Practical Concept Search Results

News: Little Boxes Turns Your iPad into an Old-Fashioned Music Box

Technology is awesome. You can use your iPad to record music or even turn your tunes into a solar system, but sometimes being plugged in all of the time can leave you nostalgic for simpler times. This new concept by Joelle Aeschlimann brings together the best of both worlds by turning your iPad into an old-fashioned, hand-cranked music box. The artist created three different music boxes, each one with its own unique song and visualization. The music boxes were made using wooden cylinders with...

How To: Interact with objects in ActionScript 3.0 and Flash

An Object within Flash CS3 is a thing - a thing that has attributes and can perform actions. That thing may be a ball bouncing in your animation or a dog barking. In this short tutorial, author Bill Dallas Lewis presents the concept of Objects within ActionScript 3 and Flash CS3 as well as how to interact with objects within your presentation.

How To: Make a stepper driver power supply for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.

News: Hak5 Just Released the Packet Squirrel

Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of concepts with space built into the design for the community to add their own tweaks and modifications. On Friday, Oct. 27, Null Byte attended the Hak5 release event in San Francisco to check out their latest devices, including the new Packet Squirrel.

Networking Foundations: Subnetting Based on Host Requirements

Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about subnetting based on host requirements as promised in my first article about subnetting. Just like in the previous articles we will jump right into the examples because that's the best way to learn.

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.

How To: Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly.

Hi everyone. Recently I've been studying some topics about Assembly, memory and exploitation, and thought I could write something nice, easy and fast about it, just because I like to share what I learn, and probably sharing what you learn and trying to explain it to a stranger is the best way to learn it better. It worked for me, and I hope it will be useful for you too.

How To: Practice Bhakti yoga

Bhakti yoga focuses on the concept of love and devotion. Learn how to practice Bhakti yoga in this yoga video clip. To practice Bhakti yoga you should shatter your ego, surrender yourself to object of devotion, and pray & meditate. With this how to video you will be able to practice the principles of Bhakti yoga.

How To: Play with a metronome on the piano

This how to video covers time signatures, beats, and using the metronome when playing piano or keyboard. These concepts are essential to understand if you want to read music and play piano with accurate rhythm. Watch this musis theory tutorial and you will understand musical time and rhythm.

How To: Use ledger lines in music

A ledger line or leger line is musical notation to inscribe notes outside the lines and spaces of the regular musical staffs. This music theory how to video teaches you the concept of ledger lines in written music. Learn how to read and write music with this tutorial.

How To: Build a Laser Trip Wire Alarm System

Building a DIY Alarm System: The Concept So, you want to protect your property, or maybe a room, car, or even your backyard. The concept of an alarm system is to notify the "alarm administrator" that there is an intruder entering the previously designated boundaries. The triggers for this boundary could be as simple as a pressure sensor, or as complicated as a laser network. They all do the same thing, but some work better than others.

Hack Your Brain: Improving Memory with Dirty Pictures

If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to improve short term memory, but the real clincher used by some of the pros is essentially... porn. Yep, you read right.

How To: Block Someone from Using Their Camera During Zoom Video Calls

As a meeting host on Zoom, you can't control what a participant does during your live video call, but you do have the power to turn off their camera so that other people aren't subjected to distractions. So if you catch someone in your call purposely making obscene gestures or accidentally exposing themselves while using the bathroom, you can block their camera, as long as you know how.