Rat Make Up

Night People : A Bad Vibes Label Profile

Night People: A Bad Vibes Label Profile Shawn Reed is one of our favorite people, not content with making music with Wet Hair, he also runs 'Night People' - an almost complete DIY record and tape label operation in Iowa - a label which has consistently put out and introduced ...more

How To : Hack Wi-Fi & Networks More Easily with Lazy Script

Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA ha ...more

How To : Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more

How To : Send & Receive iMessages on Your Android Phone

One of Android's most glaring weaknesses is its lack of an iMessage equivalent. That is, of course, until now. There's one app that will allow Android users to experience iMessage on their non-Apple phone, complete with end-to-end encryption, message effects, and group messagi ...more

How To : Make a Simple Herbal Extract

Hello there, people. Today, I am going to show you how to extract the essence from a useful plant, using either alcohol or olive oil. This is how you take a plant and turn it into a useful (and preservable) medicine. For those of you who know nothing about herbal medicine, let ...more

How To : Recognize Crowd Control - Part 3

For our final part of recognizing crowd control, we shall look at the mind. It's the most complicated thing in the universe, but also the most easily influenced. What makes us to gullible? What methods to commercials, companies and the media use to influence our position on th ...more

How To : Run Windows or Linux on a Mac

Are you a PC user who's made the switch to Mac but you miss the Windows O.S? Maybe you're a Mac user looking for a more savy experience? The Lab Rats, Andy Walker and Sean Carruthers, will show you how to run Windows or Linux on your Mac.

Scrabble Bingo of the Day : BURKITE

BURKITE n pl. -S a burker 63 points (13 points without the bingo) There's no better time than Halloween to have the BEJABERS scared out of you, and no better way than with a slasher flick or horror movie about HEXEREI. To some, Halloween is a time for candy, costumes and cel ...more

How To : Make a figure four deadfall trap

See how to make a figure four deadfall trap. This is a great survival trap that can be easily constructed (with practice) out of very basic materials that in most environments can be easily found. The trap can also be made with very limited, or primative tools. This trap is a ...more

News : Ball Pythons

Ball Pythons have become big business in the pet trade industry over the years, due to them being one of the most docile snakes in the constrictor family usually preferring to roll into a tight ball hiding it's head than to striking out with the intent to bite. These snakes co ...more

How To : 5 Ways You're Making Yourself Dumber

No one wants to appear stupid. Whether you rely on lengthy, complicated vocabulary to show your smarts, or enjoy highlighting your speedy mental math skills, everyone prefers emphasizing intelligence over hiding it. Yet even the smallest, most normal behaviors in our day-to-d ...more

News : Candied Bacon Cake

Not So Humble Pie, creator of yummy cookie lab rats, chocolate atoms and gingerbread scientists (to name a few), brings us a delectable contribution to the world of cake decorating: the candied bacon cake. This cake looks like bacon, and actually tastes a little bit like bacon ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Tips & Tactics to Create Your Own Compost Pile

While it is easy to create and maintain your compost pile, you can enjoy it more knowing a few basic tips. International Compost Awareness Week (ICAW) is May 7 through May 13, 2017. First launched in 1995, ICAW is a great opportunity to share enthusiasm and awareness of the b ...more

How To : An Introduction to Steganography & Its Uses

It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography. In this article, I will ...more

Next Page
  • Hot
  • Latest