Before you get started exploring a big new city or even just getting reacquainted with the one you live in now, make sure you aren’t putting yourself in any unnecessary danger. Memorize good traveler habits that will keep thieves and scam artist off your back. Don’t let your ...more
Crimp can be made easily and covered to the jewelry by using the following instructions. First purchase the proper supplies of crimping tool. This tool acts like pliers and is used by placing the bead in the appropriate slot at the tip and then squeeze the handle together. The ...more
To create a Christmas ornament in Illustrator is very simple if you follow the steps below. Before starting the process one should ensure that all project files used in the tutorial is available. First by holding the shift key draw an oval, then go to gradient and create a new ...more
1. To create a clipping mask in Adobe Illustrator, go to File menu select Place button. It will open a dialog box select any picture from there. 2. Click and Embed the image. 3. Now, to write a text click on the text button from the toolbar and write a text on the picture. ...more
Prepare for battle in the Shadow Arena Challenge in the Choking Ground on the Xbox 360 game Darksiders. Meet the requirements of each portal to free the Tormented Gate so that you may proceed. For Venomous, you must kill 50 enemies before War's infected health depletes. Insta ...more
Face off against Hellion in this level of the Xbox 360 game Darksiders. In the Broken Stair, you need to find the soul chest and the beholder's key. Upon exiting the Choking Grounds tunnel you'll find yourself back out in the streets of the Broken Stair area. Head up the stree ...more
This is just a simple race in The Saboteur for the Xbox 360. The twelfth mission in Act 2: On Your Marks… Get Set... is where Horst is waiting with a good car right near Margot's base. This is a solo race mission to unlock the races throughout the rest of the game. The key to ...more
This video tutorial shows you how to start and break in a new Nitro Engine for an RC Plane. 1. Block the carb and rotate the prop to prime the engine. 2. Using key, install glow plug to the side of the engine. 3. Use hand held starter motor to prime the engine more. 4. Open t ...more
Is you radiator acting up and making impossibly loud noises? Does banging in the pipes sound like someone's running a sledge hammer? Try this easy do-it-yourself fix with this video on how to bleed your radiator. You Will Need: • A radiator • A towel • A bleed key Step 1: ...more
Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install Firefox 3.5/3.6 and make it the default browser on Ubuntu Linux. To install the latest Firefox 3.5 (final) or F ...more
You've drafted a promising team, and the season's under way. Now increase your chances of making the playoffs. You Will Need * Time * Football news * Knowledge of your league's rules * Patience Step 1: Pay attention Devote time to following football news. Keep track of injur ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to track a U ...more
Performing magic with simple, everyday objects is cool! And Ryan Oakes is going to show you how to perform an amazing little trick with a quarter. Sometimes we use materials that require adult supervision... like scissors so make sure you have friends and family around wheneve ...more
Tim Carter demonstrates how to get professional painting results by caulking all cracks between woodwork and walls before painting. What are the most important tools when painting an interior wall? The paint brush or the paint roller? No, it is the caulk gun. The caulk gun is ...more
Looks like Minecraft is getting some cool new features, including editable books and colorful wooden half slabs. Check out the video below to see the newest Minecraft Snapshot 12w17a in action. Warning: This release is for experienced users only! It may corrupt your world or m ...more
Though under a lot of the average consumer's radar, the CISPA is now making rounds again with a coalition of advocacy rights groups. The act, known as the Cyber Intelligence Sharing and Protection Act, forces companies to ignore existing privacy laws and share information with ...more
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
The agents of empire do not always arrive with warning. When you are besieged, surrounded, and infiltrated, imagination is often your best weapon against the oppressors. If all you have at hand is some duct tape and a disposable camera, fear not, you have the makings of a powe ...more
The best chemistry experiments are those you can perform with items already laying around your house. With only some sugar, salt substitute and an instant cold pack, you can make your very own gunpowder! Being able to make homemade gunpowder without a trip to the store can be ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Amazingly, a lot of people I know haven't even heard of SOPA or PIPA. Now, every English-reading person with an internet connection will finally have those two four-letter acronyms emblazoned in their minds. For the entire day today, Wikipedia's English-language site will be i ...more
How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters t ...more
When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using ...more
There are a lot of things on your computer that can reveal information about you when you are surfing the Internet. If you are like me, then you will do anything to maintain your privacy and prevent those little leaks of information from happening. Here's a list of a few of th ...more
Welcome to another Community Byte announcement! For the past few Community Bytes, we coded an IRC bot, and hacked it. Then, we created a web-based login bruteforcer! This week we are going to start something a bit different. We are going to start going through the missions at ...more
Our mission for this week's Community Byte was to create a Python program to crack web-based passwords, like the ones you would see on an email or router login. I wanted it to be universal in the sense that it could be easily modified and adapted to another website just by cha ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. While mining is a basic aspect of Minecraft, it is often overlooked. Every adventure requires iron and diamonds and other ore and if you're playing in hardcore mode then you need al ...more
The United States is a hierarchical country where the weak ones are at the bottom and the powerful ones are at the top. Garment workers are at the bottom of the list although they are the most important. Without them there would be no fashion industry. They sew and cut the gar ...more
This is prank is a 'bit' complicated to do but if you manage to do it, it will be the best prank ever made for good. I think the best man for this prank should be Bam as his chances not to die during the fall down are the best : - Go to some scene shooting somewhere in the wo ...more
Update This issue has been resolved Animals and building materials have been returned! If you did not get something back that you had bought for farm cash, CONTACT SUPPORT! After the fix, I still hadn't gotten everything back so I contacted support again yesterday, and got ...more
Shaun will teach us how to create a 3D video game compatible with MAC or PC with no prior programming knowledge. First download Alice, a 3D World program that can be turned into a video game. Open Alice, click on "add objects", click on "more controls" and select your choice o ...more
how to create an Ocean in 3DS Max Your tutor, Dave will show you how to build animated water with 3ds Max in the tutorial video. This method does not require expensive plug-in. First select a plane from your screen, then drag it to top view. Rotate the plane so the square edg ...more
Pull out your Nintendo DS and your Castlevania: Dawn of Sorrows video game and get ready to demolish it (as it in beat it). This extensive video walkthrough series on Castlevania: Dawn of Sorrows provides all the maps and secrets you need to know about in the DS game. You'll ...more
This video explains how to use jumper cables to jump start a car. First, determine that a dead battery is the reason your car is not starting. If the engine cranks when you turn the key, the problem is not the battery and jump-starting won't help. If the windshield wipers, lig ...more
Make sure the bike is properly fit to the child. She should just be able to stand over the top bar of the frame without touching. Install training wheels on the bike. Have the child wear a helmet. When first starting, knee and elbow pads, as well as gloves, are a good idea. ...more
Ever wanted to know how to disable an attacker? The trick to getting away from an assailant – even one who's bigger and stronger than you are – is to hit 'em where it hurts. You Will Need: • Knowledge of the human anatomy • Bravery • A self-defense course (optional) Step ...more
Feeling unprepared for the next earthquake? In this tutorial, learn what to do and what not to do to survive "the big one". You'll be surprised to learn that hiding in a doorway is a myth! You Will Need: • A safe place • Sturdy shoes • A fire extinguisher • A flashlight ...more
Hobby rockets are tons of fun. Vicarious astronaut adventures abound with every launch. What if you want to be closer to the action though? What if you want to feel what it's like to be in a rocket at takeoff? With the discovery of tiny keychain cameras, we have technology sma ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Are you looking to clean up the look of your Minecraft with something other than a simple texture pack? Do you sometimes experience lag spikes that drop you ...more
Rockets are lots of fun when you are launching them. However, finding them can be an arduous if not maddening task. Fancy space rockets have lots of tracking equipment to make touchdowns as simple as pie. Today, we look at embedding LEDs into your hobby rocket for easy night f ...more
You're never too young to start building your vast swarm of robotic minions. Taking over the world requires a whole lot of robots. The sheer volume of robots needed means your first wave will have to be made of cheap materials. After they take over key resources, you can upgra ...more
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use y ...more
Hello, nubile young Photoshop explorers! As we all know, besides design, Photoshop is best used for revenge, as will be demonstrated below. This is my ex-girlfriend, Cassandra. She dumped me because I had "poor bone structure." I'll bone her structure! Well, not anymore, I gue ...more
Taking apart batteries is one of those things that every adult you've ever known has warned you against. Today, we break the taboo and dive into a lithium battery. Lithium has some pretty cool properties—it burns instantly in water and glows blindly bright under flame. And wit ...more
Have you ever noticed that whenever you setup your voicemail account after getting a new cell phone number, it asks you to create a security pin to access your voicemail from other phone lines? When you call your home or cell number from another phone, after a few rings your ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
What is Google Dorking? Well, simply put, "Google Dorking" is just an efficient way to utilise keywords in order to perform very specific searches on a given subject. In this case, one would look for websites/servers that are vulnerable to attacks or are configured improperly ...more
Shortening URLs has become a necessity in this age of Twitter and limited-character status updates. It not only allows us to cram more words into our oh-so-important Twitter statuses, but it also helps us with a few other things. Some Benefits of URL Shorteners We can create ...more
When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. ...more
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more
Having a custom Linux distro can be the coolest thing ever. Most of you will probably be satisfied with any particular Linux distribution, but I know I'm not the only one out there who wants it to have custom configurations and programs preloaded while leaving the bloatware be ...more
Cross-Site Request Forgery (CSRF, pronounce "sea-surf") is a common web exploit. However, for unknown reasons it's not used very often. It plays on a given website's trust in a web browser by executing another website's form action, for example, sending money to another person ...more
If you’re unfamiliar with League of Legends, you’re either not into PC gaming or you haven’t spent much time on the internet. Riot Games officially released League almost two years ago, and since then it’s become a huge hit. In fact, the Santa Monica based company recently ann ...more
Facebook has been "improving" their interface in several different ways in attempt to combat the threat of Google+. One big change is the introduction of a news ticker in the top right corner that constantly feeds updates from friends and organizations you are connected with o ...more
Here's a noncomprehensive list of current features confirmed and experienced in Minecraft 1.8. If you have anything to add, please do so in the comment section below. Biomes are MUCH larger and more uniform than before. Swamp Biomes were added to the list of existing biomes ...more
This is the cheapest device to gather interviews as a small, easy-to-carry recorder. I started to use it for preproduction and film documentation after I bought it in a Polish discount shop for about 100 Euro. The only problem was very poor sound quality. I decided to mod the ...more
Do you have an awesome rig that is able to run anything you throw at it at 60 fps with maximum settings? Prepare to be humbled. The Witcher 2 is the first game in quite some time to tax your system the same way Crysis did when it first came out. On my system ( i5 at 4.9, ATI ...more
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is down ...more