How To : Connect speakers in a PA or DJ system
Learn the difference between Speakon, Jack, and XLR inputs. Also learn how to wire all of these connectors to hook up your speaker system on your PA or DJ system.
Learn the difference between Speakon, Jack, and XLR inputs. Also learn how to wire all of these connectors to hook up your speaker system on your PA or DJ system.
Many operators use elevators to control access to particular floors, whether it be the penthouse at a hotel or a server room in an office building. However, the law requires them all to have a fire service mode, which gives emergency access to restricted floors, and a hacker c ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
Wondering how to get started with hydroponic gardening? In this video tutorial, you'll find step-by-step instructions on how to build a complete hydroponic system inside of a five-gallon bucket (with an optional fogger attachment) as well as tips for clone planting. Start gard ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
This video shows you how to set up a mini wireless spy cam. Where you put it is up to you. Who you spy on is up to you. If you're wanting to keep an extra set of eyes on someone, watch and learn. So whether you're looking to put a camera in your bathroom or garage, go for it.
Building a DIY Alarm System: The Concept So, you want to protect your property, or maybe a room, car, or even your backyard. The concept of an alarm system is to notify the "alarm administrator" that there is an intruder entering the previously designated boundaries. The trig ...more
This automotive repair video series shows you how to replace the water pump, water pump gasket, timing chain gasket, and oil seal on a 1998 Dodge Dakota Sport 4X4. If you have any or all of these problems in your Dodge Dakota truck, watch this video and learn how to fix the ti ...more
Google's version of Android is best described as AOSP with extra features. But while the Pixel's UI is rightfully praised for its simplicity, those "extra features" aren't as numerous as they are on other OEM skins like Samsung's One UI. Case in point, there's no real system-w ...more
For most of us regular folk, the only opportunity to relish in the conveniences of a maid is during hotel stays. Personally, I would love to have a maid around to help fold my clothes and sweep up those crumbs that accumulate in the corners of my kitchen, but sadly, I currentl ...more
"Cheating is for losers" is only something that losers like to say. If you want to smash your friends and fly up the leaderboards, though, sometimes you have to go that extra mile. Bejeweled Blitz is a PopCap game that can be played on your computer, through Facebook, or even ...more
When the HTC One was announced, the fact that its IR transmitter was a side note more than a main feature made me dismiss it. When Samsung included one in the GS4, it became even less impressive. However, now that I actually have a One, I find that the "TV" app is way more tha ...more
As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It's especially crucial for persistence if the target will be accessed again in the future by the attacker. To show you th ...more
Keys are on the way out. They're clunky, take up precious space, and slow you down when you have tons of identical-looking gold ones on your keyring. Everything we can open with keys can now also be opened with wireless technology in just a click—so why use keys anymore? Sure, ...more
Welcome back, my novice hackers! My recent tutorials have been focused upon ways to NOT get caught. Some people call this anti-forensics—the ability to not leave evidence that can be tracked to you or your hack by the system administrator or law enforcement. One the most com ...more
Welcome back, my budding hackers! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to find vulnerabilities or flaws in the target system, which are what we exploit when we hack. We have looked at several ways to do that including var ...more
Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an a ...more
Rooting your Samsung Galaxy Note 2 grants you access to system files, giving you the ability to change things on the device that you normally wouldn't be able to. Sounds great, right? There's just one problem. How in the hell do you manually change those system files? Let's s ...more
Everyone loves using their cell phones for everything except actually making phone calls. Whether it's watching streaming video, listening to music or playing video games, it would seem that calling people is almost an afterthought to cell manufacturers in this day and age. U ...more
Welcome back, my nascent hackers! We have spent a lot of time in previous tutorials focused on hacking the ubiquitous Windows systems, but the vast majority of "heavy iron" around the world are Linux or Unix systems. Linux and Unix dominate the world of Internet web servers w ...more
More and more car parts are controlled by computers, and the results are not always what we hope they will be. They often break for what seems like no reason and are expensive to fix. In this video you'll learn how you can fix a broken air conditioning control system on your c ...more
Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand th ...more
Before you head to class, work, or sleep, you're probably doing the same thing over and over again—toggling off system settings like Wi-Fi, sound, data, or brightness, depending on the circumstances. Schedules and routines can help increase efficiency, so while you abide to a ...more
Not all of these involve PVC, but the majority do, and they all have their merits.
MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanning for access points, and even capturing packets all can be done from the com ...more
Google's Pixel and Pixel XL flagship phones are a rousing success, with consumers praising the fluid user experience and overall performance as two of the devices' biggest strengths. But even though Google may have knocked it out of the park with a set of Apple-like smartphone ...more
Anyone who uses a computer on a regular basis probably knows how to access the task manager to check system resources and usage stats. However, on a Samsung Galaxy S3 or other Android device, it may not be so obvious. There's no equivalent to Control-Alt-Delete, but it's still ...more
Looking to make use—if not necessarily good use—of your old hard drives? This how-to presents instructions for creating a hard drive speaker system to use in conjunction with an MP3 player. To follow along, you'll need an MP3 player (e.g., the Samsung YP-S3), at least one spar ...more
There's not much you can customize on your iPhone's status bar beyond showing or hiding the battery percentage icon. You can't choose different icons or pick a vibrant color, but there's a secret trick that lets you bold all the text. If you go to Settings –> Display & Bright ...more
Welcome back, my fledgling hackers! Nearly every commercial enterprise worth hacking has an intrusion detection system (IDS). These network intrusion detection systems are designed to detect any malicious activity on the network. That means you! As the name implies, a networ ...more
Yes, you read the title correctly. GameStop has problems, and if you're lax in morals, you can take advantage of them for free games and cash. I'm bringing you all yet another exclusive Null Byte that falls into the fascinating category of life hacking. If you do not like wha ...more
Covers installation of BMW X5 Subwoofer system for X5 00-06 (E53). Part 1 shows removal of original subwoofer (if present). Part 2 shows accessing the OEM amplifier and battery. Part 3 and 4 show amplifier connections. Part 5 shows amplifier power and ground for the subwoofer ...more
Since Apple launched iOS 13, we've seen four major updates for iPhone, each of which added some cool new features. Between iOS 13.1, 13.2, 13.3, 13.4, and all the minor updates in between, there's never been a better time to be on iOS. And now, we've got even more positive cha ...more
Let's say today is your birthday. You've just put those boisterous, vicenarian times behind you, reaching the first big step to your upcoming midlife crisis—30 years old. Maybe this is your midlife crisis. After all, if you're not where you want to be in life when you join the ...more
The temperature control onto hot and the fan is turned off. A bleeder is loosened with a 12mm screwing object. A funnel attachment is placed onto the cooling system and the actual funnel placed ontop. A pre-mixed liquid is poured into the funnel. The bleeder valve is then tigh ...more
A/C system charging. Learn about recharging a car's air conditioner with refrigerant in this free car maintenance video. Part 1 of 9 - How to Recharge an auto A/C system. Recharge an auto A/C system - Part 2 of 9. Click through to watch this video on expertvillage.com Recharge ...more
This video demonstrates how to triple boot a computer, which includes Windows XP, Ubuntu, and Backtrack 2 all on one machine. Part 1 of 2 - How to Triple boot three operating systems on one computer. Part 2 of 2 - How to Triple boot three operating systems on one computer.
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
When it comes to theming your Android device, it's the little touches that count the most. That's why developer SArnab created the Android Theme Engine, an Xposed Module to theme those hard-to-reach corners of the Android System that often go untouched with other themes. So, ...more
Microsoft decided to give users a free upgrade to Windows 10 if they were previously running Windows 7 or 8—but it came with a catch. Their main motivation for knocking off over $100 from the normal going rate was to get more people using new Microsoft services like Cortana an ...more
In this gardening tutorial, you'll find instructions for building an aeroponic fogger, or mister, for a hydroponic growing system. Nutrified fog is accepted by the roots at a much faster rate than nutrients from spray or soak system. So I modified my Aerospray system to have b ...more
Get rid of your water-wasting sprinkler system— but not entirely! Keep your landscape and garden maintained by converting those sprinklers into eco- and pocket-friendly drip irrigation. In this how-to video, Paula Mohadjer from the Cascade Water Alliance explains how you can e ...more
If you've been thinking about replacing your old shower head with a new model, or maybe even adding a hand shower, you'll be glad to know it's a pretty simple process. To replace the shower head, you don't even have to shut off the water supply. You just twist off the old one, ...more
The sound I get when receiving a new text message is the camel from that Geico commercial yelling "Hump Day!" Sure, I could find a less obnoxious notification sound, but it makes me laugh every time, and that's important. However, it may not make my friends or coworkers laugh ...more
The world of Android gaming is much bigger than what's available in the Google Play Store. If you have a Samsung Galaxy S3 or other Android device—don't just stop there—a hidden treasure of games lies in those boxes of old, dusty game cartridges in your closet. You're already ...more
Check out this video tutorial to see how to construct an alarm system, that's based on the principle of motion detectors, which work by touch. It's very useful to catch unpleasant visitors red-handed. So make sure your chocolate bar never gets snagged again, catch the bandits ...more
Apps don't need to come bundled with an entire browser just to be able to display web pages — instead, they can call on the system WebView browser to render content for them. Android's default WebView renderer is Google software, which isn't quite as privacy-forward as some ot ...more
As I've explained before, black app backgrounds save you a bit of battery life on your Samsung Galaxy S5. This is because the AMOLED display on your S5 does not have to power pixels or a backlight for portions of the screen that are black. Developer Kdio knows this, and that' ...more
When you don't have a steady cellular signal or immediate Wi-Fi access but need to communicate with others around you, you can set up an off-the-grid voice communications network using a Raspberry Pi and an Android app. There are apps such as Bridgefy that will create a mesh ...more
Your car's radiator needs to be cleaned to be cool. As time goes on, a car's radiator builds solid deposits that can clog the cooling system. A quick, inexpensive radiator flush can keep the system in shape. This automotive tutorial video will give you tips on how you can flus ...more
Have you ever been the victim of theft? It sucks. Why would these lazy scumbags rather steal from us than work hard like everybody else? Well, teach them a lesson with your own homemade security system. This video tutorial will show you how to create a fun and easy security/a ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will. Torrent clients like uTorre ...more
Allow for your community to grow and expand by adding in a private messaging system to your website. Even if you're not experienced with PHP or MySQL, this tutorial walks you through the process of setting up the messaging system. Part 1 of 3 - How to Add a private messaging s ...more
Whether you're an audiophile or just a basshead (cf. Lady Tigra & Bunny), you're certain to appreciate this video, which details how to install passive crossover mid drivers in a car's stereo system. The individual steps are as follows: Step 1: Purchase speaker components set ...more
Refrigerant is the stuff that makes your A/C in your car so good at turning hot air to cold. Like almost any substance you fill part of your car with, it needs to be replaced and refilled every so often. Watch this video to learn how to bleed your air conditioning system befor ...more
Tired of touch-tone hell? Get human with our cool phone hacks and cheats with the tips from this how-to video. Become a life hacker - we'll show you how to find phone numbers, cheat the computer and hack the call center system with our hacking tools. Watch this video tutorial ...more
Welcome back, my novice hackers! It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, ...more
As dedicated bicyclists are well aware, riding can be very dangerous. Now that daylights savings time has ended in the United States, darkness appears quicker, and the night is especially dangerous for cyclists because of the low visibility that drivers have. Not only is darkn ...more
This video explains how to adjust slack in a air brake system on a vehicle.