Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Tutorials and How To's Articles


Hacking Lighting Control Systems

playing god with the lighting fixtures

14 years ago 9482 Reads
0     0
Hiding Your Files In Windows Vista

Ok, so you want to know how to hide your files so it can nev

15 years ago 7045 Reads
0     0
Using cURL for HTTP transactions

This article explains how to GET and POST data to webpages u

15 years ago 12648 Reads
0     0
Building a CMS 4 Dummies

A complete guide on building your own working CMS!

15 years ago 34331 Reads
0     0
A ball of Wool and NetCat

A simple tutorial on NetCat, and some other things you can d

15 years ago 19224 Reads
0     0
Making Fire Fox Add-ons Compatible With Your Version of Fire Fox

A quick guide to fix that problem.

15 years ago 7550 Reads
0     0
How too torrent.

15 years ago 7173 Reads
0     0
user agent switcher - huge list

how to get all of the user agents you\'ll ever need in under

15 years ago 10307 Reads
0     0
Simple PHP Form

Here is a simple PHP form tutorial to help people whom are j

15 years ago 8646 Reads
0     0
Configuring Dynamic Addressing

O dear

15 years ago 4648 Reads
0     0
Configuring Static Addressing

Another article from my coursework

15 years ago 4243 Reads
0     0
Staying hidden.

Basic to Intermediate Stealth practices.

15 years ago 7229 Reads
0     0
Types of Attacks (network) and Defenses (Windows)

Several types of network based attacks, and some network def

15 years ago 15681 Reads
0     0
Preventing the Hack - Part 1

Part 1 in a series of articles designed to help you better u

15 years ago 4899 Reads
0     0
Beginning A Career In Information Security

Step by step how to get started in a Information Security .

16 years ago 9601 Reads
0     0
Using a mac as a wireless router.

Turn a spare mac into a wireless router.

16 years ago 10845 Reads
0     0