How To : Make a glass goblet with used and pre-made parts
Learn about goblet making using pre-made parts stored in an annealing oven with Bill Gudenrath from The Corning Museum of Glass.
Learn about goblet making using pre-made parts stored in an annealing oven with Bill Gudenrath from The Corning Museum of Glass.
Some food jars seem like they're actually designed to prevent you from enjoying every last bit inside. The remnants of sticky foods like Nutella and peanut butter are almost impossible to scrape out with a knife or spoon, and it's a shame to throw out something that tastes so ...more
Learn how to use Thinking Particles in Cinema 4D. Working with these programs could be pretty complicated if you're not sure what you're doing, but this two-part tutorial covers some important topics when using Thinking Particles. As the name suggests, it is a particle-based s ...more
Check out this video to learn how to use the paste laminating system and three part mold-making techniques. This is an advanced process that is not for beginners. This process is for working on medium to large projects, this is a labor-saving process for those who need a large ...more
Working with particle flow in 3DS MAX allows you to create all sorts of awesome effects, including swarms of small characters or, in this case, realistic liquids. Specifically, this video series will show you how to use pflow to create a liquid splatter effect, which can be us ...more
Have you ever tried making your own remote-controlled water boat, but were missing all the key parts? Well, now you don't need to worry about expensive ingredients, because this video will show you how to make an RC engine boat with useless junk. You just might have some old u ...more
Learn how to work with Application Parts when using Microsoft Access 2010. Whether you're new to Microsoft's popular data management application or a seasoned MS Office professional just looking to better acquaint yourself with the Access 2010 workflow, you're sure to be well ...more
Check out this video to get tips on using past participles in French. Part 1 of 2 - How to Use past participles in French. Part 2 of 2 - How to Use past participles in French.
This week's 6-part series on Making Art on Your iOS Device comes to a close today with our last segment: a collection of useful apps for touring museums, galleries and street art. The apps below cover some of the world's greatest art meccas, so read on if you're planning an up ...more
Home cooks are often quite intimidated when trying to reproduce the delicious ethnic dishes they enjoy at various restaurants. Thankfully, there are definite flavor profiles and spice/seasoning/herb combos that are very specific to various regional cuisines and cultures; with ...more
Now that we have unlocked the menu movement — which is working very smoothly — we now have to get to work on the gaze manager, but first, we have to make a course correction. A misunderstanding of how raycasting works on my part forced me to rethink a portion of the dynamic u ...more
Now that we have installed the toolkit, set up our prefabs, and prepared Unity for export to HoloLens, we can proceed with the fun stuff involved in building a dynamic user interface. In this section, we will build the system manager. On the most basic level, the system manag ...more
An incorrectly scaled object in your HoloLens app can make or break your project, so it's important to get scaling in Unity down, such as working with uniform and non-uniform factors, before moving onto to other aspects of your app. This HoloLens Dev 101 series has been desig ...more
In the previous section of this series on dynamic user interfaces for HoloLens, we learned about delegates and events. At the same time we used those delegates and events to not only attach our menu system to the users gaze, but also to enable and disable the menu based on cer ...more
Eating out is great, but being able to cook the delicious ethnic foods you eat at restaurants is even better. It may seem daunting to put together a bunch of ingredients with which you might not be familiar (some with names you've never even heard of!), but with the guidelines ...more
So after setting everything up, creating the system, working with focus and gaze, creating our bounding box and UI elements, unlocking the menu movement, as well as jumping through hoops refactoring a few parts of the system itself, we have finally made it to the point in our ...more
In this chapter, we want to start seeing some real progress in our dynamic user interface. To do that, we will have our newly crafted toolset from the previous chapter appear where we are looking when we are looking at an object. To accomplish this we will be using a very usef ...more
After previously learning how to make the material of an object change with the focus of an object, we will build on that knowledge by adding new objects through code. We will accomplish this by creating our bounding box, which in the end is not actually a box, as you will see ...more
We started with our system manager in the previous lesson in our series on building dynamic user interfaces, but to get there, aside from the actual transform, rotation, and scaling objects, we need to make objects out of code in multiple ways, establish delegates and events, ...more
Continuing our series on building a dynamic user interface for the HoloLens, this guide will show how to rotate the objects that we already created and moved and scaled in previous lessons. So far, we've built a system that incorporates the user's gaze and what the user is lo ...more
Here is an alternative method to run Ubuntu 10.04 on a Mac without actually installing it on your internal hard disk. The idea is to install Ubuntu on your USB flash disk, instead of installing it on your internal hard drive. I'm talking about a full disk installation. It won ...more
Decorating your home during the holiday season can seem difficult, but with the right help, it can be done. In this tutorial, you'll find out some helpful tips and advice on how to decorate parts of your home using certain holiday items that you can display. So good luck and e ...more
Make It Mine Magazine associate editor Tea Benduhn shows you how to make a mold using two-part silicon putty.
Darth Maul and his double lightsaber were by far the coolest part of Star Wars Episode 1: The Phantom Menace. If you've got some DIY knowhow and want a costume / prop lightsaber that will stand out from the pack, watch this video to learn how to make a Darth Maul double lights ...more
What do you do with that unused box of cake mix collecting dust in your pantry? Grab two eggs, some butter and a cup full of semi-sweet chocolate chips, and you are all ready to bake yourself a batch super quick and easy cake mix cookies. Other than its ridiculous simplicity, ...more
The most dangerous thing about having a bunch of baked goods in your home is the possibility that you will gorge on all of them. If you are in a cupcake-y mood, but want to keep your sugar-happy gluttonous side in check, just make enough batter for two cupcakes in a single mix ...more
The idea is to buy a few items from IKEA and use them to make a back garden BBQ smoker. The concept is also know as IKEA hacking and the principles are simple, re-engineer IKEA products to make a entirely different item. This video will take you step by step through the buying ...more
In a previous article, I demonstrated an Arc Welder made using parts from old microwave ovens. Video: . Here is part 1 of 2 on how that arc welding machine was made, and how you could make one too! This is the first of two parts on building it, focusing on the modification of ...more
Welcome back, my greenhorn hackers! Digital forensics and hacking are complementary disciplines. The better you are at digital forensics, the better hacker you are, and the better hacker you are, the better you are digital forensics. Unfortunately, few people in either profes ...more
Last time, I showed how to start putting together an AC arc welder from scavenged microwave parts, focusing on the transformer modifications. Now, I'll show you how to finish up your DIY stick welding machine by fixing up the electrical system and performing the finishing touc ...more
Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about security on an application level. If a malicious file is opened on your system, will an attacker be able to access every file on the c ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. Our hacking Windows 10 and hacking macOS articles might make it seem like a reasonably secure operating system doesn't exist. But I'm here to tell you that there is a viable alterna ...more
After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimiz ...more
You've protected your Ubuntu system from physical attacks, annoyed network hackers, and sandboxed potentially malicious applications. Great! Now, the next logical steps to locking down your OS include thoroughly auditing Ubuntu for weak points, using antivirus software that re ...more
The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other device ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
Welcome back, my greenhorn hackers! Continuing with my series on how to crack passwords, I now want to introduce you to one of the newest and best designed password crackers out there—hashcat. The beauty of hashcat is in its design, which focuses on speed and versatility. It ...more
Hi all, Pro Hackers/Crackers, Let's see how we can use batch for our own Protection instead of exploiting someone with it. And this tutorial is going to explain the same. #1 Protection, PC Security: I will tell you how to add another level of security to your PC, instead of j ...more
Hello there Nullbyters, Last tutorial we discussed navigating and setting some options. Today we will be discussing searching, copy/cut & paste and some quick editing techniques. Important: Use u to undo changes. Use Ctrl + r to re-do changes. Searching First make sure yo ...more
Hello there Nullbytes, In my previous tutorial found here, http://null-byte.wonderhowto.com/how-to/vim-as-ugly-as-is-fast-0168012/, I wrote about using normal mode. Today we will go trough the basics of using the Normal Mode. The things we will be discussing: Making VIM mor ...more
Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method. Note: This method only works if the website has the vulner ...more
Welcome back, my greenhorn hackers! Lately, much of the discussion here on Null Byte has revolved around evading detection and not getting caught hacking. Several of you have written me asking for a series on evading detection and forensics, and while I began a series 5 month ...more
Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happeni ...more
Welcome back, my neophyte hackers! Digital forensics is one of the fields often overlooked by aspiring hackers. In a rush to exploit every and any system they can, they often ignore learning digital forensics—the field that may lead to them being traced. In addition to learn ...more
Welcome back, rookie hackers! We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near field devices such as headsets, speakers, and keyboards. Its minimum range is a 10-meter radius (~33 feet) and ...more
Welcome back, my tenderfoot hackers! In continuing my series on digital forensics using Kali, I want to introduce you to two complementary tools, both built right into Kali Linux. These are Brian Carrier's tools Autopsy and Sleuth Kit. Carrier is one of the leading authoriti ...more
This great video series goes through the entire process, from unboxing the Wii Hori fighting stick, to taking it apart, wiring, adding buttons, and everything else that you'll need to finish the project and have it ready to go for play on your Xbox 360! Part 1 of 5 - How to Mo ...more
NASA is going going to Saturn's moon Titan, and the space organization is using augmented reality help them do it. The team at the Johns Hopkins University Applied Physics Laboratory (APL) has been working for years to get its robotic probe mission to Titan approved, and just ...more
Welcome back, my tenderfoot hackers! Web apps are often the best vector to an organization's server/database, an entry point to their entire internal network. By definition, the web app is designed to take an input from the user and send that input back to the server or datab ...more
Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more
When you're making a restaurant, or a house, or any other somewhat modern Lego model, one way to make the interior (or exterior for that matter) come to life is by making furniture, and what better way to start than with a table with a striped table cloth on it? In this great ...more
Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more
I assume at this point you have already completed your control panel using Part 1 of this How To guide. Now, if you are anything like me, you couldn't fight the urge to play, and you have your panel sitting on saw horses in the living room. Depending on your situation, your s ...more
This article will show you how to make a shutter release cable for a Canon camera. It took me about half an hour once all of my materials were gathered. I came in at a total of about eight dollars. It has three switches and buttons. The black button on mine triggers the auto f ...more
It's somewhat funny that the HTC ThunderBolt smartphone would be released around the same time as Apple's new Thunderbolt technology. Mainly because HTC's smartphone isn't exactly something I would compare to a flash of lightning, which averages around 60,000 miles per second. ...more
I'm constantly searching for a homemade pizza dough that tastes good but isn't too challenging to execute. In other words, a recipe that doesn't require any arcane "dough whispering" skills. However, my hunt may be coming to an end thanks to one celebrity chef's concept. Maki ...more
It’s called Urophagia—the art of consuming urine. There could be any number of reasons for having the desire to drink your own urine (or somebody else’s). There’s the so-called term “urine therapy,” which uses human urine as an alternative medicine. In urine therapy, or uropat ...more
In a recent arbitrage tip, we showed you the secret to making money fast by buying and selling the same thing over and over again on eBay. But there's one thing you need to know about the buying part—get the lowest price possible! This article aims to show you some of the best ...more
Musical boxes are best known for their kitschy designs and somewhat trivial renditions of musical masterpieces. They tend to frequent the dresser of young girls or elderly woman hanging on to their youth, and for the most part, they remain cutesy and harmless, but when feature ...more