One of my favorite simple projects is building two circle wobblers. I love how such a simple object amazes with its motion. The two circle wobbler is an object made out of two circles connected to each other in such a way that the center of mass of the object doesn't move up o ...more
In this how to video, you will learn how to run Windows inside Mac OS X. First, download VMWare Fusion 3. Install the program and run it. Insert your Windows installation disc into your computer. Next, select install this operating system and click continue. Enter your informa ...more
In this how-to video, you will learn how to burn game ISO's for the Xbox 360. It is important that it is only legal to back up the games that you already own. You will need the Image Burn program. Open it and click Write Image File to Disk. Next, click browse for file and look ...more
Carving a bonsai tree can be an interesting and rewarding experience. One may think that the tree would be injured in this process, however the process can actually strengthen the health of the tree. The first step when carving a bonsai is to reduce the height of the tree to a ...more
Need to back up all those XBox 360 games you've "purchased?" Hey, we're not gonna judge! Whatever your intentions, learn how to burn your precious games with Stealth Patch in this instructional video. Don't worry - your secret is safe with us. What You Will Need: +R Dual Layer ...more
Gigafide will show you how to slipstream Windows installations. You need to go to Vlite and download the program for Windows Vista. Install and run it. Select install at the main window. Use 7-zip to extract the ISO file. Next, go to that folder and run startcd.exe. You click ...more
Magazine associate editor, Jill Erickson, demonstrates how to use a rotary tumbler with stainless steel shot to both polish and harden metal. Jill explains the benefit of stainless steel shot, which is resistant to rusting unlike standard steel. Using shot of various shapes an ...more
Digidesign has transitioned all of their plug-in software copy protection from floppy drive based key disks to copy protection authorizations that reside on the iLok technology provide by PACE. The following is some information about iLok technology. The iLok USB Hardware Key ...more
A pegboard for storage is an essential item in a workshop. Danny Lipford shows you how to install a pegboard in a workshop in this video tutorial. A pegboard wall makes a great way to hang your tools in the shop for easy access. When we had finished building the workbench acr ...more
Today's article serves as a general guide to keeping Windows 7 and Vista clean. The goal is to clean up your messy computer and have it running at maximum performance in no time. The question at hand is—what is your computer's performance like? Not great? Do you think it coul ...more
In this article, I'll be showing you how to make a simple yet effective static electricity generator. Basically, this device allows you to carry a constant static charge on your body and discharge it on anything grounded or of opposite polarity. The electricity generated is ar ...more
Piezoelectric Energy In this article, I'll show you how to make a small, wallet-sized device that generates electricity from kinetic energy. The concept is simple: Piezoelectricity is the charge that is produced when certain solid materials (commonly ceramic and crystal) in r ...more
Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, ev ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out: Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc format to fi ...more
Introduction This is one of the things I am asked the most and there are so many different answers. It is hard to just tell you without know your computer's current speed or what type of hardware it has. So here I will talk about how to speed up a slow computer and how to kee ...more
If you have not used your eRecovery system in a long time and have forgotten the password, have no fear. This video is here to help you retrieve your details and use your program again. In this clip, learn how to recover any lost passwords with Acer's eRecovery Manager for Lin ...more
Disk space is a valuable commodity on your PC, and if you're running low, it's time to sell some of that unneeded property! This video shows you the steps to freeing up space on the hard drive of your Windows XP or Vista computer. There are many areas in Windows from which you ...more
Learn how to clean out unwanted programs from your PC's hard drive. Running out of storage space on your PC? Free up some real estate by deleting programs you no longer need on your hard drive. You Will Need * Your computer Step 1. Decide Decide which programs you don’t n ...more
Have an old bike combination lock that you can't remember the code for? If it's a simply four-digit cable lock, you can easily figure out the combination with a quick peck-and-go method. Best of all, this technique doesn't require any tools or special know-how, and let's you r ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
Periodically, motorcycle and ATV exhaust system can be rebuilt to maintain the proper performance and sound level expected from the exhaust system. My experience was with a dirt bike that had an aftermarket high performance exhaust installed.I bought my 99 XR400 second hand an ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out, such as Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc form ...more
Finally, summer is just around the corner! And while there are delicious fruits and vegetables available nearly every season, summer yields some of the very best picks. Equip yourself with one or more of the tools below before your next trip to the farmers market. 1. Seasons ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
The days of having to pay for video games are over. Generally, retail games are better because they're made with more effort and care than their free counterparts. But free browser-based game sites are insanely popular, specifically Kongregate, Armor Games, and the grandaddy o ...more
If you found the world renown Body Worlds exhibition gnarly and perverse, perhaps you'll find this latest parade of plastination a little less so—considering we don't share the same DNA as these specimens of jerky-in-the-name-of-science. The Koerperwelten der Tiere—or Animal B ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
This article will show you how to make a proportionally correct 1/187 (about) size Hubble Space Telescope. I tried to add as many details as possible, but it was hard at such a small size. It was really easy, but it did take a while to make. Here are some specs for the real H ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. VoxelSniper is one of many very useful world editing plugins available to Minecraft servers. In my opinion, it is one of the best and certainly the most used of all server side plug ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more
Suffering from high energy costs or simply looking to live in a more environmentally sustainable fashion? In this video tutorial, you'll find instructions for building your own wind generator using simple hand tools. For more, as well as step-by-step instructions to building a ...more
How to make your computer run faster is very easy to understand. The steps involved are as follows: Fist click on the "Start‚" menu button, then click on "All Programs‚", then click on "Accessories‚" then click on "System Tools‚", and then finally click on the "Disk Defragmen ...more
In this video the instructor shows how to install a program or a game which is in ISO format. The first thing you will need is the ISO file that contains the game or program. Next you will need a program that can open the ISO file. Use the daemon tools for this purpose. Right ...more
Check out this video tutorial to see how to replace your rear disk, pads, and brake line on a Honda Civic EP3 (SI or SIR). This could be similar to other vehicles. In order to replace the rear disks, pads, and brake line, you will need a 12mm wrench, a 14mm wrench, a Phillips ...more
Sometimes data is lost on your hard drive by accidental deletion from recycle bin, or due to reformat or other reasons. In this video the instructor shows how to recover data even after a reformat. Contrary to popular belief that data is completely lost after a permanent delet ...more
In this how to video series, learn how to clean your shower head from home improvement expert Adolph Ramirez. He will give you expert tips for cleaning a shower head including what tools you will need and why it is important to clean your shower head. Adolph will demonstrate h ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this t ...more
Microsoft did a wonderful thing in 2015: for the first time, it was offering a free upgrade to Windows 10 for all current Windows 7 and 8.1 users. And, if you were lucky, the upgrade process was relatively simple and painless. There were, however, some questions after the ever ...more
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added. That's a very interesting new feature because it allows Kali to be easily booted on Mac too, and every EFI-supported device. First three preview lines gone? As alw ...more
Kali Linux is the obvious first choice of an operating system for most new hackers, coming bundled with a curated collection of tools organized into easy-to-navigate menus and a live boot option that is very newbie-friendly. But Kali isn't the only distribution targeted at pen ...more
We're nearly done getting our Mac set up for hacking. If you haven't checked out previous tutorials, I'd recommend you do so first before diving right into this one. While macOS is a powerful POSIX-compliant operating system, some of our Linux tools do not work out of the box ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
This is a collection of various guides and tools available on the internet. Instead of searching for 1 you can easily find whaht your looking for here. LAST UPDATED : Monday, 08/06/2015 Hello, This is my first post so please bear with me if anyone else had already posted so ...more
Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virt ...more
Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some ...more
When it comes to hacking guides, most are written from the perspective of a Linux user. There are a few outliers, but it's mainly Linux, which leads to the idea that Linux is the only OS that's viable for hacking. This couldn't be further from the truth. A properly set up Appl ...more
Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
Welcome back, my tenderfoot hackers! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network. I am also a huge fan! If you haven't seen it yet, you should. It may be the best show on TV right now. Mr. Robot is about a young man with ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
OS X is built upon a UNIX foundation, which grants you access to the benefits that UNIX offers, including the standard toolkit (make, gcc, clang, git, perl, svn, size, strings, id, and a lot more) via the command line developer tools, which are an essential if you're a develop ...more
It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orie ...more
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind. When you delete a file with the remove command (rm <file>), you're no ...more
Stand out from the high street fashion clones with stuff you’ve fashioned yourself. It’s easy to take old pieces of electronic junk and transform them into all sorts of fun ‘n’ funky geeky accessories. Like a totally useful tote bag, a what-on-earth-is-that wallet and a bedazz ...more
Apple's codec for photos and videos in iOS 11, HEVC (High-Efficiency Video Coding), as well as the container, HEIF (High-Efficiency Image File Format), result in a reduction in size for pictures and movies without sacrificing quality. Seems like a win-win situation, but Window ...more