In the digital age, old fashioned film processing and developing may seem outmoded and obsolete. However, for professional and aspiring professional photographer who want o make classic-looking prints, this is far from the case. This three-part video describes how to do tray p ...more
This video shows you how to stencil a t-shirt with inks. Tape the t-shirt onto a piece of cardboard with masking tape. Lay the stencil on the t-shirt and tape some blank paper at the edges to ensure that there is no splashing on the sides. Some mist paint in blue Hawaiian is u ...more
An introduction to a popular and delicious Filipino saucy pork and rice noodle dish demonstrated by a friendly authentic chef. For the more experienced and adventurous cook who is curious about Filipino cuisine. This video might be best viewed with a print out of the recipe at ...more
Learn how to find latent finger prints on brass surfaces, such as fired cartridge cases. Called the Acidified Peroxide method, using only white distilled vinegar and hydrogen peroxide that you can find at your local drugstore, you can uncover fingerprints that is usually impos ...more
Margot Potter, otherwise known as The Impatient Crafter, provides a thorough examination and demonstration of the ProvoCraft YuDu home screen printing machine from start to finished product (in this case a screen printed tee-shirt). This video is effective both as an introduct ...more
Creating any object you want is as simple as point and click if you have a 3D printer at home. If you don't have one handy, there are a few companies that offer printing services online. But to help services realize your design in extruded plastic, you have to make a 3D comput ...more
The possibilities are endless for 3D printing. With your very own 3D printer, you can make spare parts, circuit boards, inflatable balloons, duplicate keys, Minecraft cities, and even tiny replicas of your face. From a more artsy standpoint, you can make complex sculptures, li ...more
You've seen the felt mouse, which made computer clicking comfortable and chic, now brace yourself for something a little more interactive—DataBot. DataBot hails from the clever minds of Jan Barth and Roman Grasy, two Interaction Design students based in Germany who wanted to ...more
As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more
Have an old-school tabula recta lying around? No? Then just print out the chart below. Nothing ensures better password security than this centuries-old cipher technique. Here's how it works, via Wikipedia: "Using a tabula recta, each alphabet is shifted one letter to the left ...more
A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more
Your first, very basic web crawler. Hello again. Today I will show you how to code a web crawler, and only use up 12 lines of code (excluding whitespaces and comments). Requirements Python A website with lot's of links! Layout the logic. OK, as far as crawlers (web spider ...more
Snapseed is a highly regarded and award-winning photo-editing app for iOS devices. Originating out of image manipulation specialist Nik Software in San Diego, Snapseed is Apple’s iPad App of the Year and, after using it for the purposes of this review, I believe it points to t ...more
This is one of the easiest and best computer pranks ever invented. It's simple to do, and works great. This prank causes all of the icons on the desktop to be unclickable, as well as the start bar. 1. At your desktop, close all windows if any are open, and press Print Screen/ ...more
You may have already heard of Zazzle, an online service that allows you to print on a variety of goods (tees, mugs, posters, etc.). You can design-it-yourself, or choose from Zazzle's library of available designs. Of late, Zazzle has partnered with Keds to offer something a b ...more
CRISIS MANAGEMENT PLAN A FORM TO FILL OUT FOR WHEN CRISES ENTER YOUR WORLD I have carried a Crisis-Management Plan and a Medical Alert Book with me for about 4 years now, and it has been just as valuable to have on hand as my health card. In times when I am unable to speak, ...more
There's a time in everyone's life when they need to become immortalized and reprographed in a full-blown comic spread, complete with halftone dots and speech bubbles—or squares, if you're a square. With our favorite program Photoshop, you can quickly turn any hyperbolic celebr ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
As per Alex's request, I am posting about generating word-lists in Python. However, this is my FIRST attempt with Python, so please provide me with critiques and any and all comments. I really want to know what you think as there was a little bump here and there seeing as I a ...more
In honor of the new Astronomy World, I thought we should look at a few planetary icosahedrons. The icosahedron is the most round of the Platonic solids with twenty faces, thus has the smallest dihedral angles. This allows it to unfold into a flat map with a reasonably acceptab ...more
Here's a Math Craft project that takes less than 20 minutes, has an attractive, practical result, and is at least a little mind-blowing due to folding along curves. The designer of these boxes is Phillip Chapman-Bell, who runs an amazing origami blog and has a spectacular fli ...more
To make things a little more fun here on Scrabble World, I've decided to start a weekly feature for word freaks to ponder about it... a challenge. No, I'm not 'challenging' any of your words... I'm challenging your brains. See if you can figure some of these Scrabble puzzles o ...more
Aside from food, oxygen, sunlight and water, there are other necessities that humans arguably need today to survive—clothing, love and shelter among them. Almost everyone wears clothes, needs somebody (or something) to love and a place to call home. And what's the one thing th ...more
This is my fourth (and final) installment on SCRABBLE adverts. I'm sure there's a lot I haven't found, but that's for another day. But this post features all of the remaining SCRABBLE advertisements (prints and posters) that haven't already been listed in my previous posts: O ...more
So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA. Before We Begin You must have the latest version of Java Development Kit ...more
This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more
Last Thursday's post demonstrated how to Make Yin-Yang Pillow boxes, which were based on equilateral triangles and squares. The units for making these boxes were created by Phillip Chapman-Bell, who runs an amazing origami blog and has a spectacular flickr photostream. Using t ...more
It's another Monday, which means it's once again time to highlight some of the recent community submissions posted to the Math Craft corkboard. Additionally, I thought we'd take a look at the process of stellation and make some stellated polyhedra out of paper.Rachel Mansur of ...more
Difficulty Level: Moderate Photoshop Skills Photoshop isn't just for zapping zits and adding freaky colors to sunset pictures! You can use it for fun, altered-reality pictures, too. If you have a tripod and some friends, you can combine many exposures as separate layers and u ...more
Color Correction: Put Your Best Foot Forward via Hurlbut Visuals My first experience with the 5D DI color correction was for the Terminator Webisodes produced by the Bandito Brothers through Wonderland Sound and Vision. McG asked me to be the Director/Cameraman for these al ...more
It’s hard to know where to start talking about a book like 2666. That’s partly because, in some ways, it’s actually five books. Published posthumously, the book begins with “A Note from the Author’s Heirs” explaining that, before his death, Bolano stipulated the book be publis ...more
Graffiti is a great way of getting your message out to the masses. The earliest known graffiti dates back to 30,000 years ago and used the traditional apply-paint-to-wall technique. Though our paint now comes in cans and not from scavenged berries, the actual graffiti process ...more
If you thought the last post on Two Circle Wobblers was wild, then wait until you see what happens when you build wobblers out of two half circles or two ellipses. In both of these cases, the center of gravity still remains constant in the vertical direction, allowing them to ...more
The manual that's included with the Canon EOS 5D Mark II is a great starting point for learning the camera, but it's definitely not the only place you should be getting your information from if you intend to master your 5D Mark II. If you don't have the manual, you can downloa ...more
D.I.Y.: Start Your Own Cassette Label! By adam_schragin on Aug 4, 2008 at 10:56am in DIY Let’s say you’ve got the itch to start your own label. You’ve got the typeface all picked out, the clever name ready, and an idea of what sort of music you’d like to showcase. What you d ...more
Planning the Trip Get lots of brochures Send for brochures of the places you will be visiting. Make a travel book with the brochures to get the grandchildren and their families excited. The best place to contact for these brochures are the Visitors Bureaus or the Chamber of ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
Not every DIY project is as executable as, say, making a potato gun. Occasionally, we observe a quixotic project that is just plain wonderful. Consider rich guy Philip Anschutz and his eponymous Anschutz Entertainment Group (AEG). His ambition to bring an NFL team to Los Angel ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
Summer is almost here and you’re looking forward to that exotic vacation but you are going to need a passport and photos to go in it. There are a few simple ways to get a photo for your application. Find the method that is best for you and get traveling. Whether you are apply ...more
This is very simple but would take a little time. Get a stone or cubic zirconia or jewel of some sort about the size of a gum ball . . . start with one member of the Jackass crew swallowing it and waits until it passes through their system and then they poop it out. When they ...more
With smartphone cameras and software getting better and better every year, more and more users are getting passionate about photography. So when you're shopping for a gift to get someone, if they have a smartphone, chances are they'll more than appreciate some tools and access ...more
Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise the ...more
Sup? Today, we'll be learning about for loops in Java: What they are, how they work, and how to create them. Lets begin In Java, like many other programming languages, we have Loops, which are functions that repeat the statement(s) within their brackets until something withi ...more
Hello, Null Byte! Mkilic here. I doubt anyone knows I even exist on Null Byte, so hopefully this post will allow me to become more involved in the community and also help me learn even more. This project is somewhat similar to OTW's article here, and pry0cc's here, in which b ...more
Hello fellow training hackers. I do not know if many of you are familiar with ruby, but since it is a useful scripting language, that hasn't been covered too much here on Null Byte, I thought why not do some How-tos about it now and then. The idea is to write simple scripts ...more
Welcome back, my amateur hackers! Over the course of the next year, we will be developing our own zero-day exploits. In my first article in this series, I introduced you to buffer overflows, which are the source of some of the most lethal exploits, particularly the "remote co ...more
Video: . Learn how to make a paper origami gift bag with/without handles tutorial. In case you need a small giftt bag you can make this one easy. In this video tutorial i will teach you how to make a small paper bag with size approximately width10cm x height 15cm What do you ...more
You know that you have the Gmail app on your iPhone. After all, you get Gmail notifications, you see it in the app switcher, it's in the Settings app, and there's an "Open" button in the App Store instead of "Get" or a download icon. But you cannot find the app on your Home Sc ...more
While our time with the Protostar VM from Exploit Exercises was lovely, we must move on to bigger things and harder challenges. Exploit Exercises' Fusion VM offers some more challenging binary exploitation levels for us to tackle. The biggest change is that these levels are al ...more
SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to ...more
Gaining access to a system is always exciting, but where do you go from there? Root or bust. Sure, a compromised host is a great way to run a botnet, or do some other boring, nefarious thing—but as hackers, we want root. We also want to take the easiest path possible, search o ...more
When Apple announced its new iPhone 7 and iPhone 7 Plus models in San Francisco, one of the biggest new features was an "IP67" water-resistance rating. Couple that with a few official renderings that show the new iPhone covered in water, and you'd probably arrive at one logica ...more
Hello my fellow hackers, Welcome to my republished revision of the ruby programming language, Part 1. Today, we will try to build an ftp cracker in ruby: This is going to be a quick one since OTW has already made one in python and we are gonna look upon that to create a simil ...more
A developer from a firm named Tendigi came up with a way to run Android Marshmallow 6.0.1 on an iPhone 6 Plus, and it's pretty awesome. The hack is the brainchild of Nick Lee, who had previously installed Windows 95 on an Apple Watch, and you can see it in action below. Video: ...more
NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when atta ...more
During our last adventure into the realm of format string exploitation, we learned how we can manipulate format specifiers to rewrite a program's memory with an arbitrary value. While that's all well and good, arbitrary values are boring. We want to gain full control over the ...more
In case you didn't catch the big event in Cupertino, Apple just unveiled two of the most cutting-edge phones ever made — the iPhone 8 and the iPhone X. Out of the many glorious specs that were rattled off on stage, one stands out for being just a little confusing: Both models ...more
In previous tutorials we have encountered these things called pointers and addresses but we still don't know what they really are. Let's learn a bit more to clear things up. What Are Pointers and Addresses? A pointer is a type of variable which as been combined with the dere ...more
Welcome back! In the last training session, we covered logical and membership operators. We're going to switch gears and expand our knowledge of lists. More specifically, we're going to be discussing list slicing and comprehension, in that order. You may be asking what these ...more