Okay, you can't really become the king of the world by stacking three pistons. For that, you have to stack four pistons. Seriously though, stacking pistons is an incredibly useful thing to know how to do, and it can be used to make invisible doors, hidden staircases, portcull ...more
Here is an easy way to make a beautiful parol. All that you need is colorful papers, scissors, tape, stapler pin. Now take five sheets. Cross fold it and tear the extra paper, so that a perfect square is formed. Do it for all the five sheets. Now fold it cross wise, and again ...more
Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll ...more
For people that like to get things done, Android's home screen widgets are almost indispensable. Rather than packing your launcher with a bunch of icons, you can utilize widgets to get quick information in a beautiful package or provide one-tap access to a particular functiona ...more
The newest firmware update for Android, Jelly Bean 4.1.1, has been out for a while now, but not every device has gotten it yet (some never will). One popular device that has recently gotten it is the Samsung Galaxy S III, only they'll be pushing the update out overseas during ...more
You don't have to be a frequent flyer to know how indispensable navigation apps have become. Many of us rely on these apps for traveling from state to state and getting around in foreign cities, but even more of us count on these apps to beat rush hour traffic and find the qui ...more
It's no secret that devices leak data, but sometimes they do so in ways you may not expect. Your phone, laptop, printer, and IOT devices leak Wi-Fi information that can (and is) used to track you. Today, we'll make a Wi-Fi probe logger with Probemon.py to track nearby devices ...more
No matter what word game you're playing, whether it's Scrabble or one of its near-homogeneous counterparts like Lexulous, Wordfeud or Words with Friends, one of the easiest ways to stay on top of your opponent is knowing all of the legal two-letter words you can play. You're n ...more
Two minutes on TikTok is all it takes to learn that Renegade is a huge deal. The song and the dance combined are a viral trend that shows no sign of stopping. Feeling left out? Let's change that. You can learn the entire dance in just 20 seconds. First, what is the Renegade c ...more
Want to be fast at solving the cross of the Rubik's Cube, like two or three seconds fast? Well, this video tutorial will show you how to solve the Rubik's Cube cross faster than anyone. These insights into how to make the cross will no doubt make you a great speedcuber. Just p ...more
When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. Th ...more
Dangers abound in the world of srteet art, however one danger stands out as increasingly dangerous. Gangs around the country use graffiti to mark their terriotory and do not take kindly to street artists. In several parts of los angelos gang members will stop you in the middle ...more
During a penetration test, one of the most important aspects of engaging a target is information gathering. The more information you have coming into an attack, the more likely the attack is to succeed. In this article, I'll be looking at SpiderFoot, a modular cross-platform O ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. A hidden bridge can be both a cool part of your home and a defense against your enemies in PvP! The design is simple, you can use it to create lava traps, and it ensures that no red ...more
Battery life is and most likely always will be an issue with iPhones and other smartphones and tablets, but Apple is making it easier for us to save juice when we need to. To help monitor per-app battery usage, iOS 8 now lets us view battery usage stats for individual apps. A ...more
QR codes are everywhere, from product packaging to airline boarding passes, making the scanners that read them a juicy target for hackers. Thanks to flaws in many of these proprietary scanning devices, it's possible to exploit common vulnerabilities using exploits packed into ...more
As Android's official app provider, the Google Play Store is packed with thousands of useful programs. But Google's terms of service is extremely restrictive, which means that countless apps simply don't qualify to be hosted on the Google Play Store. As a result, many great a ...more
Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands. RapidScan does an excellent job of automating the deployment of vulnerabili ...more
Upgrading from velcro-only shoes to laced-up sneakers is an important step in life. Days are spent practicing the perfect bow-tying method, and people even argue as adults over tying with the bunny ear method versus the loop-and-wrap trick. Despite the years of shoe tying exp ...more
Nearly every native app on the iPhone received an upgrade or new features in iOS 14 — and Safari is no exception. The web browser now has better password protection, faster performance, privacy reports, and built-in translations, just to name a few. Some of the Safari updates ...more
Hangouts is a great cross-platform messaging service from Google that works with almost any device, making it one of the few messengers that can be installed on Mac, Windows, iOS, and Android gadgets alike. With its many useful features, one of the few debatable downsides is i ...more
Dating websites allow you to see a person in a very intimate context, framing their successes and accomplishments in life to an important audience. The information contained in these profiles often can't be found elsewhere, offering a unique look into the personal life of the ...more
Kali Linux is established as the go-to operating system for penetration testing, but in its default configuration, it's less than ideal for regular desktop use. While in many scenarios, a live boot or virtual environment can resolve these issues, in some situations, a full ins ...more
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 528th installment in their series of digital spreadsheet magic tricks, you'll learn how to check t ...more
There is no shortage of defenses against cross-site scripting (XSS) since it is so prevalent on the web today. Filters are one of the most common implementations used to prevent this type of attack, usually configured as a blacklist of known bad expressions or based on regex e ...more
Bottoms up Turn the Nerf Vulcan EBF-25 so the bottom side is facing up. Find the button Locate the orange section with the round button-looking thing. Find the screw Locate the metal screw behind this section. Unscrew Unscrew the cross-haired screw with a Phillips head ...more
Minecraft has been out nearly two years now. Hard to believe, isn't it? Fans of the game have been spoiled with a lot of new content over that span from its creator Notch, as well as its modders. A couple months ago, Notch tortured the Minecraft community by tweeting some scre ...more
Cross-compilation allows you to develop for one platform (like Kali) and compile to run on a different platform (such as Windows). For developers, it means that they can work on their platform of choice and compile their code for their target platform. For hackers, it means we ...more
I've never been much of a runner. I've tried running alone, with a partner, on busy sidewalks, and back country roads, but I just never got it. There are a few other forms of exercise I genuinely enjoy, but have yet to experience that "natural high" that avid runners are alway ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
In this video the tutor shows how to solve the missing ratios or proportions. He explains it with an example, where a number in one of the ratios is missing and he intends to find this value. He shows the example of cross multiplication, where you multiply the values on the ei ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
If you want to get started sniffing Wi-Fi networks, you usually need to start with a wireless network adapter. But thanks to a Wi-Fi sniffing library written in Arduino and the ultra-cheap ESP8266 chip, you might not need one. For less than $10 in electronics, you can build a ...more
The Operative Framework is a powerful Python-based open-source intelligence (OSINT) tool that can be used to find domains registered by the same email address, as well as many other investigative functions. This reconnaissance tool provides insight about your target through ex ...more
Sometimes, it's very useful to be able to use more than one app on Android phone or tablet. For example, if you want to watch a movie while surfing or if you need calculator, find some contact, write a note, search web or wikipedia for some facts, etc. Fortunately, this is pe ...more
Nobody likes having to stand at the crosswalk waiting for the light to change so you can cross. This seems to happen more times then not these days. A way has been discovered to eliminate this problem with ease. The first thing you are going to want to do is go to the pole tha ...more
In this article, I'll be covering Triggers and Coils, part two of the series (see part one here). Generally, a simple EMP generator consists of four components; a capacitor, a transformer, a trigger and a coil of copper wire. The transformer component can be varied, but the co ...more
Cortana, Microsoft's voice-activated personal assistant, originally launch on Windows Phone, but is now built directly into Windows 10 complete with "Hey Cortana" voice search (take that, Apple). It can help you locate files, set up reminders, control music. Don't Miss: How t ...more
The long-awaited Dark Mode may have grabbed all the spotlight with iOS 13, but Apple has made subtle changes across the whole platform to make your iPhone even more user-friendly. A small option aimed at people who are sensitive to motion is one such example — a feature that c ...more
Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more
You've been on Google+ for a few weeks now. You're loving it. You're exchanging thoughtful posts, pictures with your friends, meeting new people and following lots of interesting, intelligent people. There's just one problem. You're still stuck in Facebook and/or Twitter beca ...more
Welcome back, my tenderfoot hackers! Web apps are often the best vector to an organization's server/database, an entry point to their entire internal network. By definition, the web app is designed to take an input from the user and send that input back to the server or datab ...more
As most everyone knows, Android and Apple don't get along so well. Even the users don't get along well, with Android and iPhone users constantly berating and insulting each other online—any chance they get. I should know, since I was one of them, but I'm now rare breed who's l ...more
Apple's iOS 14 is here. With it, you'll see over 200 new features and changes hit your iPhone, including home screen widgets, inline replies in Messages, and cycling routes in Maps. Here's how you can get your hands on the brand new update. Apple released iOS 14 to compatible ...more
Video chatting has become an important factor in the overall smartphone experience. Even just a few years ago, 37% of teens were making video calls on a regular basis, and that number has surely grown. 85% of households with infants have used video chat apps to call relatives ...more
Foodborne infections often occur through the contamination of equipment, food-prep tools, and unsanitary surfaces. A recent report from the Centers for Disease Control and Prevention (CDC) reminds us that breast pump parts are part of the food-delivery chain — and they can bec ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
Math Craft admin Cory Poole provided quite a few recipes for sonobe models in his blog, and I followed one to make the pentakis dodecahedron here. I wasn't that happy with my first result because the colours kept on coming out wrong—i.e. two of the same colour next to each ot ...more
Apple lets you save webpages as PDF files in iOS 10, but the only obvious way to do this is by using iBooks. The thing is, most people would probably rather save their PDFs to a service like Google Drive or Dropbox to make sharing a bit easier. Plus, iBooks isn't officially av ...more
Food is a necessity, sure, but every now and then it's so satisfying to eat something because it is fun and delicious. While eating a whole tub of homemade ice cream might satisfy your need for gluttony, there's a way to take it even further—make your dinnerware edible. The B ...more
One of the more enjoyable parts of Christmas (other than opening gifts of course) is going out to find the perfect tree, struggle bringing it into the house, and decorating it. As the years went by, I realized that our tree looked exactly like every other tree in the neighborh ...more
In this article, I'll show you how to create a simple yet effective way of scaring off intruders. Of course, there are methods around this approach, but it's great for office pranks and general fun. The project requires a little background knowledge in electronics and circuitr ...more
What's the latest dance trend sweeping TikTok? The Shuffle Dance. If you just watch people doing the Shuffle Dance, especially the really good ones, you might think it's a bit complicated. In reality, it's really not that hard. It's just a handful of steps. For the uninitiate ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
So you finally decided to make the switch from iOS to Android, huh? Well first off: welcome to the world of tomorrow. And secondly: good call, mate. In all seriousness, switching between mobile ecosystems can be quite the hassle. Even after you've grown accustomed to the new ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony with help from alexstewart2. Watch this video tutorial to learn how to farm rose, lion, cross, and nation medals in Evony. You will get casualties if your hero is a low level. If this ...more
I recently had my iPhone stolen at public park and did everything I could to locate it, but with Find My iPhone disabled (I know, what an idiot) and no exact address to give to the police, I had about a .00000001 percent chance of getting it back. Maybe if it was an Android p ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
Prevent yourself from peeing in your pants with these tricks. You Will Need: * A sexual fantasy * Butt squeezes Warning: Don’t hold in your urine if you have a bladder infection; it will make the condition worse by allowing the bacteria to flourish. Step 1: Fantasize about s ...more
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mit ...more