As discussed earlier, there are many ways to view the upcoming solar eclipse, whether it be with actual eclipse glasses, welder's lenses, eclipse-approved filters, or a solar telescope. If you can't get your hands on any of those, the safest way to view the solar eclipse this ...more
When I was attending college, my friends had a phantom thief in their dormitory. Almost every night, a different item of food would go missing, never to be seen again. There was constant speculation as to whom the thief was and how to catch them. Security cameras were deemed t ...more
House plants are a refreshing reminder of the rich biosphere teaming with life just outside of our hermetically sealed human dens. They calm us and clean our air. But what would you do if you came across a glowing green flower on your dinner table? I would be startled, but not ...more
Are you tired of wasting diamonds and iron on creating hoes? Are you looking for a fun way to farm melons? Or do you simply want to show off to your friends? This tutorial will go over how to make a jaw-dropping semiautomatic melon farm. Not only will you be the talk of the se ...more
Hello, nubile young Photoshop explorers! As we all know, besides design, Photoshop is best used for revenge, as will be demonstrated below. This is my ex-girlfriend, Cassandra. She dumped me because I had "poor bone structure." I'll bone her structure! Well, not anymore, I gue ...more
If you've read my darknet series, you've probably got a pretty good idea of what I2P actually is and is capable of. One of the features of I2P is that it's designed with P2P file sharing in mind. Using a built-in service called I2PSnark, you can host and seed torrents quickly ...more
Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't ...more
If you're hungry, eat now, because this list is probably going to put you off consuming vittles for so long that you'll end up looking like the love child of Nicole Richie and Skeletor. Now that you've been officially warned, help me count down the ten most WTF food items on t ...more
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
This article will show you how to make a proportionally correct 1/187 (about) size Hubble Space Telescope. I tried to add as many details as possible, but it was hard at such a small size. It was really easy, but it did take a while to make. Here are some specs for the real H ...more
I feel like doing a bit of chemistry today, how about you? To my knowledge, thermite is the hottest burning man-made substance. Thermite is a pyrotechnic composition of a metal powder and a metal oxide that produces an exothermic oxidation-reduction reaction known as a thermit ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
How do you review an app that refuses to work for you? I was quite excited this week to review iCinegraph, an iPhone App that simplifies the creation of cinemagraphs. However, if this was a car review it'd be the kind of review where the car under consideration is never able t ...more
In this article, I'll show you how to make a glowing orb. The orb is a fun, round flashlight useful for lighting your path in a magical way. Consisting simply of LEDs, a tennis ball, a battery and a switch, it's a great simple project for beginners with electronics. Here's a v ...more
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Redstone gives you the power to construct an endless number of possible machines, mechanisms, and devices. With redstone one can move more efficiently, send messages long distance, ...more
By now you're probably already an expert at creating cover images for your Facebook Timeline, especially if you've taken advantage of those free Facebook cards that were (and still are) being offered. But just in case you need some help making eye-grabbing cover images, there' ...more
Today's tutorial will teach you how to erase data permanently so that it cannot be recovered. Many believe that having a file shredder on the computer means you are up to no good. So when might you want to use a secure eraser? Lets say you scanned your drivers licence because ...more
VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense th ...more
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more
Paying for web hosting isn't ideal in most situations. If you have your own website, hosting it yourself is very acceptable and easy to do, assuming your internet bandwidth permits. Most people want to run a personal site, nothing crazy, so hosting from home on low-bandwidth i ...more
Windows 8 Beta (Developer Preview) It wasn't that long ago Windows 7 was released - now Windows 8 Beta is here. I did do a Google search to see when the stable version will be out but wasn't able to find an official statement from Microsoft. However - I saw several articles o ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Welcome back to Minecraft World's Ultimate Survival guide! A few days ago, we reviewed a good way to start off right when you spawn, plus a small rundown of the mobs. Now we will co ...more
When you buy computer parts, it can be a tough decision where you want to put all of your hard earned dollars into. Not only that, but when you buy a top of the line component, 3 months later (at most), your hardware will likely be outdated. This puts consumers like us in a bi ...more
Bokeh (which translates to "blur" in Japanese) is a photography technique referring to the blurred areas of a photograph. Basic bokeh photographs often have one point of focus, while the background falls away into a dreamy, blurred haze. The technique can be taken even furthe ...more
WENDIGO n pl. -GOS windigo 62 points (12 points without the bingo) The WENDIGO (or WINDIGO) is a malevolent creature from the mythology of the Algonquian, one of the most populous and widespread Native American language groups, which includes such tribes as the Innu, Ojibwe, ...more
GRAMARYE n pl. -S occult learning; magic 64 points (14 points without the bingo) Simply put, GRAMARYE is MAGIC, SORCERY, and in some cases, NECROMANCY. But overall, there is very little distinction between the terms. Magic is best described as an OCCULT art that can manipula ...more
GRUB, or the GRand Unified Bootloader, is a program that installs to your Master Boot Record and controls what operating system you load at boot time. Normally, it is used for multi-boot systems. Multi-boots allow you to switch between operating systems installed on seperate d ...more
COLOSSUS n pl. COLOSSUSES or COLOSSI a gigantic statue 60 points (10 points without the bingo) A colossus is a huge statue with great size and proportions, but it could also mean a person or thing of immense size or power. It comes from the Latin word colosseus and the Greek ...more
In these weekly Scrabble Challenges, so far we've covered two-letter words, double bingos, high scoring moves, triple-triples, last moves, parallel plays, phoneys and opening moves. For this week's puzzle, we're revisiting the strategy for opening moves. It's said that the pl ...more
Things have been a bit quiet on the Google+ Insider's Guide this week. With the launch of the new Facebook, Google+ is finding itself a bit on the defensive. However, recent data shows that by making Google+ available to the general public, their traffic has jumped 13-fold, ac ...more
As much as I love Scrabble, the iPhone and Android versions of the game are just not as much fun or as fast paced as Words with Friends. I play both, but I'm most active on Zynga's version of the mobile word game because it's quicker to make moves, doesn't take as long to upda ...more
Today's segment of Making Art on Your iOS Device takes us into the third dimension. The below apps are suitable for beginners looking to venture into the world of 3d modeling, as well as pros who simply want the basics of Maya in their pocket. Build models/3D mockups or small ...more
This colorful image may look like a miniature set of model cars, foam buildings and painted grass, but it's nothing of the sort. It's a still photo from a time-lapse video that Stu Kennedy shot in his hometown of Lincoln, England. But it's not your ordinary time-lapse. Kennedy ...more
A few weeks ago I wrote about Atomic Web as the best web browser for iOS devices, and while I believe it is a superior option, Atomic Web is not the only alternative web browser you can use on your iOS device. There are three more—Dual Browser, iCabMobile, and iSwifter—that ar ...more
For Windows laptops and PCs it's easy to install Linux. However for Macs, it's a different story. There are people installing Ubuntu on Macbooks and so far I've noticed that they are using 9.10. I've remastered my own Ubuntu 10.04 complete with playing flash videos and other a ...more
Even with Apple's forthcoming iOS 5 updates to its default camera application, those upcoming features can't match what already exists in Global Delight's Camera Plus Pro. For $1.99, Camera Plus Pro provides users with over 100 tools for every part of the picture taking proces ...more
Netflix may be killing its competitors, but they're losing fans thanks to their reputation for rolling out interface updates without user knowledge or consent. PlayStation 3 owners were upset at the Netflix interface change earlier this year, and now nearly 5,000 diehard Netfl ...more
There are a few different types of Apple iPhone and iPad users: general household users who largely consume media—e.g. surfing the web, watching movies, listening to music. Other iPhone and iPad owners use their device(s) to produce stuff—written documents, edited movies, blog ...more
I love making beeps and bloops with the Arduino pitches library, but sometimes archaic 8-bit tunes just don't cut it. Whether you want your robot to terrify your enemies with a demonic synthetic voice, you just need a pocket boom box on the go, or you want to a miniature guita ...more
So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA. Before We Begin You must have the latest version of Java Development Kit ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Have a ton of saplings in Minecraft, but just don't know what to do with them? To some players, saplings seem like useless pieces of in-game junk, but that' ...more
Are you looking to hide your chests in a not-so-conspicuous way, but don't know where to start? Do you want to finally have that safe and sacred place to store your diamonds, cake and beloved treasures? This tutorial incorporates this previous week's challenge on transforming ...more
Are you tired of having to use two different enchanting tables when you want both low and high enchants? Are you sick and tired of hearing your faction/guild/clan members say that they need lower enchants because they don't have enough experience levels for high-end enchants? ...more
Injection is an attack vector that involves breaking out of a data context and switching into a programming context through the use of special characters. These characters are significant to the interpreter being used, but not needed for the general user input being asked for. ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
Today's article serves as a general guide to keeping Windows 7 and Vista clean. The goal is to clean up your messy computer and have it running at maximum performance in no time. The question at hand is—what is your computer's performance like? Not great? Do you think it coul ...more
Pygame! And what you can accomplish with it. Another python article... (Blame Alex for getting me hooked on yet another coding language...) This little article will cover "Pygame", the set of modules that were designed with game developers in mind. Specifically ones who code ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Note: As I thought of writing something like this, it sounded fairly simple. A one-stop guide for everything related to survival (survival mode, SMP) in Minecraft. But as I progress ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A double exposure cell phone photog ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play with us on our free server. In the past, we've gone over how to improve the architecture of windows, doors, walls and other such structures. In last Saturday's workshop, we looked into some specific te ...more
The concept of Scrabble and Words with Friends is the same—play words, score points, win. But the games require different strategy in terms of letter placement, premium squares, tile point values and word choices. Here's the main differences between the two games. Scrabble ha ...more
Curve stitching is a form of string art where smooth curves are created through the use of straight lines. It is taught in many Junior High and High School art classes. I discovered it when my math students started showing me the geometric art they had created. The process of ...more
SHAITAN n pl. -S an evil spirit 60 points (10 points without the bingo) For the closing of these Halloween-themed bingo words, there's no better word than SHAITAN, the evilest of all evils, which is present in all horror movie monsters and demons. Generally speaking, SHAITA ...more
It's another Monday, which means it's once again time to highlight some of the recent community submissions posted to the Math Craft corkboard. Additionally, I thought we'd take a look at the process of stellation and make some stellated polyhedra out of paper.Rachel Mansur of ...more
Minecraft mods (modifications) are additions to the game that change the way you play. They include texture packs, shaders, changes in gameplay, additions and subtractions and everything in between. Some of this information is very basic, other bits might help you along if you ...more