How To : Program a random number generator in C++
How to use the rand function in C++ to create a random number generator.
How to use the rand function in C++ to create a random number generator.
Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to genera ...more
Though impressive, reading minds in person has been done and overdone. Revamp this tired sport by learning how to mind read over the phone and even on Twitter. Watch this video for Scam School's method of reading minds over social media mediums. So whether you're at the bar o ...more
In this clip, you'll learn how to create a random password generator class in Flash Builder with PHP. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in t ...more
Bring a little bit of the excitement of Las Vegas to your Minecraft world. Watch this video to learn how to build a working slot machine, based on a random number generator, in your Minecraft map. Luck be a mob tonight. Part 1 of 2 - How to Build a working slot machine in Mine ...more
Have an old-school tabula recta lying around? No? Then just print out the chart below. Nothing ensures better password security than this centuries-old cipher technique. Here's how it works, via Wikipedia: "Using a tabula recta, each alphabet is shifted one letter to the left ...more
Sick of losing quarters to machines that promise you toys? Wanna win the stuffed piggy once and for all? Our guy Matt has won loads of stuffed piggies and he's going to show you how! Matt's an arcade game fanatic. So obsessed, he's purchased his very own claw machine just to ...more
Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own h ...more
There's a new trend on Instagram Stories: People are making viral AR filters where images of popular characters from TV shows, movies, and other mediums shuffle above your head until one sticks. The filters range from Disney and Pokémon characters to Harry Potter and Friends, ...more
The Calculator app is probably one of Apple's most-used iPhone apps, yet I always meet people who don't know all the little tricks there are to using it more efficiently. You may know most of them, but there's a chance you don't or at least forget about some of them. What a " ...more
Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a " ...more
Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more
Google has a few hidden tools you might not have discovered yet, and they work in Google Search, in the Google app, and with Google Assistant — on both iPhone and Android phones. We all know smartphones do much more than make phone calls. They serve as cameras, GPS navigators ...more
At the risk of breaking a few rules, we're going to talk about Fight Club. More specifically, digital artist Mateusz "Marpi" Marcinowski has mimicked a scene from the movie using Apple's ARKit. In the "IKEA Nesting Instinct" scene, while the narrator ruminates about his consu ...more
Everything you post on social media lives there forever — even if you delete it. Just ask anyone that's ever posted something stupid. Instagram does not provide built-in tools to save or download images and videos from other users, but there are workarounds. Third-party tools ...more
Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making cus ...more
Word games can expand your vocabulary skills in all sorts of exciting and creative ways. Because of this, both the iOS App Store and the Google Play Store are awash with word games, making it hard to differentiate between good and bad titles. This is especially troublesome if ...more
Fable 3, like many modern 3rd person games it seems, has a Banjo Kazooie-like number of random collectibles for you to find to enjoy the entire game experience. One of these sets is Rare Books. There are a ton and tracking them down takes a long time, so watch this video to le ...more
Been hacked once? Twice? Maybe more? You thought abc123 was the only password that is both 6 characters wide and easy to remember? I have some suggestions in store for you. Just read on... An Introduction There are passwords that look tremendously sexy (as opposed to gibberi ...more
Make your own personalized coasters using Scrabble tiles! You design them, so they can say anything you want them to! Pick a theme and make a set or make each coaster completely different from the rest. What You'll Need Scrabble tiles Glue gun Squares of wood or cork (about ...more
1.Here 10-50 and 300-400 numbers are taken for example to generate the random numbers within the limit in Excel. We using the command of "randbetween" for generate the random numbers and we won't get the decimal or fraction values.2.Now type "=randbetween(10,50)" which means t ...more
This video shows you how to generate random numbers with decimals in Microsoft Excel.When generating random numbers you must have a lower and upper limit, so that your number will be generated between the two limits. For a number without decimals, you only have to use the "=ra ...more
Need four different colored (green "cheat", blue, orange red and purple) Jacks along with a double-sided red card and another red-backed random numbered card for a total of six cards. Shuffle the cards in front of the viewer with the three red cards on top then blue, green, or ...more
In this tutorial, we learn how to make a safe password. Passwords are essential, and need to be safe for when browsing around the internet. Other people aren't meant to be able to nose around your information, so protect your information with an indecipherable password. Don't ...more
Developers have created many tools for testing the strength of passwords (1, 2); there are also plenty of tips for coming up with a strong password in the first place. But why do the grunt work when an app could generate a perfectly secure one for you? There are plenty of pas ...more
The idea behind this prank is two of the guys will go head to head trying to get one girls number and one guys number, both just random people on the street. Sounds simple right? No, they must tattoo the number on themselves right there in the street to make it count. The firs ...more
It turns out that the silver crinkly material traditionally used for wrapping leftovers and making funny hats to block out messages from extraterrestrial beings is pretty darn useful for a number of other random but handy tasks, such as sharpening your scissors and keeping bug ...more
Central limit theorum is easily one of the most fundamental and profound concepts in statistics and perhaps in mathematics as a whole. In probability theory, the central limit theorum (CLT) states conditions under which the mean of a suffiently large number of independent rand ...more
Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more
As per Alex's request, I am posting about generating word-lists in Python. However, this is my FIRST attempt with Python, so please provide me with critiques and any and all comments. I really want to know what you think as there was a little bump here and there seeing as I a ...more
In order to clear the cell content in Excel, using a macro, you will first need to have a table. If you don't already have a spreadsheet, you will need to create one with random numbers. Next, highlight some numbers, by clicking one box and dragging in order to select a number ...more
Today's tutorial will teach you how to erase data permanently so that it cannot be recovered. Many believe that having a file shredder on the computer means you are up to no good. So when might you want to use a secure eraser? Lets say you scanned your drivers licence because ...more
Math Problem Generator gives a video about how to add and subtract variables. All you have to do is combine the coefficient, which is the number that comes before the variable. The numbers are added or subtracted but the variable remains the same. In the video, the example giv ...more
So, you're all excited you went ahead and 'upgraded' your iPhone 3G to IOS 4.0X so you could reap all the benefits of all the new features. As it turns out, many of the best features in IOS 4.0X are not available for the 3G, such as the Bluetooth keyboard, selectable backgrou ...more
In order to win at playing slot machines, you need to keep a few things in mind. Slot machines are not random. They are programmed to pay out at certain times, in certain amounts, and at certain intervals. Most states have laws stating the number of times or the amount of mon ...more
The Golden State Warriors' Monta Ellis is some kind of basketball freak-of-nature. He just tosses it over his shoulder on his way to the locker room. Just like that. According to Hoop Doctors, "At age 24, Ellis is one of the league’s fastest rising young stars and has earned ...more
Sanding is an important step when preparing wood for painting or staining. You Will Need * Sandpaper of varying grits * A random-orbit finishing sander * A sanding block * Safety goggles * A dust mask * And a shop vacuum * A pencil WARNING: Always wear safety goggles when ope ...more
Game design is sedentary work. Generally its practitioners do their work with their butts planted securely in front of a computer in an office (be it home or away) as their muscles and verbal skills atrophy. Even game journalists are prone to this condition. Not so with Colin ...more
With the holidays over, a lot of people with shiny new Google Homes are getting their first chance to explore the new Google Assistant. Before the Google Home's release, the Assistant was only available for the Google Pixel and Pixel XL, or in a text-based form with Google All ...more
Despite a rocky start with plenty of feature disparity, the Google Assistant now provides a pretty consistent experience regardless of what device you're using it on. Be it Android, iPhone, or Google Home, the AI behind the Assistant is virtually identical — including its quir ...more
The Augmented World Expo or AWE — if you are a big fan of AR/MR technology, that is a very fitting acronym — is the world's largest conferences dedicated to all things augmented, mixed and virtual reality. AWE is in its 8th year, and with the massive growth we have seen in the ...more
Hello people again, I wrote my last post about crypto about 10 months ago, now I will introduce something not fresh for the science, but fresh for the people who wants to learn. In my http://null-byte.wonderhowto.com/forum/cryptography-0161538/ post of crypto concepts, there i ...more
Imagine being able to play a video instantly on hundreds of thousands of devices across the globe. It's totally possible, as long as all of those devices have a Chromecast plugged in. When Chromecasts are left exposed to the internet, hackers can use add them to a botnet that ...more
There is no iPad version of Apple's Calculator app, so you won't find it on your Home Screen, in your App Library, or as a shortcut in the Control Center. But that doesn't mean your iPad doesn't have an official calculator. Before the first iPad in 2010, Apple's development t ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sen ...more
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP requests and parameters, but these things are often concealed from the user, due to security reasons, convenience, or both. However, a ...more
This is a extremely easy to follow tutorial which will allow you to learn to how to build a sugar cane farm. Requirements : Sticky Pistons Redstone Dust Redstone Torches Redstone Repeaters Sugar Cane Glass Water Start building on a 9X10 base. Then follow the video tutorial. ...more
One Instagram creator's augmented reality homage to Disney's deep bench of animated characters has earned him fifteen minutes of fame. Taking a page from the enchanted book attraction at the Sorcerer's Workshop of Disney California Adventure, content creator Arno Partissimo p ...more
When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we'r ...more
When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month. In order ...more
Any internet user will need to download files eventually, and most simply have faith that what they are downloading is trustworthy. This doesn't give much clarity into the contents of the file, but if the file's author published the original checksum, comparing it to the SHA-2 ...more
Now that iOS 7 is out, what can you do that you couldn't do before? In this softModder guide, I'm going to cover all that's new and noteworthy about iOS 7. I've been playing around with it on my iPhone 5 since the first beta came out, so I'm excited to show you some of the se ...more
Apps can learn a lot about you just by reading information about your smartphone. They can easily track what device model you have, your phone number, and in some cases, your hardware MAC addresses. Many third-party apps will only track your device values for advertising purpo ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
When making a convincing mixed reality experience, audio consideration is a must. Great audio can transport the HoloLens wearer to another place or time, help navigate 3D interfaces, or blur the lines of what is real and what is a hologram. Using a location-based trigger (hots ...more
Just like the recently rediscovered Star Wars ruins in the Tunisian desert, there are tons of hidden treasures in your Samsung Galaxy Note 2 just waiting to be unearthed. Rooting enables you to install custom ROMs, exclusive features from other devices, add Wi-Fi tethering, o ...more
I'm always looking for solutions to problems people are having with their smartphones. This means I spend a lot of time browsing forums and release sites looking for new apps. In doing so, I find a lot of apps that don't quite solve a major problem, but are nonetheless pretty ...more
February is the shortest month, but it's marked by the celebration of Black history and the celebration of romantic love. After marking Black History Month and Valentine's Day in AR, you can also try out another ground-breaking filter from Snapchat's creative team and embody ...more
When browsing the web, I enjoy my privacy. It's reassuring that I can peruse the internet without the worry of having my activity tracked back to me, allowing me to leave fun, anonymous comments when I get the urge to troll. Anonymity can also be important when sending a mess ...more