Understandably, the tragedy in Japan has substantially risen the level of worldwide radiation-related hysteria. So much so, as an alternative to stampeding health food stores for iodine tablets, crafty individuals and organizations are hacking together personal radiation detectors. Rather than relying on the government, the creation and modification of handheld Geiger counters provides a self-sufficient solution to today's questions regarding radiation. Profiled below, three admirable organiz...
Tired of touch-tone hell? Get human with our cool phone hacks and cheats with the tips from this how-to video. Become a life hacker - we'll show you how to find phone numbers, cheat the computer and hack the call center system with our hacking tools. Watch this video tutorial and learn how to hack a call center telephone system. Hack a call center telephone system.
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer security, networking, software development, testing, and so on...It's probably a bit premature to decide what you want your speciality to be, but keeping the question in the back of your mind will help give you direction in ...
Here's another Null Byte on hacking our Skyrim game saves. Some of the rarer items in Skyrim are really fun to play with. However, seeing as they are rare, you will probably not see all of the best weapons in the game. Null Byte doesn't take too kindly to games that don't give us the rarest items when we please. Let's beat this game into submission by hacking our game save files via hex editing.
As many of you may have noticed, nearly every Google product (i.e. Gmail, Google search, etc.) has gone through a bit of a makeover since the release of Google+. Big blocky buttons and enormous font sizes are apparently the thing of the future, and with a cool JavaScript hack, you can have a goofy YouTube, too! Now, I'm actually just being a bit facetious, the new YouTube is really the only thing that I like out of all of Google's recent redesigns. It looks pretty sleek.
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it.
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
Can you really make an explosive from salt, sugar and weed killer? Does glycerol and water actually recover text from burnt paper? Is it possible to develop film with a first aid kit and some orange juice? MacGyver says yes.
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, Internet Explorer 8 on Windows 7, and Firefox 3.6 on Windows 7. The winners walked away with the successfully hacked computer, plus a cash prize, but they left one Godly browser intact: Google Chrome. Even the savviest ...
This week, we take a break from the holidays and focus on one of our favorite pastimes: video games. With new releases, hacks, and Easter eggs coming out every day, it's easy to be overwhelmed by the choices available. Never fear: we're here to help you sort out the wheat from the chaff.
Bubble-Troubble Demolition Derby on Ice. In this game, there are 4 teams of 2. One outside the plastic bubble, one on the inside.
This articles redirects to "Hack FarmVille with Cheat Engine".
Apple just released iOS 12.3 developer beta 5 today, Tuesday, May 7. The release coincides directly with Google I/O, Google's big hardware and software presentation, and comes eight days after the release of 12.3 dev beta 4.
When you wake your iPhone X, XS, or XS Max for the first time, you'll probably notice a subtle animation in the top right of the screen that slides down to reveals a couple switches, one toggled on and one toggled off. At first, the meaning of this could be confusing, but it's just Apple's way of helping you learn your new device better.
In a surprising move, Apple just released iOS 10 developer beta 7 and public beta 6, just four days after releasing the last betas. Apple hasn't pushed out this many betas since iOS 5, and they're on pace to break that record.
We've seen all of the signs, but now we have some concrete evidence—Android Nougat will make its debut very soon. Canadian telecom company Telus recently posted an update schedule for its Android devices, and one date in particular stands out. According to the schedule, the Nexus 6P and Nexus 5X will be getting an update to Android 7.0 on Monday, August 22. This is definitely in line with our previous thinking, as all of the signs have been pointing to an early Android release this year. In y...
Android 6.0 Marshmallow is due out later this fall, but Google has already released three preview builds of the upcoming version. So if you really wanted to give Marshmallow a try, you could install the preview on your Nexus device right now. But if you just wanted to get a little taste of what's to come, we went ahead and pulled all of the brand new wallpapers out of the latest release.
If you're looking to train yourself, and see how good at hacking you really are, I'd recommend Hack This Site. You've most likely already heard of it, but it's super fun to use and is also safe. You learn a lot, too, and there's no tutorials or anything. What you do is you pick a challenge and then it gives you a little scenario. For example I started the basic challenges about 10 minutes ago and am on challenge six, it asks for a password and you scramble through the code, editing bits and b...
Good home-cooking does require time, but not every step of the process has to be a time-consuming chore.
This tutorial shows you how to break into a digital safe. The technique uses a design floor in the safes often found in hotels or homes.
There is no fan experience in professional sports quite like watching an NBA game live. Partly, this can be attributed to the combination of fluid teamwork and jaw-dropping athleticism the players exude in the form of size, speed, jumping ability, grace, and strength. What truly differentiates the NBA from the spectators' perspective, though, is the figurative nakedness of the players. While the NFL buries its athletes beneath pads and masks, the NBA presents its talent in shorts and a tank top.
Once you have mastered the technique of knitting something in one color, you will want to go to the next step, which is learning how to add color to your knitting. You might want to knit stripes or knit something with two colors. It isn't as difficult as you might think, and once you've done it a few times you will wonder why you never attempted it before.
Been hacked once? Twice? Maybe more? You thought abc123 was the only password that is both 6 characters wide and easy to remember? I have some suggestions in store for you. Just read on...
Check out this science video tutorial on how to apply a C. elegans dopamine neuron degeneration assay for the validation of potential Parkinson's Disease genes.
Watch this video from This Old House to learn how to prevent frozen pipes. Steps:
This is a tutorial showing you how to easily hack flash (.swf) games! You only need two things:
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc.
After his fall from Asgard into space, the Asgardian Loki meets the Other, the leader of a warmongering alien race known as the Chitauri. In exchange for retrieving the Tesseract,2 a powerful energy source of unknown potential, the Other promises Loki a Chitauri army with which he can subjugate the Earth. Nick Fury, director of the espionage agency S.H.I.E.L.D., arrives at a remote research facility during an evacuation. Physicist Dr. Erik Selvig is leading a research team experimenting on th...
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server!
The only thing better than successfully pulling off a new experiment is doing it with household materials. You get to laugh in conceit as professional scientists everywhere spend all their grant money on the same project you just accomplished with some under-the-sink chemicals! However, there are times when DIY gets dangerous. Some household chemicals are not pure enough to use and some are just pure dangerous. Let's take a look at two problems I have encountered in the course of mad sciencing.
This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to read a hack log and hopefully implant the steps in your head for future use.
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured on the Null Byte blog, as well as the front page of WonderHowTo (providing it's up to par, of course).
THE ODYSSEY is an epic adventure, a world first, a race against time, an entire year of living dangerously.
Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards track players' relative progress and allows them to view and manipulate other players' completed designs. It's original, certainly, but no developer is going to ship a million units of a game about molecular-level prote...
He may have just started his teenage years, but Laurence Rock's future is looking pretty good after inventing an ingenious doorbell device called Smart Bell. He's already sold 20,000 units to telecoms giant Commtel Innovate, and is securing a second deal with an unidentified company that will land him £250,000. That's over $400,000!
Japanese people are into many things Americans find weird—like YouTube's beloved canine-hosted cooking show or Daito Manabe's light up LED grills or even more insane, a vending machine that distributes live crabs. In light of these cultural oddities, the Japanese phenomenon of visual novels (NVL, or bijuaru noberu), seems relatively normal. A meeting place of books and video games, visual novels are a sort of "Choose-Your-Own-Adventure" for the new generation.
About two months ago, the massive Gawker Media hack was a wake up call for many web denizens on the importance of proper password security. Data analyzed by the Wall Street Journal revealed the three most popular passwords recovered from the hack were downright idiotic—123456, password, and 12345678. If past events weren't motivation enough for crafting a strong password, then maybe a racy 8-bit stripper is. Naked Password is a jQuery plugin by Platform45 that rewards you with an accelerating...
Since the early genesis of the brilliant Microsoft Kinect hack, inventive applications have been popping up nonstop. One of the most fascinating projects to surface recently falls within the realm of 3D printing. "Fabricate Yourself"—a hack presented at the Tangible, Embedded and Embodied Interaction Conference in January—allows users to pose in front of an Xbox Kinect, which then converts a captured image into a 3D printable file. What does this mean exactly? Think Han Solo trapped in carbon...