Technologies Search Results

How to Hack Wi-Fi: Getting Started with Terms & Technologies

Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I can hear you all groan, but you need to know the basics before you get into more advanced hacking. Then hopefully, developing your own hacks.

How To: Make a dye-sensitized solar cell with titanium dioxide and anthocyanin

Discover the power of raspberries! Literally. In this NurdRage science video, learn how some crushed raspberries and some titanium dioxide (TiO2) can create a powered dye-sensitized solar cell. Inside a raspberry is something called anthocyanin, which is a flavonoid pigment. Commercially purchased solar cells are way more powerful than this DIY solar cell, but with a little improvement, who knows. Nurd Rage also lets you know how this works.

How To: Repair a Nintendo DS Lite top screen

The Nintendo DS is one of the most technologically advanced handheld gaming devices out there. Not only does it have dual screens, but a touch screen as well. Some of the more recent DS' even have a built in camera. But with all great technologies, problems are sure to rise. In this tutorial find out how to repair the Nintendo DS Lite top screen. Remember, opening the device can possibly result in a voided warranty, so know what you're doing and good luck!

How To: Play SWF and FLV files

In order to play SWF files, you need to download SA Flash Player. You can find this program on a website called Mega Upload. For FLV files you need to download the applian FLV player. You can find this program at a website called applian technologies at the address http://applian.com. Once you have downloaded and installed these programs, you will be able to do such things like watch videos you couldn't previously access and play games on your computer that, again, were not available before. ...

How To: Make SoGoGi JangJoRim (boiled beef and quail eggs)

This video teaches Korean Food cooking just like a Food Channel TV show. In this video we learn how to make SoGoGi JangJoRim or boiled beef and quail eggs. Unlike western technologies, this recipes shows how to first soak hand cut beef in water to remove blood and then to boil the meat with spicy vegetables like hot peppers, green onion, ginger and garlic. After cooking, the meat is removed and shredded while the cooking broth is saved and the veggies are discarded. The shredded meat is added...

How To: Change light bulbs in your automobile

There are dozens of light bulbs on your vehicle, illuminating everything to the road in front to the license plate in the rear, and for all of the modern technologies given us, most automotive bulbs are essentially the same as on out grandfather's car. So, it's no wonder why burnt out auto light bulbs are the number one cause of lighting failure.

Where Do I Start: Learn the Fundamentals

I am very new to Null Byte but I find much of its content and community incredibly interesting. I spent quite a bit of time just chronologically going through the posts and I noticed a common theme in many of the beginner posts. Many people seem to want to know the 'secret' or a paragraph on "How to Hack" and become a hacker in a few minutes. I started off this post as a reply to a question from a beginner but thought it might be beneficial to have for those stumbling across this site.

How To: Fingerprint Web Apps & Servers for Better Recon & More Successful Hacks

Web applications are ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a successful attack is good recon since it's easier to be focused and efficient with the more information you have. There are many fingerprinting tools available, such as httprint and WebTech, but there are even more that can aid us in reconnaissance.

News: Mastercard, Qualcomm-Powered ODG Smartglasses Use Iris Authentication for AR Shopping

As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives. Recognizing this, Mastercard, Qualcomm, and Osterhout Design Group have teamed up to show what secure shopping could look like in the very near future with iris authentication.

Prev Page