When it comes to platform games on mobile, endless runners are some of the hardest to play since they can go on seemingly forever. There's always room for improvement since your goal is to beat your previous score (or someone else's high score). But which endless running games ...more
|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
With the amount of time we spend glued to our smartphones, they could be considered a second job (if only we got paid). I spend a large part of my day scrolling through Reddit, Facebook, Instagram, and countless other apps, and burn through hours and hours without even noticin ...more
Coffee mugs: nothing proliferates more quickly in my kitchen cabinets. People are always handing them out as gifts or as swag, plus I always seem to find a vintage model or two at a garage sale that I'm compelled to buy. I used to do a yearly purge of my excess muggage, but it ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
Will the predicted apocalyptic date—December 21st, 2012—really be the end of the world? In this ongoing five-part series, we examine what would happen if zombies, nuclear weapons, cyber wars, earthquakes, or aliens actually destroyed our planet—and how you might survive. End ...more
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
My first encounter with a phablet was late last year with the AT&T version of the Samsung Galaxy Note 2, having never touched or even seen its highly-acclaimed and pioneering predecessor. Initially, I was a bit overwhelmed by the enormous screen and taken aback by the dated st ...more
Silence spreads over these mountains like nothing I've ever felt. If I didn't have Moby blasting in my earphones, there'd probably be no other sounds around. Well, except for someone, Phil probably, murmuring in a nearby tent just low enough to make his words indiscernible. W ...more
Whether it's a short road trip or an 18-hour flight, our phones are now essential travel companions. No longer do we need a GPS unit, maps, cameras, camcorders, or even boarding passes. However, not all phones are created equal in this regard. Some are more suited for travelin ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
Apple's latest big software update includes an entirely new Apple app, a controversial change in the TV app, better Siri control, an improved Shortcuts app, interesting Safari upgrades, Apple Music Sing, and more. Keep reading to see what iOS 16.2 has to offer your iPhone. Th ...more
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more
Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more
I assume at this point you have already completed your control panel using Part 1 of this How To guide. Now, if you are anything like me, you couldn't fight the urge to play, and you have your panel sitting on saw horses in the living room. Depending on your situation, your s ...more
Super Mario Brothers! No, wait... Super Meat Boy! Yep, that's right. Meat. As in "cube" steak. As in a square piece of beef with eyes and a shitty grin, who just happens to be in love with a band-aid. I have no idea why. And no matter how shocked you are to see your dinner on ...more
It's that time of year again when pizza boxes line the room and buffalo wings stain the couch. When cases of beer sit in the cooler and the big screen TVs are fired up and properly calibrated. When two of the best football teams vie for the championship title and the Vince Lom ...more
This video demonstrates how to install additional memory into a Power Mac G5 system. It is G5,1.8 single processor machine.Start by lifting up the latch on the back for the front door. Remove the front door. Remove the plastic air blocker system and remove the main fan assembl ...more
Tracie Cunniliers demonstrates how to wind a bobbin and thread the needle using an automatic needle threader in 'Elna 2800'.To wind a bobbin, place a spool of thread on the holder. Place a thread holder next to the spool of thread. Take the end of the thread and wind it around ...more
This video is about installing second serial ATA drive into a Power Mac G5 system. The video is a step by step demo starting with the removing of the door to the machine and the air pack. The first hard drive is at the top rack and you have to remove the four screws at the bot ...more
It's amazing what you can create with a few, everyday household and office supplies. Most of these items are already sitting in your junk drawers, so there's no need to spend money! Kipkay shows you 4 awesome hacks you can make in this "household hack pack" video. 1. iPod/iPh ...more
MacOSG demonstrates how to install memory in a 2009 Mac Pro. When performing this upgrade, be sure to take precautions for static by discharging static electricity before beginning. Shut down, unplug and place the Mac Pro on a static-free surface. To access the memory, you nee ...more
This ten-part series on machining skills for prototype development comes straight from MIT & Erik Vaaler. It's one of the most extensive video tutorials available on the web for machining. MIT's artificial intelligence laboratory's primary work is done for their robotics group ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
These days, eReaders are everywhere. For die-hard book nerds, eReaders offer the convenience of a full library without having to sacrifice shelf space. Sure, there are the paper buffs who swear that you just can't take an eReader with you into the bathtub, but when's the last ...more
Are you having problems because the game was released a long time ago and the more experienced players are better than you? Then you should be very excited to find out that I will be giving you some general tips & tricks about the different classes that I have learned the hard ...more
Showcased at Mediamatic, the "Untitled Sock Project" is a knitting machine hack by Luís Brandaõ, Fábio Costa, Sean Follmer, and Pol Pla: "By blowing into straws, visitors contribute to the creation of a knitted sock. Depending on how hard they blow and which straw they blow i ...more
In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
This confectionery hacking how-to video demonstrates that, with an electric motor, juice lids, battery and sugar, you can make your own cotton candy machine. Don't wait for a carnival or fair to get your next taste of sweet, sweet cotton candy. Watch this video tutorial to see ...more
You may or may not realize it, but there are certain seams that are used when making clothes. Each seam as their advantages for keeping things together, so it's important to know them when making your own clothes. In this handy tutorial, you'll find out how to make several se ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
It won't be much trouble getting a decent police sketch if Andrew Salomone decides to knock off a liquor store. Salomone used the Brother knitting machine hack shown below: "The balaclava is knit from cotton yarn and the design is from a bitmap file, in which pictures of my ...more
This instructional video will show you how to get all of the change out of a vending machine! Who needs Coke or Pepsi when you can have coins? Then, you can get all of the soda you want out of that vending machine. Don't Miss: 9 Vending Machine Hacks for Free Drinks, Snacks, ...more
In this tutorial, we learn how to use the feature keys for your Cricut machine. There are six feature keys on every cartridge. The first is the shadow feature key that create a matte to highlight your letter. The shadow blackout key creates a solid matte that doesn't cut out t ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
ProjectKinectMagicMirror combines augmented reality and CT-scan imagery to create a virtual "X-ray machine." Another amazing Microsoft Kinect hack to add to the vault. The ingenuity is infectious... Get inspired. Make-your-own. Video: . More Kinect Hacks: Hacked Kinect Captur ...more
Squashini is a difficult boss to beat, found at the end of the Treat Land level in Kirby's Epic Yarn. He's a giant slot machine, but you can defeat him easily by throwing back the cards that he flings at you.
In this tutorial, learn how to finish your clothing projects off right with seams 101. This video will walk you through how to sew the perfect seam on any sewing machine. This clip will cover the following seams: • Plain Seam • Basting Stitch • Slot Seam • Flat-Felled Seam • ...more
This video provides information on how a hacker can find an vulnerability on a remote computer and exploit it to gain remote access. Also, the video shows how a hacker can raise their privileges on the remote machine to administrator. Hack a computer for remote access. Click t ...more
Hack your voicemail or answering machine with special information tones. Check this out. Hack phone voicemail to block telemarketers. Click through to watch this video on spike.com
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Youtube user FVDisco is always outdoing himself. You may know his work from the Minecraft Player Piano, or his Redstone Slot Machine. Recently, he created an automated mob slaying g ...more
In order to thread your sewing machine and wind a bobbin, you will need the following, a sewing machine an empty bobbin, thread, and a pedal control for your sewing machine. Choose a good quality thread. Place the thread in the holder on top of the machine. Place the cap on th ...more
SCRABBLE is taking the world by storm. It's everywhere. You can play it on Facebook, iPhone, iPod, Nintendo DS, PSP, mobile phones... you name it, it's there. And you can even gamble online, like with SCRABBLE Cubes on WorldWinner. But now SCRABBLE gambling has a new face and ...more
There are lots of simple "hack-like" fashion projects on the web, but kudos to the Glamourai for bringing Style into the equation. Her "Scarf-tan-ette" is surprisingly chic considering it's simplicity. Relatively uncomplicated to make, all you need is a couple vintage scarves, ...more
Learn how to create your own shawl in two easy steps with Gianny L. You need fabric, chalk, trim, a sewing machine and scissors. Voila! You have a cheap, cute DIY shawl. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap.
This video clip shows you how you cannot fool any candy machine and debunks the mythical paper hacks in detail. Some say it works, some say it doesn't. Well, check out this video tutorial and decide for yourself what believe. It might just be easier to steal candy from a baby.
You will need marking pencils or chalk, scissors, seam ripper, pins and good quality matching thread. Mark desired length on each pant leg. Option 1: Stand on pants and place a pin where fabric hits the floor. Option 2: Fold pants up to desired length & pin. Take pants off; tu ...more
Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implem ...more
You can never be too rich, too thin, or have to much RAM. With a 1GB SODIMM available for under $20 these days, adding memory to your MSI Wind notebook is a no-brainer upgrade. The MSI Wind comes with either 512MB or 1GB pre-installed, but the machine will recognize up to 2GB ...more
This After Effects podcast tutorial by Aharon Rabinowitz shows you how to set up a basic odometer, ready for manual keyframed animation. If you've been wanting to create an odometer or slot machine display, this tutorial will get you on your way. The second part goes over auto ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone ...more
In this tutorial, we learn how to get a free soft drink from a vending machine. First, you will need to find one of those old vending machines, not one of the new and high tech ones. From here, you will need to sit down and lift the hatch up from the machine. Then, reach up in ...more
Well, only if you also happen to have an ARM powered LEGO Speedcuber device. Promotional video by maker David Gilday for ARM Ltd. With the help of the Android, the machine cracks the Rubik's Cube in 25 seconds (compare to LEGO Mindstorms solvers' 4 seconds.... or the human re ...more
Learn how to recycle a frumpy winter sweater into a sporty strapless dress! The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is one old frumpy winter sweater, pins, scissors, and a sewing machine. Cut along the pattern that Gianny L has ...more
Learn how to turn a t-shirt into a sexy one piece swimsuit. This swimwear project is cheap and easy. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is a t-shirt, pins and a sewing machine. Cut along the pattern Gianny L has demonstrate ...more
Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to build a m ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more