Chemically Modified Search Results

How To: Manage All Your Cloud Storage Accounts from One App on Your Samsung Galaxy Note 2

Cloud storage looks pretty good compared to the heavy restrictions that hard drives and other types of external memory carry. The cloud is not only limitless in what it can hold, but it can also easily be accessed from any device that has Internet—your smartphone, work computer, personal laptop, tablet, and more. While accessing a specific cloud storage system like Dropbox or Google Drive may be easy on your Samsung Galaxy Note 2, managing all of them individually can not only get confusing, ...

How To: Trick Verizon into Thinking You Never Modded Your Samsung Galaxy S III

One of the main reasons why the Samsung Galaxy S III has dethroned Apple's iPhone 4S as the best-selling smartphone in the world is due to Android's open-source operating system. The vast spectrum of customization that comes with Android has become one of its focal points, allowing n00bs and programmers alike to build and destroy. The open-source OS has allowed rooting and modified ROMs to flourish within Android community. The only problem with this is that rooting and installing your own RO...

How To: Add live chat to your website

In this video, we learn how to add live chat to your website. First, go to the website Meebo and log into your account. Now, you will see the interface and the accounts you have associated with this client. There are several chat engines you can use through this interface. Once you have added all your chat clients, you can participate in the chats that occur on your website just from this one website. In order to add this widget to your website, go to preferences and choose the option for wid...

How To: Flash an Xbox 360 Hitachi v0078fk Drive

Already an impressive gaming machine, the Xbox 360 can be modified to play a wider variety of games. This instructional video demonstrates how to flash your Xbox 360 to play downloadable games from the Internet. This method only works on the Hitachi v0078fk drive and will void your warranty, but think of how cool it would be to pull this off.

How To: Make your own soap like the pioneers

This is a clever video that teaches you how to make a craft that is both fun to make, and also a useful item to have around the house- soap! This is from Living a Simple Life Blog and details how to make soap, just like the pioneers. To do this, you will need some equipment, a scale, scent, colorant, lard, lye, coconut oil, plastic containers to hold ingredients while you weigh them, a stainless steel pot, safety glasses, rubber gloves, a miter box, scraper, curing racks, a funnel and a plast...

How To: Properly shape a bobby pin

If you've got a bobby pin and pair of handcuffs lying around, check out this video to learn how to modify your bobby pin to break into most locks. Using handcuffs, you can mold the tip of the bobby pin to allow the ability to open up things such as handcuffs and other locks.

Spice Rack Explosives: How to Make Gunpowder with Salt & Sugar

The best chemistry experiments are those you can perform with items already laying around your house. With only some sugar, salt substitute and an instant cold pack, you can make your very own gunpowder! Being able to make homemade gunpowder without a trip to the store can be a lifesaver, no matter if it's just for testing out a Civil War-era musket, blowing up stubborn tree stumps, or preparing for battle when imperialists overrun your country.

How To: Draw a Chibi InuYasha

InuYasha is a Japanese manga series that follows a time-traveling high school student, a half-demon, a lecherous monk, fox demon, demon slayer, and nekomata. It takes place during the Sengoku period as they seek to find the fragments or the Jewel of Four Souls. InuYasha is the half-demon. DragoArt has this video tutorial on how to draw a Chibi InuYasha. Get more detailed instructions on the step-by-step cartoon drawing here.

How To: Make toy robot scorpions

This scorpion toy was constructed by Make Magazine with a Twitchie Robot Kit. If you're afraid of real life scorpions this friendly toy might help you get used to them. His plush body is made from some fabric aiming to make him look like an Arizona bark scorpion, which are tan/yellowish/translucent. Twitchie is Arduino powered and comes pre-programmed, so it's an excellent kit for beginners in robotics, because no programming is required! You can download and modify the code if you want, and ...

How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users

Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal their real trackable MAC address, and it can even let an attacker take over the phone's data connection with no warning.

How To: Create Custom Wordlists for Password Cracking Using the Mentalist

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making customized wordlists. Using the Mentalist, we can generate millions of likely passwords based on details about the target.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

How To: Exploring Kali Linux Alternatives: How to Get Started with Parrot Security OS, a Modern Pentesting Distro

Kali Linux is the obvious first choice of an operating system for most new hackers, coming bundled with a curated collection of tools organized into easy-to-navigate menus and a live boot option that is very newbie-friendly. But Kali isn't the only distribution targeted at pentesters, and many exciting alternatives may better fit your use-case. We've already covered BlackArch Linux, now it's time to talk about Parrot Security OS.

News: MSG Is the Ultimate Healthy Flavor Hack

Hear me out. No, really. Before you sharpen your pitchforks and give me anecdotal evidence of your Chinese restaurant syndrome, I think you need to know a few things about monosodium glutamate. First of all, it's a naturally-occurring chemical compound that can be found in anything from tomatoes to cheese, and is used in all kinds of foods from KFC to breakfast sandwiches. So spare me the comments on MSG and Chinese food—you probably eat MSG on a daily basis without even knowing it. (And also...

Hot vs. Cold Brew Tea & Coffee: Which Ones Are Better for You?

Cold brewing tea and coffee are all the rage, and for good reason: they're idiot-proof. I, personally, am a total dunce at brewing coffee. It either ends up strong enough to peel paint from a car or so weak that you can see through it. Meanwhile, I have friends who inevitably brew green tea to the point where it's painful to drink it.

How To: Make Your Own Homemade Glow Sticks

Glow sticks, a popular favor at parties and outdoor events, and a must-have on Halloween, can be traced back to the United States Navy in the mid-1960s. The military desired improved visibility during night operations, and glow sticks, with their small-size portability and lack of batteries, were a perfect tactical solution.

How To: Install MicroG to Replace Google Play Services & Prevent Data Mining

With all the talk about privacy concerns recently, Google's name keeps coming up because they are a very data-driven company. As an Android user, they know basically everything about you based on your device usage. That can easily scare some people off who are worried about their privacy and security. You do have some say in what personal data Google controls, but what if you want total control?