Y and I Know It

Rasberry Pi : Connecting on Computer

I have gotten comments from my last tutorial on not being able to do anything because of a lack of a monitor. In order to address this problem I'm gonna show you how to connect and control the Rasberry Pi through a SSH client on Linux, Mac, Windows, and Chromebook computers. T ...more

Android Basics : What Is Root?

If you're completely new to Android, you're in for a treat with all of the software tweaks and customization options that your smartphone or tablet offers out of the box. But if you really want to take things to the next level, the ability to mod your device expands exponentia ...more

How To : Web Development 03 - Styling Pt 1

Welcome fellow Null-Byters! I would suggest you watch reading my last tutorial before we begin. In our last adventure, we began making a simple, ugly website. If we want it to make it look good, we should add some styling. But first, we need to understand the basics. What Is ...more

News : Announcing the Null Byte Suite!

Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a whil ...more

How To : Navigate Hands-Free Using Voice Commands

Google Maps, in conjunction with the Android operating system, is a powerful tool for navigation that is often underutilized. While it's no secret that it can get you to wherever you're going and back, some of you might not know that you can use Google Maps without even having ...more

News : Anonymous vs ISIS

As you all know, Anonymous have declared cyber war on ISIS and have already proven what they are capable of and whats to come. ISIS: I don't even want to go over this section because you all know who they are, what they can do, and what they have recently done. sadly. Anony ...more

News : Inside Bitcoin - Part 2 - Cryptographic Hashes

If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding. Today we are going to explore some of the inner workings of Bitcoin. As we previously learned in th ...more

How To : Cross Site Scripting (XSS) Basics

Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them Step 1: What Exactly Is XSS? Basically, cross site scripting is a type of security hole in a website's forms. Normally forms allow you to i ...more

How To : Hack WPA/WPA2-Enterprise Part 2

In the second part of this tutorial, we are going to crack the hashes that we've captured previously. I'm going to explain how to do it with the powerful John the Ripper. It comes with Kali by default, so no need to install! Using John the Ripper If you don't know nothing ab ...more

How To : Install Decking Posts

G'day, Knuckleheads, and welcome to Episode 22 of my Owner Builder Series. In this video we look at cutting and setting up Verandah / Decking Posts. It's really important that you get thuds right as nothing looks worse than badly set up posts. Check it out and let me know what ...more

How To : Hack Metasploitable 2 Part 1

This tutorial is for people who want to try different types of hacks in an environment that is the same for everyone so it will help people to ask questions and learn. This series assumes you know how to run a VM and network them together. This series also assumes that the ser ...more

How To : 8 Menu Bar Apps Every Mac Power User Needs

The menu bar is a great place to perform quick searches, track battery life, and switch Wi-Fi networks on your Mac, but it can do way more than that if you let it. I've rounded up some menu apps below that not only have features that will boost your productivity, but are light ...more

How To : The Best Way to Peel a Mango

For the longest time, I only ever did one thing with mangoes. I would cut off a chunk of the fruit, squeeze some lime over it, and eat it straight out of my hands as though it were a watermelon slice. I didn't do this because I loved devouring mango in the messiest way possibl ...more

How To : Hack Windows 7 (Become Admin)

Step 1: Introduction: Hello! Hackers In this tutorial I will tell you how to hack windows 7 administrator password. However you already know (I think) Specifically, it is used in school, computer labs or other workplaces, where, administrator is locked with a password, while ...more

How To : 3 Tips to Better Tasting Beer

We are living in a golden age of craft beers. Originally invented by the ancient Egyptians, every culture now has its own tastes regarding beer. The process of making beer is so multi-faceted, it's a miracle that any gets made at all. However, there are lots of steps along th ...more

How To : Noice Adds Sounds to Emojis on Your iPhone

As messaging and texting have all but replaced the need to actually call someone, emojis have seemingly replaced our need to type out text. With a simple emoji, you can relay emotions like "I don't feel very well" or "I love you" quickly and easily, knowing that the other part ...more

How To : Make Delicious Horchata

You know how you can go to those little Mexican restaurants that have the refreshing drink machines full of that sweet rice drink, horchata? Did it ever seem like some kind of arcane powdered mix or a secret recipe you would never know? If you've ever found a recipe, did you i ...more

Ingredients 101 : Buying, Grinding, & Tempering Spices

The world of spices can be bewildering. They promise to make your food more flavorful if you know how to make the most of them. Unless you know a couple of essential tricks, however, it just seems like you're adding bits of colored powder to your food. Most cooks buy a few bo ...more

Hack Like a Pro : Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more

News : Tough Decision!

15Do not be feared by the title. It's for a structure i'm building at the moment! I was bored in the vacation so i started building a castle, now i have come to this point where i'm completely not finished, but i was rambling around with Ping, and i changed my WHOLE CASTLE, L ...more

How To : Spot an Undercover Narcissist

Humans in general are great at keeping things about themselves private, from feelings to personality traits. While smartphones and social networks are making these secrets more open, narcissists have and always will love being out in the open with everyone's attention on them. ...more

How To : PvP Like a Pro

Have you ever been called a "noob" or "eZ" after some person kills you? have you ever said "you hack" or "you suck" after getting your butt kicked by another player? this wont ever have to happen again. It is actually possible to be very good at PvP in Minecraft, and you can a ...more

News : Join the Google Cast Chrome Extension Beta Program

Google has opened up their Beta version of the Google Cast extension for the Chromecast. If you don't know, you can cast tabs from a Chrome browser to your Chromecast connected display. Today, they've released the beta version of the extension to the public, and you can grab i ...more

  • Hot
  • Latest