Make a Fake Time Machine

How To : Cheat Your Apple Watch Rings

Apple Watch owners know the struggle — it's the end of the day, and those rings aren't met. Whether you forgot your watch before hitting the gym, let the battery run out, or just didn't move enough, you could feel the sting of fitness failure. But it doesn't have to be this wa ...more

NR30 : 2019's Up & Coming AR Founders You Need to Know

The landscape of the augmented reality space is broad, diverse, and constantly shifting, perhaps more so than any other vertical in technology. At the same time, major players are attempting to standardize various hardware designs and delivery methods, while still others are r ...more

News : Mod Your Sewing Machine Into a Scroll Saw

From sewing machine to scroll saw, check out Instructables member bongodrummer's in depth HowTo. Says bongodrummer, "...Old sewing machines, that are actually really rather well made, are often thrown out by people who do not have the time or inclination to use or maintain t ...more

How To : Use Your Chromecast as a Karaoke Machine

You suck at karaoke. Most of us do, but that doesn't stop any of us from hitting up the karaoke bar. It's not about who sounds best; there's American Idol for that. It's about having a great time without incurring negative judgement; the worse you are the better time I'm havin ...more

How To : Run Any Android App on Your Mac

One of the best features of Android is the fact that it's open-source, giving developers the ability to use it on pretty much any device they can think of, like on a Windows PC using Andy. That's what drove the creators behind the Android-x86 project to port over the mobile OS ...more

How To : Make Restaurant-Grade Sushi Rice

Contrary to popular belief, sushi is not the raw fish that one gets at Japanese restaurants, but the rice that comes with it. It's hard to tell whether this popular misconception led to or came about because of the primary flavors that we think of in sushi are the fish. We oft ...more

How To : Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, ...more

How To : Analyze Wi-Fi Data Captures with Jupyter Notebook

When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more

  • Hot
  • Latest