When it's frigid outside, all you can think about is getting inside and shutting out the cold. But sometimes even the largest house can get a bit, well, stuffy. One of the best ways to make the most of the situation is by making mulled cider in your slow cooker. Start the mul ...more
The Galaxy S6 already has one of the best cameras on the market, but a few minor annoyances still linger. Full-sized photos are stored with heavy compression that can cause artifacting, burst mode shots aren't taken at 100% quality, and the camera flash cannot be used when you ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
When it comes time to buy a new smartphone, the sheer amount of options on the market can make you feel overwhelmed. There are Android devices of all shapes and sizes with different functionalities and price points, and now, even Apple has three unique iPhone models to fit var ...more
Hate slogging through pages and pages of weighty books and lengthy work documents? You may not be able to depend on speed-reading apps, but with the right font, you can increase the number of words you scan each second, speeding up your reading pace exponentially. Familiar Is ...more
With the news that Cambridge Analytica obtained over 50 million Facebook users' information without their consent, there are no doubt many of us considering that terrifying yet alluring endgame — deleting Facebook. While difficult to figure out, deleting your Facebook account ...more
Whether you use a third-party keyboard or the stock offering, your Samsung device keeps a history of the last 20 words you copied on its clipboard. Samsung added this feature to Android to help make multitasking a bit easier, but if you use a password manager like LastPass, th ...more
If beauty is in the eye of the beholder, music lies in the ear. Even within a group of friends who share enough common interests to sit around and socialize over, music tastes can vary dramatically. If you've ever hosted a party and thought you had the perfect playlist picked ...more
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP requests and parameters, but these things are often concealed from the user, due to security reasons, convenience, or both. However, a ...more
In our last ARKit tutorial, we learned how to measure the sizes of horizontal planes. It was a helpful entryway into the arena of determining spatial relationships with real world spaces versus virtual objects and experiences. This time around, we'll dive into a slightly diff ...more
In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between ...more
This tutorial tells us about using helping verbs with the simple form. It also gives us information on the differences between the present, past and future tenses. •Let us see some words in the simple and past forms. Simple – Live, work, go, wake up Past – Lived, worked, went ...more
Garlic is magical. It fends off vampires (or so I hear), helps lower blood pressure, reduces the production of cholesterol in the body... oh, and it's also freaking delicious, of course. Garlic is a culinary staple in countries all over the world. That lovable stink and sharp ...more
Android's permission system doles out access to certain system-level functions. Without it, our favorite apps wouldn't be able to perform their most basic operations. Picture a camera app that didn't have permission to access your camera sensor—now that wouldn't be much fun at ...more
With this article, I'll be continuing the series I started with my recent plague doctor article. That is, examining tropes that may at first appear to not fit into Steampunk. Obviously the airship pirate never existed in real life, as we never really experienced the age of ai ...more
File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common w ...more
Most of you probably hate ads on your smartphone, but they're a part of modern digital life. As long as apps like Instagram are free to use, then we'll need to pay by dealing with posts, videos, and pop-ups trying to sell us stuff. Well, not necessarily, so long as you're OK w ...more
Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for s ...more
This is a great instructional video on how to calculate the age of Universe from Hubble's constant. The speed the galaxy moves away from us is directly proportional to the distance from us. Now think of big bang theory. Hubble's constant is equal to velocity over distance. 1 o ...more
In this video tutorial, viewers learn how to install the Installous application for the iPhone or iPod Touch. Users will need to have their iPod device jailbroken before installing. Begin by opening Cydia and select manage. Click sources and select edit. Add this source:
Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more
Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — an ...more
Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says tha ...more
Most people keep their ungodly sexual desires deep inside, only to be indulged in private on their computers. It makes you wonder... what secrets do your neighbors have? What kind of porn are they watching? And how much and for how long? Thanks to some public (and anonymous) d ...more
Papercraft + Transformers = Fanboy nirvana. Papercrafting is enjoying a renaissance thanks to its nerd-love. Popularity of card modeling boomed during World War II when paper was one of the few items whose use and production was not heavily regulated. Micromodels, designed an ...more
Welcome back, my newbie hackers! Hackers often are associated with clandestine and illegal activity, but that is not necessarily always the case. Hackers are increasingly being used and employed for law enforcement, national security, and other legitimate purposes. In this in ...more
Levers are the only toggleable way to provide a steady source of power to your redstone circuits, but they're ugly and they stick out like a sore thumb. Just look at this: What looks better? An elegant button or the huge lever that practically calls out to thieves, "Pull me! ...more
Adobe InDesign can create PDFs natively. In this video we'll see a rarely used feature that allows us to create rollover effects that work beautifully in PDF files. InDesign allows us to create buttons and using the States palette we can create rollover effects.
While I do enjoy the vanilla Android Lollipop experience that comes with the Google Play Edition HTC One, I do miss the sweet camera that ships with Sense. Luckily, the people behind Liberty ROMs found a way to port that camera over and now we can enjoy the best of both worlds ...more
Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them Step 1: What Exactly Is XSS? Basically, cross site scripting is a type of security hole in a website's forms. Normally forms allow you to i ...more
Learning to make giant bubbles for this video has been the most fun I've had with a project in a long time. It's addicting to try to get them to grow bigger and bigger than the ones before. Since filming this video, my skill has improved tremendously and the bubbles you're abo ...more
Every time my Galaxy Note 3 boots up, I'm greeted by the monotonous and slightly annoying AT&T sound. If you're as tired of the stock boot up sound as I am, then follow along with me below to see how to change it to whatever sound you want, no matter what carrier version you h ...more
This is a demonstration of how to use bolt cutters to cut off a lock. All of us have at one time lost a key to a lock, well now you can remove the lock with bolt cutters.
Not many people fly kites anymore. Most of us don't have the patience or attention span because, let's face it, we're used to smartphones and other gadgets that have games and apps galore to entertain us. Heck, you can even fly a kite on them if you really want. Though, there ...more
You've probably heard of RCS messaging. The new standard has been promoted by Google as their answer to iMessage and is the backbone behind the new "Chat" features in Android Messages. With RCS, Android phones will now enjoy enhanced messaging like iPhone users have had for ye ...more
During our last adventure into the realm of format string exploitation, we learned how we can manipulate format specifiers to rewrite a program's memory with an arbitrary value. While that's all well and good, arbitrary values are boring. We want to gain full control over the ...more
You walk over to your laptop, wiggle your mouse to wake up the screen, then fire up your browser to come visit Null Byte. Catching the article about Anonymous and how they presumably will not take down the Internet, you find yourself wondering... how would someone take down th ...more
Pulling an all-nighter for school, work or an important project is never fun. That being said, if you take the time and effort to prepare an ideal work space, minimize your distractions, and stay physically and mentally stimulated, you can maximize your productivity level with ...more
For all of the flak that Windows 8 received from desktop users, it certainly had some interesting and unique features. For instance, the "Charms" bar allowed you to easily access several key menus by simply hovering your mouse pointer in the top- or bottom-right corner of the ...more
Update 1/17: Tim Cook chimed in about the upcoming iOS upgrade with expanded battery health data. We'll expand on that below. Today, Apple announced that they'd be dropping the price of their battery replacement by $50, from $79 to $29. While this will help ailing consumers' ...more
Hi guys, this is going to be kinda like a follow up to my previous post on hacking facebook with the remote keylogger. If you haven't seen that post I suggest you do. So like you can click here. Anyway let's move on. Even though people are the weakest form of security, some o ...more
Apple's latest iPhone and iPad software, iOS 15.5 and iPadOS 15.5, became available on May 16, so you can download and install it right now if you haven't already. While there aren't as many new features as iOS 15.4 and iPadOS 15.4 had, there are a few big ones in the U.S. you ...more
Without much notice, Spotify launched Desktop Open Beta a few weeks ago, a program that allows anyone to download, test out, and provide feedback on the latest beta version of their desktop application for Mac and Windows. Download the Beta Desktop Version of Spotify Downloa ...more
Megaupload was one of the very first file-sharing sites I ever used. But since 2005, the beloved (and pretty gangster) Kim Dotcom, has been in a legal battle with the U.S. Justice Department over copyright infringement. Major movie studios and music labels went after Megauplo ...more
Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method. Note: This method only works if the website has the vulner ...more
Recently, I've been experimenting with BeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. On ...more
In places like underground bars or national parks, your phone's Internet service is sure to slow down to a very sluggish pace, making it difficult to surf the web. Or worst case, data will be non-existent, leaving you with only low-level network support for calls and SMS text ...more
Combine the power of gymnastics with the flexibility and smoothness of dance by performing this split-roll dance move. These future Olympic gymnasts will show you how to perform this dance move like a pro. Katrina shows us how to do the dance move 'split rolls', but you shoul ...more
Welcome back, my fledgling hackers! As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely da ...more
It appears that the next iteration of KitKat, Android 4.4.3, is fast approaching. If the past is any indication, today's update to the Nexus 5 software changelog on Sprint's website tells us a new version of Android will begin rolling out within 24 hours. Sprint has broken the ...more
Learn how to dance to “Lip Gloss”. Dancer, choreographer and vocalist, Samantha Davies teaches us an intermediate hip hop dance. This is for “Lip Gloss” by Lil Mama.
For the (anal) artist among us. This tutorial requires only 15 sheets of paper and scissors. Technically, because of the cutting of the paper, this swan is kirigami, not origami. That said, assembling 471 paper triangles into this beautiful swan is the work of angels. Enjoy. ...more
Bob Fenwick shows us how to repair a drain stopper on a bathtub. These are simple easy steps that can be done with a screw driver.
For those of us who love to multitask, picture-in-picture mode is a godsend. The feature, introduced in Android 8.0 Oreo, lets you enjoy videos in a floating window overlaid on top of another app. However, while the OS does have native support, only a select number of apps sup ...more
During our high school years, one of us (hint: her name starts with a B) worked at Cold Stone Creamery. She loved working there, and from this love emerged a fascination with adding creative ingredients to plain ol' vanilla ice cream. We now keep this blank palate of frozen g ...more
"Miki Falls" manga artist Mark Crilley shows us how to draw a realistic manga girl's face. Manga has its own look, and it takes practice to draw manga girls so they look appealing. This video takes you through the process of drawing manga girl faces, step by step. Mark Crille ...more
You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more
This colorful image may look like a miniature set of model cars, foam buildings and painted grass, but it's nothing of the sort. It's a still photo from a time-lapse video that Stu Kennedy shot in his hometown of Lincoln, England. But it's not your ordinary time-lapse. Kennedy ...more
Drama seems to follow red smartphones. The internet nearly blew a gasket when Apple released a red iPhone 7 with a white front, and now OnePlus is taking some heat. The new Lava Red 5T comes with black bezels, not repeating Apple's mistake, so why are people mad at the Shenzhe ...more
Welcome back, my hacker novitiates! Now, and more so in the future, wars will be fought hacker v. hacker. The number of soldiers, guns, tanks, and ships will be less important in your success in warfare than the number of well-trained hackers you have. Every nation and every ...more