You may have noticed that the HTC One Google Play Edition has a fancy red live wallpaper added to the list of live wallpapers. This new one is called "Sunbeam," and I'm going to show you quickly how you can get it on your regular HTC One right now.
While the Samsung Galaxy S3 is the world's best selling smartphone, there a few people that find the device just a bit too large. With a 4.8 inch display and 136.6 x 70.6mm dimensions, the phone can be slightly large for kids—and adults with small fingers. It can even be a hassle to put into your pocket, so that's why Samsung decided to release the Galaxy S III Mini. With a smaller frame, the phone is perfect for those that want all of the Galaxy S III features but want a more compact size. J...
Want to make your own soda or maybe just bring a dull one back to life? Homemade sodas don't always live up to the store bought ones because they can taste flat by comparison. This quick and easy method makes super fizzy drinks with only four ingredients. Because putting dry ice in a sealed bottle would effectively turn it into a bomb, you'll need to make a safety valve for the bottle.
In case you missed it, we're in the middle of an election! Move over Obama and McCain, the WonderHowTo Awards have the best candidates! Issue of the day-- healthcare, more specifically zit care.
This is a tutorial showing you how to easily hack flash (.swf) games! You only need two things:
Ubuntu users can directly copy flash videos from the web with Firefox. There's no need to install software such as a YouTube downloader, which are available in abundance throughout the web. First, you need to know where to find the temporary flash file in Ubuntu (see my other post for that).
Extracting tart, sweet deliciousness with ease is the goal. Getting seeds out of pomegranates can be a messy prospect. Wrap yourself in protective clothing and get baning. Remove pomegranate seed with a spoon.
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it.
In this article, I'll show you how to build a coil gun. A coil gun is a device that fires magnetic projectiles at high velocities, using electricity. Coil guns require no explosive propellant, therefor can be fired an infinite amount of time, providing that there is ammunition and available electricity.
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions used to operate and control the peripherals such as the keyboard, text display functions and so forth, and these software library functions are callable by external software such as the OS and system software within sai...
Nearly everyone has the capacity to be a cheater. Sometime or another, all Xbox users have yearned to get their gamerscore to unimaginable thresholds—for bragging and egotistical purposes. I can relate to this desire. However, I also don't want to mod my gamerscore, because it's just unfair and not nearly as much fun as doing it the honest way. To me, it's synonymous to entering the cheats into a game after you've beaten it. Cheats can add new life into a game once you're done, but since the ...
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:
To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints, though. Firefox has done an amazing job at completely revamping its source code and redesigning all of its engines, making it a more than worthy competitor to Chrome. However, we are displeased with Firefox because eve...
File recovery on Linux is a bit different than Windows. It requires different software than the Windows counterparts because every OS has their own file system. Windows uses NTFS, or FAT file systems, while on the other hand, Linux uses ext-based file systems. I personally use ext4 file system because it's the latest and greatest ext-journaling system and supports a large level of directory recursion and file sizes, but most installations still use ext2 or ext3. When files are deleted from a ...
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.
Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...
The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job.
Most kids who play video games will never become professional gamers. Those that do are part of a very select group— it's like being a professional actor or athlete. It's nice work if you can get it. For everyone else, the sad realization usually arrives sooner or later that time spent playing games might not have the practical rewards that homework or working hard at your job might deliver.
The artwork for Minnesota's Land O' Lakes butter packaging is classic, dating back to 1928 when it was first created by Brown & Bigelow illustrator Arthur C. Hanson. The logo was updated ("modernized") once in 1939, again in the '50s, and has undergone minor modifications here and there since. The legendary packaging is good for two rather nerdy tricks: A) a very trippy optical illusion and B) a very infantile boob illusion.
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe".
I remember once listening to a Christian comedian making fun of the way some Christians pride themselves on all the "evil" things they don't do.
Waiting for school to start? Have you been practicing reading in the meantime? Here's our most honest and effective "cheat" to help you out.
This simple meal is dedicated to all food lovers around the world and to all the Filipino diehard fans of "dinuguan"—otherwise known as pork blood stew, blood pudding stew, and even chocolate meat. I don't know where this recipe originated, but I would like to thank my girlfriend's mom for teaching me how to cook this.
I was looking around on this site and this article caught my eye. It was about hiding text in ADS or Alternate Data Streams. While this is nothing new in the tech world, it seems that more and more people are looking at ADS for one reason or another.
Are you tired of having to use two different enchanting tables when you want both low and high enchants? Are you sick and tired of hearing your faction/guild/clan members say that they need lower enchants because they don't have enough experience levels for high-end enchants?
The Ubuntu CD does not contain much in terms of software applications. So how can we incorporate other programs that would be made available after booting from a live CD?
Science-fiction writer Jules Verne predicted many scientific breakthroughs, including the moon landing, tasers, and nuclear submarines. In his 1874 book The Mysterious Island, Verne writes:
Taking apart batteries is one of those things that every adult you've ever known has warned you against. Today, we break the taboo and dive into a lithium battery. Lithium has some pretty cool properties—it burns instantly in water and glows blindly bright under flame. And with just one AA battery, you can make a blinding light beam inspiring supernatural awe in all dictatorial adults who doubted you.
Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't mind checking out the metadata in a few of those images. In this article, we'll be going over how to do just that.
When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?
Welcome to part three in a series about steganography, the art of hiding things in plain sight. We are practicing steganography because it can be a useful skill if you don't have access to encryption software, or need a quick solution to make sure the sender and recipient are the only ones who are able to read your message.
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it.
You may have asked yourself, "How do hackers take my password, if the website owner can't?" The answer is simple. When a website stores your login password for the site, it is run through a cryptographic hash function before it enters the database (if the website isn't Sony).
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out: Gears of War 3 and Dead Island, to name a few.
In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.
You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over the OS right down to the Kernel and massive availability of mature, open source (read: free & tweakable) tools & projects.
Some cops already have the ability to extract data from your cell phone using handheld forensic devices, but soon police officers will have a new mobile data collection toy to play with—an Apple iPhone. Actually, it's an iPhone-based device that connects directly to the back of an iPhone, which is designed to give law enforcement an accurate and immediate identification of a suspect based on their facial features, fingerprints and even their eyes.
See how to bake without butter, sugar, eggs, dairy milk and more. If you think it’s impossible to bake without butter without losing flavor and texture, then keep on reading. Even if you already substitute butter in your cakes and cookies, there may be some things in this article that you haven’t tried yet.
If bourbon is a man's drink, what better flavor to infuse it with than bacon? The combination tastes just as delicious as it sounds—a smokey, salty aftertaste lingering after each sip of deep, rich bourbon.
INTRODUCTION In this Digital world now almost every one knows the a, b , c of computer. From a child of 5th grade to an old man, everyone knows how to operate computer and do simple work on it. Thats why you need to have something which makes you different from others.