How to Prove {(a+b

How To : Get rid of cramps in 10 Minutes easy and proven

Dale Warner shows us how to get rid of PMS cramps in about 10 minutes. It's an easy, natural, effective and free approach. When it's that time of month, the bloating and cramping can be serious. This solution only takes about 10 minutes to practice. He uses a Jin Shin Jyutsu ...more

News : Lang Lang Proves iPad Piano Virtuosity

Another celebrity talent embraces iCulture. We know Lang Lang is the international piano rage. But allow me to make a pedestrian observation. He craves attention like a young Liberace. So, no great surprise that he would integrate an iPad into his sold out performance in San F ...more

How To : Prove congruent triangles with SSS and SAS

This is a video tutorial on how to prove congruent triangles with SSS and SAS test. SSS means side-side-side and SAS means side-angle-side. For applying the SSS test of congruency, each side of one triangle must be congruent to the corresponding side of the other triangle. For ...more

How To : Prove some random trigonometric identities

This video shows the method to prove some trigonometric identities. This involves the use of algebra and knowledge of basic trigonometric identities. The video demonstrates three examples to illustrate this problem and its solution. The first problem shows a relatively simple ...more

How To : Geometrically prove the Pythagorean theorem

From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical sup ...more

News : E3 Just Proved That Gaming Phones Aren't Gimmicks

During E3, many major game developers announced plans to bring console and PC franchises to mobile. These titles are designed for more serious gamers with competition in mind. All of this points to a shift in mobile hardware priorities — soon, gamers will need gaming phones ju ...more

How To : Prove Heron's Formula

This two part video walks you through the steps of in proving Heron's formula. This excellent video shows you a clean blackboard, with the instructors voice showing exactly what to do. Don't fret, any question you may have, will be answered. Watching this video will make you f ...more

How To : Prove angle-side-angle congruency

This is a tutorial about how to prove the congruency (equality) of two triangles when the values of two angles and an included side of each triangle is given. The author of this video instructs the viewer that it should be first determined whether the values of two angles of o ...more

How To : Prove side-side-side congruency

In this "Math Made Easy" geometry episode, you learn how to prove that two triangles are congruent (equal) by using the "side-side-side" evidence. By using "side-side-side" to prove that two triangles are congruent, you are stating that all the respective corresponding sides o ...more

How To : Passcode Lock Your Photos & Messages Apps in iOS 8

I hate to break it to you, but you're probably here because you were trolled. Thanks to a Photoshopped image making rounds across Twitter, Apple fans were tricked into believing that iOS 8 allowed them to lock individual apps, accessible only through a passcode or fingerprint ...more

How To : Get Started with Kali Linux (2014 Version)

Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more

iPhone Text Bomb Your Friends : The Ultimate SMS Prank

The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more

How To : Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you t ...more

How To : Pass a California DMV Driving Test

If all things go well, you'll only have to take your road test once. That's the goal: to ace your test on the first try and then start driving on your own. Granted, it's a nerve-racking experience, but keep in mind that the California Department of Motor Vehicles wants you to ...more

How to Hack Wi-Fi : Selecting a Good Wi-Fi Hacking Strategy

Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more

How To : 11 Weird & Wonderful Uses for Magnets

Other than sticking your crayon drawings onto your refrigerator door, magnets have a variety of unexpected and sometimes surprisingly practical uses, ranging from keeping your chip bags sealed to creating weird patterns on your nail beds using magnetic nail polish. The strong ...more

How To : Turn Any Android Device into a Hidden Spy Camera

If Detective Alonzo Harris from Training Day taught me anything, it's that "It's not what you know, it's what you can prove." So when items mysteriously go missing from my room or my section of the fridge, it's up to me to figure out and prove which roommate took them. I don' ...more

News : 2009's Wackiest Inventions

As 2009 comes to a close, the Telegraph presents a compilation of this past year's wackiest inventions. As always, here at WonderHowTo, we are inspired and impressed by ingenuity. The contraptions below range from utter silliness (engagement ring bra) to downright amazing (see ...more

Hack Like a Pro : How to Create a Smartphone Pentesting Lab

Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photogr ...more

Prev Page
  • Hot
  • Latest