Language Search Results

How To: Say "I love you" in Mandarin and Cantonese Chinese

In this video we learn how to say "I love you" in Mandarin and Cantonese Chinese. To say "I love you" in Mandarin, you would say "Wo ai ni". To say this in Cantonese, you would say "ngo ngoi ney". Say each part of these words slowly and practice them to make them sound perfect. There are different dialects you need for each of the types of Chinese, so take your time when researching and practicing. Once you get these down, you will be able to learn more basic phrases and be on the way to lear...

How To: Kiss a guy

In this tutorial, we learn how to kiss a guy. First, make sure he's into you before you kiss him. Guys will be more willing to kiss someone, but it will be better if you both like each other. Then, make it apparent that you want to kiss him by flirting and having a lot of physical contact with him. If he doesn't try to kiss you, show him with body language that you are into him. Touch his arm or his shoulder and joke around with him to show him you want him. After this, look into his eyes and...

How To: Say 'what is your name' and 'my name is' in French

Meeting new people can be hard for some people, especially if they're using a different language, like French. This video will teach you how to say "what is your name" and "my name is" in French. To ask someone their name, a stranger or someone older than you, ask, "Comment vous appelez-vous?". When asking someone your own age, it's "Comment tu t'appelles?" To answer, say "Je m'appelle" + Your Name. Example: "Je m'appelle David."

How To: Get the Bridge Limbo achievement in Just Cause 2

Don't let the fact that the text in this tutorial is in a different language. Aside from that, everything still remains the same on what you need to do in order to unlock the Bridge Limbo achievement in Just Cause 2. All you need to do is fly an airplane under 30 unique bridges in Panau and you'll have 20 gamer points for you to take home. This may take some time to complete and it can be a bit tricky. So good luck and enjoy!

How To: Unblock Facebook at school with Google

This video will show you an interesting trick which you can use to access Facebook or other web pages on a school server or other place where Facebook is normally blocked with the help of Google. You will need to first go to the Google homepage and find the button at the top of the toolbar which says "more" and go to the pull-down option of "even more" options. This will open up a new web page. You should then go down to the "translate a webpage" option on the right hand column of results and...

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.

How To: 11 Ways Apple's Reminders App Is Even Better with iOS 18, iPadOS 18, and macOS 15

With iOS 18, you get better note-taking capabilities in the revamped Notes app, advanced features like conversions and results history in the more powerful Calculator, and interactive Math Notes, a feature in both apps that's a game changer for students and professionals dealing with complex equations. But Apple didn't forget about Reminders, which has become more than a simple to-do-list app.

How To: Unlock Your iPhone's Many Hidden Text-to-Speech Features to Make It Read Virtually Any On-Screen Content

Speech-to-text technology can be seen on your iPhone in various places, from the Dictation tool to Apple's new behind-the-scenes, auto-created transcripts for podcast episodes. Your iPhone also has some pretty impressive text-to-speech capabilities. With them, your iPhone can read webpages, documents, or whatever text is on the screen out loud to you — only some of these tools aren't easy to find.

How To: Use Google Search Operators to Find Elusive Information

Google is an incredibly useful database of indexed websites, but querying Google doesn't search for what you type literally. The algorithms behind Google's searches can lead to a lot of irrelevant results. Still, with the right operators, we can be more exact while searching for information that's time-sensitive or difficult to find.

News: Apple Just Released iOS 12.3 Public Beta 2 for iPhone, Features Small Updates to Wallet & Date/Time

Apple just released the second public beta for iOS 12.3 today, Tuesday, April 9, one day after the release of the iOS 12.3 developer beta 2. This update introduces new Japanese "Date & Time" updates as well as changes to Wallet transactions. Overall, iOS 12.3 includes Apple TV Channels, premium monthly subscriptions with content available directly in the TV app across the Apple ecosystem.

News: Apple Just Released iOS 12.3 Developer Beta 2 Today, Includes Date & Time Features & Updates to Wallet Transactions

Apple just released iOS 12.3 dev beta 2 today, Monday, April 8, which follows the first iOS 12.3 beta by twelve days. This update introduces new Japanese Date & Time features as well as updates to Wallet transactions. As a whole, iOS 12.3 introduces Apple's previously announced Apple TV Channels, premium monthly subscriptions with content you can watch right in the TV app across Apple products.

Hacking macOS: How to Use One Tclsh Command to Bypass Antivirus Protections

Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the device. As an alternative, we'll use the lesser-known Tcl shell which can handle abrupt backdoor disconnections.

Basics of Ruby: Part 1 (Data Types/Data Storage)

Ruby is a dynamic, general-purpose programming language created by Yukihiro "Matz" Matsumoto in Japan around the mid-90's. It has many uses but with it's flexibility, it makes a great language to write exploits in. In fact, the entire Metasploit Framework is written in Ruby! The sole purpose of this series is to teach hackers the basics of Ruby, along with some more advanced concepts that are important in hacking.

Where Do I Start: Learn the Fundamentals

I am very new to Null Byte but I find much of its content and community incredibly interesting. I spent quite a bit of time just chronologically going through the posts and I noticed a common theme in many of the beginner posts. Many people seem to want to know the 'secret' or a paragraph on "How to Hack" and become a hacker in a few minutes. I started off this post as a reply to a question from a beginner but thought it might be beneficial to have for those stumbling across this site.

How To: Install the New S Translator from the GS4 onto Your Samsung Galaxy S3

If you watched Samsung's Unpacked 2013 live last month, where they announced the new Galaxy S4, you probably sat through this awkward skit: This was Samsung's way of introducing their new translation software, dubbed S Translator. In the skit, the backbacking American traveler in Shanghai typed his question in English, and the phone spoke it aloud in Chinese. The other man replied in Chinese, and the app translated the message back into English. Live conversation translation aside, the app ca...

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

How To: Recover deleted files and lost data with PC Inspector

In this data recovery tutorial the instructor shows how to recover deleted files and lost data using a free software called PC Inspector. On your computer you may loose data sometimes due to a corrupted hard drive, or because you deleted it accidentally or some other reason. Now some times you will need to recover that important data and it will cost you hundreds of dollars to get it done outside by the professionals. Now you can avoid this and use a free software called PC inspector and reco...

How To: Tell if a guy likes you or not

Body language is one way to tell if a guy likes you. He will lean towards you or look at you a lot. If he likes you, both feet will be pointed towards you. If he doesn't like you, one foot will be pointed at the door. Eye contact is another way to tell if he likes you. If he is shy, he will turn his head quickly when you catch him looking at you. He may try to catch your gaze and hold it, which could be uncomfortable to you if you don't like him as much. Guys will try to make themselves seem ...