Apparently submerging a hand in liquid nitrogen isn't as painful as one might suspect (if you trust the Leidenfrost effect as much as Theodore of Gray Matter): I hadn't realized that my hand was quite so deep into the liquid. Amazingly, I barely felt the cold at all. My skin ...more
Paul Ryan of the DIY Network shows how to make concrete countertops for the kitchen. Concrete is now available in a wide range of colors and textures. First build forms out of 3/4-inch melamine (a waterproof smooth material for easy casting), according to the blueprints. Use c ...more
Lyrical dance is one of those art forms that's just so pretty. You'll always have more postmodern dance forms that operate on the premise that anything can be art, thereby producing funky hand and leg movements, but watching lyrical dance is like hearing the sweetest love song ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more
Leaving scissors wet or forgetting them outside can cause them to rust. Rusty scissors, if you can even open them, will leave brown marks on everything you attempt to cut through. Attempt is the truth—rust dulls the blades of the scissors making it virtually impossible to cut ...more
Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, w ...more
"Enter your email address. Confirm your email address." I absolutely hate seeing those two sentences when I'm signing up for something online, especially on my Samsung Galaxy S3. The less keyboard work I have to do on my mobile the better. Luckily, there is a way to enter you ...more
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
As seen in "Avatar" (sort of), the Tree of Life represents all the connections we have to one another as life forms, past, present, and future. It's really quite a deep concept, and is one explored in a beauteous way in this wire wrapping project. Called the Tree of life pend ...more
Kevin Van Aelst creates witty visual "one-liners" by recontextualizing everyday, ordinary objects. With a few simple tweaks, the viewer recognizes a roll of tape as the ocean or reads gummi worms as chromosomes or understands mitosis through the use of sweet, sugary donuts. F ...more
Don't like mincing garlic into tiny pieces with a knife? No matter how you mince garlic, it will never be as easy as this kitchen trick. You won't even need a knife—just a fork! It's a great hack for kids just learning how to cook or if you only need about one or two cloves fo ...more
With summer just ahead, you, or your children, may be looking forward to some pool time or the water park. When planning water-based fun this year, keep a heads-up for microbes. Between the germs on the bodies of swimmers and fecal material in the water, the clean looks of th ...more
This is the first of a multi-part series on steganography techniques. Steganography, the art of hiding things in plain sight, has existed for a long time, and in many forms. When you manipulate the alphabet to have your own cipher and decipher, this is considered steganography ...more
If you've ever turned on an episode of Iron Chef or Top Chef, chances are you've seen a contestant in gloves and goggles, yielding a canister that looks far more fit for a chemistry lab than for a kitchen. Wonder what's in the canister? Liquid nitrogen, the go-to tool/ingredie ...more
Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that privacy, they're not perfect. There is another option, though, called Noisy, which was created by Itay Hury. It floods your ISP wit ...more
Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all fo ...more
The DIY industry is booming, despite the desperate blackmailing of society by finance capitalists. Companies like Adafruit and Makerbot are grossing well over a million dollars a year, and Evil Mad Science Laboratories just recently dedicated themselves to running a full-time ...more
Halloween is coming up, so many of you may have a need or desire to carve a pumpkin and turn it into a Jack O' Lantern. This week we are going to explore carving our pumpkins into interesting geometric shapes. In this post, we will carve the pumpkins into spherical versions of ...more
ZurplusFaction shows viewers how to pick a lock easily using 2 paper clips. First, you need to take your first paper clip and fold one end out. Fold it out again and straighten this out. Next, take the folded out in and fold in again so it forms boomerang shape with the paper ...more
Consistently used in many forms of physical training, the push up has been considered one of the best physical tests of muscular fitness and endurance. Namely known for its use in the military as well as other physically demanding activities such as boxing and the martial arts ...more
In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encrypti ...more
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this shou ...more
Once you've learned to draw sculptural forms in perspective you will naturally want to begin placing several objects within a common space. You would like to draw a background. The trouble is, when drawing in perspective, there is no flat background. It helps to map out the sp ...more
Richard Sweeney is an incredible artist whose body of work consists mainly of sculptures made from paper. His art is often related to origami, and much of his work is related to geometrical forms. I personally really love his modular forms in paper. Many of them are based off ...more
The origins of vodka are shrouded in mystery, with both Russia and Poland laying claim to its invention. Some say Genovese merchants brought vodka (then known as aqua vitae, or the water of life) in the late fourteenth century to Russia. For many years, vodka wasn't just an al ...more
The decadent, chewy, fresh-from-the-oven brownie is a classic American dessert. US History Scene states that the first brownies ever made were a result of socialite Bertha Potter Palmer's request of her chef at Chicago's Palmer House Hotel in 1893 "to create a dessert that cou ...more
Think of the coolest, most unique way to create art that you can. Got it? Now think about creating that art out of living things. The American Society For Microbiology (ASM) holds an annual art contest, but it's no ordinary art they look for. The ASM looks for agar art, which ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
Now, I know what you're thinking... "I need an extra sexy coffee table that is like no other." OK, Maybe not. Maybe you're thinking, "I need a conversation starter that doesn't have to do with economic injustice, Left/Right political paradigms or health insurance. I need it ...more
While there are a variety of privacy-focused search engines available like StartPage and DuckDuckGo, nothing can offer the complete trust offered by creating one's own search engine. For complete trust and security, Searx can be used as free metasearch engine which can be host ...more
We all know that DNA is pretty amazing, but it's not something that most of us get much hands-on experience with. Even though it's in every living thing around us, we never see it, so we rarely think about it either. A strawberry is one of the easiest things to extract DNA fr ...more
Drawing is easy for some, harder for others, but drawing letters is pretty simple for both the pro and novice artist. There's all kind of text styles you could conjure up, and they don't have to be boring fonts. Fire up your imagination to create different styles for drawing n ...more
Google's Chromecast is quite literally one of my favorite inventions of the past five years, allowing me to kick back, relax, and enjoy the various forms of streaming entertainment it has up for grabs. Don't Miss: How to Use Your Chromecast Without Wi-Fi But as awesome as it ...more
Several technologies seek to change the way we perceive our reality, whether that involves entering a virtual world, augmenting an existing one in a realistic and interactive way, or somewhere in-between. It's tough to keep track of what we mean with this terminology, so let' ...more
The best go-to method for reducing your risk of infection is to wash your hands. Next time you reach for the soap, here is some news you can use. For years, soaps and healthcare products touted their "antibacterial" properties. While soap was good, antibacterial soap had to b ...more
This article will show you how to make an auto clicker program in Visual Basic Express Edition 2008. An auto clicker is a very useful program that makes your mouse click many times automatically, wherever it's pointed. It's a very good AFK (away from keyboard) program. Just po ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
This martial arts/self defense video will show you how to break a choke hold using a pressure point, from a seated position. These are nerve points that you use to disrupt your attackers nervous system. Remember that in using these forms you must always keep a calm mind. It is ...more
Take classic origami moving cubes to the third dimension by attempting this box-like version of moving cubes, which moves on both the x and y axes. This amazing craft can be shaped into as many forms as you can make with Legos. Watch this video by origami folder Jo Nakashima ...more
Classic party games like Spin the Bottle and Truth or Dare, immensely popular in the '80s and '90s, seem to have been long forgotten and abandoned by today's youth. Today, new forms of party games are all the rage, a prime example being Cards Against Humanity. Yes, CAH is hila ...more
Google's new camera, aptly named Google Camera, has been all the rage since it was released onto Google Play last Friday. The main reason is the amazing Lens Blur feature that adds depth-of-field Lytro effects to photos, without the use of any expensive accessories or extra ha ...more
In this article, I'll be explaining the basics of how microcontrollers work, physically and virtually. First off, microcontrollers are no simple thing, so don't be discouraged if you find it mind-boggling! The world of microcontrollers is fascinating, engaging, and an awesome ...more
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP requests and parameters, but these things are often concealed from the user, due to security reasons, convenience, or both. However, a ...more
This tutorial tells us about using helping verbs with the simple form. It also gives us information on the differences between the present, past and future tenses. •Let us see some words in the simple and past forms. Simple – Live, work, go, wake up Past – Lived, worked, went ...more
Simple yet effective, capacitors come in a dizzying array of forms and materials, vital to so many circuits for storage, timing, and filtration - the mighty capacitor! In this installment of the MAKE presents series, Collin Cunningham explains - how to build a Leyden jar, how ...more
There are lots of great reasons for going out to a fantastic coffee shop for a cuppa. Coffee shops have a lovely ambiance, are a perfect place to meet with friends or do some work, and are a great excuse to get out of the house. Seeking out a perfect cup of coffee, however, sh ...more
This shows you how to tie a Shamrock Knot / True Lover's Knot - A decorative knot, built from two Thumb Knots, that forms the shape of a shamrock. This is used in sailing, boating, general use, camping and bondage.
When it comes to Thanksgiving, some people live for stuffing (or dressing, if that's what you call it). Personally, I love all stuffing, even the boxed kind. However, even the classics can start to feel a little staid and dull after a while. Why not try giving your Thanksgivi ...more
PVC isn't something you want to send to the landfill. It's not going to do anything good for the ground when it's buried. It is also something you really, REALLY don't want to send to an incinerator. When burned, PVC releases some really nasty chemicals, including hydrochloric ...more
Christina, from Brightling Beads shows you how to tie a variety of knots in this video demonstration. This allows you to make a variety of jewelry, using various forms of knot tying. She will show you how to do an overhand knot, double hand knot, square knot, lariat knot, figu ...more
So Christmas is coming up, and you want to make a couple of presents for your friends and family, who you don't really feel like splurging on- but want to make something from the heart. You've tried other stuff, and you totally failed at the Cross-stitch from last year, have y ...more
There are many different types of prepared catfish baits for catching channel and blue catfish. These baits are often referred to as "stink baits", but while they might smell quite foul to some anglers, the smell really attracts catfish. Stink bait is a very broad term and th ...more
The kick ball change is a step found in almost all forms of dancing, from ballet to tap to hip-hop. A kick ball change consists of three kicksteps and a ball change. That is, you kick your foot once and step forward, putting your foot down. Kick with the other foot and step yo ...more
Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them Step 1: What Exactly Is XSS? Basically, cross site scripting is a type of security hole in a website's forms. Normally forms allow you to i ...more
If you've ever used a heating pad or hand warmer, you essentially know what "hot ice" is. It's supersaturated sodium acetate, and it's actually fairly easy to make at home out of sodium acetate crystals. You can also make it out of vinegar and baking soda (directions at the bo ...more
A large number of the greatest musicians to ever shape the history of sound first learned to play on cheap, dirty, and often times even homemade instruments. There is a very unique atmosphere that comes about when creating music with something made by your own hands—out of wha ...more
Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the or ...more
This two part how to video series will cover the written Arabic language and then speech. This first lesson contains the basic isolated consonant forms. The second lesson will teach how to write basic words and how the isolated consonants change shape depending on where they a ...more
Check out this fishing tutorial video that illustrates how to tie a Perfection Loop fishing knot for tying lures to a fishing line. The Perfection loop is a fishing knot that forms a perfect loop at the fishing line. Just follow the simple steps outlined in this instructional ...more