Many of us in the Steampunk community have pets that we love and cherish, myself included, and we want those pets to share our joy of Steampunk. In reality, they couldn't care less, but for some reason we still love to dress them up. Their reactions usually range from bemused ...more
This short drum lesson explains how to sizzle the hi-hats within your drumming. It starts out by teaching the basic method, and then explains various ways that it can be integrated within your own musical drumming.
The two-handed sixteenth note drum beats featured in this lesson are a little different than anything covered in previous lessons. Unlike the regular sixteenth note beats, these patterns have the hands alternating between the hi-hats and snare for the entire measure.
This video lesson covers five fun drum beats that are played on the toms. Unlike most drum beats that are centered around the hi-hats or ride-cymbal, these grooves are built around tom-tom patterns. They aren't too difficult to play, and work well in a wide range of playing st ...more
Want to create a crochet pattern that doesn't take much time to do but creates a professional-looking finish? This video guides you through the crochet puff stitch, which consists of up and down waves of crochet yarn interspersed with small holes. You can use the crochet puff ...more
Reggae berets have been around and popular since the days of Bob Marley, but when chanteuse Gwen Stefani started sporting these for her solo tour and integrating rasta patterns into her clothing line, L.A.M.B, the rasta print become near uniform for admiring girls across the c ...more
A crochet single rib stitch is essentially a fancy way of saying a crochet stitch with an undulating up and down pattern. A "rib," or elevated stitch, runs across the finished piece vertically, forming an interesting pattern that can be used to accentuate scarves and mittens. ...more
In this video we learn how to make a hip hop beat in FL Studio. First, load up your drum sounds from the browser to the interface. After this, change the hits on the drums to make the beat sound different. Edit how high the volume is on the snare drum and then change the ghost ...more
Graffiti maestro Wizard performs one of his trademark user-requested graffiti demonstrations. In this video creates an even more compact design than usual, creating the word UZI in fairly standard graffiti-script and elaborating it with some splatter patterns and a hatted figu ...more
Watch this instructional crochet video to hide crocheted yarn tails. Use the same type of yarn you used to crochet your patterned hat. You will also need a tapestry needle to sew in the hanging yarn tails in the inside of the hat. You can also use this method to sew up the top ...more
This music production software tutorial describes a hack to allow you to trigger an instrument or effect when you RELEASE a key in Reason 3 or 4. This is useful for guitar strums, Hi-hats, mutes or delays, or vinyl scratch effects. With this trigger trick you can create back b ...more
In this tutorial, we learn how to make a Kufi cap with Threadbanger. First, grab a thick black jersey material and your added material of choice. Cut the fabric in a circle pattern to make the size of your head. Then, cut the band material for 3 inches longer then your head me ...more
In knitting speak, pearling is just a fancy schmancy term for creating ribs in your crochet project. Ribs help to create a regular pattern and add visual interest to caps (as in this tutorial), scarves, Afgans, and just about any crochet craft. In this video, Mikey shows you ...more
You don't want anybody to have access to your cell phone. Nobody. Well, instead of the standard unlock mechanism, the one anybody can unlock your cell phone with, the Motorola DROID, and Android enable mobile device, allows you to create your own unlock pattern, secret to anyo ...more
Cardcrazy09 teaches us how to make a graduation card. You take a piece of black card stock paper and stick thin white paper edges on each side, like a window. You then use the Cricut to make a star and the word Congrats. This will go on the left, on top of some black printed m ...more
When it comes to knitting patterns, simple algorithms can have very aesthetically pleasing results. Take the simple color-graded hat. See how to knit a color-graded hat with this easy, up close demonstration by Judy Graham, Knitter to the Stars. Pick two colors. Start with yo ...more
Gastronomes who import the consumption of food - rather than its making - often think more about the palatable impact of a morsel of chocolate or a bite of cake than how the chocolate or cake came to be. But if you're interested in putting on a chef's hat to go full circle wit ...more
How many stitches does your crochet art have? How can you tell? Why would you even want to know how many stitches are in your crocheted sweater or crocheted hat? Knowing how to count your stitches is a fundamental step in learning to crochet – assuming you want your finished p ...more
There are different kinds of knitting needles to choose from for different projects. You will find wooden, plastic or aluminum in different lengths and shapes. There are straight, circular or double pointed. Different materials For the most part Knitting Needles are made of ...more
You may have already heard of Zazzle, an online service that allows you to print on a variety of goods (tees, mugs, posters, etc.). You can design-it-yourself, or choose from Zazzle's library of available designs. Of late, Zazzle has partnered with Keds to offer something a b ...more
It turns out that the popularity of soft circuit electronics has leaked out of the interwebs and into the hands of the U.S. military. Soft circuit electronics allow you to literally sew electronics circuits into fabric using flexible conductive thread instead of wire. Soft cir ...more
When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. ...more
The Mad Hatter from Tim Burton's Alice in Wonderland not only makes a great costume but a great project. The hour-glass shaped hat, the striped pants, the fingerless gloves, and the Hatter's signature scarf are the most important components in this costume. If you're fairly sk ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask? Let me tell explain. Its basically how you behave on the internet, what websites you click, your language pattern (how you speak), what websites you are regist ...more
If you're reading this, you're likely a tech-savvy coding pro whose analytical talents are mostly applied to designing apps, cracking passwords, and infiltrating networks — all of which are admirable activities for both aspiring and seasoned white hat hackers. But there are ot ...more
Get some tinfoil hats and make a time machine because we are about to go back to the 90s and learn about some phreaking. Step 1: What Is Phreaking? Phreaking is the action of hacking into telecommunications systems, especially to obtain free calls. Phreaking was big in the 9 ...more
This article is to all the newbies on here wanting to become a hacker. Since I have seen many newbie questions on here, I need to address this. Thank You: First thank you for wanting to become a hacker, it is not an easy path. Becoming a hacker, at least in the way that I s ...more
Whether it's embarrassing pictures and videos on your smartphone, or files you just don't want anyone reading, there are plenty of ways to hide them. For most devices, that means installing third-party apps like Gallery Plus - Hide Pictures, Sectos - Photo & Video Vault, TimeL ...more
Regardless of how great your friends and family are, they'll more than likely go through your photographs if they had the chance. Hell, if my friend were to leave his/her phone lying around, I'd go through it—no doubt. So, if you want to protect yourself and your embarrassing ...more
Hi! Let me get started on this subject as it is a very "touchy" subject. We all want to "hack" these days, and that's logical. Te be real honest here, i was inspired once by the words someone from the Null byte community said. In the (near) future, wars will be ended by comput ...more
As the world goes into a frenzy over the latest strain of WannaCry ransomware, it might be a good time to remember to update all your devices. Yes, those little reminders your phone and computer throw at you every now and then to update your junk can be really annoying, but no ...more
Google has added some fun Easter eggs to Hangouts that'll give you a few more ways to procrastinate throughout your day. All of them (except for one) work on the web browser version, the Chrome app, and the mobile apps for Android and iOS, and are activated by sending a specif ...more
Hello fellow gray hat hackers, I wrote a program in python that helps me to fill up my proxychains.conf file, so I don't have to manually enter in the proxies. I figured I will give a little how-to of how I did it and maybe I could help some of you(hackers) out there to stay a ...more
When you have some form of lock screen security enabled, Android makes sure that you don't have to fumble around to enter your pattern, PIN, or password before you can call 911 in an emergency. It does this by adding an "Emergency Call" button to the bottom of the screen—but a ...more
Once again, LG is mixing up its launch. Instead of the announcing the latest entry in G series later in the year, the LG G8 ThinQ was announced at Mobile World Congress 2019, shortly after Samsung's Galaxy S10 event. And instead of trying to match what other OEMs are doing, LG ...more
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use o ...more
There's no doubt you've heard the old saying, "When life gives you lemons, make lemonade." The phrase was penned in an obituary to a dwarf actor in 1915 by an anarchist named Elbert Hubbard, who lost his life five months later aboard the RMS Lusitania when it was torpedoed by ...more
Database technology has vastly improved the way we handle vast amounts of data, and almost every modern application utilizes it in one way or another. But the widespread use of databases naturally invites a slew of vulnerabilities and attacks to occur. SQL injection has been a ...more
Samsung decided to jump into the foldable category early, announcing the Galaxy Fold in February 2019. After a major hiccup, Samsung released the phone four months later to praise. But Samsung's not finished with foldables, as the new Galaxy Z Flip is just on the horizon. Sam ...more
In 2019, Sony is mixing up its design, attempting to stand out among the sea of familiarity. Instead of emulating Samsung with punch hole cameras, they decided to target a rare section of the market, content consumers. There's the Xperia 1 for those who want the best, and the ...more
Similar to last year, LG is mixing up its releases. Instead of the G series in the first half of the year and the V series in the second half, LG is releasing both heavy hitters together. However, unlike last year, this is a true upgrade from its predecessor, the LG V50 ThinQ ...more
For 2019, Sony is trying to shake its failures of the past and start fresh. Following the unsuccessful Xperia XZ series, Sony is changing the name of their flagship to a single number: Xperia 1. With the name change comes a few upgrades, one of which is its new look. Secondly, ...more
Ever since the announcement of the Razer Phone, a wave of gaming smartphones started to hit the market. With ASUS being such a big name in gaming, it made sense for them to throw their hat in the ring. The result is the ROG Phone. And with this first try, ASUS has topped the r ...more
There are many impressive features on a Samsung Galaxy Note 2, but just like any other smartphone on the market, the most used one is the camera. How many times did you take a picture today? Or admire all the selfies in your gallery? Or upload a video to Instagram, Vine, or Sn ...more
The Fourth of July, the celebration of US independence, as well as the second paid holiday of the summer, has arrived. If you're vaccinated, you're probably planning to commemorate the occasion much differently than last year. However, if you're still playing it safe, you can ...more
Since the Razer Phone's announcement in 2017, we've seen a new subgroup of phones emerge. Gaming phones are now a thing, leading to companies like ASUS creating phones that are thoroughly optimized for the mobile gaming experience. And with their second iteration, they perfect ...more
After years of rumors and waiting, Samsung's first foldable smartphone is finally a reality. The phone itself is a bit wild, but with Samsung going so far out of their comfort zone with this one, there were some bumps in the road that caused a delayed release. The launch has b ...more
If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
Over the past decade, Marvel Studios has been a dominant force at the box office, raking in more than $21 billion dollars. Averaged out over that span of time, the yearly earnings of those movies outweigh the gross domestic product of some countries. And while those films hav ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
While iOS 11 is ready to take over your iPad, iPhone, and iPod touch, let's take a step back and check out all of the new features that iOS 10 brought to the public when it was released to everyone in Sept. 2016. Some of the updates from iOS 9 to iOS 10 were huge, as you'll s ...more