Android Lollipop's new Material Design interface does its best to strike a delicate balance between intuitiveness, usability, and aesthetics. For some folks, though, the use of a lighter color palette throughout the interface disrupts this balance. If Lollipop's white backgro ...more
The thermal fuse in your dryer is a safety device designed to prevent the dryer from overheating. The fuse is heat sensitive and when the dryer becomes too hot it will blow. If the fuse has blown then the dryer will either stop working or there will be no heat when the drum is ...more
These days, the user experience on stock Android is a lot more refined and polished than manufacturer skins like Samsung's TouchWiz or HTC's Sense. This is mostly due to Material Design, the look and feel that Google implemented back in Android Lollipop, which has finally star ...more
Welcome back, my budding hackers! One of the most time-consuming, but necessary, activities in hacking is reconnaissance. Before we can hack a system, we need to know what operating system it's running, what ports are open, what services are running, and hopefully, what appli ...more
What if the code you are trying to reverse engineer is obfuscated or somehow corrupted? What if no way is left? Here comes what I like to call (wrongly and ironically) the "brute force of reverse engineering". Before I even start, as always, I wanted to apologize for any uncl ...more
For someone used to the old-style HTC Sense, upgrading to an HTC One with Sense 5 is a pretty intuitive experience, but there's one thing that some users find obtrusively different. Blinkfeed, an app which aggregates newsworthy articles from various sources and pins them in a ...more
With the emergence of rumors that Amazon, Google, and Samsung are all making their foray into the gaming console market, it's a possibility that our Android-powered mobile devices might become tools that play a central role. As we proceed through 2014, we'll see inklings of w ...more
It's time to solve that Rubik's puzzle of yours, but how do you do it? Erno Rubik designed these three-dimensional mechanical puzzles to be precariously difficult, unless you know a little about mathematical algorithms, then it's just a matter of time and determination. This ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
Welcome back, my hacker novitiates! Often, to hack a website, we need to connect to and exploit a particular object within said website. It might be an admin panel or a subdirectory that is vulnerable to attack. The key, of course, is to find these objects, as they may be hid ...more
In recent years, Russian marine biologist Alexander Semenov has built a stunningly beautiful collection of deep sea photography, capturing alien creatures only locatable in the hostile, icy depths of the far northern sea off the coast of Russia. A brave art world denizen migh ...more
Although your friends might roll their eyes every time you talk about playing Clash of Clans, Call of Duty, or Candy Crush Saga, your excessive gaming habits might actually be making you healthier than everyone else. I've got your attention now, right? Read on for 8 insanely ...more
The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your iden ...more
Procrastination is an ugly beast. At first, it seems so innocent to spend five minutes checking Reddit or Twitter. You'll get started on work right after. Next thing you know, it's 1 a.m. and that paper is due in seven hours. Before you start another YouTube video, know you do ...more
Smartphones are still "phones," which means communicating with others is usually a primary use. Ranging from a simple "hi" to a more personal conversation and even sharing passwords, our messages should remain private so that only the intended recipient sees their content. Whi ...more
If you've never played with a Nexus 10 tablet, then you probably have no idea that your Nexus 7 actually has a different user interface. For some reason, Google decided it was better for the Nexus 7 to use a phone UI instead of a tablet one, but luckily for us, we don't have t ...more
Ideas can be a fleeting thought, just like a shooting star that appears and disappears within a brief moment. So when you're inspired and have an awesome idea, it's important to jot it down as soon as possible, otherwise it may vanish from your memory for good. This is why th ...more
As the stigma of online dating fades and swiping potential suitors on your phone becomes the new norm, one very real issue that you may have to deal with is catfishing: the act of being deceived by a fictional online persona. Although dating apps do their best to weed out fake ...more
The low system requirements of Minecraft make it ideal for playing on an Android smartphone. If you're looking to find out how to download, install, and play Minedroid, a version of Minecraft designed for your Android phone, take a look at this walkthrough and check out the do ...more
The origami magic ball is a very popular but few tutorials show you how to make one in greater detail than this four part series. This complicated paper design takes a little while to create but is worth it in the end when you have a totally unique, fluffy new toy to play with ...more
In this quick tutorial learn how to paint your nails in a leopard print pattern. Make sure to prep your hands and nails before painting them. You will need two shades of pink nail polish, glitter nail polish and a Sharpie marker. Watch this how to video and you can create thes ...more
Watch this video series to learn how to program a game with C++. This series covers the entire game design process and builds skills that can be used in any game design. Part 1 of 9 - How to Design a game with C . Part 2 of 9 - How to Design a game with C . Part 3 of 9 - How ...more
Welcome back, my fledgling hackers! Nearly every commercial enterprise worth hacking has an intrusion detection system (IDS). These network intrusion detection systems are designed to detect any malicious activity on the network. That means you! As the name implies, a networ ...more
YouTube has officially rolled out their new video player design, featuring transparent controls floating above the video, replacing the opaque ones. While you've been able to enable this player for a while now, YouTube finally flipped the switch and enabled it site-wide. Probl ...more
A massive new feature is about to hit Apple Music next week. Anyone can check it out, but only Apple Music subscribers through an Individual, Student, Family, or Apple One plan can take full advantage of the new perk that's been years in the making. Update: Apple Music Classi ...more
Deep in the crevasses of the Songshan mountain range, an Indian dhyana master established the first Shaolin Monastery in 477 AD, seeking to spread the relatively new teachings of Buddha at the time. This monastery then bred the Shaolin monks, who are now popular for their incr ...more
The USB Rubber Ducky comes with two software components, the payload script to be deployed and the firmware which controls how the Ducky behaves and what kind of device it pretends to be. This firmware can be reflashed to allow for custom Ducky behaviors, such as mounting USB ...more
After the success of the Snapdragon 835, Qualcomm now has its eyes set towards the future with the arrival of its next-generation SoC, the Snapdragon 845. Debuting alongside the Samsung Galaxy S9, the 845 is now set to take over the market for flagship Android phones in 2018. ...more
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side sy ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
Amber, emergency, and public safety alerts on an iPhone are loud — startle-you-to-death loud even. They can happen at any time, day or night, and sometimes back to back when you're in a big city. Those blaring sirens can wake you from sleep, interrupt an important meeting, or ...more
Three new iPhones means you have to make a choice: Do you go with the smaller iPhone XS, the larger iPhone XS Max, or the cheaper iPhone XR? There's lots to like about each model, but if you want to make an informed decision, it's time to learn what each has to offer. Here's w ...more
You may be familiar with image-based or audio-based steganography, the art of hiding messages or code inside of pictures, but that's not the only way to conceal secret communications. With zero-width characters, we can use text-based steganography to stash hidden information i ...more
Google recently released a new mesh router known as Nest Wifi. The updated and rebranded Google Wifi brought many improvements, such as faster processing power and an increased level of wireless security called WPA3. But while it's not enabled by default, you can still get the ...more
Google's been using their "Material Design" look in Android for years now, but a change is coming up with "Material Design 2," their updated version focusing on new colors, icons, and spacing. Whether it'll be called "Material Design 2" or not remains to be seen, but you can t ...more
When you open Safari for the first time after updating to iOS 15, you'll instantly notice its search bar is now at the bottom, and its Page Settings menu has moved with it. For tabs, moving between them is as easy as swiping on the Tab Bar or selecting one from the new grid vi ...more
The public leaks of NSA tools and information have led to the release of previously secret zero-day exploits such as EternalBlue, which was used in the notorious WannaCry ransomware attack. Despite multiple patches being released, many users have failed to update their systems ...more
After learning that you'll need to spend at least $74 on a special charger and a USB Type-C Lightning cable to enable fast charging on the new iPhone X and iPhone 8 models, you may be wondering why you can't just use the standard Lightning cable. While we can't answer why Appl ...more
Largely self-taught, Ryan John Kothe is an animator working out of Auckland, New Zealand. After picking up some rudimentary After Effects skills, he went on to create an impressive portfolio of beautifully rendered stop-motion animations with a distinctly tactile feel. Curious ...more
A couple of months ago we showed you Foldify, an iOS app that allows you to create your own custom, foldable, 3D papercraft files. Your designs could then be sent to your printer, cut out, and assembled. Video: . Now, 57Digital Ltd has followed the same concept with their new ...more
It's nearly impossible to keep a stovetop clean when cooking, at least, in my experience. No matter what I do, liquid and solid food bits fall to the surface and around the burners every single time, creating a hard-to-clean mess. Scrubbing away the stains and crusty charred ...more
Welcome back, my rookie hackers! "How can I travel and communicate over the Internet without being tracked or spied on by anyone?" It's a question many Null Byteans have asked me, so I have decided to write a comprehensive article addressing this issue. There are a multitude ...more
Most of the indie and vintage games discussed in Indie Games Ichiban are pretty cheap to purchase. They rarely top twenty bucks, which is one of the major advantages independent games have against their sixty-buck, major league counterparts. But if you think $60 for a game and ...more
OnePlus phones are easy to root, but that also means they're easy to brick if you get trigger happy with your superuser privileges. If you find yourself in this situation, you'll quickly realize the OnePlus firmware download page doesn't provide files you can flash in Fastboot ...more
Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor. Tor runs your traffi ...more
Get started with the LilyPad Arduino! It's a sewable microcontroller that lets you embed lights, sounds, sensors, and much more into your wearables, perfect for clothing and accessories. In this Make Magazine video tutorial, you'll see how to attach the LilyPad and power suppl ...more
Apple has four iPhone models for the remaining months of 2020, but the most impressive ones are the iPhone 12 Pro and iPhone 12 Pro Max. While the iPhone 12 and iPhone 12 mini are great smartphones, the "Pro" models offer more advanced features, especially for photographers an ...more
Smartphone hardware surpassed the most popular portable game devices long ago in all but one category — control. Your iPhone is more than capable of running impressive, fully-realized games, but touch controls only go so far. That's why it's so exciting that Apple has added su ...more
Check out this two part how to video and learn the solo to Hotel California by the Eagles. Hotel California is one of the most popular classic rock songs. This lesson is designed for the beginner to intermediate guitar player. With this tutorial you can impress your friends by ...more
Notes on iOS has never been a particularly great app due to a lack of overall features compared to other note-taking apps like Evernote or Microsoft OneNote. But in iOS 9, Notes has been revamped with many new features, including a new user interface, text formatting options, ...more
Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers beca ...more
Apple removed the Wish List feature from the App Store when iOS 11 was released, which was a huge disappointment, to say the least. While the Wish List still remains in the iTunes Store, it seems gone for good for apps, but that doesn't mean you can't still keep a wish list of ...more
In light of this week's Giveaway Tuesdays Photo Challenge, we've posted a thorough guide to experimenting with bokeh photography. Most of the resources require a DSLR camera, and an intermediate understanding of some of the more technical components of photography. If you don ...more
After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimiz ...more
The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company ...more
Taking care of your car requires effort, whether you take it to the pros for washes, waxes, and detailing, or you spend time to make it shine yourself—and it often seems that, right after your car is sparkling again, rain or midnight moisture appears to cover its surface in wa ...more
It's time to disassemble your Rubik's puzzle, so how do you do it? Erno Rubik designed these puzzles to be solved, but every once in a while it is necessary to take them apart, either for cleaning, lubricating or for replacing game parts. This video tutorial will teach you ho ...more
Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through UR ...more
You can easily share and transport your photo and videos on the Canon EOS 7D by using the wireless file transmission option. See exactly how sharing and downloading your files to computers and other devices works in this video. When the digital SLR camera is combined with the ...more
Perhaps one of the greatest embodiments of urban exploration lies in a disturbing and volatile mental health facility in Massachusetts, and its story starts with... Thomas Story Kirkbride. It's a name not many people know, unless you're a psychiatrist, or perhaps even an arch ...more