This video shows how to ollie higher on a skateboard. It has demonstrations from Melvin the Nerd, who shows proper technique to ollie. The ollie is done best when your board is pushed backward as you are jumping, then pushed forward as you are elevating. To practice while movi ...more
This very informative, interesting video will have you on the dance floor in a matter of minutes. Very clear directions are demonstrated by two talented dancers. The voice-over is easy to understand. Demonstrations are given in a room with a plain background so there are no di ...more
In this tutorial, we learn how to download mathematical applets using Wolfram Alpha. First, go to the website Wolfram Demonstrations. Once on this site, use the search bar to type in whatever topic you are interested in, and press enter. After this, you can scroll through and ...more
Brad Davis explains how he uses a double G tuning on the top two strings of his guitar. Convenient for using the top strings as a bass line. Demonstrations in a bluegrass and blues style are performed.
Blake Whitaker has been playing dominoes for a long time and now he's here to teach you how to play. In this series, he goes over what you'll need, how to play, how to score, and some demonstrations. Part 1 of 6 - How to Play dominoes. Play dominoes - Part 2 of 6. Click throug ...more
In these videos, you will learn some techniques for staying fit during the course of your pregnancy. You will see demonstrations of several exercises that you can perform from the first through the third trimester. You will learn how normal exercises such as the pushup, the sq ...more
In this organization tips video clip series, our expert will demonstrate the essential steps necessary for beginning to organize your home. Assessing the situation, cleaning, ordering and discarding or consolidating products and belongings are all a big part of the organizatio ...more
Nicky Markslag - world famous florist tells us how to arrange bouquets and where to put them. For more than 20 year Nicky Markslag arranges flowers and bouquets. Graduated from the florist college in Aalsmeer, she is now teaching flower design, leading many courses and demonst ...more
Ann Arnoult explains why making Pilates exercises with exercise bands is good for your body. It adds resistance, that increases your flexibility and motion. You can work your al body using it. There are demonstrations of exercises, using the band. For working your legs and bac ...more
Video covers the steps into giving your cat a bath. Subtitled steps and clear demonstrations will have your cat looking cleaner than ever.
In this instructional video series, learn the proper, safe way to use a reciprocating saw. Our expert will give you tips and techniques for doing metal and wood cutting work in a variety of settings. Demonstrations include important safety guidelines for saw use, choosing the ...more
News in a nutshell: US to announce aerial blockade of Syria Protesting against Putin Military Strike will lead to collapse of Israel Assad not ready to resign Vladimir Putin has announced his decision to run for a third time as 'President' of Russia. Thousands of anti-reg ...more
Time to change your classical guitar strings? This video will describe exactly how to do just that. The plain end of your string will be tied to the bridge. The other end is will go around the tuning pegs. You will want to do the thickest strings first. Thread through the brid ...more
So you love the idea of delicious dinners from farmers market finds, but that idea isn't going to cook itself! Maybe your mama was one hot Italian lady but she only knew how to push the power button on the microwave. No matter the challenge or limitation have no fear, local co ...more
This card demonstrations shows how I have used the Creative Expressions Die from the Sue Wilson Gemini range, this one is called Corvus. This is Part2 of a mini series. . Part1 shows the die & sizes etc and can be seen here below Video: . Step 1: Items Used Stix2Anything: Ivo ...more
Kizeme This Japanese word, kizeme, means "spirit of attack." It is said of Miyamoto Musashi, the famed Japanese swordsman, that as he grew older he relied more on kizeme to defeat adversaries and, as a result, emerged victorious from challenges without taking the life of his ...more
Do a premiere of a handyman show (with studio audience) with a one armed man as the host with a very real and authentic looking fake arm right down to the phony blood. He accidentally cuts it off on a band saw and wraps his injury in a dirty shirt and keeps on working (this g ...more
Finding an instrumental or karaoke version of a song can be pretty easy unless you're dealing with a song that isn't popular. That leaves you with just the full version of the song, complete with vocals. So how do you convert it into an instrumental or karaoke track? Accompan ...more
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any pro ...more
Can you cook a steak or salmon filet that's straight out of the freezer and get good results? Ordinarily, I would say no. Usually your steak ends up a sad grey mass fit only for the family dog and the fish is burned on the outside with an icy, undercooked center. However, it ...more
Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerabl ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. ...more
Welcome back, my novice hackers! There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful. Many novice hackers focus way too much energy on cracking passwords (which should be a last resort unless you have spec ...more
Welcome back, my fledgling hackers! If you're like most aspiring hackers, at one time or another you've probably spent too much time playing Call of Duty and not enough time preparing for your final exams. So for today, we'll look at how to break into your school's server to ...more
There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. AhMyth, one of these powerful tools, can help outsiders monitor a device's location, see SMS messages, take c ...more
You're in the middle of cooking and a car alarm, cute kitten, or neighborhood brawl made you step away from the stove for a few minutes longer that you should have. It happens to almost every home cook. Most of the time, nothing dramatic happens, but every now and then, you en ...more
Assuming that you're not a burglar-in-training, you may one day find yourself in a situation where you have to break into a home through a door chain lock. But what to do if you have no time to wait for a locksmith? All you need is some kind of string (dental floss, yarn, rib ...more
What I'm going to do in this tutorial is, as the title implies, teach you how to make nearly anything look like metal. This can especially come in handy in Steampunk, as most of us don't have the ability to machine brass. We do, however, have access to wood, PVC, and spray pai ...more
SSH is one of the most common protocols in use in modern IT infrastructures, and because of this, it can be a valuable attack vector for hackers. One of the most reliable ways to gain SSH access to servers is by brute-forcing credentials. There are a few methods of performing ...more
Greetings all. Before I get into the tutorial, I would like to mention that I am fairly new to Null Byte (been lurking for some time though), and what really appeals to me about this place is its tight, family-like community where everyone is always willing to help each other ...more
Cats. Whether you love 'em or hate 'em, you've got to admit—they've got minds of their own. While this makes them incredibly entertaining at times, it can also cause tons of issues for their owners. Trying to "train" a cat is usually an exercise in futility. This is because c ...more
One of the most useful new features Apple included on iOS 16 lets you instantly lift the subject out of a photo, separating it from the background. Once extracted, you can paste, save, or drop the cutout wherever you want as a new image, and you can even make it a sticker in m ...more
Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additio ...more
NOTE: Chapter One is a demonstration, click on chapter two to learn how to solve the cube. This cool and very smart video teaches you how to solve the popular (and annoying) Rubik's Cube in just five steps. Sounds easy, doesn't it? First, check out this video of Leyan Lo as h ...more
It used to be that you only had to worry about maids rummaging through your belongings in your locked hotel room. But now anyone with 50 bucks of hardware and some programming skills can hack their way in—as long as it's locked by keycard. At the Black Hat security conference ...more
Sushi rolls, known as makizushi in Japanese, are only limited by your imagination—and your ability to roll them neatly, of course. While it may seem like a lot of effort, rolling sushi is a snap if you have the right tools. If you plan on making sushi rolls a lot at home, a b ...more
Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern-day pin tumbler ...more
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more
We've already done a tutorial explaining why buttons are superior to levers, but now I want to show you a way to make them even more useful than they already are. You can't get this sort of functionality with levers! A button only emits a one-second (or so) pulse of power. We ...more
If you still have time left on your warranty, taking your HTC One in for repairs can be a serious pain if you've modified it in any way. To avoid the chance that they'll reject your phone because it's been tampered with, you'll have to return it to stock condition. To Do This ...more
Studying to be a nurse? Then follow along in this nursing how to video to learn how to administer an intramuscular injection in the ventrogluteal region. The ventrogluteal region simply means near or on the hip. Watch this IM ventrogluteal injection demonstration by a second y ...more
ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a tar ...more
Believe it or not, there are some older iPhones still in use out there, and they're not going away anytime soon. Sure, Apple would prefer you to upgrade your device to the latest and greatest models, which are compatible with iOS 5. Those models include all of the following: ...more
Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, such as network diagrams, IP addresses, and login credentials. Sometimes, even certain files that are encrypted aren't safe fro ...more
Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and ...more
This video is a demonstration of how to cut up a T-shirt, inspired by 80's rock band fashions. Use a regular white T-shirt and start by cutting a deep scoop neck out of it, starting about an inch outside the neckband. Turn the shirt over and fold it in half Snip horizontal lin ...more
Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But ...more
Apple's latest big software update includes an entirely new Apple app, a controversial change in the TV app, better Siri control, an improved Shortcuts app, interesting Safari upgrades, Apple Music Sing, and more. Keep reading to see what iOS 16.2 has to offer your iPhone. Th ...more
One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a les ...more
Ever wonder how to cast on with work in progress when knitting? Well, wonder no more with this knitting demonstration video! There are several ways to accomplish this, but I'm going to show you the one I like best. It's the one I use in the Knitting At Knoon patterns, and I r ...more
Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input ...more
The late, great writer Laurie Colwin once wrote that if she were allowed to have only one fruit in her kitchen, she would always choose lemons (or limes, since they can often be used interchangeably). Any dedicated home cook would agree wholeheartedly. Lemons add dimension t ...more
It's always a good idea to have a pack of mints on hand, especially right after a cup of coffee or a lunch made with loads of garlic. Whether you're going on a date, to the dentist, or to an interview, bad breath is a major faux pas and totally avoidable. Simply pop a mint! Bu ...more
Xeni checks in with the authors of the forthcoming O'Reilly HOWTO book "iPhone Hacks" (David Jurick, Adam and Damien Stolarz) for a demonstration of how to unlock and jailbreak your iPhone or iPod Touch. The authors promise to teach you how to coax more out of these devices: l ...more
Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability lets you target and disconnect devices from a wireless network, all without joining it. It runs on Kali, and we'll cover installing, configuring, and using its jamming functionalities on a smal ...more
DO you have an iPod Touch, but not know how to use Bluetooth devices with it? This video is here to show you the way. It features a simple demonstration of how to connect a Bluetooth device to an iPod touch using it's internal menus. Wireless headphone, playing your music in y ...more
This is a demonstration of how to use a software program to unlock your mobile phone and make it sim free. Enjoy your free call!
Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of ...more
One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines conn ...more