I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Snow by: Seido Ray Ronci On my way out the door, my son says, "Dad, I have to poop." After all the work of bundling him up, "Go ahead," I say. He sheds his parka, drops his snow pants, and mounts the high white seat of the toilet. I unbutton my coat, loosen my scarf, let it h ...more
News in a nutshell: US to announce aerial blockade of Syria Protesting against Putin Military Strike will lead to collapse of Israel Assad not ready to resign Vladimir Putin has announced his decision to run for a third time as 'President' of Russia. Thousands of anti-reg ...more
Hi again, Just wanted to share a neat little code that I found way back, when I was presented with a spreadsheet which was locked and asked to ''unlock'' it or do whatever it takes to enable the user to edit it's contents. Well, I'm not one to say nay to a challenge, however ...more
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more
A book query letter must be well written and brief. Heading Center on the top of the page: Your name, address, phone number, email address, and any websites or blogs. Tip Don't get fancy with font types. Keep it simple. 1st Paragraph Briefly explain why you are contactin ...more
If your PS3 is YLOD (flashing the Yellow/Red/Green Light Of Death), try sticking it in the oven. Why does this work? Instructables user formulajake88 explains what causes YLOD and why the oven re-flow method will (likely) work: "There are several prevailing theories, includin ...more
It could be said that the World Cup really starts during the knock-out stages. What was going on for the last couple of weeks was more like the "World's Soccer Fair." At least I'd like to think of it this way after watching games like Slovenia vs. Algeria, New Zealand vs. Slov ...more
In this how to video, you will how to create clay coils. You will need clay about the size of your fist, water, and a knife. Pound the clay 200 times to get all the air out. Cut a slice from the clay and roll it in your hands. It should be a log shape. Now place it on a surfac ...more
RobertMe shows viewers how to cook eggs in the microwave. First, you need to crack the eggs and put the yolk in a bowl. Next pour melted butter on a microwave safe plate. The best idea is to use a paper plate and pour your egg in the plate. Now, cover this with another paper p ...more
Want what's prepared on Wall Street but are living on Main Street? In this video, learn how to make a meal with salmon on a budget! Ingredients you will need to complete this recipe include: Approx 1 1/2 lbs salmon 3/4 - 1 cup spiced rum 1/2 - 3/4 cup brown sugar Approx 1/4 ...more
This video describes how to prepare for and execute painting your home. To begin, you should power wash your house to remove any dirt, dust, cobwebs, etc. These would prevent the paint from setting properly, unless it was new wood. If it is new wood, you should put on a beige ...more
1. This video describes how to use the application Infinidock for the iPhone and iPod Touch. This is used to set how many icons to be placed per page, this Infinidock Cracked is doing full document customization like scrolling, adjustable icon amounts and can add as many icons ...more
In this video you can learn how to make great tasting corn chowder. Directions are very easy to follow: 1. Either in stock pot, add olive oil to cool pot - put pot on medium heat. 2. Add bacon and onions and let saute and brown slightly and add garlic, diced ham and cook for t ...more
Prepare your eating area if you're eating crab at home. Lay newspaper or butcher paper on the table to collect juices. Decide if you're going to eat the crab as you crack it or collect all of the meat on a plate before you eat it. Rip off the claws and back and set them aside ...more
Modern milking parlors use machines, but milking a cow by hand is an ancient art. Here’s the "udderly" perfect way to do it. You Will Need * A dairy cow * A grain mixture or hay * A one-legged milking stool * A stainless steel milking pail * Milking gloves (optional) * Warm wa ...more
Balloons are fun, but the helium ones are always more entertaining. So today, we're going to learn how to make hydrogen gas by combining toilet bowl cleaner with aluminum foil. With hydrogen, you get the same lighter-than-air properties of helium, plus it will explode! Histori ...more
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a she ...more
Six months ago, 1.3 million registered users of Gawker Media had their passwords compromised when the site was hacked by Gnosis. The passwords were encrypted, but 188,279 of them were decoded and made publicly available for all to see. Just three weeks ago, Sony Pictures was h ...more
Beware the Canning Mission! The Zynga Community Forum is full of complaints about the new Canning Mission. Here is an outline: Mmm Tomato Gravy! Canning Master Part I - Harvest 50 Tomatoes - Collect 5 butter - Have 5,000 food (This will be consumed) Hot and Saucy: Canning M ...more
Watch this video for instructions on making the Yukki Cross Artemis scythe from the anime / manga Vampire Knight. Supply list: 4 foam board pieces (dimensions 32 x 40 x 3/16 in) paper mache hot glue gun wooden pole approx 5 feet tall craft bond spray paint paint brushes acryl ...more
Happy Whore-o-ween! It's that time of year again for ladies to shed their inhibitions, show off the booty, and debase themselves. It's no great surprise that Jersey Shore is 2010's most popular costume choice. (Offended? Check out Take Back Halloween, a project that promotes ...more
By "God," I mean Morley Davidson, John Dethridge, Herbert Kociemba, Tomas Rokicki and about 35 CPU-years. Ever since Erno Rubik conceived the Rubik's Cube in 1974, math-minded cubers have been trying to find the most efficient number of moves required to solve the 3x3 Rubik's ...more
In this how-to video from projectink we are shown how to make a lamp out of a tequila bottle. There's no need to spend 100 bucks on a lamp when making your own is cheap and easy and fun. These are the supplies you'll need: A bottle (we're using a Jose Cuervo tequila bottle), a ...more
Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to ha ...more
Feeling unprepared for the next earthquake? In this tutorial, learn what to do and what not to do to survive "the big one". You'll be surprised to learn that hiding in a doorway is a myth! You Will Need: • A safe place • Sturdy shoes • A fire extinguisher • A flashlight ...more
When it comes to used cars, it’s hard to make lemonade out of a lemon. So don’t get stuck with a piece of junk in the first place. You Will Need * A keen eye * A mechanic Step 1: Look inside Start with the interior. If there’s lots of wear-and-tear on what you can plainly see ...more
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any pro ...more
A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more
Confidence A key ingredient to building any relationship is having the confidence to ask any given woman out in the first place. Women find confidence in a man more attractive than his looks, and at first, even his personality (you will, however, have to have a good personali ...more
Whenever we make a homemade circuit, we use what are called through-hole components. Any components with long metal leads is a through-hole component. They are great for soldering to, but it's tough to fit enough through-hole resistors and capacitors into a smartphone. To get ...more
We've talked about the deep web before, but we never really covered the details of what's out there. It occurred to me that a nice list of resources would be very helpful to all of you anons out there. Think of this like a helpful brochure to the hidden web. However, I should ...more
If you've ever had teeth removed/minor surgery, you most likely received some laughing gas, or nitrous oxide. This gas creates a happy, lightened feeling, and causes instant laughter. In this article, I'll show you how to make some. BUT BE CAREFUL!!! DO NOT proceed in this exp ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
Sometimes an iDevice is best used for idle, pointless fun. Today's segment of Making Art on Your iOS Deviceis a mixed bag of time-wasting cool effects and random, but useful art-making tools. Below, 10 apps for creating anything from erratic hand-shaken digital effects to your ...more
Skulls. What spooky Halloween décor or staging of Hamlet is complete without a skull or two popping up? For ghoulish special effect and/or setting a dramatic scene, skulls are absolutely integral. Well, with some artistry, hardware supplies, and a good dose of patience, you ca ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
ACTION MOVIES The Hunger Games (2012) Set in a future where the Capitol selects a boy and girl from the twelve districts to fight to the death on live television, Katniss Everdeen volunteers to take her younger sister's place for the latest match.Dir: Gary Ross With: Jennife ...more
If you don't have the time or money for a trip to the spa for a pedicure, follow these steps for a quick at home fix. Prep Use a scrub or pumice stone to remove dead, cracked skin from the bottoms of your feet while in the shower. Add Moisture Immediately after getting out ...more
This lobster claw isn't the same one you'd be cracking during dinner. This lobster claw is a clasp for jewelry making. Great for necklaces or bracelets. If you've perfected the meticulous and dexterous art of jewelry making, than this should be simple. This demonstration video ...more
Today is Friday, and I cannot wait to sit back and crack open a nice cool Smirnoff Ice when I get home. If you lost respect for me after that statement, you have only gained mine. But seriously, cracking open a nice beer of your choice is the signal of happy times to come, an ...more
How to cut Drywall, Sheetrock, Plasterboard. THE EASY WAY! G'day Knuckleheads, Uncle Knackers here and welcome to Video Two of my ten part series titled 'My Top Ten DIY Tips' as nominated by you.. In todays video l'm going to give you the basics of cutting drywall, plasterbo ...more
For many of you, the carving fork only comes out at Thanksgiving as an essential turkey-slicing aid. Perhaps you pull it out of the knife block to slice up the occasional roast. But the carving fork (also known as kitchen fork) can be used for many more tasks around the kitche ...more
Welcome back, my rookie hackers! A short while back, I began a new series on database hacking, and now it's time to continue and extend your education in that field. As you know, the database contains all of the most valuable info for the hacker, including personally identifi ...more
Welcome back, my budding hackers! With this article, I am initiating a new series that so many of you have been asking for: Hacking Web Applications. In previous tutorials, we have touched on some of the techniques and tools for web app hacking. We looked at web app vulnerab ...more
Sometimes I forget that I'm also a fiction writer, so I thought it might be a nice change of pace to share one of my stories with you. I wrote this piece awhile ago for an anthology that never came together and I'm tired of just sitting on it. It's one of the more odd stories ...more
Apple announced four different iPhone models during its Oct. 13 web-only event, but only two of them can be purchased this month: the iPhone 12 and iPhone 12 Pro. Preorders have already started for the two smartphones, and you could have one in your hands as early as Oct. 23, ...more
Unscrew chair and knock apart gently with a rubber mallet. To fix a broken stretch, use quick dry polyurethane glue, using plenty (better to have too much than too little) Wipe of excess glue. Leave to set for 10 minutes. Sand down the points that slot into the seat of the cha ...more
Welcome back, my aspiring hackers! As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding of digital forensics. If I am tasked to intrude upon an enemy's file server to retrieve war plans, such as in this tutorial, it i ...more
If you're all out of prank ideas for April Fool's Day, we've got a few that your Apple-loving friends will enjoy (or hate?). You can have a little bit of fun if you don't have access to their iOS device or Mac, but for the best pranks, you will need access to their devices, ev ...more
Welcome back, my rookie hackers! "How can I travel and communicate over the Internet without being tracked or spied on by anyone?" It's a question many Null Byteans have asked me, so I have decided to write a comprehensive article addressing this issue. There are a multitude ...more
If you've wanted to get into Wi-Fi hacking, you might have noticed that it can be pretty challenging to find a safe and legal target to hack. But you can easily create your own test network using a single ESP8266-based microcontroller like the D1 Mini. Our goal is to crack a ...more
Welcome back, my neophyte hackers! In previous tutorials, we learned how to steal system tokens that we could use to access resources, how to use hashdump to pull password hashes from a local system, and how to grab password hashes from a local system and crack them. In each ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more
Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover a ...more
It's the bane of many a tech geek's existence that the customizability of Android software cannot be combined with the sleek design of the iPhone. A new Kickstarter project titled Eye, however, is looking to change that with a new iPhone case that allows you to combine the two ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
The iPhone is probably one of the best looking phones ever made, but that beauty comes with a price. If you have a 4S or previous version, all it takes is one drop and the back glass is shattered (unless you're incredibly lucky). Replacing it yourself is pretty simple and chea ...more
When it comes to security, Apple is usually at the top of the pack when it comes to your personal data, minus a few embarrassing flaws here and there. However, a new iOS security concern has been discovered that protects your data less than it did before — and Apple designed i ...more
Welcome back, my tenderfoot hackers! We have looked at a number of ways that we sniff traffic on the network with such tools as Wireshark, tcpdump, dnsiff, and others, but each of these tools is only capable of pulling packets off the wire. Those packets can be examined for ...more