You may know British artist David Hockney, famous for his Splash paintings and photo collages (pictured below). But did you also know Hockney is a huge Apple enthusiast? At 72 years-old, the renown artist is among the first to embrace new technology, specifically the iPhone a ...more
Rick Pitts takes us through how to do a push up using a coffee table. First, he starts by doing a push up for shoulders and triceps. You do this by placing your hands slightly wider than shoulders with fingers pointing forward. Keep your elbows near body as you lower yourself ...more
Redneck Productions teaches viewers how to clean silver and coins. This shows you how to clean coins with electricity! This process is good because you do not have to rub or scratch your coins and silver in the process. First you will need to get a battery (AA) and wire. Conne ...more
Soymilk is a well known alternative to milk for those who are lactose intolerant or just tired of regular dairy. You can spruce up regular soymilk by maing your own healthy recipe at home with oatmeal in addition to soybeans. SHARE THIS VID IF IT HAS BEEN USEFUL, THANKS!! Myt ...more
If you've received the "hal.dll is missing or corrupt" error message from your Windows machine, then you're in luck! This video will show you how to correct that problem with the Recovery Console tool that comes with the Windows 2000 and XP CDs. Using the Windows Recovery Cons ...more
When the bar that turns the tattoo machine on is pressed without an O-ring in place it rattles and doesn't make a consistent humming noise. Once you insert the rubber O-ring into the tattoo machine it changes how the machine runs. The ring only takes a couple of seconds to ins ...more
This video is about how to tattoo. Once you make your choice of design, the tattoo artist traces the image. Next, he places the image on carbon paper and traces the image again to create a reverse image. He cleans the persons skin then firmly presses on the blueprint. Now its ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more
Learn how to remove red wine stains. Thinking of switching to white wine just to avoid stains? Memorize these cleaning tips instead. You Will Need * White wine, club soda, or cold water * A white cloth napkin or clean white T-shirt * Salt * Liquid enzyme detergent * Spot st ...more
A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or ele ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Last week I reviewed Kinotopic, the iPhone app that lets you easily create cinemagraphs. While I loved the result, I found the app hugely flawed. Kinotopic forced you to use a Facebook log-in, and didn't store the finished video on your phone itself. Instead, you had to visit ...more
Time-lapse photography used to require expensive and dedicated equipment, but in today's futuristic world, we now have easy access to universal machines like the iPhone, which are pretty much tricorders. Reel Moments is a time-lapse app for the iPhone from Nexvio. It’s a ‘pic ...more
One of the main reasons I was held back from fully switching over to Linux was the fact that media streaming is nearly impossible. You have two choices in Windows: either you use file sharing with Windows Media Player, or you can just use the Windows Media Center. But both of ...more
Video games consoles have long wanted to be more than just consoles. Nintendo Japan called the NES the Famicom because they wanted to make it the sole family computer. Obviously that didn't work out, and most efforts to make consoles into all-in-one entertainment systems have ...more
Earlier this month, the U.S. Army agreed to drop quite a big chunk of change ($461m to be exact) on 423 M1117 Guardian Armored Security Vehicles (ASV), made by Textron Systems. What makes the M1117 worth $461m of the army's budget? Well, a Hummer isn't capable of withstandin ...more
Laser gun + killing mosquitoes = lots of little boy fun, but what's it all about? Quite possibly the most entertaining, thrilling, and well, downright life-saving presentation at this year's TED conference was Intellectual Ventures' mosquito death ray. The mosquito death ray ...more
Sound Like a Duck or a Fog Horn! All sounds are created by vibrations. You can discover this next time you're out at a fancy restaurant. All you need is that straw in your soda and a pair of scissors. Makes sure you flatten it out really good to make this work, then make sure ...more
I may be a bit weird, but I enjoy listening to music at night as I fall asleep. Sure, you could create a playlist of songs so that it stopped after all the songs finished playing, but I have a rather extensive database of music and I enjoy listening to them randomly. Also, I l ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
In 2007, Nintendo introduced the world to motion control video games with the Wii. Microsoft and Sony built on Nintendo's phenomenal success and released their own motion control products for the XBox 360 and Playstation 3 late in 2010: the Kinect and the Move. The Move is bas ...more
The whole world seems better when you’ve had a full night’s sleep, and if you don’t believe me, you’re JUST FRIGGIN’ WRONG. Studies show that getting enough sleep during nighttime hours can make you less irritable, help you lose weight, and reduce your risk of cancer and other ...more
I have the honor of knowing a woman who lived in Taiwan for a couple years back in the day, as a missionary. One of the things she brought back from her time spent there was the Pei Mei Chinese Cookbook Vol. 1 published in 1969. You can grab a decent used copy on Amazon for ab ...more
Home chemistry is great, but what happens when you forget to label your chemicals? How do you know if you turned a clear glass of ammonia into a clear glass of unobtainium? Chemists have a tool for just that. Litmus paper are small bits of filter paper saturated with a reacti ...more
Lying is awesome. From a very young age, children learn that flat out denying the truth gets you out of trouble and helps keep you calm in the face of horror. But what happens when you just have to know if someone, say, used your toothbrush? You could ask them to take an expen ...more
Here at Null Byte, we try to inform and teach the community on ways to navigate the Internet in that special way, as well as staying safe along the trip. That being said, I need some help from all of you! There is a lot of information to cover and I know we have some smart use ...more
Are you the expert hacker we're looking for? Do you have a great idea for an article on Null Byte? Do you have a passion to write, and more importantly... teach? We're officially looking for Null Byters on a weekly basis who are willing to take the time to educate the communi ...more
A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more
File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common w ...more
You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more
Blizzard Entertainment is considered one of the most successful game developers in the world. Ever since the release of Warcraft: Orcs & Humans (their debut Warcraft game) in 1994, they've set sales records and created genre-defining games with remarkable consistency. But the ...more
Aside from food, oxygen, sunlight and water, there are other necessities that humans arguably need today to survive—clothing, love and shelter among them. Almost everyone wears clothes, needs somebody (or something) to love and a place to call home. And what's the one thing th ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Hey, it's iDwarf again! I hope you all had fun creating your Rube Goldberg machines last week! But before we show of the winning contraptions from the last ...more
In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models. Now, I'd like to dive right back into Wireshark and start stealing packets. The filtering capabilities here are very comprehensive. You can filte ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. While it may first appear complex, the Multi-Channel music sequencer made famous by User FVDisco is rather simple in principle. It relies on proper combination of timing and tone to ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. As we all know, redstone can be a very useful tool for make basic things in Minecraft more complex and intricate. For beginners to redstone, today's article will give you a basic un ...more
Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster tha ...more
I have owned quite the plethora of electronics in my life. A commonality between most of these devices' screens is frozen or dead pixels. This is probably the most annoying thing about buying new hardware—your LCD, or worse, LED display has one or more pixels that continues to ...more
Are you finding that the Google+ features you've been waiting for are still not rolling out quickly enough for you? Although we've provided many solutions to Google+ issues with different Chrome extensions, it still seems like it's not enough. Now that we've been using Google+ ...more
Okay, stop me if you've heard this one. You have a document that you want your co-workers' advice on. You attach said document onto a mass email. The first reply comes back with an edited version of the document. You begin to make changes, but another email comes in, with yet ...more
This weekend, I was on a trip to Binghamton. In the midst of unpacking my toiletries at the hotel, I found that my brand new razor blade had lost its cap. How did I find that out? Well, when I pulled my hand out of the bag, I found that my right pointer finger was missing a bi ...more
The United States is a hierarchical country where the weak ones are at the bottom and the powerful ones are at the top. Garment workers are at the bottom of the list although they are the most important. Without them there would be no fashion industry. They sew and cut the gar ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
Technology: The Less You Know the Better? I'm sure everyone is now aware of GPS technologies and tracking techniques these days, with the release of numerous documents (even lawsuits) on big name companies like Apple, Microsoft, and Google. Yes, 2011 was a good year for eye-o ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC a ...more
If you're a frequenter of Null Byte, I bet you have at least some interest in information security. Furthermore, you have a hobby that if applied in certain ways, will get you arrested. I've received quite a few messages from the community here about federal cybercrime law and ...more
Night People: A Bad Vibes Label Profile Shawn Reed is one of our favorite people, not content with making music with Wet Hair, he also runs 'Night People' - an almost complete DIY record and tape label operation in Iowa - a label which has consistently put out and introduced ...more
You've seen his explanation of a combination lock's inner workings. You'll never lose another game of Jenga, thanks to his winning wooden pistol. And nearly 4 million YouTube users have marveled at his wooden marble machine sculpture. He's Matthias Wandel, and he's accomplishe ...more
QI and ZA. QI n pl. -S the vital force that in Chinese thought is inherent in all things ZA n pl. -S a pizza For over a decade, these words have been used in SCRABBLE play, but not in the US or Canada. It wasn't until their addition in the Official SCRABBLE Players Dictionar ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
In our media-enriched world, past and present, SCRABBLE has made a name for itself, whether deliberately, subconsciously, or influentially. You may have a read a book that had the popular word game within a chapter, watched a movie that showed your favorite characters bringing ...more
Obesity has ballooned into a worldwide epidemic. The World Health Organization estimates that 2.3 billion adults will be overweight and 700 million will be obese by 2015. Over 20 million children are overweight today. The reasons for these distressing figures are common knowle ...more
If you don't want to shell out the money to rent a dedicated server in order to host a Left 4 Dead game server, follow this tutorial on how to create one on your home computer. Keep in mind that if you intend on letting other people play it, you will need a fast connection to ...more
Want to find out how you can squash a can of Coke with a little science? Just watch this video tutorial to see how to crush a soda can with heat and cold water. You will need to get an empty can of Coke (or Pepsi if you prefer) with a little water inside, something to hold the ...more
When you clean the carpet in your home or apartment, it seems like that dirt just comes right back the next day. It's never really clean. Well, that could be changed with a deeper clean. Deep-cleaning your carpet can offer benefits including getting rid of dust mites and aller ...more