Pi

News : Winning with 2-Letter Words

When your opponent throws down "AA", you tell them no abbreviations, but alas... it's not. They build "ZA" on the board for 64 points, and you say it's slang, but it's in the dictionary. Next is "EF", and you let them know that spelling out letters is not allowed and ridiculou ...more

Buyer's Guide : Top 20 Hacker Holiday Gifts of 2018

For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more

How To : Write a fraction as a decimal

Write a fraction as a decimal Some fractions are easy to convert to decimals. Fractions with 10,100 or power of 10 are written like they sound. 1/10 is .1, 3/10 is .3, 5/100 is .05, 17/100 is .17. Some you can rename to have a power of 10 denominator. They are 2,4,5,10,20,25, ...more

How To : Take Control of Sonos IoT Devices with Python

Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more

How To : Remove an iPhone SIM chip

In this video by PI Classroom you get to learn how to remove the sim chip from an i-phone. The video provides a step by step process for removing the sim chip. The only tool required is a paper clip. *Turn the i-phone on its head so that the power button and the plug for the h ...more

How To : A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. ...more

Scrabble Challenge #6 : What Would Your Opening Move Be?

Now that you have your two-letter words down and have practiced your skills, it's time to move on to another important part of Scrabble gameplay—the opening move. There's a well known adage that states, “The player going first will win 54% of the time—all other things being eq ...more

How To : Track ADS-B Equipped Aircraft on Your Smartphone

Flight disruptions can cost billions of dollars, but most modern commercial flights rely on air traffic control systems that harbor serious vulnerabilities. The Federal Aviation Administration uses an infrastructure called NextGen, which relies on Automatic Dependent Surveilla ...more

How To : Enable the New Native SSH Client on Windows 10

For years, PuTTy has reigned supreme as the way to establish a Secure Shell (SSH) connection. However, those days are numbered with the addition of the OpenSSH server and client in the Windows 10 Fall Creators Update, which brings Windows up to par with macOS and Linux's abili ...more

How To : Use SecGen to Generate a Random Vulnerable Machine

Recently, I ran across SecGen, a project which allows a user to create random vulnerable machines. I absolutely love vulnerable machines, since a vulnerable VM is a safe and legal way to practice hacking tactics, test out new tools, and exercise your puzzle-solving skills. Wh ...more

News : The $25 USB Stick Computer

Earlier this month, game developer David Braben and his Rasberry Pi nonprofit foundation revealed a $25 USB PC. The computer can connect to an HDMI monitor on one end, and a USB peripheral on the other (such as a keyboard or a USB hub). You can use the USB hub to connect multi ...more

How To : Install OpenVAS for Broad Vulnerability Assessment

OpenVAS is a powerful vulnerability assessment tool. Forked from Nessus after Nessus became a proprietary product, OpenVAS stepped in to fill the niche. OpenVAS really shines for information gathering in large networks where manual scanning to establish a foothold can be time- ...more

News : Hak5 Just Released the Packet Squirrel

Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of concepts with space built into the design for the community to add their own tweaks and modifications. On Friday, Oct. 27, Null Byte attended the Hak5 rele ...more

How To : Find the circumference of a circle

Use a simple mathematical formula to find the circumference of a circle. The circumference of a circle can be determined by using the formula 2 times pi times the circle's radius. Pi is equal to 3.14. If a circle's radius is 10 centimeters, first multiply pi times 2. Pi, or 3. ...more

How To : Calculate the circumference of a circle

This video shows how to calculate the circumference of a given circle. The video first describes the circumference or perimeter of a circle as the distance around the outside of a circle. To find the circumference we need either the radius or the diameter of the circle. When y ...more

How To : Find the volume of a cone quickly

For people who are interested in math or who need to know how to find the volume of a cone for any reason, whether it be homework or architecture, this video will show you how to do so. The formula for finding the volume of a cone is (1/3) pi x radius^2 x height. You can find ...more

How To : Find the surface area of a cylinder easily

In this video tutorial the author shows how to find the surface area of a cylinder. He shows a four step approach to solve this problem. First he gives us a formula to find the surface area of a cylinder, where Surface area A = 2 * Pi * R * R + 2 * Pi * R * H, where R is the r ...more

How To : Things to Do on WonderHowTo (03/21 - 03/27)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Perform Network-Based Attacks with an SBC Implant

With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more

HowTo : Carve a Turkey the Infographic Way

So the cooking of the bird doesn't lie on your shoulders this Thanksgiving. Lucky. But before you relax too much, there is a wild card- you never know who will be handed the carving knife. Below, five handy infographics for carving a turkey like a pro. 1. Carve Your Turkey th ...more

How To : Find the area of a circle using squares

In this video the instructor shows how to calculate the area of a circle using squares. She starts with the formula of the circumference which she says is circumference C = Pi * D, where D is the diameter of the circle. Now she says that you can turn the shape of circle into a ...more

How To : Calculate circular velocity & acceleration

In this video the tutors explain about the concepts of Circular Velocity and Acceleration. She explains the concepts using a real world small experiments. She shows that the equation to calculate circular velocity is v = (2 * Pi * r) / T, where r is the radius of the circle th ...more

Zanti : Introduction

I've been doing tutorials on Rasberry Pi and I would like to thank everyone that have both read the tutorials and gave me feedback on how well I'm doing. But now I've decided to take a small break and start a mini series that I'm hoping to be at least five tutorials. This does ...more

How To : Find the volume of a cylinder quickly

In this video the tutor shows how to find the volume of a cylinder. He relates the cylinder to real world examples of cans etc. Now he states the formula of the volume of the cylinder as the area of the base circle multiplied by the height of the cylinder. So the formula turns ...more

How To : The Null Byte Guide to 3D Printing for Hackers

3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something b ...more

How To : Calculate lateral & total area of a cylinder

Steps involved in calculating the lateral surface and total area are: Consider a cylinder with radius r, height h. Then to find lateral area we need the formula 2*pi*r*h, circumference - 2*pi*r, total area 2*pi*(r+h) and area of circle (pi^2)*r. Therefore by using only the ra ...more

How To : Calculate the area of a circle with visuals

Learn how to find the area of circle by activity method. Requirements: A circle cut out, a pair of scissors, sketch pen, and a ruler. Take a circle of the radius. Fold the circle along itself. Fold it again. Fold yet again. And again. Now unfold and observe the crease. Numbe ...more

How To : Find the volume of a sphere

In this video the author show how to find the volume of a sphere. The formula for finding the volume of a sphere is 4/3 * Pi * r*r*r, where r is the radius of the sphere. Now to compute the volume of a sphere you have to note down the radius of the sphere and substitute it in ...more

  • Hot
  • Latest