Command Post Search Results

How To: Make rolling pinwheels with post it's

From the creators of the Diet Coke and Mentos experiment, EeepyBird demonstrates how to have fun with sticky notes. All you need is a stack of post its, and a glue stick. Glue each post it to one another, alternating sides, to create a chain. Next connect in a post it circle & you get an amazing post it pinwheel! Fun paper craft project. Enjoy.

How To: Train a Dog the Basics

Dogs need to be trained to understand a few basic commands for their own safety and for your own happiness and peace of mind. Learn basic dog training commands with tips and advice from a professional dog obedience trainer in this free dog training video series.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Make Android 10's Dark Mode Turn on Automatically at Night — No Root Needed

Android 10's new dark mode is a pleasure to behold for longtime users. Ever since OLED panels became widespread, we've been clamoring for the feature. But now that we have it, there's a new problem: it doesn't turn on automatically based on time of day. Thankfully, a simple app can turn dark mode into a true night mode.

How To: Make ADB & Fastboot Work in Any Folder on Windows

Unless you're experienced using the Linux terminal, running ADB and Fastboot commands can get confusing very fast. The problems often stem from having to hunt for various files — usually IMG or ZIP files that you need to mod your Android phone — and then move them to your platform-tools folder, which, depending on how you installed ADB in the first place, could be anywhere.

How To: Using BASH for Computer Forensics

Greetings to all geeks, hackers, nerds, and explorers of Null Byte. Welcome to my brand new tutorial, "Using BASH for Computer Forensics". This tutorial will give you a look at how the computer programming language, Bash, can be used to find out details on apple devices for later use.

How To: Antisocial Engine

A.E Hi again this is my second post on nullbyte. The first one was on how to make a remote screenshot captor, now I will give you a presentation for a project of mine(I have named It Antisocial Engine) that It is not something extraordinary but will help many guys.

How To: Do a Simple NMAP Scan on Armatige

How to do an NMAP scan on Armitage to find IPs within a certain range. Armitage is a gui interface of Metasploit, and advanced hacking/exploiting program. It can be downloaded from http://metasploit.com/ and http://fastandeasyhacking.com/ and you will need NMAP. http://www.nmap.org/

How To: Upgrade a Normal Command Shell to a Metasploit Meterpreter

When attempting to compromise a target, we want as much control as possible over the victim. Metasploit's meterpreter allows us to have immense control over the victim, the only issue is that sometimes we can't land a meterpreter. We may only be able to land a standard shell, but fear not, there is a way to upgrade our shell into the all powerful meterpreter!

How To: Use Meterpeter on OS X

Hello all, this is my first submission to null byte! I noticed something a little strange, particularly that whenever Meterpreter is discussed, it is virtually always in the context of Windows. Granted, the Windows Meterpreter is more powerful than the version that can run on OS X (it has several more commands/options), but I think it is still worth noting how to do it. I've even seen some people mistakenly say that Meterpreter can only be run on Windows, which is not true. Meterpreter can ea...

Android Basics: How to Install ADB & Fastboot on Mac, Linux & Windows

ADB and Fastboot are probably the most essential tools for any Android aficionado. They can do everything from backing up your device to unlocking your bootloader with a few simple steps. This paves the way for many new tweaks and customizations that weren't possible before. The required platform works with the three most popular computer operating systems, too, which is good news for everyone.

Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows)

Welcome back, my hacker novitiates! In the previous two posts in this series, we looked at the basics of buffer overflows. In this post, we will look at one technique for finding buffer overflows. We will try to send random, oversized, and invalid data at a variable to see whether we can make it crash or overflow. This process is known as fuzzing. It is often the first step to developing an exploit, as we need to find some variable that is susceptible to overflowing.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 10 (Manipulating Text)

Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.

How To: Shut Down Your PC and Send Other Commands Remotely Through Twitter Using TweetMyPC

Ever been halfway to work or school and suddenly remembered you forgot to log off your computer? A lot of people are constantly logged in to email and social media accounts, so if you have a mischievous roommate or sibling, this situation could be disastrous. That's where TweetMyPC comes in—it's a free Windows application that lets you send commands to your computer just by tweeting. Image by Twittermania

How To: Use the Black & White grayscale conversion command in Adobe Photoshop CS5

Want to turn an image into black and white? With Photoshop CS5's Black & White command, it's easy! This clip will show you how to use it. Whether you're new to Adobe's popular raster graphics editor or a seasoned designer looking to better acquaint yourself with the new features and functions of the latest iteration of the application, you're sure to benefit from this free software tutorial. For more information, watch this video guide.

How To: Beat the Tactical Command Challenge with flawless gold ranking in StarCraft 2

Starcraft 2 is finally upon us after 12 years of waiting, and it is just as majestic as you would hope it would be. If you're new to the series or just haven't played in five years, the barrier to entry for the unskilled can high, especially if you prefer playing online multiplayer. Fortunately for you, we've compiled videos on just about everything you need to know about the game, including strategies and tips for winning with different races in different modes and situations, and even how t...

How To: Install a seat post

This is a video tutorial in the Sports category where you are going to learn how to install a seat post on your bike. This is pretty easy. But, it's important that you get proper measurements for the inside and the outside diameter of the tube using a caliper. Now find the correct seat post and the seat clamp. Fix the clamp on the tube. Put generous amount of grease on the bottom part of the seat post and on the inside part of the tube and slide the seat post inside the tube. There is a minim...

How To: Use a post hole digger as a measuring stick

Here is a simple technical to measure hole you dug with a post hole digger. Take measuring tape. Place it with the post hole digger from bottom to the end of the post hole digger. Mark each foot division on the post hole digger with a marker. So now you can measure depth of the hole you dug with post hole digger without the need of a measuring tape. If you want to dig 2 feet deep down the earth and you could not find a measuring tape to measure, but markings on the digger will help you to mea...

How To: Make gemstone post earrings with snap fit findings

Gemstone earrings are quick to make at home, not to mention cheaper and more customized. To make gemstone post earrings with snap fit findings, you'll need snap fit post findings, ear clutches, gemstones to match the finding, and bent chain nose pliers will help. Learn how to make gemstone post earrings with snap fit findings by watching this video jewelry-making tutorial.