This simple Adobe Photoshop video based signature tutorial, teaches you how to create a simple effects in a forum signature. This tutorial also has some great tips for beginners explaining the use of gradient maps and clipping masks in Photoshop. Part 1 of 4 - How to Create an ...more
In this video tutorial you will learn to use Photoshop to create one of those popular forum signature images seen at many places. Learn to use tool such as Transform to resize images. You will also see how to use Polygonal selection tool to select image areas.
One of the most frustrating things on the Internet are sites that make you register just to view content. I'm not talking about paywalls—I mean the sites that make you give them personal information to look at free articles or forum threads. Most people are uncomfortable with ...more
The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data ...more
This video covers creating and programming a a PHP-based web forum. Topics include basic layout, login and logout, Admin start, creating categories and subcategories, creating topics, and more... Part 1 of 9 - How to Program a PHP forum. Part 2 of 9 - How to Program a PHP for ...more
If you like participating in online forums, you might want to have your very own signature graphic. In this video tutorial you will learn how to create one using Photoshop. If you want to promote a blog, using a signature graphic might be a good idea. Part 1 of 2 - How to Use ...more
FBI has taken down a notorious hacking forum called "darkode" where cyber criminals bought, sold and traded hacked databases, stolen bank accounts, and malicious software that steal information from other computer systems and helped each other to infiltrate other computers. Th ...more
An attacker can repurpose public MyBB forums to act as command-and-control servers. It only takes a few lines of code to configure a MacBook to fetch commands and send responses to any website the attacker desires. Before you keep reading, know that this project is not geared ...more
Since the early introduction of the internet, forums have been a popular destination for people to share their opinions with other users. This particular video shows you how to make a userbar for forums using Adobe Photoshop. It's an easy way to show your pride about a particu ...more
I'm using this page as an image uploader for official forum charts. Here's one for crafting mastery if you want to see it in action :)
This quick video gives you some basic instructions on how to embed and remove a YouTube video in a forum. Though this video shows a specific Aussiebirds Forum, the information is applicable to many forums with the same type of format. It's as simple as a few clicks. You'll be ...more
Week 01 : 9/31 - 09/06 Read Chapters 1-2 of Creating Motion Graphics with After Effects Do the exercises from each chapter you read in the After Effects Book in Lab Time. Read - How To Be An Explorer of the World - Pages 1 - 37 Do exercises 1-5 - Please document these in a ...more
Check out our Forum and give us your opinion! We want to know what you think.
My name is Mike Goedecke and I am your professor for Production 476 / 690. I have been in the production and post-production field for over 20 years. I founded and ran my own motion graphics studio called Belief for 15 years. Years ago I wrote the After Effects Classroom in ...more
We love you. Yes, you, esteemed reader. Your attention is what keeps Indie Games Ichiban World going, and we'd like to thank you for that, every single week. How? With $10! No, we're not sending you money just for partaking in this World. That is not a sustainable business m ...more
I'm having a hard time finding my older posts, so I'm sure you are too. I'll put them all here so you can find them easily. You can bookmark this if you want :) Facebook Page - Like it, Share it, Get updates about the game and new posts! Beginners Guide - Some screen shots o ...more
I have no idea what this forum is talking about but Starcraft players may find it useful.
Welcome back, my greenhorn hackers. When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. You can read more about that in my b ...more
Welcome to Minecraft World! Check out our full tutorials and make sure to post to the community forum if you have any questions or cool builds you want to share. All of these tricks were taught as a part of one of our old community workshops for the 1.2.3 update, but the majo ...more
When a phone has only one main button, it can be pretty frustrating when that one button doesn't really work anymore. If you have an iPhone 4 or 4S, you know exactly what I'm talking about. Yep, the Home button, which is prone to unresponsiveness and lag. Most users blame the ...more
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any pro ...more
Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software develop ...more
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on h ...more
Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against t ...more
One of Apple's best products is iMessage, which allows for quick, creative, and free messaging between iOS and Mac devices. However, users are reporting that conversation threads in the Messages app are occasionally out of order, which is equal parts confusing and annoying. Lu ...more
Modular origami is a technique that can be used to build some pretty interesting and impressive models of mathematical objects. In modular origami, you combine multiple units folded from single pieces of paper into more complicated forms. The Sonobe unit is a simple example un ...more
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
There are definitely some great things about iOS 7, but like any good piece of software, it's got some things to kink out—and how wallpapers work seems to be one of the biggest issues, since it's so much different than in previous iOS versions. We've seen tons of questions po ...more
If you own a Samsung phone and enjoy rooting or modding your device, flashing official firmware can be very useful. Odin is Samsung's own internal program for loading such updates for testing purposes, and it's quite easy to use for your own custom modification needs. Though ...more
The Elder Scrolls V: Skyrim set off a bang in the video game world this month. It will likely be video game of the year a few times over. Skyrim is another part to a series set in the fantasy world of Tamriel, a world filled with mystical creatures, folklore, and even its own ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
Not having internet sucks! We do a ton online these days, from working, shopping, studying, and collaborating, to watching fail videos and endlessly clicking through memes. But sometimes your mobile screen is just not big enough! So, wouldn't it be cool if you could use your ...more
If you've ever owned an HTC device or anything in the Nexus line, odds are, you have typed the word "fastboot" into your command line at one time or another. That said, odds are, you have only just barely scratched the surface of what this handy little Android tool can do. Let ...more
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python to ...more
Android smartphones have all sorts of connectivity chips built in, including Bluetooth, Wi-Fi, GPS, NFC, and mobile data. But what about AM or FM radio, two of the most common methods of wireless communication? The truth is, it really depends on your device. Some phones come ...more
Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate h ...more
Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic. The first a ...more
Because of Android's new SafetyNet system, certain apps can now block rooted users or prevent you from accessing them altogether — but at least for now, there are still ways around these restrictions. You can pass most of SafetyNet's checks with Magisk and systemless root, bu ...more
When the 6.1 version of iOS was released back in February, complaints of severe battery drainage for iPhone, iPad, and iPod touch users exploded onto every Apple-related forum on the Internet. Everyone was either losing a percentage every three or so minutes, or their battery ...more
There are a ton of options available to Android users when it come to messaging, but the problem is that with all of these options, where is the go-to app? The one used by most people? The one that can offer a more unified approach? The answer to this question lies largely wi ...more
Scary costumes are the only way to go for Halloween, but instead of shelling out upwards of 150 bucks this year for some store-bought outfit, save your cash for things like candy and create your own costume on the cheap. The Tale of Slender Man Remember the Slender Man? The ...more
The Jelly Bean update brought a lot of cool features to the Samsung Galaxy S3, but one nasty bug remained. Something was causing "Android System" usage to be consistently high. Of course, the percentage of this process that is used is dependent on what you're doing at any give ...more
In this article, I'll be showing you how to make a simple yet effective static electricity generator. Basically, this device allows you to carry a constant static charge on your body and discharge it on anything grounded or of opposite polarity. The electricity generated is ar ...more
Forum member Luciano posted a terrific guide on adding hacks to our phone by editing build.prop. The article was great, but one of best things I saw in it was the "What You'll Need" section: A current nandroid/backup of your device. Having current and complete backups of you ...more
Welcome back, my fledgling hackers! If you're like most aspiring hackers, at one time or another you've probably spent too much time playing Call of Duty and not enough time preparing for your final exams. So for today, we'll look at how to break into your school's server to ...more
Android's flexible operating system allows for lots of customization, and one of the most common ways to add personal flair to your smartphone is to set your own ringtones and notification sounds. On Android this feature is no only supported, but it's actually very simple. Ch ...more
According to a study done by Kaspersky, 7.6% of Android users root their phones. That may not sound like a lot, but with over 2 billion Android devices out there, the math works out to over 150 million rooted phones — more than the total population of Russia, Mexico, or Japan ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
Update 2: 1.9 Version3 is currently out. Click here to download and install 1.9 Version 3. Update: 1.8 is now officially out! It'll prompt you to update the next time you launch. Be sure to read the rundown of the new 1.8 features and share your thoughts in the 1.8 general im ...more
Welcome back, my eager hackers! In recent blogs, I've demonstrated how to grab password hashes remotely using Metasploit's meterpreter and pwdump. Once we have the Windows passwords from the SAM file, we can then crack these hashes using tools such as Cain and Abel. In this ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play with us on our free server. Gathering resources can be an exhausting business. Hours can be spent collecting feathers for arrows or in search of enough Ender pearls to find a stronghold. Luckily with e ...more
When the specs for Google's Nexus 4 came out, most critics were more than thrilled. A very fast processor, lots of RAM, a big display with very high resolution, and an 8MP camera made it the media darling of the smartphone world. It climbed the ranks of the best smartphones av ...more
JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicio ...more
Hi there again, aspiring hackers (and veterans as well)! I'm going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn't work with WPA Enterprise For that end, you'd have to use an Evil Twin to get the "Enterpr ...more
The battery in the Samsung Galaxy S4 may pack 500 more milliamps per hour than the old S3 battery, but that doesn't necessarily mean more battery life. High-powered devices need lots of juice, and the S4 is definitely more powerful than its predecessor. The new battery can han ...more
Rooting, bootloaders, custom ROMs, CyanogenMod, ClockworkMod... it's all pretty confusing, isn't it? You're not the only one having trouble with this. Many users in the Nexus 7 SoftModder forum have been scratching their heads at these many terms. First, let's cover the terms ...more
No matter what device you have, Android lag will get you down. It's our little green robot's only major downside, and you've probably noticed it quite a bit on your Nexus 7 tablet. Apps open slowly, actions stutter or pause, and loading files takes forever. There are ways to ...more
Over the years, YouTube ads have become more and more integrated with the videos themselves, which means traditional Android ad blockers can no longer block the ads without blocking the videos. It's gotten to the point where the only ways to get rid of the ads are to either su ...more