Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more
Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that privacy, they're not perfect. There is another option, though, called Noisy, which was created by Itay Hury. It floods your ISP wit ...more
Well, five days into the contest and our submissions box is flooded with poo. You guys are 1) amazing & 2) chronically scatological. Poo fights, poo-filled balloons, poo-powered rockets, poo-slicked slides, poo-spiked drinks…you get the idea. If you don't believe us, check i ...more
Flooding a backyard in winter is a common technique for building a hockey rink in your backyard. This is used for ice skating, ice hockey and other winter sports. Bring winter joy to your boring backyard by flooding it into a make-shift pond or body of water that freezes.
Alishan Mao describes how to fix a flooded Nitro Engine on an RC car, remove the excess fuel, and start the engine. Flooding of the engine can occur when priming the engine. If you prime the engine too much, the engine can get flooded, making it difficult to pull the pull star ...more
Annoy your fellow users to know end by spamming a Teamspeak server. Spam flood a Teamspeak server. Click through to watch this video on tricklife.com
Learn how to replace or fix your old backyard or garage floodlight on your house with a new one. This video will show you how to remove the old floodlight, on your house or garage, and also explain the wiring and show you how to hook everything up. Video: .
Can't seem to get past all the nasty arrow traps, threatening skeletons and enemy ambushes in the "Flooded Passage" mission in Lara Croft and the Guardian of Light? Then, follow this three-part walkthrough from Mahalo to learn the best way to go about beating the "Flooded Pass ...more
The week of the annual Consumer Electronics Show is supposed to be filled with good news for the augmented reality industry as AR headset and smartglasses makers show off their new wares. Alas, as CES wrapped this week, a dark cloud hung over the AR hardware fraternity. We le ...more
Check out this 5 part series walkthrough for Halo Wars - Mission 9: The Flood. Beat Halo Wars with a little help from Mahalo Gaming's walkthrough. This is a brand new game for XBOX 360. Halo wars is a real-time strategy (RTS) game that takes place in the Halo universe 20 year ...more
More annoying Teamspeak antics. This time on how to flood a channel. Channel flood a Teamspeak server. Click through to watch this video on tricklife.com
Alright, this will be my first tutorial in C. Note that this guide is written for Linux. This won't be very easy if you don't know the basics of C, so if you don't I suggest looking into dontrustme's awesome C tutorials first. READ THIS FIRST Alright here is the deal, this ...more
A few quick easy steps to stop the junk mail from coming to your home.
This tutorial shows how to use Frantic Films' Flood:Surf to create realistic ocean surfaces. Create oceans with Flood:Surf. Click through to watch this video on studiodaily.com
Welcome back, my hacker novitiates! Many of you have probably heard of a man-in-the-middle attack and wondered how difficult an attack like that would be. For those of you who've never heard of one, it's simply where we, the hacker, place ourselves between the victim and the ...more
Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks. For those of you who are new here, a denial of service is basica ...more
There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
Most mobile games have moved to an online-only format, meaning you need to be connected to the Internet in order to get any kind of multiplayer action going. This is great when you're at home on Wi-Fi, but when you're out and about, slow and inconsistent data speeds can cause ...more
Montezuma's revenge, the runs, the trots, or just diarrhea — everyone gets it sooner or later. What exactly is diarrhea good for, if anything? The basic description of diarrhea is loose, watery, stools. It can be explosive, frequent, acute, or chronic — but the bottom line is ...more
You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulne ...more
In our first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hea ...more
Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability lets you target and disconnect devices from a wireless network, all without joining it. It runs on Kali, and we'll cover installing, configuring, and using its jamming functionalities on a smal ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the i ...more
Apple has something big in store for consumers in 2017 to mark the 10th anniversary of the iPhone. One major surprise is that Apple has decided to forgo on releasing a 7S in favor of a redesigned iPhone 8 and 8 Plus. To further commemorate its 10-year milestone, the Cupertino- ...more
The iPhone X has a new unlocking mechanism called Face ID, which replaces the old Touch ID system since the phone no longer has a fingerprint sensor. The way it works is simple — you just look at the phone, it recognizes your face, then the system unlocks — so Apple deserves t ...more
Even though you may love onions, cutting them is probably a completely different story. You've really got to be a pro at slicing and dicing them without getting frustrated, and even then they can still make your cry—literally. But if you don't want to wear a pair of goggles to ...more
Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more
Ah, the art of applying eyeliner. Bad habit of going just a weee bit too heavy? Having a hard time keeping your line nice and steady? Is it really supposed to go INSIDE the outer edge of your eye? Jezebel received a flood of woes such as these, and therefore asked their reader ...more
Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Our previous workshop on building an automatic boat dock went really well. A lot of Minecrafters showed up and everyone got right to work on their own versi ...more
Star-Lord may not have been a household name prior to the release of Guardians of the Galaxy, but you can sure count on a flood of kids and adults alike wanting to dress up as Chris Pratt's character this year for Halloween. The costume is easy enough to put together with a r ...more
Is there a bigger name in pop music than Taylor Swift right now? Her 116 million followers on Instagram would probably argue, "No." As such, if you're one of these many followers, you might have seen Taylor advertising a new "4.26" filter on her story. Problem is, there's no c ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
Papaya trees are very vulnerable to transplantation shock. Seedlings tend to recover slowly and poorly after replanting in a new location under a sunny sky. Many internet articles advise that papaya trees should be transplanted without injury to their root systems. Keeping the ...more
Whether you're changing your tap for a new look or because the old one just doesn't work anymore, this how-to video can help you with this repair project. Follow along with the steps provided and get out your toolbox. Make sure to turn off the water first, or you're looking to ...more
Ever since the GDPR was implemented, it seems every website on the internet needs to inform you of how its privacy policies have changed. If your web browsing experience has been marred by a constant barrage of these cookie pop-ups and privacy dialogs, you should know there's ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
Lori Nix is a photographer whose stunning work depicts curious scenes of danger and disaster: abandoned spaces, architecture in a state of extreme deterioration, natural calamities, and more. But the mysterious places she captures with her 8x10 large format camera aren't actua ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
Russian cyber disinformation campaigns have many missions, but one of particular interest is using technology to monitor, influence, and disrupt online communications surrounding culturally sensitive topics or protests. The ability to watch these events, and even filter positi ...more
Welcome back, my hackers novitiates! As you read my various hacking tutorials, you're probably asking yourself, "What are the chances that this hack will be detected and that I'll land behind bars, disappointing my dear mother who already thinks I'm a loser?" In this tutoria ...more
Welcome back, my budding hackers! As I have mentioned many times throughout this series, knowing a bit of digital forensics might keep you out of a lot of trouble. In addition, digital forensics is a burgeoning and high paying career. Some knowledge and certifications in this ...more
From the onset of the popularization of apps for the iDevice, users have experimented with creating original artwork on their iPhone/iPad/iPod Touch. And when famed British artist David Hockney christened the iDevice with his painterly digital drawings, the trend exploded even ...more
If we were to assign a theme for the 2019 edition of the Next Reality 30 (NR30), it might be something along the lines of, "What have you done for me lately?" Many of the top names in the industry from the 2018 edition remain the same, but their positions have shuffled. The p ...more
Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise the ...more
In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffi ...more
The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnera ...more
Before I start this tutorial, no, this is not that "Effective. Power." text that is going around. With that being said, let's talk about this attack. Hello, my hacker friends! Today we are going to look at how hackers can take advantage of the system, and repeatedly crash the ...more
With audible alerts and subtle vibrations, the Apple Watch makes it difficult to miss incoming notifications. But soon enough you'll realize that not every notification is worth receiving on your Watch and can ultimately render the experience annoying under particular circumst ...more
RC Car Action Magazine Editor Kevin Hetmanski shows us how to properly start a nitro engine. The engine needs to be primed and then started, but be careful not to flood the engine. Watch this video tutorial and learn how to start a nitro engine on an RC car.
As practically the entire Steampunk world knows by now, IBM has predicted that Steampunk will be the big new trend from 2013 to 2015. They based this prediction on their computers, which sift through broad swathes of the internet in order to see patterns that may help commerci ...more
Super Mario Brothers! No, wait... Super Meat Boy! Yep, that's right. Meat. As in "cube" steak. As in a square piece of beef with eyes and a shitty grin, who just happens to be in love with a band-aid. I have no idea why. And no matter how shocked you are to see your dinner on ...more
In this tutorial, learn a great, fast way to get your plants growing. This hydroponic system will keep your plants happy and healthy for much longer than old fashioned planting. This video will show you exactly how to set up a flood drain system using PVC pipe and other cheap ...more
It's always a big deal when the company that makes Android releases a new phone. Google's Pixel series has made a name for itself in three short years behind its camera prowess, but now it's time to start competing with the major players. That said, Google should like how thei ...more
In older Android versions, you could flood your status bar with a wall of notification icons. But starting with Android 9, Google made it to where you can only see four icons by default, and it was mostly done to accommodate phones with notches. But Google's only notched phone ...more
Having control of your basic motor functions is something most people take for granted, but for individuals with Parkinson's disease, that is not the case. Emma Lawton is a 33-year-old British graphic designer who has been living with Parkinson's for the last four years. Park ...more