When a triangle is inserted in a circle in such a way that one of the side of the triangle is diameter of the circle then the triangle is right triangle. To prove this first draw the figure of a circle. Now draw a diameter to it. It can be any line passing through the center o ...more
This free video science lesson from Jefferson Lab demonstrates a simple technique for demonstrating the polarity of the water molecules. For all of the relevant details and detailed, step-by-step instructions, as well as to get started trying this experiment yourself, watch th ...more
Learn how to prove that the rank of a matrix, A, is equal to the rank of its transpose in linear algebra. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Interne ...more
A cup of ginger tea with lemon first thing in the morning, a pick-me-up cup of green tea (or matcha) to fight off the afternoon slump and a soothing cup of chamomile tea to help me unwind before bed—I would be lying if I said I weren't a major tea enthusiast. Don't Miss: Gree ...more
Need help proving the cos(a+b) = (cos a)(cos b)-(sin a)(sin b) trigonometric identity? This free video lesson will show you how. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And ...more
See how to prove the log a + log b = log ab logarithmic property with this free video math lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's ...more
Another celebrity talent embraces iCulture. We know Lang Lang is the international piano rage. But allow me to make a pedestrian observation. He craves attention like a young Liberace. So, no great surprise that he would integrate an iPad into his sold out performance in San F ...more
This video walks you through the steps to prove an inscribed angle is half of a central angle that subtends the same arc. This excellent video shows you a clean blackboard, with the instructors voice showing exactly what to do. Don't fret, any question you may have, will be an ...more
With wearable tech becoming the latest trend in electronics, it's a shame that most smartwatches are locked down to one ecosystem. If you purchase a smartwatch, you can expect that it will not work with devices from competing manufacturers. That will be the case for the Apple ...more
This is a video tutorial on how to prove congruent triangles with SSS and SAS test. SSS means side-side-side and SAS means side-angle-side. For applying the SSS test of congruency, each side of one triangle must be congruent to the corresponding side of the other triangle. For ...more
Need help proving the sin(a+b)=(cos a)(sin b)+(sin a)(cos b) trigonometric identity? This free video lesson will show you how. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, ...more
This video shows the method to prove some trigonometric identities. This involves the use of algebra and knowledge of basic trigonometric identities. The video demonstrates three examples to illustrate this problem and its solution. The first problem shows a relatively simple ...more
This two part video walks you through the steps of in proving Heron's formula. This excellent video shows you a clean blackboard, with the instructors voice showing exactly what to do. Don't fret, any question you may have, will be answered. Watching this video will make you f ...more
For those of us on the fast ring of the Windows Insider Program — Microsoft's continual beta program for the Windows operating system — the constant updates can be a bit of a pain. But there is a trade-off. We get to try the new features long before they come out to the public ...more
From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical sup ...more
From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical sup ...more
This is a tutorial about how to prove the congruency (equality) of two triangles when the values of two angles and an included side of each triangle is given. The author of this video instructs the viewer that it should be first determined whether the values of two angles of o ...more
Considered by many (perhaps unfairly) to be a very public failure, Google Glass can add another plot point to its comeback story, this time as a tool to teach social skills to children and adults with autism. Enter Brain Power, a company that has combined neuroscience and aug ...more
The year 2018 was a rough one for Snap, the company behind the Snapchat app and the Spectacles wearable camera device. From executive departures to reports of slowed user growth, the company that once spurned Facebook's multibillion-dollar advances is now facing a moment of tr ...more
Though the Microsoft HoloLens' release to the consumer market is still a distant thought at the moment, Ubisoft is preparing for the future with the unveiling of AR video game prototypes. The French video game publisher revealed the AR prototypes at a talk called 'AR Prototyp ...more
Grandmaster Alexandra Kosteniuk shows you how to play chess like a master in this chess video tutorial. This is a chess problem by Galitsky, in which you need to let White play and checkmate in three moves. This mate in 3 chess problem by Galitsky will show you how to prove t ...more
Tech companies are embroiled in controversy this week. No, not the hearings on Russian interference in last year's election; in this case, it's all about the burger emoji. Now, Snapchat has joined the fray and further muddied the waters regarding proper burger construction wi ...more
During E3, many major game developers announced plans to bring console and PC franchises to mobile. These titles are designed for more serious gamers with competition in mind. All of this points to a shift in mobile hardware priorities — soon, gamers will need gaming phones ju ...more
We recently set out to find the best phones for people whose primary usage revolves around social media apps like Facebook and Instagram. Samsung, Apple, and Google were the three brands that made our top five, and while the latter only had one finalist, the two bigger OEMs ha ...more
In this "Math Made Easy" geometry episode, you learn how to prove that two triangles are congruent (equal) by using the "side-side-side" evidence. By using "side-side-side" to prove that two triangles are congruent, you are stating that all the respective corresponding sides o ...more
I hate to break it to you, but you're probably here because you were trolled. Thanks to a Photoshopped image making rounds across Twitter, Apple fans were tricked into believing that iOS 8 allowed them to lock individual apps, accessible only through a passcode or fingerprint ...more
Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more
Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more
Summer is the best friend of poison ivy, oak, and sumac. When the weather is hot outside, people spend more time in the great outdoors, which means more people accidentally running face first into some poisonous shrubs, leaves, and vines. If that sounds like you, instead of su ...more
In 2014, Snapchat introduced a special type of Filter called Geofilters. Geofilters only appear when you're in a specific location. For example, a Disney Land Geofilter will only appear if you're actually there. Rather, your phone needs to think that you're at Disney Land. By ...more
A couple times a year, I hear about someone I know receiving that oh-so-scary letter from their ISP telling them to stop torrenting. ISPs will go as far as throttling your bandwidth (without lowering your bill), and sometimes even reporting you to authorities. The next thing y ...more
The Next Three Days is the new film by Paul Haggis (Crash), which stars Russell Crowe and Elizabeth Banks. Laura (Banks) is accused of murder and sent to prison, and her husband John (Crowe) struggles to prove her innocence while taking care of their only child. But the system ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
As 2009 comes to a close, the Telegraph presents a compilation of this past year's wackiest inventions. As always, here at WonderHowTo, we are inspired and impressed by ingenuity. The contraptions below range from utter silliness (engagement ring bra) to downright amazing (see ...more
If Detective Alonzo Harris from Training Day taught me anything, it's that "It's not what you know, it's what you can prove." So when items mysteriously go missing from my room or my section of the fridge, it's up to me to figure out and prove which roommate took them. I don' ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
If all things go well, you'll only have to take your road test once. That's the goal: to ace your test on the first try and then start driving on your own. Granted, it's a nerve-racking experience, but keep in mind that the California Department of Motor Vehicles wants you to ...more
While still extremely awesome, the Samsung Galaxy Gear smartwatch is limited as to what you can download on to it, especially apps. It also doesn't have its own internet access (only Bluetooth), so apps like Instagram, Facebook, and Vine have yet to make their way to the Gear ...more
Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photogr ...more
Other than sticking your crayon drawings onto your refrigerator door, magnets have a variety of unexpected and sometimes surprisingly practical uses, ranging from keeping your chip bags sealed to creating weird patterns on your nail beds using magnetic nail polish. The strong ...more
Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern day pin tumbler l ...more
Let's get one thing straight: CyanogenMod is one hell of a ROM. They've got a great community, a great product, and getting it on your HTC One couldn't be easier with their CyanogenMod installer, which does all the hard rooting and bootloader unlocking for you. If at all you ...more
Welcome back, my greenhorn hackers! Continuing with my Wi-Fi hacking series, this article will focus on creating an invisible rogue access point, which is an access point that's not authorized by the information technology staff and may be a significant security vulnerability ...more
There have been hundreds of reports of users hearing a grinding noise when they place a disc into their brand new Xbox One video game consoles. To prove it, here is an awesomely sad compilation of Xbox One owners having the issue. Video: . Needless to say, shelling out 500 buc ...more
In today's world of social media, there's really only two powerhouses—Facebook and Twitter. And those of you with Twitter accounts know the power of a Tweet. Getting more followers means reaching more people, but the vast majority of Tweeters are following only a handful of Tw ...more
Bras are such wonderful inventions. Without them, our twins would stray and wander right out of our clothing, and cold weather would prove rather uncomfortable - not to mention awkward - anytime we take our sweater off (if you catch our drift). The one sucky thing about bras, ...more
When a new jailbreak method comes out, Apple is quick to patch the vulnerability it exploits by issuing a new iOS update. If you were to accept such an update, you'd no longer be able to jailbreak your iPad, iPhone, or iPod touch unless you could roll back your firmware to a v ...more
The creation of private browsing was brought upon by the backlash against ad tracking and other ways that sites and agencies take away users' privacy online. People were tired of getting spammed with ads for Vitamin C pills simply because they visited WebMD. Private browsing i ...more
One booze hack that's been making the rounds for years is that inserting a spoon by the handle in a champagne bottle's neck will preserve its carbonation. This is one of those tips that I wish were true. Champagne is a great thing to have around on a special occasion, and it s ...more
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on. Those are just the big ones that get reported in the news. Millions ...more
NMAP is an essential tool in any hacker's arsenal. Originally written by Gordon Lyon aka Fydor, it's used to locate hosts and services and create a map of the network. NMAP has always been an incredibly powerful tool, but with it's newest release, which dropped mid-November of ...more
One of Android's biggest strengths, when compared to other mobile operating systems is its open file structure. Google introduced a built-in file manager with Marshmallow that provides basic file management, but like with most apps on Android, there are alternatives. Third-par ...more
Minecraft was first released just a few years ago, but when a paradigm-shifting piece of media comes along the rest of the world is quick to take inspiration from it. The absolutely terrible XBLA knock-off FortressCraft was the first, and last month a much more interesting gam ...more
Does executing a perfectly timed, no-scoped headshot, followed by a well-choreographed teabagging ever get old? No, no it doesn't, and neither do custom emblems for Call of Duty: Black Ops 2. How else are we going to kill time until Black Ops 3 arrives? I've already covered m ...more
Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more
Many have tried to prove (or disprove) that tennis ball lock picking really works, but it still seems up for debate. Mythbusters have supposedly debunked this technique (watch the video). Someone over at the Auto Blog also has tested this car lock method with failed results (w ...more
We like our Egg McMuffins around here, albeit homemade with our preferred ingredients: whole wheat (or homemade sourdough) English muffins, a slice of thick Tillamook cheddar cheese, a meat, perhaps, like Canadian bacon, and finally—that perfectly-fried, perfectly-shaped egg. ...more
Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ accoun ...more