You'd like to treat your friend to a drink from the vending machine, but you only have enough cash for one soda. What do you do? Learn this new Coke vending machine hack! It only works on the newer style vending machines, which use a conveyer belt to deliver your drink to yo ...more
This video demonstrates a way to hack a vending machine for change. First, you should press the top selection button four times, and then press the very last button three times. Then, hold the fourth button from the top and press the last button once more. If done correctly, t ...more
JamesKesn teaches you how to hack a vending machine. You must use a very specific machine and an exact combination of button presses. For this it is: far left Pepsi, near right Mountain Dew, near left Pepsi, far right Mountain Dew. Then far left Pepsi, near right Mountain Dew. ...more
Craving candy but have no change? Then listen closely to this hack. This con how-to video shows you how to hack a candy machine by creating fake quarters. This hack trick should also work on parking meters. Never pay for candy or meters again. Watch this video tutorial on YouT ...more
Learn how to con a vending Pepsi machine and access a secret (but benign) debug menu with this hack how-to video. While this hack won't get you any free soda, you might, at the very least, impress your friends with it. For complete instructions for this simple, pushbutton hack ...more
Get into a menu in the Coke machine. This video offers the code for hacking into a Coke machine menu. This may not work for every machine, but should work for some.
How to get a vending machine to pay you for its goodies, instead of you paying for them. First off, find a older vending machine, and insert your dollar bill as you normally would. Once you have entered it, you can select which ever item you want. Then quickly, before the item ...more
Welcome hackers. Hackacademic.RTB1 is vulnerable machine for training our skills.This machine can be download from free from here. There is many tutorial how to hack these machine but i did always be my self. Step 1: Recognize Open Ports First step is recognize open ports i ...more
Check out this video from CouponCodesHero on hacking a vending machine in no time. All you need is a little packing tape and some paper money, then fool the machine to either get free stuff, or use the "change" to get free money! Video: .
A vending machine is an invaluable yet totally frustrating piece of equipment. It's a godsend whenever your tummy's growling or you need an ice-cold drink on a hot summer day. But when something gets stuck inside or the machine flat-out malfunctions, it quickly becomes your ar ...more
In this video, we learn how to hack a toy slot machine. If you time it right, you can win the jackpot yourself. You can slot the parts of the slot down with your just finger by pressing on them. You can also press down on the side of the slot just hard enough so you can press ...more
Stuck in the middle of London with only 1p in your pocket? If you're hungry, have lost your "A to Z" and need to know how to get free goodies out of a British vending machine, check this out! In this video, you will learn how to take a 1 pence coin, wrap it in tin foil and tri ...more
It only takes a minute to steal a U.S. Election! So, vote for your new president, and everybody else's new president by hacking away that Diebold ETS voting machine. Check out this video to see how to insert a virus into the voting system and control the elections. Those ball ...more
So 2000 was a wash for an election year; we put up with W for four years, then what happened? 2004! Lost again!!! Diebold you just can't seem to fade. Don't believe the elections were a fraud -- try out the legitimacy of the elections yourself. Princeton students present the ...more
Man, it's laundry day and once again you have NO quarters. Well, check out this video and you'll never need quarters again. This how-to shows how to pick the lock on a coin operated laundry machine and then rig it up so you'll never need to pay again. Sweeeet.
The Brother KH-930e knitting machine is an old but reliable device. It's age means that it doesn't like interfacing with modern computers though, so it's hard to get patterns from your computer to your machine so it will knit your project. Without this video it's hard, that is ...more
This ultra clever mod of household junk makes for an ingenious variation on the carnival classic. The essence of this treat is basic carmelization. Start with juice. Heat. Spray liquid into air so that it crystallizes into a thready form resembling cotton. Or as the Aussies c ...more
For about a buck, you can make a fun Mini-Pinball machine out of a VHS, just follow the steps in this how-to video. This is a great toy for kids, or anyone that wants to make a cheap version of the arcade favorite. Bring the VHS pinball machine into the car to stay entertained ...more
It always sounds like a good idea to throw a party... until the party gets there. Next thing you know, you're running around hiding anything breakable, and once everyone leaves, you're stuck cleaning up the mess. But the worst part is footing the bill for everything, and if yo ...more
Super Mario Brothers! No, wait... Super Meat Boy! Yep, that's right. Meat. As in "cube" steak. As in a square piece of beef with eyes and a shitty grin, who just happens to be in love with a band-aid. I have no idea why. And no matter how shocked you are to see your dinner on ...more
Follow these step by step instructions to learn how to hack a vending machine, giving you two Cokes for the price of one. You and your friends will love this cool vending machine con. Never go thirsty again. Just check out this instructional video and start hacking vending. Ma ...more
Michael-David BenDor demonstrates how an optical scanner voting machine can be hacked in under five minutes using everyday tools. So, if you want to rig the next election in Michigan, this is the video tutorial for you. Don't agree with the next popular president or governor? ...more
Most people have had the unfortunate experience of not having a washer and dryer at some point. Apartments in my area tend to charge at least one hundred dollars extra for the units with washer and dryer hookups, and even more if you want a unit with an actual washer and dryer ...more
Showcased at Mediamatic, the "Untitled Sock Project" is a knitting machine hack by Luís Brandaõ, Fábio Costa, Sean Follmer, and Pol Pla: "By blowing into straws, visitors contribute to the creation of a knitted sock. Depending on how hard they blow and which straw they blow i ...more
It won't be much trouble getting a decent police sketch if Andrew Salomone decides to knock off a liquor store. Salomone used the Brother knitting machine hack shown below: "The balaclava is knit from cotton yarn and the design is from a bitmap file, in which pictures of my ...more
Hack your voicemail or answering machine with special information tones. Check this out. Hack phone voicemail to block telemarketers. Click through to watch this video on spike.com
This instructional video will show you how to get all of the change out of a vending machine! Who needs Coke or Pepsi when you can have coins? Then, you can get all of the soda you want out of that vending machine. Don't Miss: 9 Vending Machine Hacks for Free Drinks, Snacks, ...more
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more
ProjectKinectMagicMirror combines augmented reality and CT-scan imagery to create a virtual "X-ray machine." Another amazing Microsoft Kinect hack to add to the vault. The ingenuity is infectious... Get inspired. Make-your-own. Video: . More Kinect Hacks: Hacked Kinect Captur ...more
Since the invention of the mechanical clock, enclosure of the commons, and proletarianization of labor, the alarm clock has been the bane of our existence. While not actually evil, it does represent the constant and uncompromising glare of our owners shaking a patronizing fing ...more
This video provides information on how a hacker can find an vulnerability on a remote computer and exploit it to gain remote access. Also, the video shows how a hacker can raise their privileges on the remote machine to administrator. Hack a computer for remote access. Click t ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
This confectionery hacking how-to video demonstrates that, with an electric motor, juice lids, battery and sugar, you can make your own cotton candy machine. Don't wait for a carnival or fair to get your next taste of sweet, sweet cotton candy. Watch this video tutorial to see ...more
Cheers to another completed Community Byte project! Things went well regarding timeliness and being friendly to the other coders and students. If you've got ideas for our next mission, or an idea for a tutorial, submit them to me. Friday, our mission was to take out HackThisSi ...more
In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more
Learn how to turn a t-shirt into a sexy one piece swimsuit. This swimwear project is cheap and easy. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is a t-shirt, pins and a sewing machine. Cut along the pattern Gianny L has demonstrate ...more
Learn how to recycle a frumpy winter sweater into a sporty strapless dress! The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is one old frumpy winter sweater, pins, scissors, and a sewing machine. Cut along the pattern that Gianny L has ...more
Learn how to create your own shawl in two easy steps with Gianny L. You need fabric, chalk, trim, a sewing machine and scissors. Voila! You have a cheap, cute DIY shawl. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap.
Well, only if you also happen to have an ARM powered LEGO Speedcuber device. Promotional video by maker David Gilday for ARM Ltd. With the help of the Android, the machine cracks the Rubik's Cube in 25 seconds (compare to LEGO Mindstorms solvers' 4 seconds.... or the human re ...more
In this series of videos, you can get first hand instruction on strength training machines. For example, you can see clips of our expert using different press machines like the chest press and leg press machines. Learn how to work out your glutious maximus using a glute isolat ...more
Learn how to save money by making your own Nepresso coffee maker capsules. Hack your coffee machine with this video.
A couple of months ago at the Black Hat security conference, hacker Cody Brocious gave the hotel industry a nasty surprise when he figured out how to hack the locks made by Onity that are used in millions of hotels worldwide. The reason his hack is so impressive is because it ...more
The last two US Presidential elections were marred by reports of voter fraud. So Princeton University took it upon themselves to investigate how easy it could be to hack the election.Answer: easy. They bought a Diebold voting machine, the system used across the country and in ...more
In a 10 button Nesquik vending machine or other 10 button vending machines, you can hack to get credited for free drinks. Don't Miss: 9 Vending Machine Hacks for Free Drinks, Snacks, & More Step 1: Press the following sequence on the buttons: 44455544455, you will be able t ...more
Welcome back, my novice hackers! As we saw in my first tutorial on Facebook hacking, it is not a simple task. However, with the right skills and tools, as well as persistence and ingenuity, nothing is beyond our capabilities. One of the cardinal rules of hacking is: "If I ca ...more
Pachinko originated in Japan as large casino machines that were similar to video slot machines. Players gambled on them for prizes. They were then adapted and became popular in the US as handheld kids' toys made of cardboard, a couple of BBs, some plastic and a rubber band. N ...more
Welcome back, my neophyte hackers! In today's hack, we're going to have a bit of Halloween fun. Have you ever had a boss who made you miserable with his micro-management and nagging? Maybe you thought he unfairly fired your friend/colleague? Well, now here's your chance to ge ...more
Want an electric car without the price tag? You could always build your own, or maybe just hack your old gas guzzler into an eco-friendly electric machine... This weekend at Defcon, security consultant David Brown showed off his "Voltswagon" project, a 1974 Beetle named Shocky ...more
Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more
When Yosemite was released, a more detailed boot screen came to your Mac. So now, just like on Apple's mobile devices, you will see a loading bar telling you how far into the startup process you are. Apple also decided to add a black version of this boot screen to newer Macs, ...more
Welcome back, my greenhorn hackers! A few years back, Microsoft implicitly recognized the superiority of the Linux terminal over the GUI-based operating system by developing PowerShell. Since Windows 7, every Windows operating system has had PowerShell installed by default, a ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
Welcome back, hacker novitiates! In the next few hacks, we will be breaking into Windows servers. In this installment, we will learn to add ourselves as a user to a Windows 2003 server. Of course, when we have added ourselves as a user, we can come back any time and simply log ...more
A vulnerability in the design of LiDAR components in driverless cars is far worse than anything we've seen yet outside of the CAN bus sphere — with a potentially deadly consequence if exploited. The hack is also going to be hard to fix, researchers Hocheol Shin, Dohyun Kim, Y ...more
Welcome back, my novice hackers! The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP ...more
QR codes are everywhere, from product packaging to airline boarding passes, making the scanners that read them a juicy target for hackers. Thanks to flaws in many of these proprietary scanning devices, it's possible to exploit common vulnerabilities using exploits packed into ...more
One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines conn ...more
Hello null_byters, after some time out here we are again with another tutorial, continuing our beautiful series, today we will write our first real world bash script. BEFORE WE START Before we start today's lesson Let's recap what we learned in the previous lesson, right now ...more
A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more
Welcome back, my novice hackers! There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful. Many novice hackers focus way too much energy on cracking passwords (which should be a last resort unless you have spec ...more