Continue Search Results

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

How To: Become a Hacker

Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private detectives, and many other organizations.

How To: Make Your Own Bad USB

Hello, everyone! Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice to have something related on our WonderHowTo world. So here it is!

Basics of Ruby: Part Two (Loops)

In the last Ruby article, we talked about how to store information in three different kinds of storages: variable, array, and a hash. After we get the data, we have many ways of using them, but, for right now,

How To: Change the Login Screen Background on Windows 10

Windows 10 makes it a cinch to change the lock screen background: simply go to Setting -> Personalization -> Lock screen, then change the background to whatever you'd like. But, trying to change the login screen background—the screen where you enter your password—was a long, complicated, and possibly dangerous process. Luckily, developer Krutonium has published a tool that automates the entire process, and it's very easy to use.

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

How To: Use Your Android as a Streaming Wi-Fi Camera

Not too long ago I showcased ReCam, a free app that lets you schedule recordings and use your Android device as a security or spy camera of sorts. While useful, this app required you to schedule when to record in advance, resulting in you possibly missing the footage you intended to record (assuming your scheduling wasn't as on-point as you wished).

How To: Close All Open Tabs at Once in Chrome for Android & iOS

With over 500 million downloads on Android alone, I find it safe to assume that most of us use the Chrome Browser on our mobile devices; it's great for reading articles with Reader mode enabled, syncs open tabs and bookmarks across all your devices (as long as you're signed in to your Google account), and is regularly updated with new features and optimizations.

How To: Do the Sliced Banana Trick!

How to do the sliced banana magic trick! Fool your friends and be the life of the party with this awesome magic trick! This video will show you how to cut a banana before you even peel it! All that you will need for this cool trick is a needle and a banana.

News: What to Expect from Null Byte in 2015

Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to see, and I'll try to honor as many requests as I can.

How To: Silence Notifications for Specific Message Threads in iOS 8

As hilarious and fun as group messages can be on your iPad or iPhone, they can also be equally annoying. You may not necessarily want to leave a group message thread, but you don't want to be bothered by notification after notification as participants in the conversation continue to send out rapid-fire texts. Thankfully, one of iOS 8's new features now makes it extremely easy to mute notifications from specified conversation threads, single or group.