Household Hacker brings you fun hack how to projects in a variety of areas: electronic hacks, computer hacks, pranks, etc. Search Household Hacker on WonderHowTo for more videos by this creator. In this video, learn how to cheat with a blank piece of paper.
Tired of the yo-yo? Try your hands at the diabolo (which most jugglers erroneously misspell as the diablo). This is a step above the yo-yo... it's the Chinese yo-yo... it's the devil on two sticks. Watch this video tutorial on how to do the Infinite Suicide trick on a diabolo Chinese yo-yo.
Tired of the yo-yo? Try your hands at the diabolo (which most jugglers erroneously misspell as the diablo). This is a step above the yo-yo... it's the Chinese yo-yo... it's the devil on two sticks. Watch this video tutorial on how to do the Continuous Mini-Genocide trick on a diabolo Chinese yo-yo.
Tired of the yo-yo? Try your hands at the diabolo (which most jugglers erroneously misspell as the diablo). This is a step above the yo-yo... it's the Chinese yo-yo... it's the devil on two sticks. Watch this video tutorial on how to start, run, and accelerate two diabolo Chinese yo-yos.
Get moving! Learn how to walk, run and jump your way through LittleBigPlanet. LittleBigPlanet exclusively for the PLAYSTATION 3. It lets you PLAY alone, or with friends, in a world of infinite possibilities. Run, jump, grab and swing your way thru imaginative levels and mini-games. If you're feeling creative, you can CREATE your own levels, enemies, obstacles and even storyline. Once done, SHARE them with our online community of thousands of User Generated Levels from around the world for
Stick it to them! Learn how to resize, rotate, and stamp your sticker collection in LittleBigPlanet.
Get some clothes on! Dress up or Dress down, learn how to express your own SackFashion for Little Big Planet on PS3.
In this video tutorial, you'll be working in Adobe Photoshop and learning a little bit about a very specific skill that I think is important for all designers. That is, the Pen Tool and using it to hand-draw clipping vector paths. There are a variety of ways to make selections in Photoshop, but drawing a real vector path is the most tried-and-true and highest quality way to do so. Mastering this tool will make you a better designer and help unleash your creative potential.
Snails and slugs are a big problem for gardeners across the country, whether it be a hosta patch or your lettuce, they love to eat a wide variety of plants. If you have containers, raised beds, even if you have benches slugs will climb up and over and into your plants. To get rid of these pests you could use baits, traps or a preventative barrier. Copper tape is a protective barrier that works. Copper conducts enough electricity so that when that slimy slug touches the copper strip it gets a ...
In this tutorial, we learn how to use the HLSW game server organizer program. First, go to the HLSW website and download their product. After this, save it to your computer and then install it. Next, register an account with them, then fill out your information. Now, when you are in the program you will be able to find servers that don't require key checks for games. Then, you will be able to add the servers to your computer. To download the server list, you will have to login, then you will ...
Organize both your business and personal files on the HP MediaSmart Server to share and stream music, photos or video to any connected computer on your network.
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look at setting a Pi-hole up and customizing a blacklist to suit your needs.
It's no secret that the vast majority of Null Byte readers range from beginner to seasoned coding pros and developers. Regardless of whether you're interested primarily in building websites or creating best-selling apps and games, working with a wide variety of programming languages remains one of the best ways to make serious money in an increasingly app-driven world.
Correctly identifying the underlying technologies that run on a website gives pentesters a considerable advantage when preparing an attack. Whether you're testing out the defenses of a large corporation or playing the latest CTF, figuring out what technologies a site uses is a crucial pen-tester skill.
Apple's Gatekeeper security software for macOS (Mac OS X) is vulnerable to remote attacks up to version 10.14.5. An attacker that's anywhere in the world can exploit MacBooks and other Mac computers by sharing a single ZIP file.
For the entirety of its existence, Snapchat has lived on mobile, but in its quest to lead the augmented reality industry, the company is now bringing those mobile AR experiences to desktops.
One of the best ways to improve your skills as a hacker is to learn to combine different avenues of attack to achieve success. What if it were possible to get a victim to connect to our machine and execute a chosen payload on our behalf? This is indeed possible with the almighty Metasploit and the aid of a technique known as command injection.
For SQL injection, the next step after performing reconnaissance and gathering information about a database is launching an attack. But something seems off .. in the real world, it's usually not quite as simple as passing in a few fragments of SQL code to an input field and seeing all that glorious data displayed right in the browser. This is when more advanced techniques are needed.
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target.
People love emojis, it's a scientific fact. So an app that places poops, smileys, and ghosts into social media videos should, in theory, be the most popular app ever. That's likely the reasoning behind the new Holocam app, which is available for $0.99 in the iOS App Store. Sure, Snapchat and Instagram offer users editing tools to stick static text, emojis, and drawings on top of photos and videos. However, Holocam ups the ante by placing fully three-dimensional emoji, text, and drawings, as w...
If you've been to the doctor enough, you know that the medical staff can make a variety of mistakes from time to time. They're human and that's normal, but errors in the medical field can often have significant negative impacts. At Boston's 2016 HoloHacks event, a team of developers created HoloHealth to mitigate human error in common healthcare tasks.
Welcome back everyone. I apologize for the lack of training articles, but I've been rater busy lately. I've recently picked up a second job and my college courses are now back in session, so I'm a bit strapped for time.
If your company has already released some popular and addictive game and you're thinking about creation a sequel, this article is just what you need. We gathered the main tips and advices that will be useful for the building a strategy and a sequel itself. Check out the following instructions and recommendations that can lend you a hand in making a sequel for your game.
Developing GUI apps in python is really cool. I ask those who understand the language to help convert some of the command-line or console programs or apps ( I mean programs that are useful to a hacker ) to GUI. I know GUI makes us lazy and not wanna learn but we should all know its fast. Today's tutorial is on p2p chat app I developed last week and decided to share it with the community since its kinda cool.
Welcome back, my budding hackers! This is the initial post of a new series on how to hack Facebook. It's important to note here that each hack I'll be covering is very specific. I have said it before, but I feel I need to repeat it again: there is NO SILVER BULLET that works under all circumstances. Obviously, the good folks at Facebook have taken precautions to make certain that their app is not hacked, but if we are creative, persistent, and ingenious, we can still get in.
Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to see, and I'll try to honor as many requests as I can.
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across the globe underlines how important hacking has become in our all-digital 21st century. As I have emphasized so many times in this column, hacking is the discipline of the future. From cybercrime to cyber intelligence to cy...
Welcome back, my aspiring hackers! In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. In a very recent guide, I taught how to scan vulnerable servers for Heartbleed.
The Motorola Droid is getting a little long in the tooth, but it is still a remarkably capable phone with full keyboard, which makes it almost unique among it's Android-based competition. If you've rooted your phone (good for you!) and for some reason want to go back to the stock configuration that your phone was in when you took it out of the box, this video will show you how to do it. One good reason is if you want to update your phone's firmware, which will not work if you phone is rooted ...
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to share files between Ubuntu (Host) & XP (Guest).
This series of ping pong / table tennis videos demonstrate how to master the table tennis serve. Jim Clegg, a Level 4 Coach with the English Table Tennis Association and Head Coach of the Preston Table Tennis Association, explains and demonstrates how to do a table tennis serve correctly. Serving today is an extremely complicated topic. These are 9 in depth thought processes for a table tennis serve.
In this tutorial, we learn how to grow healthy and productive fruit trees. Pest management is an issue with growing plats, so use something that can grow in a small area. Only use disease resistant varieties of trees, so you won't lose any while they are growing. You can grow some trees in a small area so they maintain in their space and they are very active. Make sure you prune the trees once they reach a certain heights and you remove any pests that are around. Use these tips to grow health...
This tutorial uses Photoshop, but any software program that lets you draw will be able to replicate this tutorial. Without using a model, here's how you can draw the comic book character Wolverine from X-Men in a variety of dynamic and powerful poses.
In this tutorial, we learn to know the differences in quinoa. Quinoa is a complete protein that's very mineral rich. There is a tan and red variety, both are delicious. This is an ancient South American grain that is gluten free for the wheat intolerant. When prepping this, you will first need to rinse it off thoroughly. Cooked quinoa can be mixed with toasted sunflower seeds, lemon juice, sea salt, and olive oil for a great taste that is full with nutrients. It's a great replacement for rice...
The newest sims game, Sims 3, gives you a wide variety of sims and choices. This tutorial demonstrates how you can maximize happiness for each of your sims by giving them hobbies and making sure all their needs are met.
This food tutorial presents one of the most important and widely used cooking skills you'll ever need to know: how to cook eggs over easy. Eggs are pretty much standard for breakfast and are used in a variety of other recipes, so it's important to know how to cook them well.
Smokey eyes have a particular rep. Specifically, that they're super dramatic, mixed with intense hues and only wearable for ultra sultriness at night. But that's like saying you can only wear your most figure flattering LBD dress at night because it's too pretty for daytime.
If your arm is tingling all fuzzy-like the way it does when you've slept on it wrong all night but you've been up for more than a few hours, then you may have a case of the stroke rather than sleep-induced wonky arm.