Article I'll Search Results

How To: Calculate what your maximum heart rate is

Your maximum heart rate is an important piece of information to know if you are exercising seriously and want to make sure you are going hard without damaging your body. This video will teach you an easy, conservative way to estimate your maximum heart rate. With this knowledge and a heart monitor you will be able to assess the quality of your workout more accurately.

How To: Line-dry your clothes

Looking for a way to save on your energy bills at home? How about line drying your clothes? According to the Energy Information Agency, clothes dryers account for 5.8 percent of home electricity usage. Line-dry your washed clothes and linens to keep them from wearing out, and save money on your energy bill at the same time.

How To: Get a good divorce

In this how-to video, the LoveFeed tackles The Washington Post's article, "How To Have A Good Divorce." Divorce is stressful, but it doesn't need to be ugly. Watch this video relationship tutorial and learn how to get a good divorce.

How To: Stop electrical hum on an Wurlitzer Electric Piano

While one can achieve a number of realistic vintage keyboard sounds through sample libraries like the Reason Abbey Road Keyboards refill, there's no beating the genuine article. If you find a vintage keyboard, however, it may need any number of repairs to get it sounding like it should. In this how-to, you'll learn a few quick tips for getting rid of electrical hum on a Wurlitzer 200 Electric Piano. Take a look!

How To: Remove AC hum from a Wurlitzer 200 Electric Piano

While one can achieve a number of realistic vintage keyboard sounds through sample libraries like the Reason Abbey Road Keyboards refill, there's no beating the genuine article. If you find a vintage keyboard, however, it may need any number of repairs to get it sounding like it should. In this how-to, you'll learn how to get rid of electrical hum in a Wurlitzer 200 Electric Piano. Take a look!

Raspberry Pi: Hacking Platform

First of all, I would like to apologize for a week long absents for the tutorials of this newly series, Raspberry Pi. But obviously I'm back and I present all you guys a article on turning your Raspberry Pi into a hacking platform. I'm gonna use the platform Kali Linux for the Raspberry Pi. I should note that I'm not gonna go into detail on how to install Kali Linux since OTW already has done a tutorial on how to turn your Raspberry Pi into a Hacking Pi. The point of this particular tutorial ...

How To: Bypass Paywalls in Safari to Read Any Article on Your iPhone

Paywalls make it nearly impossible to access certain content unless you have a subscription. It's a practice that many news organizations and other online publications use to increase revenue: The New York Times, The Wall Street Journal, Vanity Fair, Wired, and so many more. But just because a paywall is in place doesn't mean you can't get around it on your iPhone.

News: Nova Launcher Receives Updated Google Now Page

One of the better additions in the stock Android launcher is the Google Now page. Residing to the left of the home screen, this page presents a host of information based on the user's interests, which Google bases on analyzed data. Recently, the Google Now page design received a makeover which Nova Launcher users can now enjoy.

How To: A Guide on Runtime Crypters

What's good, peeps? I've been noticing some rather advanced tutorials slowly emerging here on Null Byte and I know that people want more of them but I've been reluctant to post something of such caliber because I fear that the information will just go over their heads, but hey, as long as it's there, people can always go off to research themselves and eventually understand. So here is my contribution to the gradual and inevitable progression of Null Byte!

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

How To: Overclock an Intel Core i7 processor

Check out this overclocking tutorial from HotHardware.com! Intel's Core i7 processor offers a significant performance increase over previous generation Core 2 processors. In addition, like the legacy Core 2 architecture, the new Core i7 also has a bunch more headroom for wringing upside performance out of the chip, maximizing value, power and return on your investment with overclocking. In fact, Intel actually built-in a predefined overclocking feature called "Turbo Mode". We explain how not ...

How To: Wear an American Apparel Le Sac dress (art deco look)

One of American Apparel's most famous articles of clothing for women is their Le Sac dress, which is no ordinary dress. It's simplistic look mocks it ingenious design, which can be shaped, formed, mutated, tie, and tucked in at least TWELVE different ways to create a different dress for each day of the week. The Architectural Mini look is just one of the ways to style it, and this video shows you exactly that. Use this art deco style for a sexy, architectural inspired halter look.

How To: Wear an American Apparel Le Sac dress (The Dominatrix)

Can you believe this dress? American Apparel have outdone themselves again! A dress that's not just "one" dress, but at least "eight" dresses. The Le Sac dress is a marvelous article of clothing because it can be worn every day of the week… without looking like a hobo. It's a different style each day, with at least TWELVE different styles. And there's even a look for you dominatrices out there, a super sexy and daring S&M style Dominatrix look. See how easy it is!

How To: Wear an American Apparel Le Sac dress (The Grecian)

American Apparel is famous for selling articles of clothing that can be worn in multiple ways. Their latest creation is the Le Sac dress. This dress can be tied and twisted all over the place to come up with TWELVE or more styles! You can wear this outfit every single day and everyone would think you were in something new. So, if you are looking for a sexy, Greek-inspired off the shoulder look, check this official tutorial out for the Grecian look. Learn how to wear your Sac and look amazing.

How To: Make a Lock Pick Out of a Paper Clip and Multi-Tool

The fine folks at ITS Tactical made this detailed tutorial on how to make a two-piece lock pick set out of only a few paper clips and using only a multi-tool in the construction. The host begins by demonstrating how to construct the pick, then how to use it on a real lock. It is not as easy as using a real lock pick, but will still work. As the host emphasizes at the beginning of the video, these picks are only to be used in emergency situations, and NOT to break into other people's homes wil...

How To: Build an Evasive Shell in Python, Part 1: Introduction & Concepts

Hello, everyone. Stealth is a large part of any successful hack; if we don't get noticed, we're much less likely to be caught. In these next few articles, we'll be building a shell based on keeping us hidden from a firewall. There are many ways to stay hidden from a firewall, but we'll only be incorporating a couple into our shell. This article will outline and explain these evasion concepts and techniques.

Raspberry Pi: Metasploit

Before we dive into the world of frustration, I first would like to thank whoever of the admins and mods made the folder for Raspberry Pi in the How-To's, thank you. Now with that outta the way, this article is about Metasploit on Raspberry Pi (hence the title). I should say that I ran into a error, but I think I figured what the problem is. First of all this is not on Kali Linux, but on a regular Linux OS. With that said let's open up a terminal and begin.

News: Announcing the Null Byte Suite!

Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...