In this clip, you'll learn how to play an MP3 file within a VB app. Whether you're new to Microsoft's popular event-driven program language & IDE or a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free Visual Basic programming les ...more
Take an .flv video clip and embed it as a Flash movie, complete with stop, play and pause buttons to control the video. This tutorial shows you how you can use the Adobe Flash software to set up your own embedded videos.
Welcome back Hackers! We have embed a Backdoor in to a PDF file,Android package File. In this tutorial we will embed a Backdoor in to an exe file. lets start, Open msfconsole To create the embed exe we need the executable file.I am using idm to create the Backdoor. Lets cr ...more
UPDATE: This post is outdated, the latest version with the correct links and updated instructions can be found UPDATE: This post is outdated, the latest version with the correct links and updated instructions can be found at my blog, here - at my blog, here - https://techkerne ...more
UPDATE: This post is outdated, the latest version with the correct links and updated instructions can be found at my blog, here - https://techkernel.org/2015/12/19/embed-metasploit-payload-in-apk-manually/ Hi guys, I'm here again with my second tutorial, as I promised. Metas ...more
Learn how to import and attach mp3, mov, and wmv files to your website both by embedding and linking the files with Adobe Dreamweaver
Blogger Jimmy R. demonstrates how you can embed hidden files into an innocent-looking JPEG image using the free 7-Zip and the Windows command line.
Want to make sure a message doesn't fall into the wrong hands? Try embedding it in a web image. With the Mozaic Encrypt web app, it's both quick and simple. For all of the relevant details, and to get started adding secret messages to image files yourself, watch this home-comp ...more
One of the more impressive new features in Dreamweaver CS4 is the ability to work with Smart Objects between Dreamweaver and Photoshop. It’s now possible to import a fully-layered, fully editable Photoshop file into Dreamweaver. Dreamweaver will help compress the file by compa ...more
Why a PDF Portfolio? If you've been wanting to create a PDF (portable document format) portfolio for your photos, art or design work, or wanted to create a PDF magazine that can be read by anyone on the net, then this article will show you how to go about it. I created my PD ...more
With Aperture, you can include IPTC metadata when you export a version of an image and embed it when you export a master file.
To start off the process of publishing your access database online we first look at a sample MS ACCESS database with typical formats and a online searchable application where users can search by library name or city and get details of the library. There are 3 steps to publish ...more
Found a video on YouTube that's perfect for your Keynote presentation? It's easy to embed YouTube clips on websites, but how can you successfully insert them into something like a Keynote project? It's actually quite easy! This video, just over a minute long, shows you the bas ...more
Radford University demonstrates how to upload pictures, embed videos and then publish them in Blogger. Log into blogger and go to your dashboard page. Click edit posts or create a new post. In the blog editor choose edit image from the toolbar. You can now add an image from a ...more
This is a tutorial showing you how to easily hack flash (.swf) games! You only need two things: A flash game (in .swf format) and Flasm (an amazing flash disassembler). Getting Flasm Download Flasm Flasm can be downloaded from the no|wrap.de website. Save & Extract Save ...more
Looking for an easy way to hide a file or folder? Try embedding it within an image file. It's easy and this clip presents a complete, step-by-step overview of the process. For more information, including detailed instructions, and to get started embedding files within JPEG fil ...more
This video tutorial is in the software category where you will learn how to put a YouTube video into a PowerPoint presentation. First you go to the YouTube video that you want to put in your presentation and copy the URL in the address box. Then you go to one of the file conve ...more
INTRODUCTION In this world of Internet era, almost everyone wants to create theirs own web presence by either hosting their own blog, articles, photos, videos, reviews, etc etc . But some people choose their own way and decide to have something bigger! What is it? Its a websi ...more
This genius video shows the viewers how to easily embed and add a YouTube video into a PowerPoint presentation with no internet connection! First you will need to make sure you are using Firefox. After getting Firefox, make sure you install a Firefox Add-on called Video downlo ...more
This video will show you how to embed subtitles into video files using the free softwares VirtualDub and dvXLand. Embedding subtitles with VirtualDub and dvxland allows you to add subtitles to your videos without having to keep two separate files. The software used in the vide ...more
Facebook Fan Pages have become extremely popular and are being used by everyone from large companies like Coca Cola and Ford Motors all the way down to people's pets. So how do we make the most of these fan pages and get our brand out the best that we can? Custom Landing Page ...more
First thing you want to do is to find a video that you want to embed in a PowerPoint file (it might be PowerPoint 2007 also). After that you might see the video and decide of the final quality of it (dependent on your internet speed ). In the right side of the video you will s ...more
It is a great video tutorial about how to create a keynote presentation to run on a windows platform. After opening the keynote presentation, click on file menu and open up the export window. This window shows different file formats and types. By using this we can export a qui ...more
PDF is a convenient format for documents that can embed text and pictures and can be read by almost any device—personal computers, laptops, smartphones, etc. However, PDFs are mostly read-only files, so sometimes it's necessary to convert them to JPG images, a universal format ...more
Since the early genesis of the brilliant Microsoft Kinect hack, inventive applications have been popping up nonstop. One of the most fascinating projects to surface recently falls within the realm of 3D printing. "Fabricate Yourself"—a hack presented at the Tangible, Embedded ...more
If you are looking to get your point across even better, why not add video to your Powerpoint presentation? In this tutorial, learn how to use Windows Media Player files in your PowerPoint project. By using Windows Media Player, you will be able to pause, start, stop and rewin ...more
In this video tutorial, viewers learn how to embed a YouTube video into a blackboard forum post. Begin by finding the YouTube video that you want and copy the URL. Then go to your blackboard post and go to a forum that you want the video to be in. Start a new thread and fill o ...more
Need to record narration for a PowerPoint presentation. Watch this video to learn how. Adding narration to PowerPoint presentations is easier than it sounds. You can record your voice to narrate your slide show and then link to or embed the sound file to your presentation. Th ...more
SQLite is a small C library that implements a self-contained, embeddable, zero-configuration SQL database engine. SQLite implements a large subset of SQL-92 and stores a complete database in a single disk file. The library footprint is less than 250 KB making is suitable for u ...more
In this Adobe Photoshop video tutorial you will learn how to edit pictures embedded in PDF files. You'll learn how to link to editing program, edit images, and save them with edits. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There ...more
Welcome to part three in a series about steganography, the art of hiding things in plain sight. We are practicing steganography because it can be a useful skill if you don't have access to encryption software, or need a quick solution to make sure the sender and recipient are ...more
In this video maniactive teaches how to embed a YouTube video in PowerPoint 2007. You must have a live internet connection to do this. Make sure your Developer tag is turned on in your ribbon. Click on the PowerPoint logo on top left , click PowerPoint options. Under popular c ...more
If you're looking for a cool way to add text to your videos, like for an opening sequence to a film where the credits are displayed, embedding the text directly into the scene is the way to go, especially if you like the hit television show "Fringe", who used these kind of emb ...more
1. To create a clipping mask in Adobe Illustrator, go to File menu select Place button. It will open a dialog box select any picture from there. 2. Click and Embed the image. 3. Now, to write a text click on the text button from the toolbar and write a text on the picture. ...more
Can a free cloud-based video editor that lives in your browser replace iMovie? In three words: yes, it can. But whether you should use it instead of iMovie or an equivalent depends not on the functionality of the editor you need, as WeVideo can do what most of what iMovie doe ...more
Technology: The Less You Know the Better? I'm sure everyone is now aware of GPS technologies and tracking techniques these days, with the release of numerous documents (even lawsuits) on big name companies like Apple, Microsoft, and Google. Yes, 2011 was a good year for eye-o ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Last week I reviewed Kinotopic, the iPhone app that lets you easily create cinemagraphs. While I loved the result, I found the app hugely flawed. Kinotopic forced you to use a Facebook log-in, and didn't store the finished video on your phone itself. Instead, you had to visit ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Ever wanted to display text in Minecraft? It's actually not overly difficult. In this tutorial, I will endeavor to guide you through the process between storing and displaying text from memory. To do this, we will examine two different methods of displaying and storing text in ...more
Introduction I will not go into some time-waster of a story about how I came to build this app. It was a prerequisite in a bigger project I am still tinkering with from time to time. What are QR Codes? No doubt you have seen these all over the place in recent years. Origina ...more
This video shows how to easily record your voice and insert a sound podcast to your WebQuest or webpage using Dreamweaver. It shows how to have the sound play on the same page without auto starting. The tutor initially goes to the Start button and in All programs selects Acces ...more
Steganography is the art of hiding information in plain sight, and in this tutorial, I'll show you how to use Steghide — a very simple command line tool to do just that. In addition, I'll go over a bit of conceptual background to help you understand what's going on behind the ...more
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look ...more
Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more
The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network firewalls as well as vigilant sysadmins. In this attack scenario, a malicious c ...more
It seems like every day now that we see a new headline on a cyber security breach. These headlines usually involve millions of records being stolen from some large financial institution or retailer. What doesn't reach the headlines are the many individual breaches that happen ...more
If you weren't aware, all music purchased online through iTunes, Amazon, and other digital audio providers have information embedded that can be used to identify the buyer and transaction of the digital music file. This may seem like something you should be disclosed about in ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
Windows XP will always have a special place in my heart—it's the operating system I grew up on. It guided me through the glory days of AIM, Napster, and MySpace, but now it's dead. The OS that had been supported by Microsoft for twelve years officially lost its support on Apri ...more
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will. Torrent clients like uTorre ...more
Encrypting payloads and encoding stagers are more effective against macOS than one might think. It's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of this project was to locate a known and easily detectable macOS payload, then ...more
Hello, everyone! Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice t ...more
It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography. In this article, I will ...more
Welcome back, my tenderfoot hackers! So many of you responded positively to my post about using the keylogger, as well as my post regarding turning on the webcam, that I decided that you might enjoy another similar hack. In this article, we will enable the audio recording cap ...more
By default, images embedded using external links will not automatically load in any emails that you get with ProtonMail. This is a security mechanism that can prevent malicious code from being executed on your system, but it can also be fairly annoying to have to manually load ...more
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on. Those are just the big ones that get reported in the news. Millions ...more
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attac ...more