This video tutorial instructs how to make a fun spinning card to add a little extra flare to a basic card.
Ng Spinning Card
This spinning 3D greeting card may look complicated, but don't let that deter you from trying this card design out. A little hard work means a lot to those you will be giving the card to. This video will show you the steps to making this beautiful spinner card, which is a love ...more
Learn how to do the card spin trick. It is a fun thing to learn to go with the rest of your tricks.
Hand spinners who want to master long-draw drafting for woolen spinning need their fibers in a special form: carded rolags. Combed fiber won't do it -- neither will carded batts. This introduction shows you how to make carded rolags. Start by washing your fleece. ...more
In this how-to, I will be demonstrating a few of the tactical applications of Besside-ng, the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any networ ...more
Place the card in the center tip of your middle finger. The card should balance on your finger and you can test this by wobbling the card on your finger left and right without it falling off of your finger. Try to spin the card with your other hand. If it falls off your finger ...more
Best card control ever ... !! Daryl's Hot Shot Cut. As seen on David Blaine series. This cut shoots a spinning card out of the deck.
Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more
This how-to video shows how to make an owl spinner card out of paper. Learn how to make a designer art card with a spinning owl design.
This video tutorial is in the Computers & Programming category which will show you how to hack a wireless network with WEP encryption. This video is intended only as a means of testing the security of your own network. Go to Backtrack Linux, download the backtrack4 and burn it ...more
In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless gu ...more
Ever since kernel 2.6.xx in Linux, a lot of the internet kernel modules for wireless interfaces ended up becoming broken when trying to use monitor mode. What happens commonly (to myself included) is a forced channel that your card sits on. No good! For users of airodump and t ...more
Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on h ...more
Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more
After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their M ...more
This is my first how-to for this site so feel free to let me know if I can somehow improve! Inspired by the great Jailbroken iDevice and Rooted Android PenTesting tutorials I decided to share how I use my Toshiba Chromebook 2 with Kali Sana. Chromebooks have a couple of bene ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
Hack Like a Pro : How to Get Even with Your Annoying Neighbor by Bumping Them Off Their WiFi Network —Undetected
Welcome back, my hacker apprentices! My recent posts here in Null Byte have been very technical in nature, so I thought that I'd have a little fun with this one. Have you ever had an annoying neighbor whose dog barks all night, who has loud parties that keep you awake, or who ...more
Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. I strongly suggest that you look at some of my earlier posts, such as "Getting Started with Te ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more
Card flourishes are more of an art form, not really necessary for your magic card tricks and illusions, but really cool to impress your friends. Watch this video tutorial to learn how to perform a fan spin card flourish, which shows you how to fan a deck of playing cards and h ...more
Learn how to spin a card on your finger.This can be a nice touch to a magic trick or routine.
A brief video tutorial on how to spin a card in one hand using your pointer finger to spin it.
Nice trick for spicing up you magic act. Watch as the demonstrator shows you the spin and then how to do it.
This kid has great instincts for teaching magic or card tricks as he instructs with multiple camera angles the best methods for shooting cards in the air. He also has different finger and grip techniques for multiple cards and different spins.
Scam School host Brian Brushwood demonstrates how to convert a standard playing card into a weapon. By perfecting your release and giving a specific spin, you'll be able to burst a water balloon halfway across the room.
Learn how to perform a few basic card flourishes such as the card spin, the dribble, and the corner spring. I slowed down the flourishes so people can follow along and learn.
In order to make the Spinner Pinwheel Card with your Cricut, you will need the follow: the Cricut Wild Card cartridge, card stock, ribbon, brads, printed/patterned paper, adhesive, and an ink pad. Go to page 51 on your manual. Place your cartridge in your Cricut. Load the pap ...more
Need a new card trick? Learn how to magically make a card levitate above your hand and spin around in circles like a hummingbird. This trick takes a little set up time but the pay off will be well worth it. Float and spin a card in mid air and impress all onlookers. Perform th ...more
This greeting card tutorial video will give you tips on how to make a greeting card that spins and shows various images in its little window. This is a take on the old view master toys that children used to play with. Your friends and family will definitely think this greeting ...more
Long ago, wool yarns were described as "worsted", or "woolen", or something in-between. A true "worsted" yarn is spun from combed fiber, which is dense and fairly smooth. A true "woolen" yarn, on the other hand, is open, airy, fuzzy, and warm. Its fibers comfortably tangle and ...more
Make this cute baby card, demonstrated using CTMH products. The suspended circle can be wound up, so when the recipient takes it out of the envelope, it will spin. Watch this video card-making tutorial and learn how to craft a suspension style greeting card.
Learn how to shuffle cards from one hand to another, make a car spin on your finger, or make a card jump from the deck to your hand. These simple tricks are easy to learn and will definitely impress your audience. Perform multiple card tricks. Click through to watch this video ...more
Learn how to transform your greetings with funky needle-felted motifs. Corinne Bradd shows Kristy Clark how to put a contemporary spin on this traditional craft, with charming shapes and clever techniques.
In this video, you will learn the best way to throw cards. This takes practice, as many people who first try to throw card do not have the right grip. In order to throw the card properly, you will need to place your thumb on the center of the top side and the index finger on t ...more
Shelley Lovett shows how to teach kids a spin on the "Ten Little Indians" song. that she calls "Ten Little Penguins." She has a simple prop to make the song more fun for young kids. She has a pair of black gloves to which she has glued a little card-stock penguin to each finge ...more
The Tesla CD Turbine is a little homemade turbine made from CD's, CD spindle, supermagnets, and glue. It runs on faucet water pressure. This movie demonstrates the total over-use of technology in using the Tesla CD Turbine as a Decision Maker to help decide what to do during ...more
Founded by Zach Kaplan, a "serial entrepreneur" with a B.S. in mechanical engineering, Inventables is a futuristic online hardware store based out of Chicago. The company sells innovative materials at much smaller quantities than typically available—largely to artists, invento ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
To make a Spinner Card you need some essential tools like, Paper Cutter, Scissors, Stamps, 1/2" Circle Punch, 2 Pennies, a Stamping Dimensional and any embellishments. Have the card stocks one for the card part and the other for the front of the card. In the first step, take t ...more
Once you get past the initial quick start setup of the Canon EOS 5D Mark II, capturing pictures in auto mode is a breeze. But what do you do after you've snapped those photos? This quick guide will show you the easy steps to viewing your images directly on the camera. Playbac ...more
Hey everybody, This feed is about the traditional three act structure when writing an action/adventure story or screenplay. Act I "The Setup" Act 1 is a great time to begin throwing out a lot of foreshadowing. For many films, once you watch a few times the same film over an ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
My JO was watching The Simpsons on FOX the other day, like she wholeheartedly does every evening, and I joined her, much like I always do— though I must admit, I'm not as obsessed with the cartoon family as much as she is. Just like she isn't as obsessed with SCRABBLE as I am. ...more
Using only a circle and straight lines, it's possible to create various aesthetic curves that combine both art and mathematics. The geometry behind the concentric circle, ellipse, and cardioid dates back centuries and is easily found in the world around us. From an archery tar ...more
To levitate a playing card you will need an ordinary playing card, scotch or clear tape, a pair of scissors, white paper and some string or yarn. First, measure the yarn by holding it up to your ear and cut the yarn at the desired level. Then, place the yarn to the white paper ...more
While the USB Rubber Ducky is well known by hackers as a tool for quick in-person keystroke injection attacks, one of the original uses for it was automation. In this guide, I'll be going the latter, explaining how we can use it to automate Wi-Fi handshake harvesting on the Ra ...more
Instead of a tutorial this is really a card idea for what to do with large stamps/images/rub ons/stickers etc.. and a really quick & easy option. Step 1: Items Used Stix2Anything 8x8 blank white card 1 layer DCWV pink card 1 matt & layer in white card with die cut aperture la ...more
This tutorial is quite an epic, so get a cuppa, kick off your slippers, sit back and relax as we go through a few great inking & blending techniques. We start with masking a blank card base, using artists/crafters masking paper roll, this is available online or try DIY/Hobby ...more
Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, ...more
How To : Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter
Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and ...more
Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecur ...more
The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized ...more