How To: make dripping street art
In the world of instructional video, there are some videos that transcend debate. Is there the intent to instruct? Is the idea simple and original? Is a step by step process articulated? Is the content revelatory?
In the world of instructional video, there are some videos that transcend debate. Is there the intent to instruct? Is the idea simple and original? Is a step by step process articulated? Is the content revelatory?
Solving a Dilemma This is a simple how-to for a cost effective drip irrigation system for your garden. My motivation to set up my garden for drip irrigation was pretty simple. In the summer, it gets to 90+ degrees outside, and my 50’ garden hose didn’t reach the far extents where I have the majority of my large trees. I noticed a large amount of the water I applied to the trees just ran off and did absolutely nothing. This was a huge waste of resources.
The Minnesota Department of Public Safety issued a press release today announcing the suspension of a drug recognition program conducted by the Minnesota State Patrol. The program was exposed earlier this month by activists and members of Communities United Against Police Brutality in Minneapolis.
Imagine if all 350 million toilets in the United States were flushed at the same time. Granted, doing this would require exceptional coordination, and the helping hands of a few million foreigners. But what if we could pull it off? Would flushing in concert explode all the pipelines, cripple the water supply, flood the streets with sewage, and, in short, destroy civilization as we know it . Could this be the 2012 doomsday LOL...The end of humanity By simple toilets
24th Street Theatre Saturday Explorer Series 2012 Saturday Explorer Series 2012
As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs.
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.
Download the Software Go to the Antiprism downloads page. Download and install Antiprism 0.20.
Here's a delicious Byte of information for you. A proof of concept program on Linux was coded to exploit a known bug in how the Linux Kernel (versions 2.6.39+) handles permissions for the
In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, and their devastating effects on electronics. A simple EMP consists of a capacitor, transformer, trigger, and coil of copper wire. This, when triggered, would produce an intense magnetic field for a brief period, similar ...
Words that will help you with your writing Alliteration - The repetition of aconsonant sound. This si important because it makes words stand out, and because it can help set the mood for something.
The already robust and ingenious Nmap tool has received a whole slew of new scanning scripts that can be used to do all sorts of naughty endeavors. Notably, the SQLi module, since it is a necessary evil that we must cover here at Null Byte. This major update is going to fuel today's lesson.
Null Byte is looking for forum moderators! Last Friday's mission was to accomplish solving HackThisSite, basic mission 9. This mission delves a little further into Unix commands and remote directory traversal (which is just a fancy term for going through folders blindly).
Last Friday's mission was to accomplish solving HackThisSite, basic mission 8. This meant that we had to learn some more basic Unix commands.
Here's another great achievement tutorial for Battlefield 3. This one is for 'The Professional', which you get on the level "Comrades". What it asks of you is to complete the street chase in under 2 minutes 30 seconds. Seems easy enough. But if you take in to account all of the bad guys that stand in your way, suddenly the challenge went way up.
This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project to do not too far back, and a good bit of practice for a beginner to programming. It teaches that you can do useful stuff with programming. However, a while ago Twitter started using something called OAuth to access the...
Now, myself and Minecraft World admin Jon Hook began brainstorming for the texture pack (which I will gladly create for all of you) but then I quickly remembered, this World isn't all about me, it's about all of you guys, too. So, I would like to hear your thoughts on what time period should dominate the texture pack.
I'm most thankful for the simplest things in life...and how they can be so beautiful. Take this margarita I was sipping on a patio with my friends. Just a few friends, chatting...watching the people pass by on a busy street...the summer air so calm and relaxing....and the sip I'm about to take from this beautifully salted margarita. A relaxing moment in time. So simple, yet so precious to me.
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:
Ok. My Cell Phone isn't cool like everyone else's. I still wanted to post up some images though. These are my attempts to make something look like it was taken using a filter app for a smart phone. These were inspired by the picture Swell of the Frank Gehry concert hall in downtown LA that was in the post on 50 amazing shots taken using instagram. I had some pictures of it that I thought were pretty cool. So there's two of them here and then a another downtown artsy pictures of Los Angeles, a...
To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints, though. Firefox has done an amazing job at completely revamping its source code and redesigning all of its engines, making it a more than worthy competitor to Chrome. However, we are displeased with Firefox because eve...
As we all know, security is a big thing here in Null Byte. We've talked quite a bit about ways to encrypt traffic and become anonymous on the internet, some of which entail using proxies, VPNs, and SSH tunnels. We've also talked about preference using SSL pages in practice for safe logins. These are all great protocols and tools, but aren't without their flaws and inconveniences.
There is a near-infinite amount of ways a computer can be broken into. But that does not mean that there isn't a reason to secure our computers as best as we possibly can. It's like the principles of a secure house. Which are the most secure houses? The ones with locks and advanced alarms, obviously, but not for the reasons people normally think.
Stay off the streets, lock your doors and grab your shotguns, because zombies are infecting the world over. Well… this Halloween season anyway. With the return of The Walking Dead to AMC a couple weeks ago and the subsequent renewal of a third season, it just goes to show that the undead cannot be killed.
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a friend pointed out to me, Ubuntu is currently the only distro implementing SHA-2 as the default. With SHA-2, your passwords take an unreasonably larger amount of time to calculate. This will greatly decrease how many password...
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this should be disregarded, as firewalls are nearly the entire security of your computer.
Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topology where sharing your wireless Internet via Ethernet would just be a better option.
Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...
In a previous article where I suggested 104 photographers to follow on Google+, I received a lot of criticism because over 90% of the listed photographers were men. While women are currently not a majority on Google+, they are a definite presence, and they are active. Today, I highlight the best female photographers I've found on Google+ so far. This time I'm taking a slightly different approach. Since the best way to get to know photographers is through their work, I've included one photo fo...
Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (payWave) and MasterCard (PayPass). But soon "contactless" payments will be made by an entirely different beast—NFC, which stands for near field communication.
The yet-to-be released Augmented Reality Cinema app is sure to make avid movie fans across the world drool. The concept is genius and appears to be quite seamless as well: Simply install the app on your iPhone, take a stroll through your city (supported cities have not yet been released, but the video below shows London), and aim your phone at various locations to view movie scenes that have been previously shot there.
The aging and maturity of video games as a medium has lead to some unfortunate consequences. One of these, perhaps drawn from the film industry, is the spate of remakes that has overtaken the game market over the last few years. It hasn't been as bad as the remakeorama trend in cinema, but developers have recognized the value in releasing the same thing they already made and making more money off it. Below, a roundup of some remakes of classic games released for XBLA recently, some fantastic,...
If you've ever been to an amusement park or carnival, or even just been on a stroll down the boardwalk or promenade, then you probably know exactly what a caricature drawing is—those cartoony depictions of people or things with extremely exaggerated or oversimplified features that create a comedic effect. Caricatures aren't just for street artists, though—they also work great for political satire and entertainment purposes.
Via Newsweek Tumblr. Looks like this video and billboard hijacking is the work of DesireObtainCherish, an LA-based street team. The work isn't exactly great art, but it's an amusing form of culture jamming, in which anti-consumerist activists subvert public advertisements.
Dual nurses? Random transformer shirt guy? White collar fighter? Fatso macho man? Super Mario? Ah, you must be playing Dong Dong Never Die!
F.A.T. Lab (Free Art and Technology) is a network of artists, engineers, scientists, lawyers, and musicians dedicated to the research and development of new technologies and creative media. They are "committed to supporting open values and the public domain through the use of emerging open licenses, support for open entrepreneurship and the admonishment of secrecy, copyright monopolies and patents."
These pictures was taken on the bus during my ride going home from work. My heart reaches out to them, Street children who cannot afford to buy food. Who resort to sniffing solvent fumes just to forget hunger and the harsh reality of life.I just wish I could something for them. I saw them on the sidewalk near SM Makati under MRT Ayala Station.
The Junkyard Jumbotron is an amazing project that allows a collection of random web browser enabled displays—laptops, smartphones or tablets—to share a single image split across the group, creating one large virtual display. Created by Rick Borovoy at MIT's Center for Future Civic Media, the app is completely free and open, meaning you can do it yourself in a matter of minutes. It works like this: