Informative Article Search Results

How To: A Guide on Runtime Crypters

What's good, peeps? I've been noticing some rather advanced tutorials slowly emerging here on Null Byte and I know that people want more of them but I've been reluctant to post something of such caliber because I fear that the information will just go over their heads, but hey, as long as it's there, people can always go off to research themselves and eventually understand. So here is my contribution to the gradual and inevitable progression of Null Byte!

How To: Wear an American Apparel Le Sac dress (art deco look)

One of American Apparel's most famous articles of clothing for women is their Le Sac dress, which is no ordinary dress. It's simplistic look mocks it ingenious design, which can be shaped, formed, mutated, tie, and tucked in at least TWELVE different ways to create a different dress for each day of the week. The Architectural Mini look is just one of the ways to style it, and this video shows you exactly that. Use this art deco style for a sexy, architectural inspired halter look.

How To: Wear an American Apparel Le Sac dress (The Dominatrix)

Can you believe this dress? American Apparel have outdone themselves again! A dress that's not just "one" dress, but at least "eight" dresses. The Le Sac dress is a marvelous article of clothing because it can be worn every day of the week… without looking like a hobo. It's a different style each day, with at least TWELVE different styles. And there's even a look for you dominatrices out there, a super sexy and daring S&M style Dominatrix look. See how easy it is!

How To: Wear an American Apparel Le Sac dress (The Grecian)

American Apparel is famous for selling articles of clothing that can be worn in multiple ways. Their latest creation is the Le Sac dress. This dress can be tied and twisted all over the place to come up with TWELVE or more styles! You can wear this outfit every single day and everyone would think you were in something new. So, if you are looking for a sexy, Greek-inspired off the shoulder look, check this official tutorial out for the Grecian look. Learn how to wear your Sac and look amazing.

How To: Make a Lock Pick Out of a Paper Clip and Multi-Tool

The fine folks at ITS Tactical made this detailed tutorial on how to make a two-piece lock pick set out of only a few paper clips and using only a multi-tool in the construction. The host begins by demonstrating how to construct the pick, then how to use it on a real lock. It is not as easy as using a real lock pick, but will still work. As the host emphasizes at the beginning of the video, these picks are only to be used in emergency situations, and NOT to break into other people's homes wil...

How To: Build an Evasive Shell in Python, Part 1: Introduction & Concepts

Hello, everyone. Stealth is a large part of any successful hack; if we don't get noticed, we're much less likely to be caught. In these next few articles, we'll be building a shell based on keeping us hidden from a firewall. There are many ways to stay hidden from a firewall, but we'll only be incorporating a couple into our shell. This article will outline and explain these evasion concepts and techniques.

Raspberry Pi: Metasploit

Before we dive into the world of frustration, I first would like to thank whoever of the admins and mods made the folder for Raspberry Pi in the How-To's, thank you. Now with that outta the way, this article is about Metasploit on Raspberry Pi (hence the title). I should say that I ran into a error, but I think I figured what the problem is. First of all this is not on Kali Linux, but on a regular Linux OS. With that said let's open up a terminal and begin.

News: Announcing the Null Byte Suite!

Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...

How To: Find Hacked Accounts Online ~ PART 1 - haveibeenpwned

You must have read news about hackers dumping the data online, recent one was Ashely Madison. It's only the big companies' data, which gets noticed once it is out. There are many other small leaks which don't even get a mention. So this article is the first one of my series which will help you to find hacked accounts. Some of you must already know about this, but this post is intended for the new learners. This also serves as an example of my learning how a good service can be used in other w...

How To: Give an effective Swedish back massage

You start the Swedish back massage first by putting lotion in your hands to warm it. You first use long fleeting strokes and work your way into shorter spinal column strokes (remembering of course to keep even pressure). You then move to the petrissage stroke running your hands smoothly interchanging the openness of your fingers alternately all across the back. You then go back to work on the trapezes remembering to push outward from the spinal column. The video also brings up the concept of ...

How To: Pipe cake lilies, morning glories & roses

This is a great instructional video on how to pipe cake lilies, morning glories and roses. In this video you can learn the techniques on how to decorate cakes. It shows you how to pipe flowers such as lilies, morning glory, roses, leaves and stack cake. You can learn almost anything you need to know in just 10 minutes by watching this informative video. This teaches you to decorate cakes beautifully. This Pipe cake lilies is becoming more and more popular these days. The decorating methods ar...

How To: Develop a perfect pull-up so you can save yourself

Many, many Americans cannot do a single pull-up. That is just the state of our society. And it means that these people, if faced with a survival situation where they are dangling for a ledge or need to scale a building, are less likely to survive than they could be. This video will teach you how to develop your pull-up motion and techniques to improve your strength and survival ability.

How To: Make a eurpoean hand tied bouquet

This is a demonstration of making a hand tied bouquet.Keep all the required articles nearby on the table.Take a few stems of lemon grass and bind them with a wire to form a single bunch.Tie the aspedestra leaves in a loop with wrapping a wire to the stem.Now take the stems with single flower like movie star roses or carnations or iris or tulips pluck or cut the loose petals.Now hold one of the stems loosely in the left hand,now with the right hand place the second stem so that the flower is o...

How To: Check spelling and grammar in MS Word 2010

This video tutorial is a quick explanation of the ins and outs of spell and grammar check when using MS Word 2010. One of the main things highlighted in this video is that unlike previous additions, this year's version offers more contextual correction. For example, when the word their was used in an article, it was spelled correctly but used in the wrong context. The spell and grammar checker will underline this to let you know that it is incorrect. If you hit the spell and grammar check but...

How To: The Best Way to Bypass Website Paywalls & Unlock Full Articles on Your iPhone

One of the most aggravating things that can happen on Facebook, Twitter, and other social media apps is when a friend shares an exciting story, and a paywall prevents you from reading any of it. You could pay for a subscription to unlock it, but there are so many news sites that it can be both confusing and expensive to spend money on all of them.

How To: The Simple Trick to Stop Your iPhone from Automatically Going to Sleep

You're halfway through reading an article on your iPhone, when the display just turns off. Frustrated, you open the article again, only for the display to go black again. You shouldn't have to keeping touching the screen to keep your iPhone from going to sleep. Luckily, you can delay or even stop your iPhone from doing so with just a few taps.

Networking Foundations: Exploring UDP via Wireshark(Part 2)

Hello ladies and gentlemen, welcome back to the Part 2 of our UDP & Wireshark adventure as I promised. Last time we discussed about what DNS is and how it uses UDP as its transport protocol but we left some unexplained parts behind and I'm about to investigate those with you. I would advice you to go back to Part 1 so you can have a clear understanding in case you don't feel comfortable with the topic. So our computer made its request to the DNS server and asked "Hey, I want to find out what ...