Welcome back, my budding hackers! One of the most time-consuming, but necessary, activities in hacking is reconnaissance. Before we can hack a system, we need to know what operating system it's running, what ports are open, what services are running, and hopefully, what appli ...more
This series of ping pong / table tennis videos demonstrate how to master the table tennis serve. Jim Clegg, a Level 4 Coach with the English Table Tennis Association and Head Coach of the Preston Table Tennis Association, explains and demonstrates how to do a table tennis serv ...more
This video demonstrates the easiest and fastest smoke bomb that a person can make. Supplies include aluminum foil, standard ping pong ball, a pen or pencil, and a flame lighter. Wrap the ping pong ball with foil, being extra careful not to tear the aluminum foil. Use the pen t ...more
Expand your arsenal of Table Tennis serves. Watch this video to learn the technique behind many of the most effective serves in Ping Pong. This video will show you how to put topsin, backspin, spidespin, all kinds of spin on the Table Tennis ball.
Why did I write this when they're tons of scanning tools available. Let's start with a real world situation. I sometimes visit clients sites that I need to obtain a usable IP address for a server or whatever. Believe it or not, they are networks that are configured with class ...more
How cool are smoke grenades? You toss 'em into the air and they explode into a vision of thick clouds and smoke, preventing your enemy from seeing you as you stealthily sneak past him and shoot him upside the head with a paintball gun. The great thing about smoke grenades is ...more
You can do a lot with liquid nitrogen, including freeze and shatter gummy bears, make homemade Dippin' Dots, and scare the crap out of your friends by dipping your hand in it! If you can't get your hands on any, you can even make it yourself. Or, if you want to try something a ...more
What can you do with a hair dryer besides dry your hair? Lots. You can remove stickers from clothing, clean up crayon marks, and mold your plastic eyeglasses for a better fit. But how about something a little more fun? Well, you can levitate things. Ping pong balls, to be exac ...more
Can you float a ping pong ball in mid air? According to Outreach Science Educator Jason Lindsey you can and all you need is a hair dryer. This is a great way to demonstrate wind and gravity with household objects. Check out this demonstration from Hooked On Science to learn m ...more
A network security tutorial on using ping and tracert to show th IP of a webserver, your own IP, your ISP's IP, who they connect to, and what computers your request goes through before reaching a destination.
In the "Harry Potter" book series, the golden snitch is the most elusive ball in Quidditch to catch, faster than a hummingbird and nigh impossible to see. Those who do manage to catch the golden snitch - including Harry - are met with great applause and victory. Craft and sna ...more
This square dance video teaches the following plus level square dance calls: Fan the Top, Acey Deucey, Tea Cup Chain, Ping Pong Circulate.
Here's an awesome weekend project that could leave you with a fearsome "Ping Pong Ball Mauler" capable of firing hundreds of balls a minute at your unsuspecting neighbors. Christian Reed built it out of a poly drum and a homemade pneumatic device. He turned a standard shop vac ...more
The true masters of ping pong show you how to do varies grips to hold a ping pong paddle.
Ruan Olivier(Blue shirt) and John Getty(Black shirt) show you have to remove a dent from a ping pong ball.
There are few apps or services better than Slack for keeping a team both communicative and productive. But it also makes it difficult to escape your job — after work hours and weekends should be yours, not Slack's. If you want to stop the barrage of notifications and messages ...more
The true masters of Ping Pong show you how to execute the forehand smash in ping pong.
The video shows how to make an extra long ping pong smoke bomb. For this we need a long sheet of aluminum foil (length of the foil depends on the number of ping pong balls we use), 12 ping pong balls is used in the video (any number of balls can be used), a pair of scissors an ...more
Quickly bring a dented Ping Pong Ball back to life on the fly. Also, watch to the end if you just want to see how to make a pong ball shoot flames. This is a very helpful and effective martial arts technique.
From California is a Place, a portrait of young ping pong Olympic hopefuls at the ICC in Milpitas, California. These kids practice 10 hours a day. To the decent adult ping pong player. You are inferior. So get to it. Start practicing. Previously from California is a Place: A ...more
Tekzilla shows you how to troubleshoot network woes with ping and traceroute.
Arduino fashion (essentially, electronic textiles that can perform a variety of functions) is certainly not a new idea, but the Ping social networking garment brings a fresh and exciting perspective to the concept. What's it all about? Designer Jennifer Darmour's statement: ...more
This is a video tutorial in the Computers & Programming category where you are going to learn how to find and ping your IP address. Go to start > run and type in "cmd" to get the DOS window. Here type in "ipconfig" and hit enter. If you are online, your IP address will be disp ...more
In this little video tutorial, Bryce shows us what it takes to make a smoke bomb using not one or two ping pong balls, but six! All you need is six ping pong balls (of course), foil, scissors, a lighter, and some patience. Make sure to do it outside and be careful of the smoke ...more
The true masters of ping pong give out some tips for doing the backhand punch.
Shaving Cream Man teaches us how to create a Pong-o-nator. This chindogu invention is the best way to re-ignite your passion for ping pong for you and your family. Another great video from the Shaving Cream Man Solution Show.
The true masters of ping pong show you how to do the backhand block in ping pong.
In this series of videos you'll learn how to play table tennis. Expert Scott Browder shows you the basics, from how to pick a ping pong table, paddles and balls, to the basic types of shots you'll need to become a ping pong master. Part 1 of 20 - How to Play ping pong. Play pi ...more
In this series of videos you'll learn how to play table tennis. Expert Scott Browder shows you the basics, from how to pick a ping pong table, paddles and balls, to the basic types of shots you'll need to become a ping pong master. Part 1 of 27 - How to Play intermediate ping ...more
Info Summary: Website: EducateTube.com | Your Host: Sipski Bupong - The Coolest Home Made DIY Invention - Ping Pong Bazooka - Powered by butane. This is not a toy and should never be built without a proper understanding of safety procedures. Always wear safety goggles and do ...more
In this video magician David Zanthor shares an age old magic trick. You will need a willing human, a deck of cards, a rubber band, two identical coins and skills. The trick? It involves Ing Ping Ching energy and it is quite involved...so you will have to watch the video! Do th ...more
Learn one of the world's most popular games. It's actually good exercise, too! Step 1: Decide who goes first Decide who serves first by flipping a coin. It’s easier to play with two players when first learning the game. Step 2: Serve the ball Start by serving. Hold a paddle ...more
Here is the amazingly original social network trailer Here is a parody of that trailer done for ping. Its amazing what a single track of music can do to create the feeling of a trailer.
A great tool for any system administrators, the iPhone (or other Apple wifi device) app Ping a Majig allows you to enter in the IP addresses of websites. Then you can keep checking on them to make sure they are running smoothly and operating correctly. You can click on the web ...more
Looking for a convenient way to advertise your blog and promote your content? With Ping-o-Matic, it's easy! So easy, in fact, that this home computing how-to from the folks at Easily can present a complete (and somewhat talky) overview of the process in just under six minutes' ...more
There are many people on the web today who, when they submit content wait for the search engine spiders to crawl and find out the content on their site has been updated. Wouldn't you like to know how let the search engines know ahead of time that your content has been udpated? ...more
Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet. So no, there's no such ...more
Old people are usually perceived as wise and enduring, whereas an old smartphone, like my iPhone 4, becomes the butt of a joke every time I take it out of my pocket. I mean, come on, it's not like I'm still rocking one of these... And if I was, I guarantee you wouldn't beat my ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
Your Apple Watch is a fantastic tool that can help you perform daily tasks on your iPhone. Notifications get filtered through it, you can respond to messages on it, and you can even use Apple Pay to purchase goods and services. Your Apple Watch is also a valuable asset when it ...more
One of the most exciting things as an ethical hacker, in my opinion, is catching a reverse shell. But often, these shells are limited, lacking the full power and functionality of a proper terminal. Certain things don't work in these environments, and they can be troublesome to ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
I'm sure that many of us have heard of that nasty Shellshock vulnerability, but not very many people know how to exploit it. Try these few tricks on vulnerable websites! Background Information So, what is Shellshock? Shellshock is a vulnerability in Bash shell (v1.1 to v4.3 ...more
In this article I'll show you how to make a simple IP address notifier. The program will text you your new IP address, in the event that it changes. For those of you with dynamic IPs, this is very useful. I'm constantly frustrated when my IP changes, and it's handy to be notif ...more
With over 1 billion downloads on the Play Store alone, Google Maps has become a staple for those traveling. Its popularity is the result of Google consistently improving its accuracy and adding new functionality. And this was only achieved with help of you — specifically, your ...more
Smartphones are now indispensable when traveling. Domestic and overseas travel alike require food, navigation, translation, and so much more to make work or vacation successful. Gone are the days of lugging multiple tourist books around with you everywhere you go — you need to ...more
Unruly customers. Crazy exes. Horrible bosses. When you need proof of insanity or just want it for your records, recording a phone call is a must. Problem is, it's not the easiest thing to do on an iPhone — but it's completely possible. Even though there are plenty of legit r ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swi ...more
While many people may use Bluetooth every day, the majority don't know how it works or that it can be hacked. Bluetooth hacking gives a clear window into the world of the target. Nearly every device has Bluetooth capabilities, and people store a great deal of personal info on ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more
Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks. For those of you who are new here, a denial of service is basica ...more
Welcome back, my hacker apprentices! Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on. In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are ess ...more
Nowadays many schools and colleges have blocked the social community sites from accessing them through school computers. The video shows how one can access to these sites using a command prompt. Follow these steps and access the blocked sites: 1. Go to the start menu and ope ...more
Each flavor of sake, the national spirit of Japan, comes with its own fans, not unlike whiskey aficionados here in the States. While sake is often called "rice wine," it is more akin to a malted beverage like beer. Unfortunately, many people's first exposure to sake comes in ...more
No website will be inaccessible and no web filter will deny you content once you learn the skills presented in this internet hacking video. In this tutorial you'll learn how to access blocked websites as well as to bypass web filters using URL scripting, HTTP proxies, and a w ...more
Ralph Waldo Emerson once observed that "the seed of science" was "wonder," and taking a look at this nine-layer liquid tower from Steve Spangler's Sick Science! channel, one can't help but do just that — wonder. How is this possible? Is this magic or what? While it's not exac ...more