Ever wanted to learn how to pick a lock? Well, there's no better time than now to start learning the craft of so many locksmiths out there... lock picking. Just watch this video tutorial to see how to bypass security wafers when lock picking. Security wafers on locks prevent ...more
In yoga the Bound Forward Fold involves twisting the body and clasping the hands together. Learn a new yoga pose in this video yoga lesson. Take action: place feet wider than hips, root into feet, bend knees to lock, and focus on breathing. Cindy Mastry, the instructor of this ...more
The Extended Side Arm Pose engages the core muscles and improves balance. Learn a new yoga pose in this video yoga lesson. Take action: let go of fear, engage core, find counter balance, use belly lock, and breathe and center. Cindy Mastry, the instructor of this how-to video, ...more
Have a go at this dodecahedron "flower-ish" kusudama model by Enrica Dray. You can do a lot of different things with the modules both in appearance as well as locking them together. Check out this how-to video if you want to origami Enrica's dodecahedron kusudama. Maybe you ar ...more
Hi again, Just wanted to share a neat little code that I found way back, when I was presented with a spreadsheet which was locked and asked to ''unlock'' it or do whatever it takes to enable the user to edit it's contents. Well, I'm not one to say nay to a challenge, however ...more
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more
Since we all know Bam is terrified of Snakes I figured this would go above and beyond. The Proof Sneak into his hotel room while he's asleep and place the cameras. The Initiation Set loose some snakes (any kind) across the floor but make sure he has room to hop over and ge ...more
Beware the Canning Mission! The Zynga Community Forum is full of complaints about the new Canning Mission. Here is an outline: Mmm Tomato Gravy! Canning Master Part I - Harvest 50 Tomatoes - Collect 5 butter - Have 5,000 food (This will be consumed) Hot and Saucy: Canning M ...more
Over the past few months I've written up several helpful How-To guides to help you with various FarmVille related issues. It's about time I put them all in one place so they are easy to find, learn from and share! It has been a pleasure writing for you all and I do hope I have ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Farm achievements in Halo: Reach Can't wait for Halo: Reach to come out next week? We've got an ...more
In this video, Erik Dillard teaches us how to sing. Remember that breathing is everything. A lot of people having amazing voices, but they can't tap into their full voice because they aren't breathing properly. Make sure you use your diaphragm and never breathe through your ch ...more
Since we've already mastered the fried egg, it's time to move on to a slightly more ambitious task. Apartment Therapy brings us another step-by-step on the art of the egg. This time around, HowTo: poach an egg perfectly. You Will Need: 1 or more eggs White vinegar Water Sma ...more
The art of the sunny side up, fried egg. Master it, and you're sure to impress. Luckily, Apartment Therapy is here to instruct with another Home Hack. HowTo: make a perfectly cooked fried egg. You Will Need: One or more eggs Butter Nonstick OR stainless steel skillet or fr ...more
Damsels in Distress: Everybody likes rescuing a helpless woman, or multiple helpless women. You'll find Antonio and company in the Dorsoduro district to the south. Talk to him and your conversation is interrupted by a murder—that's right, murder! After the cut scene, you need ...more
Knowledge Is Power: But can power be knowledge, too? Pay a visit to Leonardo and he'll cook up a new weapon for you based on a mystery codex. After the cut scene, move out to the yellow map marker and you'll get some directions on how to use your new pistol. Lock onto the thre ...more
Fox Hunt: When you trigger this mission, you're asked to find a particular man among the crowd in the village square that's marked in green on your map. Use your eagle vision and only the guy you're looking for will glow gold (guards glow red, everyone else is darkened out). W ...more
Practice What You Preach: Just make sure you know what you're doing. Return to Leonardo in Florence and he'll use your collected codices to give you some new skills. After the cut scene, look for the marker on your map that points you to a courtyard behind Leonardo's pad. Ther ...more
Family Heirloom: Find the precious family peice passed down generation to generation. Go back to Giovanni's room and use eagle vision to locate the hidden door. Okay, it's not really very hidden. Open the door and step into the secret room. Open up the chest inside to get a sn ...more
Boys Will Be Boys: This is the very first problem for you to solve in the video game. You're dropped into your first mission, which requires you beat up a lot of dudes. Be sure to lock onto an enemy, which allows you to throw up your guard and block incoming attacks. You've go ...more
This Null Byte is a doozey. On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely, to request to have the root user's password changed without knowing the password to the ...more
If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to i ...more
Hanging a door evenly isn't easy, and if you screw it up, you'll probably have to start over with a brand new door. Master this skill, however, and save a bundle in installation fees. You Will Need * A circular saw * A sanding block * Varnish * A combination square or ruler ...more
You've seen his explanation of a combination lock's inner workings. You'll never lose another game of Jenga, thanks to his winning wooden pistol. And nearly 4 million YouTube users have marveled at his wooden marble machine sculpture. He's Matthias Wandel, and he's accomplishe ...more
The Holy Grail of chicken has just been found by an unsuspecting reporter of the Chicago Tribune. Yes, that's right: The secret 11 herbs and spices in Colonel Sanders' Original Recipe chicken has finally been revealed, and it looks legit as hell. While a copy of the Original ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. ...more
Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards ...more
Whenever we make a homemade circuit, we use what are called through-hole components. Any components with long metal leads is a through-hole component. They are great for soldering to, but it's tough to fit enough through-hole resistors and capacitors into a smartphone. To get ...more
Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then ac ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A nostalgia-themed cell phone photo ...more
Difficulty Level: Moderate Photoshop Skills Photoshop isn't just for zapping zits and adding freaky colors to sunset pictures! You can use it for fun, altered-reality pictures, too. If you have a tripod and some friends, you can combine many exposures as separate layers and u ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
Traditional Aboriginal didgeridoos are made from trees that have been hollowed out by termites. Finishing work to smooth out surfaces and decorate the didgeridoo would soon follow. Lucky for you, you don't have to spend lots of money or find a hollowed out tree to create a did ...more
You want to put out a live web server, but you don't want to be owned in the process. An expert eye for security is not needed if you take a few basic steps in locking down the hatches. Most successful attacks today are not the complex, time-consuming tasks you might think, bu ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
Dawn your flannel and grow out your beard, it’s time to do some log cutting. Put good use to unwanted trees or extra lumber by making proper logs. It may seem self explanatory but the correct form will create uniform, crack free logs and keep you with all your fingers. You ha ...more
Aikido employs blocks, atemi, wrist locks, and principles of motion that allow you to defend a mid level punch or Mune Tsuki and gain control of your opponent. Learn intermediate Aikido techniques for avoiding and controlling an opponent's mid level punches in this free Aikido ...more
They say cheaters never prosper, but how will your know for sure if you don't give it a try? By a little repositioning of the blindfold and some spacial awareness you can be the master at this classic party game. Follow these tips to make sure your tail wins the prize. You W ...more
In this online video series, learn judo techniques from 12 time U.S. National Masters Champion Sensei John T. Anderson, as he demonstrates moves such as the compression arm lock, forearm lock, Hadaka Jin rear stranglehold, breakfalling, Juji Gatame cross lock, Kate Te Jume str ...more
Chrome, Firefox, and Safari all provide built-in features that allow you to save your username and password for your favorite sites, making the process for entering your credentials a breeze when you revisit them. While this automation does make your life a little easier, it ...more
If you're all out of prank ideas for April Fool's Day, we've got a few that your Apple-loving friends will enjoy (or hate?). You can have a little bit of fun if you don't have access to their iOS device or Mac, but for the best pranks, you will need access to their devices, ev ...more
When it comes to security, Android generally takes an all-or-nothing approach—once someone has your PIN, they're free to do just about anything, up to and including wiping your device. This is why you have to be extra careful to ensure that neither strangers nor friends are lo ...more
Losing your phone is a much bigger ordeal today than it was just 10 years ago. Our smartphones carry with them lots of sensitive data that, in the wrong hands, is capable of being used for identity theft and fraud. One of the smartest things you can do to help avoid such a di ...more
This time it's serious. Really. The largest web security vulnerability of all time went public on Monday, April 7th, 2014, resulting in widespread panic throughout the Internet as system administrators scrambled to secure their websites from the OpenSSL bug known as Heartblee ...more
If you're ever faced with a situation of handing over your iPhone to law enforcement (or getting it taken forcibly), whether by the police, feds, or court system, there are things you can do to prevent them from getting access to all that potentially self-incriminating data. A ...more
Welcome back, my eager hackers! In recent blogs, I've demonstrated how to grab password hashes remotely using Metasploit's meterpreter and pwdump. Once we have the Windows passwords from the SAM file, we can then crack these hashes using tools such as Cain and Abel. In this ...more
Apple's latest mobile operating system for iPhones, iOS 12, was released to everyone Monday, Sept. 17, and it's the same exact build that developers and public beta testers received as the "golden master" on Sept. 12, the day of Apple's 2018 special event. Install it to start ...more
Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private ...more
Who wouldn't want to know if someone was trying to log onto their personal computer without their permission? Be it your annoying co-worker or your girlfriend, there are many cases where people may try to gain access to your desktop or laptop. Having a strong password is the ...more
We've seen compressed air power a homemade rocket, shoot erasers across the room, and even remove dents from a vehicle, but how about breaking a bike lock? As Theodore Gray of PopSci explains, no matter how tough your lock is, there's one thing that will defeat it every time— ...more
People are always looking for ways to save money, and for the most part, saving money and cheating the system are synonymous when it comes to things like free internet access. Practically every new gadget is capable of connecting to the web, which means more and more people ar ...more
Self proclaimed "Paper Airplane Guy", John Collins, is the master of paper crafted flight. Collins hosts workshops for Corporate America, using the paper airplane as a metaphor for success: "Weaving your corporate message into the stories of how the planes get invented, ties ...more
Who doesn't love The Lego Movie? With a theme song that shouts the film's awesomeness, becoming one of its brick-bodied, eternally happy characters is everyone's dream. If you've ever relied on scissors and tape to craft your Halloween costume, get ready: creating a costume b ...more
It's nearly impossible not to be at least somewhat familiar with Microsoft Excel. While it's needed for many office jobs and data analysis fields, hackers could also benefit from improving their spreadsheet skills. Many white hats already know some of the essential Excel hacks ...more
As long as you're on the internet, you can be hacked. With an estimated 2.65 billion social media users, these apps are prime targets for hackers. While companies like Facebook, Snap, and Twitter do a formidable job against the waves of attacks they receive daily, they are no ...more
Just yesterday, Google announced that it is banning all apps that contain any form of lock screen ads. Today, they posted a list of the Best Apps of 2017 for the Play Store. Given the new policy of cracking down on apps with advertisements on the lock screen, you wouldn't expe ...more
With certain apps and games, it's all about the settings. In order to get your money's worth with one of these, you simply have to take the time to tweak and adjust various options, which is something a lot of users don't necessarily want to do. Take GravityBox for example—th ...more