# How to Prove {(a+b

### How To : Prove a triangle inscribed in a circle is right angled

When a triangle is inserted in a circle in such a way that one of the side of the triangle is diameter of the circle then the triangle is right triangle. To prove this first draw the figure of a circle. Now draw a diameter to it. It can be any line passing through the center o ...more

### How To : Prove that water molecules are polar with a home-science experiment

This free video science lesson from Jefferson Lab demonstrates a simple technique for demonstrating the polarity of the water molecules. For all of the relevant details and detailed, step-by-step instructions, as well as to get started trying this experiment yourself, watch th ...more

### How To : Prove Rank(A) = Rank(transpose of A) in linear algebra

Learn how to prove that the rank of a matrix, A, is equal to the rank of its transpose in linear algebra. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Interne ...more

### How To : These 5 Recipes Prove That Tea Is a Delicious Addition to Anything

A cup of ginger tea with lemon first thing in the morning, a pick-me-up cup of green tea (or matcha) to fight off the afternoon slump and a soothing cup of chamomile tea to help me unwind before bed—I would be lying if I said I weren't a major tea enthusiast. Don't Miss: Gree ...more

### How To : Prove cos(a+b)=(cos a)(cos b)-(sin a)(sin b) in trig

Need help proving the cos(a+b) = (cos a)(cos b)-(sin a)(sin b) trigonometric identity? This free video lesson will show you how. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And ...more

### How To : Prove the log a + log b = log ab logarithm property

See how to prove the log a + log b = log ab logarithmic property with this free video math lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's ...more

### News : Lang Lang Proves iPad Piano Virtuosity

Another celebrity talent embraces iCulture. We know Lang Lang is the international piano rage. But allow me to make a pedestrian observation. He craves attention like a young Liberace. So, no great surprise that he would integrate an iPad into his sold out performance in San F ...more

### How To : Prove an inscribed angle is half of a central angle

This video walks you through the steps to prove an inscribed angle is half of a central angle that subtends the same arc. This excellent video shows you a clean blackboard, with the instructors voice showing exactly what to do. Don't fret, any question you may have, will be an ...more

### News : Hack Proves Android Wear Can Work with iPhones (Demo)

With wearable tech becoming the latest trend in electronics, it's a shame that most smartwatches are locked down to one ecosystem. If you purchase a smartwatch, you can expect that it will not work with devices from competing manufacturers. That will be the case for the Apple ...more

### How To : Prove congruent triangles with SSS and SAS

This is a video tutorial on how to prove congruent triangles with SSS and SAS test. SSS means side-side-side and SAS means side-angle-side. For applying the SSS test of congruency, each side of one triangle must be congruent to the corresponding side of the other triangle. For ...more

### How To : Prove sin(a+b)=(cos a)(sin b)+(sin a)(cos b) in trig

Need help proving the sin(a+b)=(cos a)(sin b)+(sin a)(cos b) trigonometric identity? This free video lesson will show you how. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, ...more

### How To : Prove some random trigonometric identities

This video shows the method to prove some trigonometric identities. This involves the use of algebra and knowledge of basic trigonometric identities. The video demonstrates three examples to illustrate this problem and its solution. The first problem shows a relatively simple ...more

### How To : Prove Heron's Formula

This two part video walks you through the steps of in proving Heron's formula. This excellent video shows you a clean blackboard, with the instructors voice showing exactly what to do. Don't fret, any question you may have, will be answered. Watching this video will make you f ...more

### Have You Seen This? : The New & Improved Windows Mixed Reality Portal

For those of us on the fast ring of the Windows Insider Program — Microsoft's continual beta program for the Windows operating system — the constant updates can be a bit of a pain. But there is a trade-off. We get to try the new features long before they come out to the public ...more

### How To : Geometrically prove the Pythagorean theorem

From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical sup ...more

### How To : Prove that the areas of diagonal-generated triangles are equal in geometry

From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical sup ...more

### How To : Prove angle-side-angle congruency

This is a tutorial about how to prove the congruency (equality) of two triangles when the values of two angles and an included side of each triangle is given. The author of this video instructs the viewer that it should be first determined whether the values of two angles of o ...more

### News : Google Glass Resurfaces as a Tool to Help People with Autism Improve Their Social Skills via AR

Considered by many (perhaps unfairly) to be a very public failure, Google Glass can add another plot point to its comeback story, this time as a tool to teach social skills to children and adults with autism. Enter Brain Power, a company that has combined neuroscience and aug ...more

### News : This Is How Snap's Non-Creepy, Fashionable Spectacles Wearable Camera Proves We're Ready for Mainstream AR Smartglasses

The year 2018 was a rough one for Snap, the company behind the Snapchat app and the Spectacles wearable camera device. From executive departures to reports of slowed user growth, the company that once spurned Facebook's multibillion-dollar advances is now facing a moment of tr ...more

### News : Ubisoft Proves They're Serious About AR Gaming at United Europe 2017

Though the Microsoft HoloLens' release to the consumer market is still a distant thought at the moment, Ubisoft is preparing for the future with the unveiling of AR video game prototypes. The French video game publisher revealed the AR prototypes at a talk called 'AR Prototyp ...more

### How To : Prove that black is better off without his chess pawns

Grandmaster Alexandra Kosteniuk shows you how to play chess like a master in this chess video tutorial. This is a chess problem by Galitsky, in which you need to let White play and checkmate in three moves. This mate in 3 chess problem by Galitsky will show you how to prove t ...more

### News : Snapchat Proves That No One Can Agree on How to Assemble a Burger

Tech companies are embroiled in controversy this week. No, not the hearings on Russian interference in last year's election; in this case, it's all about the burger emoji. Now, Snapchat has joined the fray and further muddied the waters regarding proper burger construction wi ...more

### News : E3 Just Proved That Gaming Phones Aren't Gimmicks

During E3, many major game developers announced plans to bring console and PC franchises to mobile. These titles are designed for more serious gamers with competition in mind. All of this points to a shift in mobile hardware priorities — soon, gamers will need gaming phones ju ...more

### News : Samsung, Not Apple, Makes the Best Social Media Phones (& We Can Prove It)

We recently set out to find the best phones for people whose primary usage revolves around social media apps like Facebook and Instagram. Samsung, Apple, and Google were the three brands that made our top five, and while the latter only had one finalist, the two bigger OEMs ha ...more

### How To : Prove side-side-side congruency

In this "Math Made Easy" geometry episode, you learn how to prove that two triangles are congruent (equal) by using the "side-side-side" evidence. By using "side-side-side" to prove that two triangles are congruent, you are stating that all the respective corresponding sides o ...more

### How To : Passcode Lock Your Photos & Messages Apps in iOS 8

I hate to break it to you, but you're probably here because you were trolled. Thanks to a Photoshopped image making rounds across Twitter, Apple fans were tricked into believing that iOS 8 allowed them to lock individual apps, accessible only through a passcode or fingerprint ...more

### Hack Like a Pro : Getting Started with Kali, Your New Hacking System

Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more

### Hack Like a Pro : How to Crack Passwords, Part 1 (Principles & Technologies)

Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more

### How to Hack Wi-Fi : Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more

### iPhone Text Bomb Your Friends : The Ultimate SMS Prank

The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more

### How To : The Top 5 Home Remedies for Treating Poison Ivy & Poison Oak Rashes

Summer is the best friend of poison ivy, oak, and sumac. When the weather is hot outside, people spend more time in the great outdoors, which means more people accidentally running face first into some poisonous shrubs, leaves, and vines. If that sounds like you, instead of su ...more

### How To : Bypass Location Restrictions to Use Any Snapchat Geofilter You Want on Android

In 2014, Snapchat introduced a special type of Filter called Geofilters. Geofilters only appear when you're in a specific location. For example, a Disney Land Geofilter will only appear if you're actually there. Rather, your phone needs to think that you're at Disney Land. By ...more

### How To : Completely Mask & Anonymize Your BitTorrent Traffic Using Anomos

A couple times a year, I hear about someone I know receiving that oh-so-scary letter from their ISP telling them to stop torrenting. ISPs will go as far as throttling your bandwidth (without lowering your bill), and sometimes even reporting you to authorities. The next thing y ...more

### How To : Use a Tennis Ball to Unlock Car Doors Without a Key

The Next Three Days is the new film by Paul Haggis (Crash), which stars Russell Crowe and Elizabeth Banks. Laura (Banks) is accused of murder and sent to prison, and her husband John (Crowe) struggles to prove her innocence while taking care of their only child. But the system ...more

### How to Hack Wi-Fi : Selecting a Good Wi-Fi Hacking Strategy

Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more

### News : 2009's Wackiest Inventions

As 2009 comes to a close, the Telegraph presents a compilation of this past year's wackiest inventions. As always, here at WonderHowTo, we are inspired and impressed by ingenuity. The contraptions below range from utter silliness (engagement ring bra) to downright amazing (see ...more

### How To : Turn Any Android Device into a Hidden Spy Camera

If Detective Alonzo Harris from Training Day taught me anything, it's that "It's not what you know, it's what you can prove." So when items mysteriously go missing from my room or my section of the fridge, it's up to me to figure out and prove which roommate took them. I don' ...more

### Remove Your Online Identity : The Ultimate Guide to Anonymity and Security on the Internet

Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more

### How To : Pass a California DMV Driving Test

If all things go well, you'll only have to take your road test once. That's the goal: to ace your test on the first try and then start driving on your own. Granted, it's a nerve-racking experience, but keep in mind that the California Department of Motor Vehicles wants you to ...more

### How To : Install the Android Debug Bridge (ADB) Utility on a Windows PC

While still extremely awesome, the Samsung Galaxy Gear smartwatch is limited as to what you can download on to it, especially apps. It also doesn't have its own internet access (only Bluetooth), so apps like Instagram, Facebook, and Vine have yet to make their way to the Gear ...more

### Hack Like a Pro : How to Hack Smartphones (Creating a Smartphone Pentesting Lab)

Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photogr ...more

### How To : 11 Weird & Wonderful Uses for Magnets

Other than sticking your crayon drawings onto your refrigerator door, magnets have a variety of unexpected and sometimes surprisingly practical uses, ranging from keeping your chip bags sealed to creating weird patterns on your nail beds using magnetic nail polish. The strong ...more

### How To : Break into Locks with Beer Can Shims, Bump Keys, & Just Plain Brute Force

Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern day pin tumbler l ...more

### How To : Uninstall CyanogenMod & Revert Back to Stock Sense on the HTC One

Let's get one thing straight: CyanogenMod is one hell of a ROM. They've got a great community, a great product, and getting it on your HTC One couldn't be easier with their CyanogenMod installer, which does all the hard rooting and bootloader unlocking for you. If at all you ...more

### How to Hack Wi-Fi : Creating an Invisible Rogue Access Point to Siphon Off Data Undetected

Welcome back, my greenhorn hackers! Continuing with my Wi-Fi hacking series, this article will focus on creating an invisible rogue access point, which is an access point that's not authorized by the information technology staff and may be a significant security vulnerability ...more

### How To : Fix Your Xbox One's Broken & Grinding Disc Drive Problems

There have been hundreds of reports of users hearing a grinding noise when they place a disc into their brand new Xbox One video game consoles. To prove it, here is an awesomely sad compilation of Xbox One owners having the issue. Video: . Needless to say, shelling out 500 buc ...more

### How to Spy on Tweeters : Viewing Someone Else's Twitter Timeline with TwtRoulette

In today's world of social media, there's really only two powerhouses—Facebook and Twitter. And those of you with Twitter accounts know the power of a Tweet. Getting more followers means reaching more people, but the vast majority of Tweeters are following only a handful of Tw ...more

### How To : Remove a bra strap using Adobe Photoshop

Bras are such wonderful inventions. Without them, our twins would stray and wander right out of our clothing, and cold weather would prove rather uncomfortable - not to mention awkward - anytime we take our sweater off (if you catch our drift). The one sucky thing about bras, ...more

### How To : Save Your iPhone's SHSH2 Blobs So You Can Downgrade iOS for Future Jailbreak Methods

When a new jailbreak method comes out, Apple is quick to patch the vulnerability it exploits by issuing a new iOS update. If you were to accept such an update, you'd no longer be able to jailbreak your iPad, iPhone, or iPod touch unless you could roll back your firmware to a v ...more

### How To : 5 Great Reasons Why You Should Use Private Browsing Online

The creation of private browsing was brought upon by the backlash against ad tracking and other ways that sites and agencies take away users' privacy online. People were tired of getting spammed with ads for Vitamin C pills simply because they visited WebMD. Private browsing i ...more

### Keep Champagne Bubbly (Hint : A Spoon Doesn't Work)

One booze hack that's been making the rounds for years is that inserting a spoon by the handle in a champagne bottle's neck will preserve its carbonation. This is one of those tips that I wish were true. Champagne is a great thing to have around on a special occasion, and it s ...more

### Advice from a Real Hacker : How to Protect Yourself from Being Hacked

Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on. Those are just the big ones that get reported in the news. Millions ...more

### How To : Use NMAP 7 to Discover Vulnerabilities, Launch DoS Attacks and More!

NMAP is an essential tool in any hacker's arsenal. Originally written by Gordon Lyon aka Fydor, it's used to locate hosts and services and create a map of the network. NMAP has always been an incredibly powerful tool, but with it's newest release, which dropped mid-November of ...more

### News : The 5 Best Free File Managers for Android

One of Android's biggest strengths, when compared to other mobile operating systems is its open file structure. Google introduced a built-in file manager with Marshmallow that provides basic file management, but like with most apps on Android, there are alternatives. Third-par ...more

### News : Minecraft, Meet Terraria

Minecraft was first released just a few years ago, but when a paradigm-shifting piece of media comes along the rest of the world is quick to take inspiration from it. The absolutely terrible XBLA knock-off FortressCraft was the first, and last month a much more interesting gam ...more

### How To : 12 Hilarious Emblem Designs for Call of Duty: Black Ops 2 (And How to Make Them)

Does executing a perfectly timed, no-scoped headshot, followed by a well-choreographed teabagging ever get old? No, no it doesn't, and neither do custom emblems for Call of Duty: Black Ops 2. How else are we going to kill time until Black Ops 3 arrives? I've already covered m ...more

### Hack Like a Pro : Digital Forensics Using Kali, Part 2 (Acquiring a Hard Drive Image for Analysis)

Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more

### How To : Unlock Car Doors with a Punctured Tennis Ball (Faux-To?)

Many have tried to prove (or disprove) that tennis ball lock picking really works, but it still seems up for debate. Mythbusters have supposedly debunked this technique (watch the video). Someone over at the Auto Blog also has tested this car lock method with failed results (w ...more

### How To : Make Perfectly Circular McMuffin-Style Eggs Without Special Tools

We like our Egg McMuffins around here, albeit homemade with our preferred ingredients: whole wheat (or homemade sourdough) English muffins, a slice of thick Tillamook cheddar cheese, a meat, perhaps, like Canadian bacon, and finally—that perfectly-fried, perfectly-shaped egg. ...more

Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ accoun ...more

Prev Page

• Hot
• Latest