This series of ping pong / table tennis videos demonstrate how to master the table tennis serve. Jim Clegg, a Level 4 Coach with the English Table Tennis Association and Head Coach of the Preston Table Tennis Association, explains and demonstrates how to do a table tennis serv ...more
Welcome back, my budding hackers! One of the most time-consuming, but necessary, activities in hacking is reconnaissance. Before we can hack a system, we need to know what operating system it's running, what ports are open, what services are running, and hopefully, what appli ...more
Expand your arsenal of Table Tennis serves. Watch this video to learn the technique behind many of the most effective serves in Ping Pong. This video will show you how to put topsin, backspin, spidespin, all kinds of spin on the Table Tennis ball.
This video demonstrates the easiest and fastest smoke bomb that a person can make. Supplies include aluminum foil, standard ping pong ball, a pen or pencil, and a flame lighter. Wrap the ping pong ball with foil, being extra careful not to tear the aluminum foil. Use the pen t ...more
How cool are smoke grenades? You toss 'em into the air and they explode into a vision of thick clouds and smoke, preventing your enemy from seeing you as you stealthily sneak past him and shoot him upside the head with a paintball gun. The great thing about smoke grenades is ...more
You can do a lot with liquid nitrogen, including freeze and shatter gummy bears, make homemade Dippin' Dots, and scare the crap out of your friends by dipping your hand in it! If you can't get your hands on any, you can even make it yourself. Or, if you want to try something a ...more
A network security tutorial on using ping and tracert to show th IP of a webserver, your own IP, your ISP's IP, who they connect to, and what computers your request goes through before reaching a destination.
What can you do with a hair dryer besides dry your hair? Lots. You can remove stickers from clothing, clean up crayon marks, and mold your plastic eyeglasses for a better fit. But how about something a little more fun? Well, you can levitate things. Ping pong balls, to be exac ...more
Why did I write this when they're tons of scanning tools available. Let's start with a real world situation. I sometimes visit clients sites that I need to obtain a usable IP address for a server or whatever. Believe it or not, they are networks that are configured with class ...more
Can you float a ping pong ball in mid air? According to Outreach Science Educator Jason Lindsey you can and all you need is a hair dryer. This is a great way to demonstrate wind and gravity with household objects. Check out this demonstration from Hooked On Science to learn m ...more
This square dance video teaches the following plus level square dance calls: Fan the Top, Acey Deucey, Tea Cup Chain, Ping Pong Circulate.
The true masters of ping pong show you how to do varies grips to hold a ping pong paddle.
The true masters of Ping Pong show you how to execute the forehand smash in ping pong.
Ruan Olivier(Blue shirt) and John Getty(Black shirt) show you have to remove a dent from a ping pong ball.
In the "Harry Potter" book series, the golden snitch is the most elusive ball in Quidditch to catch, faster than a hummingbird and nigh impossible to see. Those who do manage to catch the golden snitch - including Harry - are met with great applause and victory. Craft and sna ...more
From California is a Place, a portrait of young ping pong Olympic hopefuls at the ICC in Milpitas, California. These kids practice 10 hours a day. To the decent adult ping pong player. You are inferior. So get to it. Start practicing. Previously from California is a Place: A ...more
Quickly bring a dented Ping Pong Ball back to life on the fly. Also, watch to the end if you just want to see how to make a pong ball shoot flames. This is a very helpful and effective martial arts technique.
Here's an awesome weekend project that could leave you with a fearsome "Ping Pong Ball Mauler" capable of firing hundreds of balls a minute at your unsuspecting neighbors. Christian Reed built it out of a poly drum and a homemade pneumatic device. He turned a standard shop vac ...more
Tekzilla shows you how to troubleshoot network woes with ping and traceroute.
Arduino fashion (essentially, electronic textiles that can perform a variety of functions) is certainly not a new idea, but the Ping social networking garment brings a fresh and exciting perspective to the concept. What's it all about? Designer Jennifer Darmour's statement: ...more
The video shows how to make an extra long ping pong smoke bomb. For this we need a long sheet of aluminum foil (length of the foil depends on the number of ping pong balls we use), 12 ping pong balls is used in the video (any number of balls can be used), a pair of scissors an ...more
Acquire over 500 ping pong balls. Acquire the keys to your friends automobile. Find out block of time that your friend is away from their automobile. Unlock friends car when they are at work. Fill front seat below window level with the acquired ping pong balls. Hide with camer ...more
The true masters of ping pong give out some tips for doing the backhand punch.
The true masters of ping pong show you how to do the backhand block in ping pong.
Shaving Cream Man teaches us how to create a Pong-o-nator. This chindogu invention is the best way to re-ignite your passion for ping pong for you and your family. Another great video from the Shaving Cream Man Solution Show.
In this series of videos you'll learn how to play table tennis. Expert Scott Browder shows you the basics, from how to pick a ping pong table, paddles and balls, to the basic types of shots you'll need to become a ping pong master. Part 1 of 27 - How to Play intermediate ping ...more
In this series of videos you'll learn how to play table tennis. Expert Scott Browder shows you the basics, from how to pick a ping pong table, paddles and balls, to the basic types of shots you'll need to become a ping pong master. Part 1 of 20 - How to Play ping pong. Play pi ...more
This is a video tutorial in the Computers & Programming category where you are going to learn how to find and ping your IP address. Go to start > run and type in "cmd" to get the DOS window. Here type in "ipconfig" and hit enter. If you are online, your IP address will be disp ...more
In this little video tutorial, Bryce shows us what it takes to make a smoke bomb using not one or two ping pong balls, but six! All you need is six ping pong balls (of course), foil, scissors, a lighter, and some patience. Make sure to do it outside and be careful of the smoke ...more
Learn one of the world's most popular games. It's actually good exercise, too! Step 1: Decide who goes first Decide who serves first by flipping a coin. It’s easier to play with two players when first learning the game. Step 2: Serve the ball Start by serving. Hold a paddle ...more
In this video magician David Zanthor shares an age old magic trick. You will need a willing human, a deck of cards, a rubber band, two identical coins and skills. The trick? It involves Ing Ping Ching energy and it is quite involved...so you will have to watch the video! Do th ...more
Info Summary: Website: EducateTube.com | Your Host: Sipski Bupong - The Coolest Home Made DIY Invention - Ping Pong Bazooka - Powered by butane. This is not a toy and should never be built without a proper understanding of safety procedures. Always wear safety goggles and do ...more
Here is the amazingly original social network trailer Here is a parody of that trailer done for ping. Its amazing what a single track of music can do to create the feeling of a trailer.
Looking for a convenient way to advertise your blog and promote your content? With Ping-o-Matic, it's easy! So easy, in fact, that this home computing how-to from the folks at Easily can present a complete (and somewhat talky) overview of the process in just under six minutes' ...more
A great tool for any system administrators, the iPhone (or other Apple wifi device) app Ping a Majig allows you to enter in the IP addresses of websites. Then you can keep checking on them to make sure they are running smoothly and operating correctly. You can click on the web ...more
There are many people on the web today who, when they submit content wait for the search engine spiders to crawl and find out the content on their site has been updated. Wouldn't you like to know how let the search engines know ahead of time that your content has been udpated? ...more
|Updated December 2017. Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, the handset's data connection ensures that tracking cookies, advertising IDs, and ...more
Old people are usually perceived as wise and enduring, whereas an old smartphone, like my iPhone 4, becomes the butt of a joke every time I take it out of my pocket. I mean, come on, it's not like I'm still rocking one of these... And if I was, I guarantee you wouldn't beat my ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
In this article I'll show you how to make a simple IP address notifier. The program will text you your new IP address, in the event that it changes. For those of you with dynamic IPs, this is very useful. I'm constantly frustrated when my IP changes, and it's handy to be notif ...more
I'm sure that many of us have heard of that nasty Shellshock vulnerability, but not very many people know how to exploit it. Try these few tricks on vulnerable websites! Background Information So, what is Shellshock? Shellshock is a vulnerability in Bash shell (v1.1 to v4.3 ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
Nowadays many schools and colleges have blocked the social community sites from accessing them through school computers. The video shows how one can access to these sites using a command prompt. Follow these steps and access the blocked sites: 1. Go to the start menu and ope ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
No website will be inaccessible and no web filter will deny you content once you learn the skills presented in this internet hacking video. In this tutorial you'll learn how to access blocked websites as well as to bypass web filters using URL scripting, HTTP proxies, and a w ...more
Welcome back, my greenhorn hackers! For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it's virtually unknown outside. It's so powerful and usef ...more
Welcome back, my hacker apprentices! Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on. In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are ess ...more
Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more
Welcome back, my greenhorn hackers! In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different. In many restaurants, hote ...more
The older I get, the more my Friday nights involve watching Netflix at home with a bottle of Maker's Mark and a box of Oreos. Netflix is a big part of my life, and I'm not alone. YouTube and Netflix make up over 50% of all activity on the Internet, so it might be worth your ti ...more
Each flavor of sake, the national spirit of Japan, comes with its own fans, not unlike whiskey aficionados here in the States. While sake is often called "rice wine," it is more akin to a malted beverage like beer. Unfortunately, many people's first exposure to sake comes in ...more
Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks. For those of you who are new here, a denial of service is basica ...more
Ralph Waldo Emerson once observed that "the seed of science" was "wonder," and taking a look at this nine-layer liquid tower from Steve Spangler's Sick Science! channel, one can't help but do just that — wonder. How is this possible? Is this magic or what? While it's not exac ...more
This video will show you how to make your own command prompt and how to use command prompts to get onto blocked sites . Steps to make your own command prompt: 1. Open notepad. 2. Type the following: @ echo off Start command 3. Now click on file option from the menu and save ...more
Android has released a new application called ezNetScan, which is a free app that scans the wireless network you're connected to and gives you a full log of all of the devices connected to that network. This isn't new for smartphone users, let alone Android users. Fing has bee ...more
Like all absent-minded people, I occasionally misplace my iPhone around the house. It's typically just under a cushion after being swallowed by my couch, but I instantly go into panic mode from the insecurity of not having my phone on me at all times. Before the Apple Watch c ...more
In this how-to, I will be demonstrating a few of the tactical applications of Besside-ng, the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any networ ...more