In this video, we learn how to replace the line on a STIHL trimmer head. First, remove the spool from the head by stopping the engine and cutting attachment first. Then, grasp the body and insert your thumb into the tab on the head, then rotate around and press on the second t ...more
While it's easy enough to ask websites not to track your browsing activity in Safari, they do not have to honor your request. Plus, some of the third-party content providers that websites use can actually invasively track you across other websites. Thankfully, iOS 11 includes ...more
Whether you mean to or not, taking burst photos is super easy on the iPhone. In the Camera app, just compose your photo, tap-and-hold the shutter button, and watch the number of pics go up and up until you take your finger off the screen. However, finding that one special keep ...more
Scotland's Danny MacAskill first came to the world's attention in April 2009 when his roommate uploaded a video of his insane mountain bike stunts. The video amassed more than 350,000 views in the first forty hours it was uploaded. Six months later, the video now has over ten ...more
Most people can probably make one star with a rubber band.. at the most they can twist two. But in this video, you will learn how to make THREE stars all at once using a single elastic band. If you would like to learn how to do this super fun trick, check out the clip. All yo ...more
For lazy children, winter snow means snowball fights, snowmen and snow days. For lazy homeowners, it can mean leaky roofs and costly repairs. Fortunately, where snowy roofs are concerned, a little bit of preventative maintenance can go a long way. As you're probably already w ...more
The other day I was perusing my Instagram when I came upon a curious hashtag... #OnePotPasta. Intrigued, I investigated further and discovered a whole world that was previously unbeknownst to me. How was it possible, I asked myself, to cook pasta with all of the ingredients i ...more
I love cryptography. It is like a great gigantic puzzle for me to solve. However, it is more important than that. It is also how we keep secrets safe. Not just sorta safe either, but really safe. Until recently, if you wanted to use strong encryption you had to either learn d ...more
Back in 2015, Amazon Prime Video was the first subscription-based streaming service to introduce the ability to download movies and TV shows for offline viewing on mobile devices. For travelers and users with limited data plans that like to watch films and episodes on the go, ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Several new block types were introduced to Minecraft when 1.2 was released, expanding the potential for builders throughout the world. Actually, so many new ...more
SCRABBLE may seem like a board game for word nerds only, but believe it or not, SCRABBLE can be used to lure thousands of hot women into your bed... at least that's what Clive Worth claims. Now, I wouldn't put much faith in his "words", but somewhere in this world of lonely b ...more
While the OnePlus One is a great value, you could be plagued with a touchscreen issue or two. The most common problems come in the form of ghost touches and touches not registering with apps. Often, these can be related to hardware or manufacturing issues, but adjusting a few ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
The OnePlus 7 Pro is definitely a beast on paper. With a specs page that ticks virtually every box and a price point that undercuts the competition by hundreds of dollars, it's hard to overlook this phone. But before you get too excited, know that OnePlus has repeatedly shown ...more
While the Galaxy S10+ is a fantastic device, the biggest gripe I have with it is the curved display. Yes, it adds to the aesthetics of the phone, but it makes the phone prone to accidental touches. Thanks to a recent update, however, this is a problem of the past. Edge Touch ...more
In this video, we learn how to play the Tetris theme song on the accordion. D major 7 is the first chord, going to A, B flat, C, B flat, A, G, B flat, D, C, B flat, A, B flat, C, D, B flat, G, and G. Play these separately, then practice doing all of these chords in order one a ...more
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more
Fractals and stars are two of the most beautiful and complicated-looking classes of geometric objects out there. We're going to explore these objects and how to carve them on a pumpkin. Unlike the last one on carving polyhedral pumpkins, where we used the entire pumpkin to car ...more
Some apps look great with Dark Mode, and some do not. So when you have system-wide Dark Mode enabled on your iPhone and are using an app that only looks good in Light Mode, you'd normally have to turn the dark appearance off manually, then switch it back on when you leave. But ...more
What's the point of having a 1080p screen if you're not using it to get in some quality gaming time? Google Play is great for downloading games, but you probably already have an extensive library of games for your consoles, so use those! Emulators are a dime a dozen, but Retr ...more
There are a number of options and hidden menus within Android that provide users more control over their device. With this control, you can better manage how your phone operates. We came up with a list of tips and shortcuts that, when used, will slowly put you on a path to bec ...more
Apple likes to make their products simple. However, sometimes that simplicity leads to a confusing user-experience. Take the Apple TV, for example. How do you turn it off? Just press the power button, right? Sorry, there is no power button. Okay, so it's like an iPhone and has ...more
In this tutorial, we learn how to weave a (king) cobra stitch for paracord bracelets. First, take a 10 inch cord, fold it in half, then tie a knot at the end of it. Put this on a holder, then tie another chord on the bottom of it and hold it with your knees for tension. Next, ...more
Imagine you're in Paris and you need to get to Versailles. Looking around for directions, you come to a cold realization—you do not speak a lick of French! How are you going to get to Versailles and what happens if there is a detour? It will be a difficult struggle, and you'd ...more
Although lacking in megapixels, the HTC One M8's camera can be considered a top-tier, flagship-level shooter. With the Duo Camera and UltraPixel technology behind it, it can make even the most inexperienced photographer snap pictures like a pro. There seems to be little missin ...more
To share a song or album to family and friends, it's as easy as copying its link in the app and pasting that into a message. However, not everyone uses the same music streaming service, so a link to an Apple Music song won't do a Spotify, Tidal, Pandora, Deezer, or YouTube Mus ...more
In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless gu ...more
For the majority of phones, Android's volume rocker is wrong. A large vocal part of the Android community wishes the volume buttons' default control was the media volume, not the ringer. Although the Galaxy Note 9 is in the "wrong" camp, Samsung has included multiple ways to c ...more
In order to play the game Risk, begin by setting up. Name a banker. Players choose a color. The number of players determines the number of armies. Remove the jokers from the country card packs. Shuffle the cards. Deal them face down. Players may not get an equal number. Each ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Want the convenience of a throwaway email address without all the hassle? How about anonymous text messaging so you can get to know someone before giving them your real information? Gliph has you covered. Gliph is a service that lets you create an identity around a set of thre ...more
File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, ...more
It seems like all tech companies want to know where we are. Even Apple and Google have been caught abusing their location access on iOS and Android. Luckily, there are apps that can trick your phone into thinking it's somewhere it's not. As The New York Times recently detaile ...more
In this article, I'll be explaining the basics of how microcontrollers work, physically and virtually. First off, microcontrollers are no simple thing, so don't be discouraged if you find it mind-boggling! The world of microcontrollers is fascinating, engaging, and an awesome ...more
If you have a large media library, you should definitely have the Plex server installed on your computer. If you do, you can just install Plex for Android or iPhone, then you'll have access to all of your music, movies, and TV shows anywhere. By default, Plex does a great job ...more
Apple pushed out iOS 12.1.3 developer beta 2 to all developers on Wednesday, Dec. 19. It's an interesting and mysterious update, as it follows the sudden release of iOS 12.1.2. That software only had one beta version before its stable release, which would explain why the iOS 1 ...more
Here are some charts I made to help you master crafting recipe levels. Don't forget to note the rewards at the bottom of each chart! If you need an overview of what Crafting Mastery is, check out the official Farmville blog post here. I have taken the information from their c ...more
Razer just made a big step into the mobile industry by releasing an absolute beast of a smartphone. The gaming-centric Razer Phone tries to provide the best experience for its target audience: Gamers. With that in mind, they created a top-tier device with some of the best spec ...more
Many Minecrafters think that Minecart Traveling with many rails is the fastest (most efficient) way of travel. They are wrong. There is one other way of traveling with carts on rails, Forward, Backward, and Upward. And it can take you places up to 6X Faster than the traditiona ...more
DYI-FYI #57 teaches you how to fix a leaky faucet in this video. First, have to distinguish if the water drips from the tap or from the handle. If the water is leaking form the tap you need a new washer; if it drips from the handle you need a new o-ring. First, turn the water ...more
Watch this instructional video to accomplish the knitting technique: M1R / M1L: Make One Right / Left. A make one, abbreviated M1 in knitting patterns, is an increase stitch. In some instances the slant of the increase does not matter, but, when it does, it's helpful to know h ...more
In our last ARKit tutorial, we learned how to measure the sizes of horizontal planes. It was a helpful entryway into the arena of determining spatial relationships with real world spaces versus virtual objects and experiences. This time around, we'll dive into a slightly diff ...more
In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between ...more
If you've received a spam message in Signal Private Messenger, you know that anyone can contact you as long as they have your linked phone number. But when it comes to the people you're actually trying to have a private conversation with, how do you know it's really them? Whe ...more
Know thy enemy — wise words that can be applied to many different situations, including database hacking. It is essential to performing adequate reconnaissance on a system before even thinking about launching an attack — any type of attack — and this is no different for SQL in ...more
There's a feature in the Gboard keyboard that enables people who cannot talk, type, or swipe normally to still have a way to communicate in the digital age on their smartphones. While it's mainly an accessibility feature for those who actually need it, it's a good way for anyo ...more
Most employed in the game industry have two-word job titles that start with “game”—game designer, game producer, game critic, game tester, etc. Usually, they’re one or the other, even though some can be both a game designer and a game tester or game critic and game tester. And ...more
For SQL injection, the next step after performing reconnaissance and gathering information about a database is launching an attack. But something seems off .. in the real world, it's usually not quite as simple as passing in a few fragments of SQL code to an input field and se ...more
If you're familiar with Instagram Stories, you know that you can download your story to your iPhone or Android device for offline viewing. Those downloaded stories can easily get lost, and Instagram is finally doing something to keep that from happening with a new archive opti ...more
If you want to play 'Love Story' by Taylor Swift on ukulele you should first start with making sure you have your ukulele standard tuned to G, C, E and A top to bottom. You will use the chords C, G, Am and F. These are the chords that are use basically through the entire song. ...more
Fugu - a simple virus in bash. I once told a friend of mine I'd written a virus in bash and he scoffed - "You can't write a virus in bash!" - he sniggered, like an ignorant idiot. Take my script, read and run it I told him. He declined. I still have that script so thought I ...more
Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for s ...more
Does a bob haircut remind you of flappers from the 1920's? Originally, the hairstyle (as worn by flappers) was meant to be an androgynous cut, boyish in length and style. But that doesn't mean you can't sex it up for your own needs. Check out this video to learn how to cut an ...more
Sputnik, Apollo and the Space Race. If you watched the State of the Union address last night, you probably heard President Barack Obama mention those three things. The Space Race was an informal bout between the Soviet Union (USSR) and the United States (USA) over the ascenda ...more
The following two videos show in detail how to proceed in changing the timing belt and water pump in a Peugeot 206 with 1.4 L engine. The timing belt has to be changed every 90,000 km or 5 years, whichever comes first. In most cases, it's a good idea to change the water pump d ...more
If you're painting your auto yourself, you might need a little help if you've never done it before, especially when it comes to the primer sealer and apply your first base coat of paint. This video will show you how to do just that. An OEM fender was already prepped by sanding ...more
Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more
Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — an ...more
Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, ...more
Blizzard's Hearthstone was a rousing success with more than 10 million downloads on the Google Play Store. Not taking things lying down, Bethesda, the creator of The Elder Scrolls, has come up with a card game based off its popular fantasy franchise. The Elder Scrolls: Legends ...more