Normal Outdated Search Results

How To: Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning to end can be a bit daunting. I wanted to combine all the steps into a single article and share my experience with everyone. If I have left out any steps please let me know.

How To: Use YouTube

The trend of online video sharing came to the mainstream with popularization of YouTube, which let users view, submit and share video clips. YouTube started off in the year 2005, and quickly became one of the most visited websites on the internet. Sensing the emerging trend, large companies like Google joined the trail and launched their own video sharing sites (Google later bought YouTube).

Learn Java: Part One

So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA.

The Sweet Smell of Success: DIY Smoke Mix with Sugar and Potassium Nitrate

I finally got around to trying out another one of Will's mad science experiments and found out that this one was actually more satisfying (and less frustrating) than my slightly uncooperative jar jet. There's something very pleasing about making potassium nitrate at home in the kitchen and then watching the transformation from semitransparent liquid to spiky, frozen crystals. That was the best part for me, second only to igniting it with its sugar companion.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?

News: The World's Most Expensive Video Games and Consoles Ever

Most of the indie and vintage games discussed in Indie Games Ichiban are pretty cheap to purchase. They rarely top twenty bucks, which is one of the major advantages independent games have against their sixty-buck, major league counterparts. But if you think $60 for a game and $300 for a PS3 or Xbox 360 seems like a lot, then you haven't played Steel Battalion or seen the TurboExpress. They go above and beyond what normal gamers are willing to spend for questionably entertaining products. Her...

Inventables: A Store for Superheroes & Hackers

Founded by Zach Kaplan, a "serial entrepreneur" with a B.S. in mechanical engineering, Inventables is a futuristic online hardware store based out of Chicago. The company sells innovative materials at much smaller quantities than typically available—largely to artists, inventors, developers, and researchers. If you've got a brilliant idea and cash to spare, careful, you just may go hog wild. My premature "Dear Santa" wishlist-in-progress:

How To: Manage Your Time Planning a Scavenger Hunt

When you're aiming to set up a scavenger hunt, you might be pondering how much time frame you are committing oneself to. It's a great thought, and one which does not have a single size that matches everyone's resolution. But this unique guideline will furnish the facts you need so that you can figure out just how long implementing a scavenger hunt or clue hunt will take. You might want to be aware of a small amount with regards to which variety of quest you are preparing. Is it a common scave...

How To: Recover Lost Files and Images

You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downloaded from the camera then erased from the cameras disk...the inevitable "I'm Screwed!'

One Night Stand: The Late Late Show With Jackass

Johnny Knoxville is booked as a guest on The Late Late Show with Craig Ferguson. Unbeknown to Ferguson, the producers are in cahoots with Jeff Tremaine & Knoxville. A mystery stooge is placed in the audience to be brought up at the beginning of the show as every once in a while Ferguson does this. When the stooge is brought up by Craig via insistence of the show's producers, the interview starts normal but shortly soon thereafter, the 'audience member' disagrees with Ferguson over a remark, t...

How to Get Better at Halo: Reach

Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and bits of advice that I've picked up.

How To: Create a PCB Etchant That Automatically Improves After Each Use

Etching your own circuit boards is tons of fun, but etching requires strong chemicals to dissolve the copper plating on blank circuit boards. The normal ferric chloride solution works well, but can be expensive and leaves permanent stains. Luckily, we can whip up our own etchant at home with everyday chemicals! Better yet, our new etchant will turn an eerie green color rather than the dull brown of ferric chloride.

The "Minecraft: DotA" Map: An In-Game Game Based on an In-Game Game

Hello, everyone. My friend and I recently released a Defense of the Ancients (DotA) map that went viral and thought I should share it with Minecraft World on WonderHowTo since you guys helped me out when I first started making videos! We were featured on Kotaku, RockPaperShotgun, Gamespy, The Verge, Joystiq and many more websites!Exciting!You can see the full details below are head straight here for the downloads.

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...