Hack a Slot Machine

Coffee Mugs : They're Not Just for Coffee

Coffee mugs: nothing proliferates more quickly in my kitchen cabinets. People are always handing them out as gifts or as swag, plus I always seem to find a vintage model or two at a garage sale that I'm compelled to buy. I used to do a yearly purge of my excess muggage, but it ...more

Build a Home Arcade Machine : Part 1

Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more

Build a Home Arcade Machine : Part 2

I assume at this point you have already completed your control panel using Part 1 of this How To guide. Now, if you are anything like me, you couldn't fight the urge to play, and you have your panel sitting on saw horses in the living room. Depending on your situation, your s ...more

How To : Watch the 2011 Super Bowl Commercials Online

It's that time of year again when pizza boxes line the room and buffalo wings stain the couch. When cases of beer sit in the cooler and the big screen TVs are fired up and properly calibrated. When two of the best football teams vie for the championship title and the Vince Lom ...more

How To : Install memory in a Power Mac G5

This video demonstrates how to install additional memory into a Power Mac G5 system. It is G5,1.8 single processor machine.Start by lifting up the latch on the back for the front door. Remove the front door. Remove the plastic air blocker system and remove the main fan assembl ...more

How To : Install a hard drive in a Power Mac G5

This video is about installing second serial ATA drive into a Power Mac G5 system. The video is a step by step demo starting with the removing of the door to the machine and the air pack. The first hard drive is at the top rack and you have to remove the four screws at the bot ...more

How To : Make an iPhone stand, fart gadget & mini BB gun

It's amazing what you can create with a few, everyday household and office supplies. Most of these items are already sitting in your junk drawers, so there's no need to spend money! Kipkay shows you 4 awesome hacks you can make in this "household hack pack" video. 1. iPod/iPh ...more

How To : Install memory in a 2009 Mac Pro

MacOSG demonstrates how to install memory in a 2009 Mac Pro. When performing this upgrade, be sure to take precautions for static by discharging static electricity before beginning. Shut down, unplug and place the Mac Pro on a static-free surface. To access the memory, you nee ...more

How To : Shop for an eReader

These days, eReaders are everywhere. For die-hard book nerds, eReaders offer the convenience of a full library without having to sacrifice shelf space. Sure, there are the paper buffs who swear that you just can't take an eReader with you into the bathtub, but when's the last ...more

How To : Play Your Kit in Battlefield Bad Company 2

Are you having problems because the game was released a long time ago and the more experienced players are better than you? Then you should be very excited to find out that I will be giving you some general tips & tricks about the different classes that I have learned the hard ...more

How To : Use the feature keys for your circuit machine

In this tutorial, we learn how to use the feature keys for your Cricut machine. There are six feature keys on every cartridge. The first is the shadow feature key that create a matte to highlight your letter. The shadow blackout key creates a solid matte that doesn't cut out t ...more

HowTo : Make the Laziest Dress Ever

There are lots of simple "hack-like" fashion projects on the web, but kudos to the Glamourai for bringing Style into the equation. Her "Scarf-tan-ette" is surprisingly chic considering it's simplicity. Relatively uncomplicated to make, all you need is a couple vintage scarves, ...more

How To : Debunk the free candy cheat myth

This video clip shows you how you cannot fool any candy machine and debunks the mythical paper hacks in detail. Some say it works, some say it doesn't. Well, check out this video tutorial and decide for yourself what believe. It might just be easier to steal candy from a baby.

How To : Get a Free Soft Drink from a Vending Machine

In this tutorial, we learn how to get a free soft drink from a vending machine. First, you will need to find one of those old vending machines, not one of the new and high tech ones. From here, you will need to sit down and lift the hatch up from the machine. Then, reach up in ...more

How To : Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implem ...more

HowTo : Make Perfect Bacon

Here's another home hack for you (1, 2, 3). The perfect way to make bacon? Ditch the frying pan. Instead, try Apartment Therapy's recipe for perfectly cooked, oven-baked bacon. You Will Need: High quality bacon (such as Niman Ranch) Baking sheet with a 1/2"-3/4" lip (to cat ...more

News : Military Technology Used to Create Video Game Drone

An iPhone-controlled drone unveiled at the recently held CES is expected to revolutionize the world of video gaming. Called the AR.Drone (AR stands for augmented reality), this new product will literally bring video games to the streets. Via Daily Mail, "The flying saucer-li ...more

How To : Make a Superman costume with Gianny L

Superman is one of the greatest and most known superheroes out there. Developed by DC Comics, Superman has seen the world… as in comics, television, newspaper strips, video games, movies, radio serials, etc. See how to make a Superman costume in this video from GiannyL. This ...more

How To : Things to Do on WonderHowTo (11/16 - 11/22)

WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Hacking, crafting, mining & more… just another ...more

How To : Bypass a Local Network Proxy for Free Internet

Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more

News : Become Your Own Souvenir

As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more

How To : Edit Super Mario World levels with Lunar Magic

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more

Windows Security : Software Level

As many of you know Windows is not the most secure Operating System in the world, but then again no OS is really secure if the user doesn't know how to protect themselves. Later I will show you how to lower the risk even more on your (the user's) end. Well onto the real stuff ...more

How To : Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more

How To : Write a Press Release

A press release should be about news. It should have a sense of urgency about it and grab the reader’s attention from the outset. A good press release must quickly answer the journalist’s immediate questions: Who? What? When? Where? Why? How? The release should ideally conta ...more

Hack Logs and Linux Commands : What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more

How To : Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more

How To : Things to Do on WonderHowTo (06/06 - 06/12)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more

How To : Things to Do on WonderHowTo (05/23 - 05/29)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more

  • Hot
  • Latest