Mccaul Wrote Search Results

How To: An Extended Guide on Runtime Crypters

Hello again, folks! I'm back with another (final) guide on runtime crypters which is an extension on my previous runtime crypter guide. If you have not read it yet, I highly recommend that you do since the fundamental theory of the PE format. Again, this will be a Windows-specific guide, so I'll repeat this: If you're a hater and cringe at the slightest sound of Microsoft's grotesque baby, feel free to close this tab, delete your history, exit your browser, pour some oil onto your machine and...

How To: Program Your Own Little RAT (Part 1) Getting the Server Working

I saw many people asking for a Tutorial about writing their own Remote Administration Tool, so I now introduce you in a basic kind of RAT. This program is not for real use, but for learning how you could write this kind of tool. It will be basicly coded and not very refined. I used Python 3, so you have to install it if you want to use this program unchanged. Also this RAT is for Windows and almost all features won't work under Linux.

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Make Your Own Bad USB

Hello, everyone! Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice to have something related on our WonderHowTo world. So here it is!

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

How To: Fill a 7 Hour Layover in Guangzhou

One of the down-sides of international long-haul travel is layovers between flights in unfamiliar places. We have a flight to Europe this year via Guangzhou, China, and I've been putting together my notes on how to make the best use of 7 hours between flights, which I'd like to share.

How To: Inflate Any Ball Without a Pump or Needle

What happens when you find your ball deflated and there's no pump or needle in sight? You could always cancel your plans of kicking around the soccer ball or starting that pickup football game in the park. Better yet, you could be terribly clever and find another way to get air into the ball. From a pen to a balloon to a gas station, there are ways to inflate it.

How To: Watch the Hobbit

Many people that I know who have gone to see the Hobbit have come back unimpressed or annoyed with the film. I LOVED it. When those non-specific people, cough Loziers cough, gave me their reasons for not liking the movie, I was very annoyed... I considered the demands that they were placing on Peter Jackson and his team to be very high and unreasonable. So, as a method of venting my anger, here is how to watch the Hobbit. If you’ve read Lord of the Rings and the Hobbit, please, go back, and R...

How To: Find Out If the FBI Is Keeping Tabs on Your Apple Device (UPDATED)

It's no secret that there's a lot of surveillance going on these days. It's easier than ever to end up in a database, and even former government agents are speaking out about the atrocious amount of spying being done against our own citizens. They've targeted our laptops, cars, IP addresses, and now they're coming for our iPhones. AntiSec hackers managed to get their hands on a list of over 12 million Apple UDIDs (Universal Device IDs) from an FBI computer, and they published 1,000,001 of the...

How To: Write an effective letter of recommendation

Letters of recommendation are important in the business world. If you have been asked to write about a coworker, student or friend, check out this tutorial. Takes you through a step-by-step process you can use to produce a professional-looking and highly effective letter of recommendation. Includes how to structure your letter, how to personalize it for your candidate, and how to make it convincing to the recipient.

How To: Burn an ISO file to a blank CD using Burning Studio

Learn how to burn an ISO file to a blank DVD or CD using Ashampoo burning studio. What you will need: - Ashampoo burning studio- A blank CD/DVD- A CD/DVD drive which can burn CDs/DVDs 1. Open up Ashampoo Burning Studio and go to "create/burn disk images" then click the first option. 2. Browse for you ISO file. 3. Click on "next" and then insert a blank DVD or CD (use a CD for files less than 700mb). 4. Select the CD/DVD drive under "CD-writer". 5. When you see a green tick, click on options a...

How To: Fill in a scorecard for golf

This video shows the viewer how to fill in a standard golf score card. The video shows a man filling in a score card with fictitious scores to demonstrate how a card should be filled in correctly. The video also shows how to incorporate a player’s handicap into a scorecard.

How To: Write a cover letter in 30 seconds using a Mac

This video features a very handy technique for writing a cover letter in less than a minute- and all you need is a tool called Text Expander, which can be easily downloaded. The basic idea behind this program is that you can create shortcut keys to text that you commonly use, so you can enter in all of your basic cover letter information very quickly, and only have to customize small sections.