With over 6 million break-ins across the nation a year, Here's a cheap quick and easy way to hide your smaller more valuable goodies! Build your own hidden safe. Click through to watch this video on instructables.com
Thanks to the internet and its increasingly lack of privacy, secrets don't even seem safe in our own homes anymore. So how do you hide your secrets, stash your cash, or keep your valuable jewelry out of sight where no one can find it? Well, the answer might be right above you. ...more
Make a hidden safe out of a whipped cream can. Kipkay shows you how to make a secret stash for valuables with just some magnets and glue.
Need a way to hide your small pricey or memorable objects? Well, what better place to hide those cherished items than in a burning candle? Unless your robbers have a thing for scented and aromatic candles. Watch this video tutorial to see exactly how to make a secret candle s ...more
In this how-to video from Household Hacker, we show you how to disguise a common household item as a safe to hide all your goodies in. You need a can (soda, bug spray, beans etc) a hot glue gun, can opener, imagination, and time. Watch this video pranking tutorial and learn ...more
Want a safe place to hide your stash? Here's how to build a miniature electronic safe out of an Altoids tin and a Hallmark musical greeting card.
If you're trying to get a triangle on someone in an MMA or jiu jitzu fight and they hide their arm to try and relieve the pressure on their neck, they might think they are safe. They aren't. Watch this video to learn how to finish the triangle in this situation from Joanne and ...more
Hide your valuables in plain sight! This tutorial shows you how to take an empty can of whipped cream and then add a few discreet mods. When you're done, it'll still look like a can of whippped cream, but now there will be a way to hide your valuables!
Hide your money, small candies or other tiny items you want to keep hidden! Pry off the top of the battery, take out the innards and then rebuild the casing to re-camoflauge the battery. Then you're ready to hide your goodies!
A lot of commonly used household items are actually poison for your furry friends. In this clip, learn all about which items can pose a danger for your dog or cat. It's not only chemicals that are bad for your pets, innocent seeming items like fruit, veggies, chicken bones, ch ...more
Sometimes you don't want people to see what you've entered into Excel. Use this tutorial video to learn how to hide that information in Excel to keep it safe.
Turn a household item into an awesome hiding spot in just minutes! This video tutorial will show you how easy it is to make a peanut butter safe. Just make a hole in peanut butter jar, put a plastic cup on in, and trim the cut neatly. That's it. Follow the instructions in this ...more
In this clip, learn how to mod an ordinary wax candle so that you can store a stash inside it. The best part about this stash box - other than the fact that its easy to make and basically free - is that the candle will still burn normally so no one will ever suspect something' ...more
The Improper Behavior achievement in Dead Rising 2 demands that you spraypaint all of the 33 Zombrex posters hidden in the game. This take a lot of paint and lot of observation, and some help from this video. It will show you where each poster is, and the creator wrote up a ha ...more
Someday, maybe not today, maybe not tomorrow, but someday, you'll find yourself on the road in your car, maybe on the highway, and you'll hear something. With your air conditioning on full blast and your stereo so loud your ears feel like they are bleeding, you normally would ...more
Have you ever wondered how to create an invisible folder? I mean an invisible folder, not a hidden folder. Nowadays, we are facing lots and lots of problems requiring us to keep our data safe and secure. There are millions of hackers all around the world that are trying to ste ...more
Are you having problems because the game was released a long time ago and the more experienced players are better than you? Then you should be very excited to find out that I will be giving you some general tips & tricks about the different classes that I have learned the hard ...more
First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more
Put yourself in the shoes of a burglar so you can anticipate where they'd look for your valuables. You Will Need * A home safe * An empty cereal box Step 1: Understand the burglar's motivation Understand that the burglar has two goals: to find your valuables, and to get in an ...more
Need to stash a couple small valuables and your super secret Moleskin journal in a place where no one will ever find them? Get yourself some glue, a few cutting tools and a fairly thick book, and you'll have all of the utensils you need to make yourself a nifty book safe that ...more
Looking for somewhere to hide your things so that no thieves will take them? Why not try hide them inside that old Hanson or Backstreet Boys CD? If you have out of date CDs that you are no longer listening to, check out this tutorial. In this video you will learn how to use or ...more
This will demonstrate how to build a hidden compartment / diversion safe out of an electric outlet.
A basic maintenance step in Windows XP is deleting temporary files. In this short tutorial, TellYouKnew walks you through the steps necessary to delete temporary files. The first step is to select "RUN" from the Start menu. When the Run box opens, type %temp% in the box and pr ...more
Keep your possessions safe from thieves with these tips. You Will Need * Motion detector lights * Locks * A locksmith * A security alarm system * A safety deposit box or home safe * An engraving pen * A trusted neighbor * Bolts or wooden dowels (optional) Step 1: Eliminate bu ...more
Got something to hide? Build a secret door in your Minecraft world. A secret door is perfect for keeping valuable items safe, or giving yourself somewhere to to high away to when you need it. This video has all the instructions.
In this clip, learn how to make a super cheap stash can that really works! This can is made from an old Lynx or Axe deodorant bottle and looks completely real and inconspicuous. If you have some things you need to hide from your roommates, mom, siblings, the police.. check out ...more
In this tutorial, learn how to use an ordinary deck of cards and make them into a safe for your personal belongings. This is a great little device for hiding things in plain sight like money, jewelry or keys. A thief is not very likely to steal a seemingly ordinary deck of car ...more
Don’t let cyber bullies push you around, being nasty and spreading rumors about you online. Learn how to fight back against tormenters who hide behind a computer screen. Internet harassment is just as damaging and hurtful as any other form, and proper action needs to be taken ...more
A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
Robert Xyster, submitter to Love.Earn, demonstrates the universal edibility test using vegetation of the Iraq desert as an example: "Besides shrubs and trees, there's plenty of different vegetation, like the cultivated date palm tree (Phoenix dactylifera), poplars, bushes, sh ...more
In this video tutorial, viewers learn how to make a secret deodorant safe. Begin by removing the cap of the deodorant, and cut off the top part of the deodorant can, using a pair of pliers. Now simply place in your item and place on the cap to disguise your safe. Place some ti ...more
We've talked about the deep web before, but we never really covered the details of what's out there. It occurred to me that a nice list of resources would be very helpful to all of you anons out there. Think of this like a helpful brochure to the hidden web. However, I should ...more
Have something expensive or personal to hide? Something you don't want anybody else to find? A secret book compartment is perfect for concealing your valuables in plain sight. And this video will show you how to make your own hidden recess for your very own book safe. Just gra ...more
Check out this tutorial and hide your goodies inside a seemingly ordinary house candle. The candle will still burn once you've hacked it, but be careful not to burn it all the way down! You don't want your stash to be revealed! So, the next time you have something you need to ...more
Do you have something important that you want to hide from your parents or friends? Well, then check out this tutorial. In this video, you will learn how to take an ordinary Pepsi bottle and turn it into a secret stash box. Because the bottle is see-through, no one will ever s ...more
Live on the edge and kick up your beauty routine a notch to create a look that will drive your parents crazy! Create an edgy, rock 'n' roll makeup look with help from this makeup tutorial hosted by Goldie Starling. Stop hiding behind a boring and safe makeup routine and take y ...more
Want a tattoo that's daytime work-safe (invisible), but nighttime party-friendly (UV blacklight)? At first sight it may be hard to believe these tattoos are real, but in fact, they are. UV light tattoos are the perfect way to hide it from mom. The tattoos can be completely in ...more
If you're serious about keeping your diary for your eyes only then you might have to take some drastic steps. There are some very clever ways to distract from, encrypt, hide, or disguise a diary if you're willing to put in the work. If you keep a diary, you’re likely to want ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
Hi there Dolls, I just got done putting the children to bed for the night. Fed the husband, made a little love, and took a bubble bath! I lathered up my body with a Gardenia lotion and have thrown on my amazing silk robe. I smell and feel wonderful as I sip on my Cantaloupe ...more
You see before you the humble block: This single, unassuming block couldn't possibly hold anything of value, right? That's only what we want thieves to think! With a little bit of magic, this block (or any other basic block) can be turned into a secret chest capable of keepi ...more
Don't hide in a cave when the market is down. Find stocks that will pay off when the bull makes its return. You Will Need * Stocks at limit price below market * Small-cap stocks * Bonds * Dividend-paying stocks * IPOs * Currency of developed countries Step 1 Sell your mutual ...more
No magic show would be complete without the famous sawing in half trick. So grab a straw and a piece of string and come join the fun! You will need a straw, a piece of string and a pair of scissors. Sometimes we use materials that require adult supervision... like scissors so ...more
Last Friday's mission was to accomplish solving HackThisSite, realistic 2. This second mission in a series of realistic simulation missions was designed to be exactly like situations you may encounter in the real world, requesting we help a friend take down a racist hate-group ...more
Cheers to another completed Community Byte project! Things went well regarding timeliness and being friendly to the other coders and students. If you've got ideas for our next mission, or an idea for a tutorial, submit them to me. Friday, our mission was to take out HackThisSi ...more
As Google+ became available to more people, it started running into issues of accounts being suspended due to names that did not sound "real". According to Google+'s community standards, names that users "commonly go by" were encouraged, but not pseudonyms. Those who were usin ...more
Feeling unprepared for the next earthquake? In this tutorial, learn what to do and what not to do to survive "the big one". You'll be surprised to learn that hiding in a doorway is a myth! You Will Need: • A safe place • Sturdy shoes • A fire extinguisher • A flashlight ...more
A gerbil makes a great “starter pet” for a child. Gerbils are friendly, fun to watch, quiet, and clean little guys whose cages don’t get smelly as fast as some animals’. You Will Need * A gerbil * A large wire cage or 20-gallon glass aquarium * Bedding * Gerbil food * Fresh gr ...more
Learn how to play hide-and-seek. If you need a rainy day activity for the kids, or just want to relive your childhood, hide-and-seek is a great game for everyone. You Will Need * A place to play * Someone to be "it" * People to hide Step 1. Designate hiding spots Designate ...more
Previously, we talked about how to secure Firefox. Today, we will talk about securing a Chromium based Browser. Why? Because Chrome recently beat Firefox in holding more customers. It is obvious that Google Chrome tracks our every move online, so what alternatives is out ther ...more
Facebook has been "improving" their interface in several different ways in attempt to combat the threat of Google+. One big change is the introduction of a news ticker in the top right corner that constantly feeds updates from friends and organizations you are connected with o ...more
The community here on Null Byte has always been great and helpful in sharing their know-how, even before I took up admin duties in this World. I jumped at the chance of leading Null Byte because I enjoy teaching and informing people on all of the important need-to-know things ...more
Some of you might be using Tor to host hidden services, and some of you might not even know what hidden services are. If the latter's you, do not miss this article. Why? Because you can host your websites and services on the I2P darknet. It's safe and secure—it's anonymous. I ...more
With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard dr ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! The workshop last Saturday revolved around how to build a Hidden Passageway, and the turnout was great. We had around eight of us in TeamSpeak, and even I l ...more
Both Google+ and Facebook are competing for your time and space, and your commitment to one social network. To make their spaces more attractive to you, they've both made it easier for you to deal with people you don't like or don't care for. Ignore People on Google+ In Goog ...more
Just how private is your Facebook profile? To some extent, that's up to you. Many Facebook users share and poke their days away, never knowing about the plethora of custom privacy settings that lie just a click away. Facebook's privacy menus can look a little complicated to th ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more