Scanning Search Results

How To: Restore deleted PC files using the Recuva application

In this video tutorial, viewers will learn how to restore and recover deleted files using Recuva. Recuva is a freeware data recovery program. Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. Begin by selecting the type of file and continue inputting the information. Then it will begin scanning the driver for the deleted files. It will then display all the deleted files. The green files are recoverable while the red ones are not recover...

How To: Create, share & embed a C-SPAN library video clip

C-SPAN is one of the best ways to get your news on the web. Watching their videos from their website will get you up-to-date on all of the new headlines, and it will always give you a history lesson with all of the past headlines. See something interesting while watching a C-SPAN video and want others to see it, too? C-SPAN makes it easy to clip the exact portion you want, and share it with friends or embed it on a website or blog. Just follow these instructions.

How To: Set up a wireless network using Ubuntu

TheUMLabs shows how to setup a wireless network with Ubuntu. The first thing the user does in this task is open Hardware Drives. After the searching for drives box finish scanning it list available drives to install. This s then selects a driver that is available to the computer they are working on. The next thing that the user do is edit the Wireless connection. If you follow all of the steps in the video, you should be able to connect to a wireless network in Ubuntu.

How To: Beat Mass Effect 2 on the PlayStation 3

Mass Effect 2 may have been around for a whole year... but not on the PlayStation 3. And last Tuesday, January 18th, PS3 gamers finally got their hands on a copy of the critically acclaimed RPG. Actually, this is the first time any Mass Effect game has been available on the PS3, making this a historical event for BioWare.

How To: Use the Kodak ESP 3 AiO Printer and software

This interactive Kodak EasyShare software tutorial takes you through every step necessary to fully use your AiO Home Center software. If you have a Kodak EasyShare digital camera and a Kodak ESP 3 or ESP 5 All-in-One Printer, you probably have this printer suite program. Let Kodak teach you how to use the AiO Home Center software. See how to perform basic scanning with the printer, advanced scanning, basic copying, advanced copying, printing pictures, checking ink levels, and other helpful re...

How To: Set up a network tarpit or teergrube

A network Tarpit, sometimes know by the German word Teergrube, is a service or set of hosts that deliberately try to slow malicious network connections down to a crawl. The idea is to put up unused hosts or services on the network that respond to an attacker, but do things to waste their time and greatly slow their scanning (or spreading in the case of Worms). To follow along with this video tutorial, you'll need a package called LaBrea by Tom Liston and an unused IP address to tarpit. Set up...

How To: Use the Nmap security tool

This hour-long hacking tutorial looks at the Nmap security scanner. In particular, this Nmap tutorial looks at port scanning concepts, TCP three way handshake, stealth scans, idle scans, bounce scans, version detection, OS detection, NSE/LUA scripting and firewall logs. To get started using Nmap, watch this video tutorial. Use the Nmap security tool.

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

News: Police Use iPhones to ID Suspects via Face, Iris and Fingerprint Scans

Some cops already have the ability to extract data from your cell phone using handheld forensic devices, but soon police officers will have a new mobile data collection toy to play with—an Apple iPhone. Actually, it's an iPhone-based device that connects directly to the back of an iPhone, which is designed to give law enforcement an accurate and immediate identification of a suspect based on their facial features, fingerprints and even their eyes.

How To: Scan for Viruses in Windows Using a Linux Live CD/USB

Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and malware to spread. And while there's a plethora of antivirus tools for Windows, sometimes infections (such as certain scareware) can disable the install and/or use of antivirus systems and render your OS unusable until cle...

How To: Share Your Favorite Mobile Apps with Your Friends

There are over 425,000 apps in the iTunes App Store and the Android Market has over 300,000 available, which makes it really hard to tell which ones you want and which ones you don't. One of the best ways to find new mobile apps is from your family, friends and colleagues—those who have similar tastes in games and productivity. And it goes both ways, which means you need to share your favorite picks with those around you. But what's the easiest way to do that?

Weekend Homework: How to Become a Null Byte Contributor (1/29/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

Weekend Homework: How to Become a Null Byte Contributor (1/12/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, about anything you feel like sharing that is ...

How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More

Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...

News: Sing Along to Your Favorite Songs with the musiXmatch Mobile Lyrics App

You may not do it in public, and you might not admit to it among your friends, but you do it. We all do it... sing. We sing when we're alone in our cars, at home when no one's listening, and when we've had a little too much to drink and don't care anymore, all inhibitions aside. We love to croon and belt out lyrics to our favorite songs because it makes us feel good, no matter how good or how awful we are, or how well we know the words. Well... now you can at least be proud of one of those th...

Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)

Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured on the Null Byte blog, as well as the front page of WonderHowTo (providing it's up to par, of course).

News: Signal, Snowden's Favorite Secure-Messenger App, Is Now on Your Desktop

Encryption is on everyone's mind these days, from the FBI's battles in court with Apple to WhatsApp's recent announcement of end-to-end encryption for their one billion users. Now you can add Signal, whistleblower Edward Snowden's favorite messaging app, back to that whirlwind discussion. Created by Open Whisper Systems, Signal is an encrypted messenger app that allows you to send text, images, video, and audio messages without the fear of prying eyes. They already have an Android and iOS app...

How To: Get Rid of Even the Most Extreme Malware and Spyware on Your Grandma's PC

You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a bricked state. Without some serious CPR, it will be lost to you. Sure, you could just reinstall the system, but then you might lose all of that valuable data.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...