Even though you may love onions, cutting them is probably a completely different story. You've really got to be a pro at slicing and dicing them without getting frustrated, and even then they can still make your cry—literally. But if you don't want to wear a pair of goggles to ...more
One of the hardest things a man can go through in life is a trip to the hospital, especially when he knows he's going to need a catheter. It's every man's worst fear. But for a nurse, it's necessary knowledge. Learning the male urinary catheterization procedure hands-on is dif ...more
Metadata contained in images and other files can give away a lot more information than the average user might think. By tricking a target into sending a photo containing GPS coordinates and additional information, a hacker can learn where a mark lives or works simply by extrac ...more
I've previously shown a few ways to make your iPhone a little more unique by customizing app icons on the home screen, and while those processes did not require a jailbreak, they were a pain in the ass. Thankfully, there's a better way to customize app and shortcut icons that' ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
Contrary to popular belief, augmented reality apps have been available for a while now. I remember using the Layar app (still available for iOS and Android) to explore nearby businesses and landmarks with varying success via an early-generation Android handset. It would be ha ...more
I have over 400 photos on my iPhone, and I don't even know where half of them came from. Scrolling through all of those pictures is a pain in the ass, but it's not nearly as bad as trying to actually find an old image. Organization is not my strong suit, so I'm definitely not ...more
Since its release three years ago, Canon's EOS 5D Mark II has been the most sought out digital SLR for photographers everywhere. But it's also becoming a favorite amongst cinematographers, thanks to its compact size and high-def video recording mode, seeing action in everythin ...more
Welcome back, my neophyte hackers! There are innumerable ways to hack a system. We must not overlook any of the possibilities if we want to "own" the system. As systems become more and more secure, we need to be vigilant in our search for weaknesses. In this hack, we'll look ...more
If bourbon is a man's drink, what better flavor to infuse it with than bacon? The combination tastes just as delicious as it sounds—a smokey, salty aftertaste lingering after each sip of deep, rich bourbon. To infuse bourbon with bacon is simpler than it sounds. All you need ...more
What is more fun than wrecking your boyfriend's shirt and turning it into a cute dress? In this tutorial, learn how to take a super oversized men's shirt and make a totally adorable summer dress with it! You will need to know sewing basics and be sneaky enough to get a shirt o ...more
DJ Matt shows you the basics of how to cut men's hair. You start out by making a line on the top of the head. You can then make your first cut, or the straight cut on the back bottom. After that, you then make a "down cut" which creates layers. When you get to the "semi-top of ...more
This video shows the method to create a messy bed hair for men. Straighten your hair with a GHD ministyler. The product to be used to style your hair is ID hair dusty Bronze "clay wax". This should be applied in dry hair. You can wash the wax out by shampooing your hair twice. ...more
If we learned anything from Mulan, it's that "the flower that blooms in adversity is the most rare and beautiful of them all." Well, these have been a trying couple of weeks in the US, hence the need for a blooming marshmallow flower. Dominique Ansel, the man responsible for ...more
Learn how to take a shower if you are a woman, and then if you are a man. Personal results may vary. Gender by gender view the step by step of this hygienic staple. This video shows both sides of the shower coin.
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
When you were younger, you probably had your parents bugging you not to have your cassette player headphones up too loud. For all you younger readers out there, it was probably a CD player. The even younger readers likely had an iPod or other MP3 player. Either way, your paren ...more
Are you an Xbox gamer? Like to play on Xbox live? Yeah! Would you like to change your voice to disguise it, or pretend to older or younger or maybe a man instead of a woman or vice versa? Well you can! This how to gives you the info on changing your voice when you're playing X ...more
If you watched Samsung's Unpacked 2013 live last month, where they announced the new Galaxy S4, you probably sat through this awkward skit: This was Samsung's way of introducing their new translation software, dubbed S Translator. In the skit, the backbacking American traveler ...more
Earning more money in YoVille doesn't have to be hard and take forever. You can make more cash simply by hacking your way to success with the notorious Cheat Engine program. How to hack YoVille! from Zynga! This video tutorial teaches you how to hack YoVille coins with Cheat ...more
Learn how to give yourself a testicular self exam. Something every man should know. Follow along as our favorite British imports from videojug show a detailed tutorial for taking care of the goods. Do a testicular self exam. Click through to watch this video on videojug.com
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
If smartphone video games have a weakness, it's probably their inability to emulate the riveting and immersive experience that consoles offer. Sure, there are mobile gaming products out there like the PlayStation Portable (PSP), but when we're constantly lugging around tablet ...more
We solicit your honest response. Truly. We are a nascent community establishing boundaries. On the one hand, this is a how-to video. Revelatory, step by step, procedural. On the other hand...is it appropriate to our site? Would it be any better if the subject were a man? For ...more
Learn how to tie a Handcuff Knot. This is a handy knot for those times when an emergency set of handcuffs are needed :) Firefighters also use this knot, coupled with a half hitch over each loop, as a man harness. This knot can be used in sailing, boating, general use, camping ...more
Everyone hopes their dance moves come off lookin' cool and you are no exception. (You are searching the Internet or free dance lessons, right?) In order to do easy, good-looking street dance moves, it's important to add swagger to street dance moves, such as the running man. L ...more
Easy as 1, 2, 3. Dorm room cooking reaches new heights with this simple gourmet-esque potato chip recipe. Slice the potatoes (preferably with a good handheld slicer, but you can use a vegetable peeler or knife). Spray the potato slices with non stick spray and lightly sprinkl ...more
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more
SharePlay is arguably one of the most significant features to hit FaceTime since group calls, and it's still hard to find apps that support shared experiences in FaceTime. Apple does list a few apps, but there is no official index of all the apps with SharePlay integration. Th ...more
Barbers can be expensive, especially if you have very short hair and need to go often. In this two part tutorial, learn how to buzz your own hair. Keyon takes you step by step through his grooming process and offers useful tips and tricks along the way. Part 1 of 2 - How to Cu ...more
If you have cracked or smashed your iPad screen, don't worry! This tutorial will show you how to take it all apart and start over with a brand new touchscreen. Don't waste money on a repair man or bother having the "Genius Bar" tell you it's all your fault - take matters into ...more
What's the latest dance trend sweeping TikTok? The Shuffle Dance. If you just watch people doing the Shuffle Dance, especially the really good ones, you might think it's a bit complicated. In reality, it's really not that hard. It's just a handful of steps. For the uninitiate ...more
Welcome back, my novice hackers! Previously in my "Spy on Anyone" series, we used our hacking skills to turn a target's computer system into a bug to record conversations and found and downloaded confidential documents on someone's computer. In this tutorial, I will show you ...more
Breaking off a piece of that Kit Kat bar gets a lot more difficult when the whole thing weighs 13 pounds. Ann Reardon, a food scientist and dietitian with an ironic obsession for unhealthy desserts, started the very successful blog How To Cook That back in 2011 to showcase he ...more
Do you remember my last article on how to hook any web browser with MITMf and BeEF? Well, we are using the tool once again, but this time for auto-backdooring.... How It Works MITMf (if you don't already know) is a man in the middle attack framwork. MITMf literally stands fo ...more
Sputnik was the very first man-made object to be sent into space. Though it was a truly epic accomplishment, all this Soviet sky surfer actually did was transmit a constant beeping noise back to the surface. Your young students can learn about the history of space travel whil ...more
Messages is arguably the most important app on your iPhone, which is why it's always exciting when Apple pushes out new features for it. With the iOS 14 update, there a few critical changes as well as interface improvements and customization options that make the experience ev ...more
Biting into a perfectly ripened piece of fruit is enough to convince you to give up baked goods and plant your own garden. The combination of flavor, juice, and sweetness in a ripe mango, apple, plum, or berry is the stuff of life itself. Alas, most people don't know how to c ...more
Defined by Urban Dictionary, Nerdtastic: Something generally not cool, but to a nerd it's freakin' fantastic. Below, a collection of WonderHowTo's top 10 favorite, utterly nerdtastic Halloween costume tutorials. The clock's ticking, so if you don't have your costume yet, perus ...more
Instagram allows us to vicariously live through others, experiencing their moments with them. It's an enormously popular application and has already garnered 100 million users, but it has only been made available for download on Android and Apple devices. Sure, there are third ...more
Apple's iOS 15.4 update for iPhone is out after 46 days of beta testing, and it has some exciting features you won't want to miss. Here's everything you need to know about the new software. The iOS 15.4 software has been available to developers since Jan. 27, 2022, and public ...more
You know that guy who does the cheesy card trick to get the attention of all the girls at the party? Well, we kinda hate that guy don't we? But, if we could be that guy, it might not be so bad. Knowing a few card tricks is a great way to break the ice and can also be an easy ...more
It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our ...more
Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more
It's late and dark, I'm playing Dying Light, and, admittedly, I'm a little creeped out. Working as a grown man's night-light, this is one instance where I actually appreciate the light bar on my PlayStation 4's DualShock controller. But outside of a few particular instances, I ...more
Nice people finish first—or is it last? Though you may have been told throughout your life that being kind pays off, there are some obvious advantages to getting mean. So whether you're driving towards a goal at work, or need to attack a task in your personal life, acting like ...more
Want to learn how to flirt with a man or woman you have a crush on? Wouldn't you like to feel relaxed around that special someone? Don't you wish you could just outsource flirting? Well, since that service doesn't exist yet, our love-song specialist Evan Brown from Mahalo has ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Seeing that you probably can't go ten minutes without lying (according to this study), you're probably interested in becoming a better liar. The best way to do so is to learn what makes a bad liar, and then do the opposite. 1. Liars Have Revealing Micro Expressions According ...more
In early-2014, Facebook had the brilliant idea of auto-playing all of those annoying videos in your news feed that you never wanted to see in the first place. Fortunately, they realized their mistake and have provided a way to disable auto-play, which means you can now get rid ...more
In my last how-to, we built a man-in-the-middle tool. The aforementioned script only established a man-in-the-middle. Today we'll be building a tool to utilize it. We'll be building a DNS packet sniffer. In a nutshell, this listens for DNS queries from the victim and shows the ...more
Welcome back, my amateur hackers! With Halloween right around the corner, I thought you could have a little fun with your newfound hacking skills using a hack that is guaranteed to freak out your boss, teacher, coworker, friend, etc. Any time someone's computer seems to act ...more
After reviewing the international plans for major US wireless carriers, it became obvious they're all pretty bad. Your data is heavily restricted, requiring a daily fee which can cost an extra $100+ on a seven-day vacation. That's when I learned about Google Fi, and how for mo ...more
The Xposed Framework is still alive and kicking despite the fact that development has slowed down a bit lately. Rovo89 is the only true developer behind Xposed, so it's really a one-man show. This means the popular root mod doesn't typically support the latest Android version, ...more
Giving up your Wi-Fi password can be giving up more control than you think. Because of the way Chromecast and other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we ...more
Just like Leslie Knope, I love waffles. Unlike that imaginary character, I don't require that my waffles come from JJ's Diner. I have a deep affinity for frozen waffles as well as the homemade ones. They're so convenient! A few moments in the toaster, and you have a great foun ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
The man in the video says there are three major things to be aware of when obtaining and using a fake ID card. The first thing and most important thing is to actually look at the fake ID before you are buying. A regular ID should have a name, date of birth and a photo. Make su ...more
Emoji are, without a doubt, an integral part of messaging on smartphones. Whether you're team iPhone or Android, chances are you send emoji daily. However, years after their introduction, emoji remain static in most cases, even with animated stickers and GIFs supported on almo ...more
Any internet user will need to download files eventually, and most simply have faith that what they are downloading is trustworthy. This doesn't give much clarity into the contents of the file, but if the file's author published the original checksum, comparing it to the SHA-2 ...more