Learn to Tell the Time on Watch

How To : Fold a Nakamura Knot paper airplane

This paper airplane has got to be one of the best airplanes of all time. It's called the Nakamura Knot for theknot in the center of the plane that keeps the airplane well-balanced. However, these airplanes take a couple good trials to get right. Once you've constructed it corr ...more

How To : Make a homemade laser pointer

Don't buy those $100+ laser pointers. Watch this video, and for under $50 you can make your own that is capable of burning, popping balloons, and cutting things! Casing/Lens (650nm 10mw 12mm X 30mm case): http://mfgcn.com/_wsn/page2.html Do not make the mistake I did the fi ...more

How To : Make a hamster holding tank

Our expert, Laura Nessen, shows you how to create a holding tank for your hamster. Learn the right kind of hamster bedding to buy. Also, Laura gives you tips for finding accessories and toys for your hamster. So, take some time, and learn how to make your hamster as comfortabl ...more

How To : Fake your death online

Tired of the same old boring things on the internet. Learn how to fool everyone and fake your own death. Through careful planning you too can join the likes of Elvis, Bigfoot, and Nessie the Lockness Monster. Fake your death online and have a grand ole time fooling all of the ...more

How To : Do close-grip lat. pull-down

This video demonstrates how to do a close-grip lat. pull-down. This primarily works the upper back and upper latisimus dorsi and secondarily works the biceps. Don't jerk the bar down using momentum in an attempt to complete the repetition, control the weight at all times. Do c ...more

How To : Do preacher curls with a dumbbell

This video demonstrates how to do a preacher curl with a dumbbell. you hold a dumbbell in your right hand so that the edge of the bench is under your armpit and your arm is fully extended over the bench surface. Raise the weight towards your chin, keeping your wrist locked at ...more

How To : Play dominoes

Blake Whitaker has been playing dominoes for a long time and now he's here to teach you how to play. In this series, he goes over what you'll need, how to play, how to score, and some demonstrations. Part 1 of 6 - How to Play dominoes. Play dominoes - Part 2 of 6. Click throug ...more

News : Randomest Things Ever!!!

Materials Needed: Panda Costume, Robot Costume, Burrito (unwrapped)Okay, to tell the truth, i am not 18 or older, i am a 15 and a half year old teenager who has admired you guys for years and has been dying to meet you all. my idea (my best friend Steven Vaughan also helped wi ...more

How To : Play role playing games

This series goes over setting up and playing roll playing games like Dungeons and Dragons. It even tells you how to start writing your own games. Part 1 of 9 - How to Play role playing games. Play role playing games - Part 2 of 9. Click through to watch this video on expertvil ...more

News : Paintball Blast

The title of this prank doesn't really tell everything about it. So here it is. Imagine Johnny Knoxville walking down the road among dozens of other pedestrains. Have police sirens blaring in the backround. Have a white van speeding hen come to a screeching halt. Have Bam marg ...more

News : Where's The CRASH

This prank has to be where people walk all the time.... You start off by putting portable or wireless speakers that would play a playback of car tires skidding on the ground, in cylinder shaped trash cans right by a busy street full of cars and where a lot of spectators would ...more

News : wrap your brains around this one.

alright so my dumb friends and I were sitting just bullshitting and came up with an idea for a gnar prank. if ya got balls though, this shit might get your ass killed. we want you guys to skydive down and land in a state correctional facilities' outdoor recreational area, and ...more

News : shower fun time

so victim gets in the shower. person locks/blocks them in the shower. victim does not know they are locked in. let victim get all wet and fill the shower up with a bit of water. (before victim gets in shower) hook up a stun gun, or some other low voltage torture machine to the ...more

How To : Rooted Android = Your New PenTesting Tool

No more carrying around heavy laptops and thousands of Linux Live CDs and USBs to always be ready for pentesting on the fly! I hope you had a good Christmas and happy new year! Update1: Added the section "weaponizing your Android" where I talk about apps and fundamental Kali ...more

How To : watch any video on Youtube in HD!

Believe it or not, yes, Youtube is getting ready for high definition. But, because (me thinks) of the cost structure involved, they ain't advertising the hell out of this feature, yet. This tutorial from a soft spoken asian accented man tells you how to download and view a vi ...more

How To : Deleting Your Files Completely

What you probably don't know is when you remove a file on your system, it is actually still saved, and not entirely removed. Let me tell you how to get rid of it completely. Overview: When you delete a file it is not removed entirely from your drive and can be recovered. No ...more

How-to Ruby : Simple SSH Bruteforcer

Hello fellow training hackers. I do not know if many of you are familiar with ruby, but since it is a useful scripting language, that hasn't been covered too much here on Null Byte, I thought why not do some How-tos about it now and then. The idea is to write simple scripts ...more

How To : Get a Perfect Winged Eyeliner

Getting those perfectly winged eyeliner can be such a trouble at times. Especially for those with shaky hands, or less stretched out eyes, this can be really difficult and a very time consuming process. Video: . Products used: Sugar Eye Told You SO Waterproof Eyeliner Twist a ...more

How To : 6 Tweaks You Should Be Using on Your Mac Right Now

All of Apple's products are praised for being extremely easy to use. So much so, that your grandma can pick one up and be a "pro" within a few hours. However, this isn't necessarily a good thing for us real power users who want more granular control of our devices. Luckily, M ...more

How To : Set the Date, Time, and Schedule on bObsweep

bObsweep robotic vacuums automatically clean whenever instructed to do so by an owner or because of a pre-programmed schedule. The first step to making a schedule is telling Bob the time and date, so your vacuum can correctly follow your settings. Video: . Set the Date and Ti ...more

SPLOIT : What to Expect in the Journey as Hackers

Greetings my fellow aspiring hackers, It's still Christmas and we have a lot of things and hugs and kisses and ... to share ( you know the things that you do ). I have never done this before but I just felt to encourage you on the quest for knowledge, security and defence, sk ...more

How To : Useful Lesser Known Commands for Linux

Hello everyone on null byte this is my first tutorial This Tutorial Is on Useful Lesser Known Commands on Linux STAT COMMAND: The stat command displays the status of a file.The information is much more when compared to ls -l. It also includes the absolute path,Number of blo ...more

SSH the World : Mac, Linux, Windows, iDevices and Android.

Probably SSH is not as clean and fast as other useful tools like netcat, but it has some features which are very useful, and when you'll need them, here's how to behave with that huge amount of computers all over your house. Probably, you already know what SSH means, but for ...more

News : The Latest Pairing for Your Cookies: Cockroach Milk?

In the Western world, the only time you'd associate food with cockroaches is health code violations. And while other cultures and countries are more open to cooking with and eating these and other little buggers, insects are probably not a food trend that will be adopted by th ...more

Android Basics : How to Set Up Google Now

Android's personal assistant is more than just a sassy backtalker—it's a full-on suite of all the information you could need at a given time. Google Now, as it's called, uses data from various sources to predict what you'll want to know before you even search for it, and it's ...more

How To : Make a Secret Language with Python

Sometimes our information important. So important that we have to encode it to keep it away from criminals. What better way to encode information than to make our own encoder with Python? In this tutorial, we will cover the basics of cryptography in hopes to make a "gibberish ...more

NR30 : The Mobile AR Leaders of 2018

This time last year, we got our first taste of what mobile app developers could do in augmented reality with Apple's ARKit. Most people had never heard of Animojis. Google's AR platform was still Tango. Snapchat introduced its World Lens AR experiences. Most mobile AR experien ...more

News : MIT Tech Protects Your WiFi Without Passwords

Researchers at MIT's Computer Science and Artificial Intelligence Laboratory have created Wi-Fi technology that identifies where you are, which may eliminate the need for passwords. Video: . The system, called Chronos, can determine where a user is with an accuracy of "tens of ...more

News : Reconnect to Victim's System Success

After a long time I succeed to reconnect to victim's system without a touch(the victim did not click the app again) note:my big problem is the AVG sometimes the AVG does not discover it but sometimes does..... first of all i hacked his pc with Veil-Evasion by sending him the ...more

How To : A Simple Virus Written...in Bash!

Fugu - a simple virus in bash. I once told a friend of mine I'd written a virus in bash and he scoffed - "You can't write a virus in bash!" - he sniggered, like an ignorant idiot. Take my script, read and run it I told him. He declined. I still have that script so thought I ...more

  • Hot
  • Latest