From Instagram bot farms in China all the way to vending machines in Moscow that promise to sell you fake followers — the Facebook-owned empire is attracting the attention of the world around. When it comes to Russia especially, the country seems to be developing a little crus ...more
We happen to use an 802.11n AirPort Extreme as our router, so we put today's new firmware upgrade to the test to see if TIme Machine really does work with AirPort Disk. As expected, it works and only requires a few simple steps... First we updated our firmware using the AIrpo ...more
In order to back up your hard drive using Time Machine, you will need to plug in your hard drive. When the computer recognizes your hard drive, it will ask you how you want to back up. If it doesn't prompt you with a pop-up, you can click on the clock on your screen. Select " ...more
From the people who brought you the Dummies instructional book series, brings you the same non-intimidating guides in video form. This is Mac for Dummies. Just watch this video tutorial to learn how to back up files with Time Machine, For Dummies. Secure data by backing up fi ...more
This video tells us the method to partition the external hard drive for Time Machine. This process consists of a couple of steps. In the first step, go to 'Finder'. The second step involves clicking on the 'Applications' option on it. After choosing the 'Applications' and go t ...more
Okay, so what you have to do is get someone really drunk and get them to pass out. Then, when they're knocked out, take out all of the electronics, and replace them with old books, typewriters, candles, etc. and make them think they drank themselves to the past.
Stephen Hawking asks: "is time travel possible? Can we open a portal to the past or find a shortcut to the future? Can we ultimately use the laws of nature to become masters of time itself?" The master of the universe writes into Daily Mail, and proposes a "HowTo" for time tr ...more
Need a little help with your magic card skills? Check out this video tutorial to learn how to perform the "time machine" card trick. The art of magic and illusion is tricky, but nothing can't be done. Tricks are just tricks. See the "time machine" card trick revealed.
After achieving viral and financial success with its Gender Swap and Baby Face camera filters, Snapchat has returned with the augmented reality equivalent of Benjamin Button. On Thursday, the app added the Time Machine Lens to the carousel so that users can see what they will ...more
Candy machine hacks are so popular now, one might think it's easier to get candy from a vending machine than from a ... baby. Debunker Mike from Mississippi has taken the craze head on, debunking many inaccurate methods of stealing candy. He dissects the coin collecting mecha ...more
You will need to create some time lapse footage first. Then, you can use the Magic Bullet software to edit in a fake tilt shift look for your time lapse film. This technique will work on most other video editing programs as well.
Use After Effects to simulate a 3D stereoscopic effect, and remap time to speed up and slow down footage (a popular video effect used throughout the 2007 movie '300'). This tutorial from motion graphics designer James Zanoni shows you how. [dl.dropbox.com/?u/?6092444/?03%20-% ...more
Ruth demonstrates how to wind a bobbin successfully every time you attempt. Place the spool of thread on the machine and wind the thread between the two disks on the spindle (found in all machines). It is better to wind the thread twice to avoid the thread come off the spindle ...more
Drinking games just got a little more sophisticated (kind of). Startup SmartThings built this awesome Arduino-based machine that automatically pours a shot whenever the US wins a medal in the 2012 Summer Olympics. Goldschläger for gold, Cuervo for silver, and Jack Daniels for ...more
If you don't spend the time cleaning your house regularly to keep it within reach of clean all the time and you need it to be clean fast, watch this video. It will teach you how to quickly and effectively fake clean a house if your parents, significant other, or other figure y ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Russian cyber disinformation campaigns have many missions, but one of particular interest is using technology to monitor, influence, and disrupt online communications surrounding culturally sensitive topics or protests. The ability to watch these events, and even filter positi ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for ...more
The macOS 10.14 security update tried to make parts of the operating system difficult for hackers to access. Let's take a closer look at how its new feature works and what we can do to spoof the origin of an application attempting to access protected data. Apple introduced so ...more
A vending machine is an invaluable yet totally frustrating piece of equipment. It's a godsend whenever your tummy's growling or you need an ice-cold drink on a hot summer day. But when something gets stuck inside or the machine flat-out malfunctions, it quickly becomes your ar ...more
In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of s ...more
Welcome back, my greenhorn hackers! Throughout this series on Metasploit, and in most of my hacking tutorials here on Null Byte that use Metasploit (there are many; type "metasploit" into the search bar and you will find dozens), I have focused primarily on just two types of ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the i ...more
Skulls. What spooky Halloween décor or staging of Hamlet is complete without a skull or two popping up? For ghoulish special effect and/or setting a dramatic scene, skulls are absolutely integral. Well, with some artistry, hardware supplies, and a good dose of patience, you ca ...more
There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely s ...more
The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples ...more
Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listenin ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
We are now in the age of 5G. Carriers worldwide are upgrading their networks to the newest standard for mobile, which will dramatically improve your phone experience. How? By giving it download speeds and latency that surpass Wi-Fi. But before you upgrade, there are few things ...more
After numerous scandals like the Equifax data breach and the 2016 US election, cybersecurity has become a significant issue for Americans. Unfortunately, anytime we use our devices, we're open to a cyber attack — especially when we browse the web. However, there are ways that ...more
Night People: A Bad Vibes Label Profile Shawn Reed is one of our favorite people, not content with making music with Wet Hair, he also runs 'Night People' - an almost complete DIY record and tape label operation in Iowa - a label which has consistently put out and introduced ...more
Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more
Need to add some spooky ambient fog to your super-scary Halloween party? Rather than shelling out money for a fog machine you'll probably only use once a year, make a trip to the nearest drug store and pick up a bottle of glycerin, a gallon of distilled water, a 2-liter bottle ...more
Procrastination is an ugly beast. At first, it seems so innocent to spend five minutes checking Reddit or Twitter. You'll get started on work right after. Next thing you know, it's 1 a.m. and that paper is due in seven hours. Before you start another YouTube video, know you do ...more
A vulnerability in the design of LiDAR components in driverless cars is far worse than anything we've seen yet outside of the CAN bus sphere — with a potentially deadly consequence if exploited. The hack is also going to be hard to fix, researchers Hocheol Shin, Dohyun Kim, Y ...more
When Google introduced the Call Screen feature with the Pixel 3, I had never been more excited to get a Pixel device. This AI feature provided real protection against rising spam and robocalls, which billions of people deal with each year. After a recent update to the feature, ...more
A man-in-the-middle attack places you between your target and the internet, pretending to be a Wi-Fi network while secretly inspecting every packet that flows through the connection. The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwa ...more
Welcome back, my novice hackers! There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful. Many novice hackers focus way too much energy on cracking passwords (which should be a last resort unless you have spec ...more
It's somewhat funny that the HTC ThunderBolt smartphone would be released around the same time as Apple's new Thunderbolt technology. Mainly because HTC's smartphone isn't exactly something I would compare to a flash of lightning, which averages around 60,000 miles per second. ...more
There's three types of animal lovers in the world. The first are your basic pet owners. The ones with a cat or dog in the home, meant to be their cuddly companion. They love and adore it and consider it a member of the family. The second are animal rights activists. They ten ...more
Outside the realm of politics, where opposing sides are quite passionate and quite disagreeable, there are few areas in our society quite as divisive as Twitter. People who like Twitter love Twitter and are relentless in trying to co-opt the people they know into joining (this ...more
In an age of trend-following stars and fast fashion turnaround, there are few celebrities left whose looks hearken back to the golden age of Hollywood. Dita Von Teese, however, is the exception and has devoted her entire career to emulating the glamorous red-lipped look of he ...more
OK, are you looking to jump in your time machine and dance the Achy Breaky Heart line dance. Well, this how to video will prep you for your trip to the past. Get you comfortable shoes, gather up your friends who are eager to dance this country classic, and start heart breaking ...more
In this video tutorial, viewers learn how to perform different soccer skills in the game FIFA 10, part of Electronic Arts' series of football games. The video shows a variety of different skills to perform followed by a controller that reveals the button sequence. The skills i ...more
Watch this video tutorial from the Polish Guy to see how to polish a stainless steel roller using Autosol. In this polishing tip we polish a stainless steel roller using Autosol Metal Polish. The tutorial includes detailed work instructions and best practices. Materials: Aut ...more
Inception may not be the lead contender for the 68th Golden Globe Awards, honoring the best movies and television from 2010, but Christopher Nolan's film still collected four nominations— Best Motion Picture, Best Director, Best Screenplay and Best Original Score. But does it ...more
So your washing machine is on the blink? Dirty clothes piling up? You're embarrassed of your smalls and can't face the launderette? Watch this video tutorial to save your blushes and get your machine up and running again in no time... First things first always always always u ...more
If you're having a problem with your vacuum's clutch and need it replace, don't go pay someone for their service, do it yourself. Not only will you be saving yourself an arm and a leg, but you'll be able to understand how your machine works and what to do next time it breaks. ...more
This video shows how to softmod your slim, PS2. You'll need to crack open your case and be comfortable with the insides of your machine. Take your time and follow the instrutions to soft mod your Sony slim PS2 and enjoy the expanded goodness. This will let you unlock your PS2 ...more
Whether you have a Singer sewing machine, a Janome or a Brother, this video is good advice. If your sewing machine has been sitting in storage or has been unused for a long time, you'll need to do a little bit of maintenance before you start it up again.
In this tutorial, we learn how to mount your laptop to your exercise equipment with Chris Gardner. This is a great way to stay active and get your work done at the same time. First, grab some measurements of your machine, then grab aluminum bars that are the sizes of the front ...more
Does one of your coworkers at the office really make you mad? Do you want to mess with them at the office without having to destroy any property? This video can help. It will show you how to quickly create a fake wallpaper on someone's computer with Windows XP, which will infu ...more
No, you're not going to look like a cheesy impersonation of Batman when you don this "bat sleeve" blouse. Composed of wide sleeves that encourage free air flow (always good, especially for sisters with sweaty armpits. Yes, we went there) and a nipped in waist, this blouse is f ...more
Aliens… do they exist? Can anyone say for sure? No, but some do swear of their existence, and some swear on a more personal level, although some say that alien abductions are going a little "too" far in proving aliens exist. But a more common staple of proof of aliens are UFOs ...more
Alright, so you have some fake blood, and you want to use it in your movie. Unless you are showing a wound after it has happened, and if you want to do anything depicting people getting shot, you are going to have to find a way to make the blood "shoot" out of the wound when i ...more
Quilt as you go is becoming one of the most popular quilting methods out there and this video will show you how to do the technique using only your sewing machine. This method allows you to create a quilt in no time flat. You'll need lots of fabric strips, squares or triangles ...more