Harry shows ways to fix common garbage disposal problems. First he shows if it hums use a crowbar to break free what is stuck. If you flip the switch and nothing happens it may be the red reset button on the bottom has popped out. He enplanes it may even be a bad wall switch o ...more
In this video you will learn how to tighten radiator valves using a spanner and water pump pliers. If you find that your radiator valves are leaking, follow these simple steps to remedy the situation: If you take a look at your lock shield valve, you may see signs that it has ...more
Spread the word: It's easy to reduce energy consumption! By sharing these tips, you'll help friends and family use less energy and save money. You Will Need * An energy-saving checklist * The willingness to help others Step 1: Get the facts Download a full checklist of energy ...more
Hydraulic brakes require occasional bleeding in order to get rid of all the air bubbles and keep the brakes working smoothly. This how-to video demonstrates the process of pumping out old oil and replacing it with new, while taking out as much air as possible. You will need a ...more
Still got stock? Many factory installed exhaust systems not only sound anemic, they actually are because they scrub power. The designers who are given the task of producing these pipes are often handcuffed by several different requirements that add up to one big compromise. Ex ...more
So here is a video tutorial that shows you how to swap out your iPhone headset ear buds for your generic ear buds that fit your ear better. Make sure you don't switch the wires and remember where the colors go (red, copper, green). Happy modding!
Watch this video from This Old House to learn how to install an air valve for a hot-water heating system. Steps: 1. Turn off water leading to the boiler. 2. Mark the pipe for cutting, which allows the installation of the air valve. 3. Use reciprocating saw to cut out section ...more
Watch this video from This Old House to learn how to install an instantaneous water heater. Steps: 1 Use template to mark position of vent hole on exterior wall of basement. 2 Bore center pilot hole for vent using a 3/8-inch-diameter masonry bit. 3 Cut vent hole through wall u ...more
This step-by-step guide will show you how to make moonshine. To make moonshine you will need the following: A pot with a lid, beer, a big bucket, ice, a jug, and a lot of copper tubing. Put the pot on the stove and fill it with beer. Place the lid on the pot and attach the cop ...more
In this Home & Garden video tutorial you will learn how to unclog a sink in the bathroom or kitchen. It's extremely simple. Put a bowl under the U joint. Unscrew the plunger rod located under the sink and pull it out. Then remove the sink blocker and remove any dirt from insid ...more
This Home & Garden video shows you how to replace a running old style fill valve toilet with something more modern. Shut the supply line to the toilet and flush to remove the water from the tank. Then remove the supply line. Now take a wrench and loosen the plastic nut of the ...more
If your replacement faucet is not the right size, pick up a connector and fitting from the hardware store. You will also need wrenches. First turn off the water supply. Then, brace the pipe with a pipe wrench. Use another wrench as a lever and remove the faucet. Take a piece o ...more
Changing the hold music piped into your company phone is a prank some callers will appreciate—depending on what you replace it with. You Will Need * A set of cojones * Access to the radio that feeds the company telephones Step 1: Access the radio Access the radio that feeds ...more
Gary, RV Dr. tip #9 is describing about his new tool called HepVO for the kitchen and bathroom sinks, for the better flow of water and to prohibit the bad gases to come in. Mr. Gary is explaining that how this HepVo can replace P shaped traps. Because the traps are necessary f ...more
Drywall is a great way to easily cover the studs, electrical, and piping that hide inside your ceiling. You can even use drywall to replace cracked plastered ceilings without the technical expertise needed to smoothly cover a ceiling with plaster. Drywall is commonly availabl ...more
Since the invention of the mechanical clock, enclosure of the commons, and proletarianization of labor, the alarm clock has been the bane of our existence. While not actually evil, it does represent the constant and uncompromising glare of our owners shaking a patronizing fing ...more
This article will show you how to make a proportionally correct 1/187 (about) size Hubble Space Telescope. I tried to add as many details as possible, but it was hard at such a small size. It was really easy, but it did take a while to make. Here are some specs for the real H ...more
In this article, I'll show you how to build a coil gun. A coil gun is a device that fires magnetic projectiles at high velocities, using electricity. Coil guns require no explosive propellant, therefor can be fired an infinite amount of time, providing that there is ammunition ...more
Graffiti is a great way of getting your message out to the masses. The earliest known graffiti dates back to 30,000 years ago and used the traditional apply-paint-to-wall technique. Though our paint now comes in cans and not from scavenged berries, the actual graffiti process ...more
This article details the step-by-step instructions on how you can make a strawberry tower that can be used for your hydroponics/aquaponics system. The water dripping through the system contains the nutrients, so soil is not used. The growing media is expanded shale, but you co ...more
Making your own circuit boards can be a daunting challenge. You have to design a schematic, test it on a breadboard, design the board layout, and then after all of that, you still have to print and etch a board! Luckily, we have Fritzing. Fritzing is a free open-source PCB d ...more
PEX, or cross-linked polyethylene, is a common alternative to copper piping. If you're looking to save time on your project (or have an aversion to soldering), PEX might be for you. In this tutorial, you'll learn what PEX is and how to decide what type of PEX is best for your ...more
The video describes the procedure of fixing the wiring harness on a Ninja 250R motorcycle. The person who owns the bike presents this video. He says that he got his bike back after getting the wire harness newly fitted. His signal blinker lights were not working. The next morn ...more
Do you listen to a lot of music on your smartphone or MP3 player? Ever wished the built-in speaker was louder? You're in luck, because this simple amplifier can increase your volume by 14 decibels and make your device look totally steampunk while you're at it. What You'll Need ...more
Pickles come in all shapes, sizes, and names (gherkins in the UK, cornichons in France). There are even crazy flavors such as koolickles—dill pickles soaked in a mixture of Kool-Aid and brine, an American South favorite. Whatever sort of pickle tickles your fancy, you can coun ...more
How to replace a tap washer. Dripping Tap. Dripping Faucet. Replacing a tap / facuet washer is quite an easy process as long as you follow the 6 steps in my video. Basically all you need to do is this: Step 1: Turn the water off at the mains. Step 2: Turn the tap on and let t ...more
I know, "Steamdown" conjures images of a hoedown, but "Steampunk prop breakdown" is a bit of a mouthful, I thought. Anyway, I'm going to show you how I made my very first Steampunk prop! It doesn't require any tools at all, just some glue and some parts from the hardware stor ...more
When you're shooting in the rain (or other extreme weather conditions), there's a lot more to think about since cameras and water don't exactly mix well. An umbrella will protect your gear, but unless you have someone to hold it for you, it can be a pain to use. Here's a simp ...more
Did you know that the average cost to make a penny is about 2.4 cents?!? That's why the Obama administration asked Congress earlier this year for permission to change the metals in the penny, hoping to get the cost back down where it makes sense. But do we even need these coi ...more
It's been proven over and over that you can make batteries out of fruits and vegetables such as lemons, potatoes, and even apples. Turns out, passion fruit is also acidic enough to power a battery, but Maui Makers member Ryan K decided to take it a step further by adding a las ...more
If you're one who enjoys a good DIY project, or if you're just tired of paying exorbitant labor fees to have your vehicle serviced every 5,000 miles, changing your own oil can be a rewarding endeavor. Even though cars and trucks are becoming increasingly over-engineered these ...more
In a much-hated move, Flappy Bird developer Dong Nguyen removed his incredibly popular, yet extremely frustrating app from both Google Play and the iOS App Store. The jury is still out on the exact reason behind the move, though we can rule out pressure from Nintendo, but one ...more
If you haven't met a person that's broken a pair of headphones, you might need to get out more. No matter how expensive or cheap a pair of headphones are, the sound can get buggy, the wire can get cut, or the headphone jack itself can be broken or ripped off the cord. But inst ...more
In a previous project, I showed how to build an electrical Jacob's ladder using an old microwave oven transformer (MOT). In this project, I modified the secondary coil on the MOT, which converts it from a high voltage/low current device into a low voltage/high current metal me ...more
Lighthouses and signal fires may have been the first social media. Without the ability to share language, a distant light meant "humans here." A new study from the University of California, San Diego, finds that bacteria can also send out a universal sign to attract the attent ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
Drone mishaps, such as the collision that scratched a military helicopter in New York, are becoming something of an everyday hazard. And professional drone operators sweat bullets when their drones hover too close to their clients' things — especially their expensive things. ...more
During the lead up to Samsung's Note7's release, rumors swirled about a leaked "Grace UX" interface replacing Samsung's maligned TouchWiz Android skin. In the end, this seems to have been nothing more than an internal code name that Samsung was using to test a few new icons an ...more
In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of s ...more
Welcome back, my aspiring hackers! Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The drawback to installing these hacking systems as a VM is that it then requi ...more
Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, w ...more
What I'm going to do in this tutorial is, as the title implies, teach you how to make nearly anything look like metal. This can especially come in handy in Steampunk, as most of us don't have the ability to machine brass. We do, however, have access to wood, PVC, and spray pai ...more
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get ...more
Flappy Bird is immensely popular, we already know that, but it's even more so now that the developer removed it from Google Play and the iOS App Store. Android users can still get the game fairly easy, but it's nearly impossible to install a safe version on the iPhone now, so ...more
In this project, you'll learn step by step how to modify a microwave oven transformer into a high-current device that can pump out 800 amps of electrical current, which is enough amperage to melt metal. If you liked the Metal Melter you saw in my previous project, here's how y ...more
As I said in this earlier post, there's no easy way to explain or define the Steampunk aesthetic. There are a large number of Steampunk tropes or "cues", as I call them, that bring to mind the feeling of Steampunk. These cues combine to push past the "not-Steampunk" threshold ...more
Getting a new phone is like getting a pair of new socks—you can't wait to try them on and when you do, they feel totally awesome. Maybe that's just me, but for many customers that have already received their highly anticipated iPhone 5 in the mail, awesome is definitely not th ...more
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attac ...more
We're almost there to completing the setup of your Mac for hacking! Now that we have Git and Homebrew under our belts, it's time to take on something fairly easy, but very important for our hacking needs. Ruby is an object-oriented scripting language used to write powerful pr ...more
I'm sure that many of us have heard of that nasty Shellshock vulnerability, but not very many people know how to exploit it. Try these few tricks on vulnerable websites! Background Information So, what is Shellshock? Shellshock is a vulnerability in Bash shell (v1.1 to v4.3 ...more
This summer's going to be a hot one, so skip the water pistol this year and break out the big guns! In this project, I'll be showing you how to build a water balloon shotgun—a high-powered water balloon launcher that's capable of firing 17 water balloons at the same time! Vide ...more
In a previous article, I demonstrated an Arc Welder made using parts from old microwave ovens. Video: . Here is part 1 of 2 on how that arc welding machine was made, and how you could make one too! This is the first of two parts on building it, focusing on the modification of ...more
The concept and structure of Christmas hasn't changed much since its inception. In its infancy, Christians recruited Roman pagans by associating Christmas with the Saturnalia, an ancient Roman festival in honor of the deity Saturn (also held in December). The pagans had long w ...more
An attacker with shell access to a Linux server can manipulate, or perhaps even ruin, anything they have access to. While many more subtle attacks could provide significant value to a hacker, most attacks also leave traces. These traces, of course, can also be manipulated and ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for ...more
The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnera ...more
Apple has something big in store for consumers in 2017 to mark the 10th anniversary of the iPhone. One major surprise is that Apple has decided to forgo on releasing a 7S in favor of a redesigned iPhone 8 and 8 Plus. To further commemorate its 10-year milestone, the Cupertino- ...more
Most of you lot would be aware what WPA/WPA2 is so I won't bang on about the encryption or protocols a great deal. In short WPA and WPA2 both have a maximum of 256bit encrypted with a maximum of 64 characters in the password. The encryption is really only 64bit but x 4 because ...more
Welcome, in this tutorial we shall we looking at creating a safe(r) way to back up your important files. The contents we will be covering are as follows; Creating a partition Updating the /etc/fstab file Mounting a file system with Python Copying the contents of a file system ...more