Article Search Results

How To: Get started with MLA in Word

The video demonstrates how to get started with MLA (Modern Language Association documentation format) for an article. One of the first things that is important to understand is how to name your paper, and add a header format that will automatically paginate your paper so that you do not have to worry about it. The entries in your Works Cited need to be alphabetized and also need to be indented. Note that there is no extra space between the entries. You do not have to know how to manually form...

How To: Draw the anime character Kenshin

This is a DrawingNow.com video tutorial of how to draw Kenshin from the "Samurai X" anime series ("Rurouni Kenshin" is the title in Japan). The tutorial begins with a blank page and demonstrates, stroke-by-stroke, how to sketch out the basic structure, and then builds on this to produce the finished article. The drawing has been carried out using the tools available on DrawingNow.com's own drawing applet, but the same steps could be done in any drawing program which supports layers. The tutor...

How To: Make a realistic werewolf claw

You can't have a werewolf movie without a werewolf, but how do you make one. Well, you should start of small. Try your hands at the wolf claws. To create these furry werewolf claws, you'll need a glove and some other materials. Watch this video tutorial to learn how to make a breakable prop computer. For written instructions on the actual claws, check out the WikiHow article, "How to Make Origami Paper Claws".

How To: Learn a few motorcycle safety tips

Check out this informational safety video that provides a few motorcycle safety tips. This video was created to encourage safe motorcycle riding. Warning! This video contains SERIOUS motorcycle crash videos! Here are a few safety tips to keep motorcyclists safer. The contents of this video are paraphrased & condensed from a motorcycle magazine article. Avoid severe injury and death by learning a few basic motorcycle safety precautions.

News: 9 Notorious Hackers

I found this article a while back and I found it underneath a bunch of junk. Anyway, it's a article on 9 notorious hacker including Walter O'Brien (You know the T.V. show Scorpion? Well that's him). Not to mention the weird names:

How To: Bake a Peanut Butter Pie with Paula Deen

Paula Deen whips up a decadently rich peanut butter no-bake pie. Watch and see how easy it is to whip up this peanut butter pie recipe. The original cooking how-to video from this article was part of Paula's Home Cooking show hosted by Jamie Deen, Paula Deen. Paula Deen, owner of Lady and Sons, a famous Savannah restaurant, is Food Network's resident southern chef.

How To: I Tried 5 Different Pomodoro Apps Over 5 Days — Here's Which Helped Me Get the Most Done

Procrastination is an ugly beast. At first, it seems so innocent to spend five minutes checking Reddit or Twitter. You'll get started on work right after. Next thing you know, it's 1 a.m. and that paper is due in seven hours. Before you start another YouTube video, know you don't have to be like Spongebob. You can be like me, taking control of your productivity with the right app.

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

How To: A Guide on Runtime Crypters

What's good, peeps? I've been noticing some rather advanced tutorials slowly emerging here on Null Byte and I know that people want more of them but I've been reluctant to post something of such caliber because I fear that the information will just go over their heads, but hey, as long as it's there, people can always go off to research themselves and eventually understand. So here is my contribution to the gradual and inevitable progression of Null Byte!

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

Networking Foundations: Exploring UDP via Wireshark(Part 1)

Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-depth article. In this article I'm going to walk you through one of the main networking protocols when it comes to communication across the Internet between programs, aka UDP(User Datagram Protocol).

How To: Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators.

Networking Foundations: Subnetting Madness

Hello everyone! How's subnetting going? Did you practice a lot? I hope you did, but even if you didn't we will go through some more examples so you can be feeling confident after reading this article. It's all about that bad boy binary!

Raspberry Pi: Metasploit

Before we dive into the world of frustration, I first would like to thank whoever of the admins and mods made the folder for Raspberry Pi in the How-To's, thank you. Now with that outta the way, this article is about Metasploit on Raspberry Pi (hence the title). I should say that I ran into a error, but I think I figured what the problem is. First of all this is not on Kali Linux, but on a regular Linux OS. With that said let's open up a terminal and begin.