Windows 7

Know Your Android Tools : What Is ADB & How Do You Use It?

Anyone who has rooted their Android device has likely used a tool called Android Debug Bridge, better known as ADB, at some point during the process. For most, that is their only interaction with the ADB, but to be a true Android power user, you need to really know the tools a ...more

How To : The Essential Skills to Becoming a Master Hacker

Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more

How To : Recover Deleted Photos from Your iPhone

In one of Apple's newer ads, the company claims that "more photos are taken with the iPhone than any other camera." If this is in fact true, then it might also be appropriate to say that more photos are accidentally deleted on iPhones than any other camera. Don't Miss: How to ...more

How To : Draw a City in One Point Perspective

Video: . Step 1: Today We Are Going to Draw a City in One Point Perspective -- Buildings in the City Going into One Point Perspective. Let's Start Our Drawing with the Vanishing Point and Horizon Line. In Order to Get the Feel of the Drawing We Need to Determine Where Vanishin ...more

How To : Know Who's Not Who They Claim to Be Online

All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are ...more

Weekend Homework : How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more

How To : Share Your Favorite Mobile Apps with Your Friends

There are over 425,000 apps in the iTunes App Store and the Android Market has over 300,000 available, which makes it really hard to tell which ones you want and which ones you don't. One of the best ways to find new mobile apps is from your family, friends and colleagues—thos ...more

How To : Install Ubuntu 9.10 (Karmic Koala) on Your PC

This tutorial will walk you through the steps required to install the Ubuntu 9.10 operating system (Karmic Koala) on your computer. I have a Suzuki Kuiper 1411 HKS notebook computer with 2.1 GHz Intel Dual Core processor, 4GB RAM and 320GB hard drive. It has a dedicated 256MB ...more

HoloLens Dev 101 : Building a Dynamic User Interface

Generally speaking, in terms of modern devices, the more simple you make an interface to navigate, the more successful the product is. The product could be a coffee maker, an electric piano, a smartphone, or computer operating system. This very idea was one reason that Window ...more

How To : Find Your IMEI & MEID Numbers

If your smartphone is ever lost or stolen, it's a terrible experience. If you file a police report, chances are the responding officer will need your device's IMEI or MEID number if you want to stand a chance of getting it back. Same goes for making an insurance claim on a los ...more

News : Islamic State (ISIS) Attacks U.S. Power Grid!

Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future. To further emphasize how important our skill set is, knowledgeable estimates put the potent ...more

How To : Build an ARP Scanner Using Scapy and Python

As you might know, there are a multitude of tools used to discover internal IP addresses. Many of these tools use ARP, address resolution protocol, in order to find live internal hosts. If we could write a script using this protocol, we would be able to scan for hosts on a giv ...more

Hacker Hurdles : DEP & ASLR

This is the first installment in a new series that I am calling "Hacker Hurdles." These are things, methods, techniques that make our job as hackers more challenging and difficult. Don't misunderstand me, these items don't make our task impossible, but rather more challenging ...more

  • Hot
  • Latest