Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Hello, it's iDwarf again! Last week's redstone trap competition was a HUGE success. We had at least 30 entries! But before we get to showing off the winners ...more
Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it do ...more
Cross-site scripting is one of the most common vulnerabilities found on the web today, with repercussions of this type of flaw ranging from harmless defacement to sensitive data exposure. Probing for XSS can be tedious and time-consuming for an attacker, but luckily there are ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
Knowing how to make a TASSEL is a very useful technique to know. You can attach them to a scarf, a hat, a shawl...there are many uses for a TASSEL. How to Make a Tassel Cut a piece of cardboard. It should be a little longer than the length you want the tassel to be. Wind y ...more
Most companies have services like employee login portals, internal-only subdomains, and test servers they would prefer to keep private. Red teams and white hat hackers can find these obscure and often vulnerable services using a tool designed to help protect users from fraudul ...more
Want to learn how to do all those cool swing dance flips and jumps? This three part dance tutorial teaches you how to do swing dance style aerials. Learn how to do the Frog Jump, the Knickerbocker, the Pancake and the Hat Trick. Aerials should not be done on a social dance flo ...more
When it comes to platform games on mobile, endless runners are some of the hardest to play since they can go on seemingly forever. There's always room for improvement since your goal is to beat your previous score (or someone else's high score). But which endless running games ...more
The NSA's massive internet spying efforts will continue. In President Obama's latest press conference, he went public to (in so many words) say that the NSA's spying efforts will continue uninterrupted. This, coming just weeks after the Amash Amendment which would have defund ...more
Reggae berets have been around and popular since the days of Bob Marley, but when chanteuse Gwen Stefani started sporting these for her solo tour and integrating rasta patterns into her clothing line, L.A.M.B, the rasta print become near uniform for admiring girls across the c ...more
In this video, we learn how to knit a hat on circular needles. First, use a stitch marker to mark the beginning of the round and make sure no stitches are twisted around. Now, join the two ends by knitting your stitch and using both of the loose ends at once. You will now star ...more
Soda bread, corned beef and cabbage, and colcannon are all great dishes to serve up on St. Patrick's Day, but desserts really let your inner leprechaun come out to play. Not only can you have fun incorporating all kinds of tasty Irish liquors into baked goods, you get to dye t ...more
Chances are if you have heard any Dirty South styled beats you have heard these techniques. Check out this tutorial and learn how to create snare and hi hat rolls of your own in FL Studio.
This how-to crochet video offers a simple pattern and instruction for stitching your own cute and easy crocheted hat. Knitted hats don't have to be for winter. While a cozy hat will protect you from the cold, a lighter yarn can add some style in warmer months as well. Check ou ...more
Setting up Face ID is simple, but getting it to work correctly every time is a different story. While there are numerous tips for getting Face ID to work every time you need it on your iPhone X, XS, XS Max, or XR, Apple has added a better option in iOS 12 that lets you add an ...more
Welcome back, my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have read it when just starting out studying Linux. Now, that you are well into your Linux studies and have some familiarity with how it operat ...more
A modern iPhone is capable of running sophisticated, exquisitely-rendered games that rival titles on current-generation consoles. However, there is some value in classic video game titles, whether you grew up playing games on the Atari 2600, Nintendo Entertainment System, and ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Hey, it's iDwarf bringing you another redstone competition! The last one was fairly successful for being new. As you all know, I will be running these compe ...more
As one of the most powerful Android apps for connecting your phone or tablet to your other devices in various ways, Pushbullet had always been a fan—and Gadget Hacks—favorite. However, ever since late last year, many of the app's popular and once-free features now require a c ...more
If you need to scan a large number of domains for a specific web app vulnerability, Dorkbot may be the tool for you. Dorkbot uses search engines to locate dorks and then scan potentially vulnerable apps with a scanner module. This tool is useful if you're managing a large num ...more
In this tutorial, we learn ten different ways to wear a beret. The first way is to wear the hat with the long side on the forehead going down on the rest of the hair. The next way is to do this same look, except move the hat to the right. Next, place the hat in the middle of t ...more
Over the years, the internet has become a dangerous place. As its popularity has increased, it has attracted more hackers looking to make a quick buck. However, as our dependency on the web grows, it becomes increasingly difficult to sever all ties. This means we have to prote ...more
The Dark Knight Rises. The Amazing Spider-Man. The Avengers. Halloween is a few weeks away and all we're going to see are these same ol' superhero costumes. It's like that every year, due to the immense popularity of comic book films by DC and Marvel. So, if you want to skip ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! This week, everyone has been so busy working on the Futuristic Creations Weekly Challenge, that there were unfortunately very few entries for the Weekly Sta ...more
Static electrical shock your worst nightmare? The clothes you choose, the shoes you wear, and even the things you touch might encourage this natural phenomenon. If static shock is ruining your day, then take some action. Reduce your chances of getting a nasty shock that's not ...more
The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. ...more
Crocheting is an very old hand woven technique used to create clothing out of single very long coils of yarn. Learn how to crochet a hat from this expert in these free video clips. Part 1 of 26 - How to Crochet a hat. Crochet a hat - Part 2 of 26. Click through to watch this v ...more
Shelley Lovett from ChildCare shows us how to make a cotton ball snowman. This is a great activity for developing fine motor skills. The snowman comes in a several variations, there is a snowman that has circles on its tummy so that children would have to try and place the cot ...more
Cosplay, or "costume play," is basically dressing up with costumes and accessories to represent a specific character, usually one in anime (like Sailor Moon) or manga. Like most Japanese fashion trends, cosplay emerged from the trendsetting Harajuku district of Japan and conti ...more
Backdooring a powered-off MacBook is easy when a few minutes of physical access is allowed. That attack works well if the hacker also shares a Wi-Fi network with the victim, but this time, I'll show how to remotely establish a connection to the backdoored MacBook as it moves b ...more
Screenshots taken from a compromised computer can provide hackers with access to private emails, photographs, and information found in sensitive documents. This data can be used by the attackers to build profiles of a target for social engineering attacks and blackmail or even ...more
With the list of available mobile apps for moviegoers constantly expanding and improving, seeing a film at your local theater has never been better. With the right apps for your iPhone or Android phone, you can research movies, find out if showings are sold out, reserve seats, ...more
In this tutorial, we learn how to draw a graffiti style hip hop cartoon character. First, make a circle, then draw long triangles for eyes and a mouth plus a rectangular shaped body with very large feet. Then, draw in the arms with large hands and draw a hat on the top of the ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Before you know it, old Saint Nick's reindeer will be tapping on top of your roof and a Salvation Army bell ringer, festooned with a Santa Hat, will be around every corner. That's right, guys and gals, Christmastime is almost at our front door, which means you should get prepa ...more
This how-to crochet video offers a simple pattern and instruction for stitching your own cute and easy crocheted hat. Knitted hats don't have to be for winter. While a cozy hat will protect you from the cold, a lighter yarn can add some style in warmer months as well. Check ou ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! The server activity has actually been kinda slow while we wait to install the new 1.2.3 update, but that didn't stop any build progress! Everyone on the ser ...more
During winter, a person's body loses most of its heat through its head. Protect your baby from bitter, cold winds with a knitted santa hat or elf hat. This tutorial shows you how to use yarn for making warm hats of all varieties for your baby. You'll need a loom, eyelash yarn ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Last week's challenge was to build some futuristic creations, and the results were nothing less than spectacular. Just about everyone on the server entered ...more
The Pinchin Pirate is, of course, a giant crab with an eyepatch and a pirate hat. He's the second boss you'll have to defeat when playing Donkey Kong Country Returns. This guide shows you the best strategies and tactics to vanquish him!
This how-to crochet video offers a simple pattern and instruction for stitching your own cute and easy crocheted hat. Knitted hats don't have to be for winter. While a cozy hat will protect you from the cold, a lighter yarn can add some style in warmer months as well. Check ou ...more
Though feeling cold during the winter is pretty unavoidable, you can definitely prevent the torment of having flaky, dry skin during the cold winter months. If you spend a lot of time indoors, use a humidifier if possible and avoid overusing the indoor heater. Take shorter sh ...more
Knitting with beads is a lot like regular knitting, only you're attaching beads to your string in order to create a more pearlized look, or to add complexity to a knitted purse, flower, or hat. Adding beads is a wonderful way to switch up the old knitting routine at minimal co ...more
Many of us in the Steampunk community have pets that we love and cherish, myself included, and we want those pets to share our joy of Steampunk. In reality, they couldn't care less, but for some reason we still love to dress them up. Their reactions usually range from bemused ...more
Need to be undercover? Well, make yourself impossible to photograph. Get some infrared LEDs. They're undetectable to the human eye, but that's not the case with cameras. Wire them to the brim of your hat and you've got instant invisibility to any camera -- paparazzi, Big Brot ...more
You might notice that there's been a few changes around here. All of us here at WonderHowTo have been working hard to create fun new spaces and topic areas to dig our heels into. We've created a few brand new websites, spiffied up our design, and today we're launching the Won ...more
There is much to be learned about Apple Music and the revamped Music application introduced in iOS 8.4. Throwing their hat into an already competitive field with other companies like Spotify, Tidal, or Rdio, this is a bold move on Apple's part. So, before you consider signing ...more
Ladies, have you ever wondered what it would be like to be a dude for the day? Maybe as part of a Halloween costume, or even just for fun? No need to get a gender reassignment surgery, take a test drive as a man with the help of a little makeup, ironically enough. You will nee ...more
Our synth expert, Ryan Larson, will explain the basic sequencing process step by step, including how to use samples, setup and create loops, choose and add effects to tracks, record instruments like a thumping bass drum, crisp hi hat cymbals, tight snare hits, and other percus ...more
There seems to be a nearly cult-like craze surrounding those glasses filled with summery, pink-hued rosé wine. From picnics in the park to long days spent on the beach, rosé wine offers light, warm-weather refreshment to its lucky imbiber. With these 10 fun facts about this e ...more
A while back, I wrote review of my favorite hacking movies of all time. Two of my key criteria were; (1) how realistic was the hacking, and (2) are the hackers portrayed as the "good guys." This past winter, a new hacker movie was released, appropriately named Blackhat starrin ...more
The overarching and expanding field of data science and analysis has become virtually inseparable from areas such as programming and development. As the driving force behind web development and marketing, engineering, white-hat hacking, and even finance, large-scale data anal ...more
It's Monday, time to highlight some of the community submissions posted to the Math Craft corkboard. One of these posts inspired me so much, I think it merits a closer look. Today, I present a "simple" method for making a golden spiral using just a straight edge, a compass, an ...more
The Null Byte community is all about learning white hat hacking skills. In part, this is because I believe that hacking skills will become the most valuable and important skill set of the 21st century. This week, The U.S. Department of Defense confirmed my belief by announcin ...more
Watch this instructional crochet video to crochet a star stitch hat or winter cap. This crochet method creates an intricate rotating pattern. Use any type of thread and crochet needle to complete this project. This star stitch pattern creates a complex crochet weave for warm y ...more
In this video we learn how to make a hip hop beat in FL Studio. First, load up your drum sounds from the browser to the interface. After this, change the hits on the drums to make the beat sound different. Edit how high the volume is on the snare drum and then change the ghost ...more
With the rise of website encryption (TLS), sniffing passwords from network activity has become difficult. However, it's still possible to quietly exfiltrate a target's network traffic in real time to extract passwords and sensitive information. Pertaining to macOS, there are t ...more
If you have an endless supply of purses and a limitless supply of wall empty wall space, it's about time you made some DIY purse racks. In this video, you'll see a very easy (and cheap) way to hang all of your purses (and please your boyfriend). For this DIY purse rack, you'll ...more
If you're an avid knitter, then you're probably making dozens of different pojects at the same time: scarves, Afghan quilts, hats, and wee slippers for your dog. So you need a video that doesn't waste your time (so you can finish that last row on your striped rugby scarf) by g ...more
You can almost detect the collective breath-holding of the augmented reality industry as it waits for Apple's inevitable entry. A new Apple wearable built with augmented reality technology is likely the device that will finally make the smartphone take a backseat. Apple's for ...more