Chantelle Fashion demonstrates how to make a lucky scrap scarf. First, cut out a four inch by four inch square template. Gather all of your fabric scraps and put them in a bag. Close your eyes, think thoughts of luck and pick out a color. Use the template to cut the scrap fabr ...more
In this video the viewers are shown how to pick a Master lock. He starts off by telling his viewers what items they need to start. A tension wrench is made from a pen cap and a pick from his sister's bobby pin. He then demonstrates how to successfully pick the lock. He also su ...more
In this tutorial, we learn how to pierce your own lip like an emo kid. First, grab a safety pin and put heat with a lighter to it. Let this cool off, then put gloves on your hands. Mark where you want the piercing to be on your lip and look in the mirror to make sure it's in t ...more
In this tutorial, we learn how to make a toga in two minutes. First, pick out the fabric that you want, you will need around 6 yards. Next, get in a stance with your legs apart so you have leg room to move after you wrap it around. Then, wrap the fabric around your waist, tuck ...more
In this video, we learn how to set up the mast on the Open 570 single-handedly. First, look to see where the mast is going to fit on the boat. Pick the mast up in the middle so it balances out on each side, it's very long. Turn the mast around and place the edge facing the foy ...more
In this video, we learn how to make your own sterling silver headpins. You will first need a torch (one from your kitchen will work fine), a heat protected surface, bowl of cold water, and fine silver. Next, cut out two inch pieces (or longer if that suits you best). Put on sa ...more
This video shows how to make an inside-out French braid across the front of the head. First divide the hair into three pieces like a normal braid at the very front off to one side. Instead of braiding the normal way, make the middle piece go over the top alternately on the lef ...more
Having a bad hair day? Here is the answer: French braid your bangs! Section your hair: taking the bangs with some of your hair and put it into three sections. Keep the rest of your hair aside in a ponytail. Each time that you go over the middle, pick up another small section o ...more
Today, learn the basics of lock bumping. Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially-crafted bump key. One bump key will work for all locks of the same type. This video tutorial will show you how to hack into locks with lock bumpi ...more
For those who need security on their Android devices, the standard swipe lock screen just isn't enough, so it's necessary to install applications like GOTO and WidgetLocker to enable either pattern, password or PIN protection. This protection is great overall, but when you're ...more
First Ever User-Generated HD Contest Vimeo and Canon have launched this wonderful contest for filmmakers shooting on Canon's EOS 7D DSLR. Here's Canon's official description of the contest: The Story Beyond The Still It's the first ever user-generated HD Video Contest wher ...more
This video tutorial is for educational purposes only. See how to pick a normal lock with a tension allen wrench and a small screwdriver. "Lock picking is the act of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key. Alt ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
News in a nutshell: US to announce aerial blockade of Syria Protesting against Putin Military Strike will lead to collapse of Israel Assad not ready to resign Vladimir Putin has announced his decision to run for a third time as 'President' of Russia. Thousands of anti-reg ...more
This article relates to changing the settings in Adobe Flash so that you can improve your overall computer security and privacy. Changing these settings might have a negative performance impact on your computer - but it is worth while. How to Amend Adobe Flash Settings Adobe ...more
1. Involves gate crashing a big awards event or film opening (like what AAF did with their song 'These Days': http://www.youtube.com/watch?v=JNM2tV3PA_8). Pretty much cause a huge disturbance to the proceedings of an event and see how long it takes for the police to shut you d ...more
In this tutorial, we learn how to do braided hairstyles step by step. To begin, make a small section an inch wide and then section it into three parts. Cross them over like a braid, and as you go along, pick up pieces from each side and work it into each braid. Keep gathering ...more
DARPA and Dallas's Southern Methodist University are collaborating on a super high tech camera, capable of scanning eyeballs in a moving crowd. Via Wired, "Called Panoptes, the devices use low-resolution sensors to create a high-res image that can be captured using a lightwe ...more
Breaking into a low-security lock is easy (and thus, why it's the subject of a googolplex number of Youtube tutorials made by mischievous prepubescent boys). But add a combination number to a lock and your lock-picking life gets much harder. Learn how to break a padlock and a ...more
First of all you have to start with the bungee band pony tail at behind. You can use the brush on your back hair to make it appear bigger. Use your brush on the underneath of the back hair to make it appear wider and it should appear to have a body. Pick small locks at the bac ...more
Progression, isn't it great? It used to be that video games only rewarded you with game scores. The satisfaction was always at the end, and all that mattered was getting there. Nowdays it's more Kerouac-esque,where the journey matters more than the end game. Getting there is ...more
If you are going to a toga party or just want to be prepared in case you need to improvise some clothing you will want to know how to tie a toga around yourself. This video will instruct on two ways you can tie a toga for men or for women. Step1 First, you will want to go to ...more
In honor of our recent post on the man behind MacGyver, here's a little advice from the master: "A paperclip can be a wonderous thing. More times than I can remember one of these had gotten me out of a tight spot..." MacGyver's legendary paperclip. Famous for using common eve ...more
This quick tutorial runs you through a fast and easy way to make your iPhone or iPod Touch more secure. However the best security is abstinence. Just don't run the programs that leave your devices vulnerable unless you need them. The first half of this tutorial is for those w ...more
Not sure what to be next Halloween? A princess is a classic choice. Whether you’re making a costume for your little girl, or want to feel like royalty yourself, a princess costume is always in style. You Will Need: • A party dress • Craft or fabric glue • Rhinestones and c ...more
Keep your possessions safe from thieves with these tips. You Will Need * Motion detector lights * Locks * A locksmith * A security alarm system * A safety deposit box or home safe * An engraving pen * A trusted neighbor * Bolts or wooden dowels (optional) Step 1: Eliminate bu ...more
Fishing is relaxing, but not if you hook yourself because you couldn’t cast a reel! You Will Need * A body of water * A bobber * A sinker * A fishing rod Step 1: Attach the bobber and sinker Attach the bobber to the line six to eight inches from the tip of the rod and attach ...more
Pants too long or too short? Skip the cost of a tailor – hemming your own pants is "sew" easy. You Will Need * A pair of pants * Scissors or a seam ripper * Shoes * A friend * Pins * An ironing board * Measuring tape * An iron * Thread * A needle * A dry or damp cloth (optiona ...more
Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more
You’ve finally found the perfect fabric for that new dress – don’t let careless cutting ruin your project. You Will Need * Fabric * Laundry detergent * An iron * An ironing board * Sewing chalk * Pins * A pattern * Scissors * Padding for table (optional) * Foam (optional) * Fe ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
As many of you know Windows is not the most secure Operating System in the world, but then again no OS is really secure if the user doesn't know how to protect themselves. Later I will show you how to lower the risk even more on your (the user's) end. Well onto the real stuff ...more
When I was attending college, my friends had a phantom thief in their dormitory. Almost every night, a different item of food would go missing, never to be seen again. There was constant speculation as to whom the thief was and how to catch them. Security cameras were deemed t ...more
Gone are the days when you had to carry a clunky DynaTAC to make phone calls, pocket phone book for you contact list, Sony Discman for your tunes, and wallet for you cash and credit cards. Today, all you need is your smartphone. To be specific, Google's Nexus S 4G on Sprint. ...more
Are you prone to crusades of the overambitious? Well, here's one for you: try to find and identify every animal on earth. You may think scientists have a handle on this, having pinned down 1.4 million animal species so far, but there are millions more are out there, waiting to ...more
This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project ...more
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an ...more
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
Aside from food, oxygen, sunlight and water, there are other necessities that humans arguably need today to survive—clothing, love and shelter among them. Almost everyone wears clothes, needs somebody (or something) to love and a place to call home. And what's the one thing th ...more
We've talked about the deep web before, but we never really covered the details of what's out there. It occurred to me that a nice list of resources would be very helpful to all of you anons out there. Think of this like a helpful brochure to the hidden web. However, I should ...more
If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! mo ...more
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our moderators and contrib ...more
This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that ...more
Previously, we talked about how to secure Firefox. Today, we will talk about securing a Chromium based Browser. Why? Because Chrome recently beat Firefox in holding more customers. It is obvious that Google Chrome tracks our every move online, so what alternatives is out ther ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
You can make homemade pizza with a minimum of tools, or you can buy the entire yuppie menagerie (and let's face it—if you're a foodie, you probably want the toys). Below is a brief rundown of the different options available. Since I'm a relative beginner to the process, I've a ...more
Just how private is your Facebook profile? To some extent, that's up to you. Many Facebook users share and poke their days away, never knowing about the plethora of custom privacy settings that lie just a click away. Facebook's privacy menus can look a little complicated to th ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. First off, thanks to all of our moderators ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
Social network fatigue sets in when it starts to feel impossible to keep up with all that new content from your friends, followers, and acquaintances on a daily basis. You lose track of stuff you wanted to read more about, and you miss important news from your friends, but are ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
Before jumping right into becoming the next James Neely or Moose Peterson, you're going to have get situated with your new digital SLR. No matter if you purchased the Canon EOS 5D Mark II body and lens separately or together, you've got everything you need to get started excep ...more
The DIY industry is booming, despite the desperate blackmailing of society by finance capitalists. Companies like Adafruit and Makerbot are grossing well over a million dollars a year, and Evil Mad Science Laboratories just recently dedicated themselves to running a full-time ...more
My JO was watching The Simpsons on FOX the other day, like she wholeheartedly does every evening, and I joined her, much like I always do— though I must admit, I'm not as obsessed with the cartoon family as much as she is. Just like she isn't as obsessed with SCRABBLE as I am. ...more
It's a trick that never fails to amaze. You're placed in handcuffs, but with a flick of the wrist, you're free! Kick off your career as a daring escape artist with these simple tips. You Will Need *A pair of handcuffs *A handcuff key *A bobby pin or paper clip *An assistant ...more