How To : Hack a Roomba with LEDs to make a Pacman-ba !
This is a hack to create a Roomba covered in LEDs that will munch your dust. See how to do this cool mod for the Roomba, the robotic vacuum cleaner made by iRobot.
This is a hack to create a Roomba covered in LEDs that will munch your dust. See how to do this cool mod for the Roomba, the robotic vacuum cleaner made by iRobot.
This year marks the 30th anniversary of the classic arcade game, Pacman! If you are looking for a fun way to celebrate and don't feel like dusting off your old Atari, check out this tutorial. In it, you will learn how to play the famous Pacman theme song on the piano and impr ...more
Pacman is gaining in popularity lately due to the game's 30 year anniversary. If you would like to take Pacman out of the game and into real life, check out this tutorial. In this video, you will learn how to fold an origami version of Pacman with one sheet of paper. This lit ...more
Okay, so you've started making a Flash CS4 gam. You've got a character that walks around. Where is he going to go? This video will teach you how to create Pacman-style level boundaries using Actionscript 3 and Flash CS4. This means that whenever your character walks off the e ...more
Check out this video to learn how to build two Pacman ghosts (inky and blinky) out of legos!
In this tutorial, learn how to perform the PacMan arm wave and make your body look like it's turned to rubber! This dance was created by Phillip "PacMan" Cbeeb and is one of the coolest there is. So, next time you are challenged to a breakdancing competition or just feel like ...more
To celebrate 30 years of Pacman, Google released a playable version of the classic game. This game was only available on Google for a couple of days, however. If you would like to play Google Pacman as often as you like, for as long as you like, check out this tutorial. In it, ...more
This is a step by step guide to learning the dance move of the Pacman wave. Learning the dance move did not come easy but understanding the simple steps involved will make learning easy. You start with your left or right hand and as your hand moves away from the body your hand ...more
oh god at the ending lol.
An amazing version of PacMan was in DCPU! I would suggest trying it in Chrome as FireFox is really slow for more complex javascript apps.
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
The new Samsung Galaxy S4 just received an update to Android 4.2.2, so why is it that my Galaxy Note 2 is still running an older version of Jelly Bean? It felt like yesterday that my device was finally updated to 4.1.2, but why even bother since 4.2 has been around since last ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
In 2013, Offensive Security released Kali Linux, a rebuild of BackTrack Linux derived from Debian. Since then, Kali has gone on to become somewhat of a standard for penetration testing. It comes preconfigured with a collection of tools accessible by a menu system, tied togethe ...more
Having a custom Linux distro can be the coolest thing ever. Most of you will probably be satisfied with any particular Linux distribution, but I know I'm not the only one out there who wants it to have custom configurations and programs preloaded while leaving the bloatware be ...more
Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't en ...more
Paying for web hosting isn't ideal in most situations. If you have your own website, hosting it yourself is very acceptable and easy to do, assuming your internet bandwidth permits. Most people want to run a personal site, nothing crazy, so hosting from home on low-bandwidth i ...more
Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topolog ...more
SSH is what is referred to as the Secure SHell protocol. SSH allows you to do a plethora of great things over a network, all while being heavily encrypted. You can make a remote accessible shell on your home computer that gives you access to all your files at home, and you can ...more
Hello fellow Null-Byters today I will be showing you how to change from the simple but powerful BASH system to a more powerful and faster Z - Shell system. This change can be permanent if you want but doesn't have to be, and it is an extremely simple one to perform. Reasons t ...more
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this shou ...more
With the plethora of programming that we promote at Null Byte, I figured a lot of you newbies that stop by IRC will need a big boost in the right direction to make your dive into programming a lot easier. A hot question that has been thrown around in IRC a lot when making the ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because the ...more
Something that can shy a user away from making the switch to Linux is not having the option to go back to Windows. Luckily, there are solutions like dual-booting, where you can have both OS's installed right next to each other. However, Windows 8 appears as if it will block du ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out, such as Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc form ...more
Linux can have the most beautiful interface in the world, because it is simply what you make of it. You can change every little detail with relative ease because that's what Linux is all about: Freedom and OpenSource. I posted pictures of my desktop on the corkboard a few wee ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
Welcome to the second part of the Arch Linux installation tutorial! We are installing Arch because of the amount of users who want to learn how to get into Linux. Arch is a simple, minimalistic distro, designed not to hold the users hand, but to push them to know their system ...more
Back in 1982, the Commodore 64 home computer was released by Commodore International for $595 (which would now be close to $1,300). It featured an 8-bit microprocessor, 16-color video microchip, awesome sound chip, parallel and serial capabilities, and a whopping 64 kilobytes ...more
Let's face it, CDs and DVDs are a thing of the past. We no longer use them as a storage medium because they are slow, prone to failure in burning, and non-reusable. The future is flash memory. Flash memory is cheap, fast, and efficient. Eventually, flash drives might even repl ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
When you have a lot of equipment, dragging it everywhere with you can be a pain, especially when the weather's bad. Sure, you can put it in a camera bag, but a lot of them don't protect your stuff from water, and waterproof cases can get expensive. Rather than buying a case, ...more
In this video from ThunderBoom9709 we learn all of the faces used in Facebook chat or any IM program. We learn :) is a smile, :( is sad, +o( is sick, ;) is wink, :D is excited, :O is shocked, : '( is crying, B ) is glasses, 8| is glasses/cool, >:( is really mad, >:O s laughing ...more
Today we pay homage to a phenomenon. One as diffuse and amusing as the internet itself, and as pointless as dog Halloween costumes. I'm speaking, of course, of giant games. Not Supergiant Games, makers of the forthcoming and awesome-looking indie RPG Bastion, but giant games ...more
Amazing animation by Patrick Jean. NYC is destroyed by 8-bit evil forces from 70s and 80s video games such as Space Invaders, Pacman and Donkey Kong.
Check out this How-to from Craftnerdy that shows you how to make an amazingly nerdy shower curtain in the likeness of Pac-Man. Get your nerd craft on! Pacman is Watching you Shower O.o. Hang it, enjoy it, and don’t forget to show it off to everyone who enters your house!
kriquit describes how to make a PacMan charm bracelet in this video. She uses various colors of polymer clay to make Mr.. and ms. PacMan and the little ghosts. The color she uses are red, blue, pink, orange, yellow and white and black for the eyes. She also says that you need ...more
Need a hobby? The yo-yo is the perfect to for anyone in need of a hobby to keep them busy. Did you know that it's also one of the oldest toys around, and that modern yoyo's have been born and perfected in Santa Barbara, California? Did you know there's millions of tricks out t ...more
Cater your next geek fest with the services of online bakery Geeky Cookies. Available in sets of a dozen, each in the $20-$25 range. Mario, Zelda, or Star Trek... pick your favorite geek treat. Star Fleet Badges U.S.S. Enterprise Away Team ...more
Would you like to impress all your friends by making 23 different smileys/emoticons on Facebook while you chat with them? Some of them are simple and easy to guess because they are used almost everywhere, but some of them are not so common. Some of the less common ones include ...more
Want your boyfriend to clean house? Make it a game. This Wii remote-controlled Pac Man vacuum will transform every alpha male into a....maid! Wii hacker Ron Tajima's brainchild is covered in 448 LEDs and controlled via an SH2 MPU control unit. This isn't just a blinking toy. ...more
What happens when you combine Super Mario Land with Minecraft? Maybe some awesome pixel art, but how about if you go a step further? What if you add the computer game within a computer game idea and throw in a little stop motion? You get one hell of an impressive spectacle—yo ...more