This video teaches you how to use substitution to find the point on a graph (the x and y coordinates) where two separate equations would cross. Substitution is a trick of algebra that allows you to find this point without making a graph. The first step is to isolate one of the ...more
If you are given an equation of ellipse in the form of a function whose value is a square root, you may need to simplify it to make it look like the equation of an ellipse. Now equate the function to a variable y and perform squaring on both sides to remove the radical. Now si ...more
When you begin to graph equations you will need to know how to do so in different ways. In this tutorial, learn exactly how to graph linear equations by plotting points. This video will go over the process with you step by step. The whole equation will be shown to you, as it i ...more
Looking for a way to pump up the crowd? In this video tutorial, you'll learn how to employ the loop function in Traktor, formerly known as Traktor DJ studio, to create build-ups and drum rolls without much effort. For a step-by-step walkthrough, press play!
Step1. Determine the type of job you want. Make sure that you have a detailed and complete profile on ‘linkedin’. You must also have a number of connections. Then decide which job you are looking for and the typical functions and titles. Also choose which type of industry ...more
This is the video about how to find the equation of a tangent line. As you may recall, a line which is tangent to a curve at a point a, must have the same slope as the curve. Therefore, the slope of the tangent is m = lim f(a + h) - f(a) h-->0 h Since the slope equation of the ...more
This will illustrate us how to dual boot Windows Mobile and Android. Here are the following steps:Step 1: First of all switch on your mobile and close all the running taskStep 2: Go on the start menu and press the center scroll key, the menu will open up.Step 3: Now go on sett ...more
Using Trapcode Particular, Harry Frank teaches us how to create subtle unusual particle effects using the Aux Particle function in Trapcode Particular. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking ...more
In this video from Intown Bicycles, demonstrates how to easily remove and to reinstall a rear bicycle wheel from a bicycle equipped with a quick release axle. There are three different common types of bicycle braking systems, and you will learn first how to disengage each of t ...more
Learn how to translate shapes with a few simple steps. - First step: Find the new verticals under the transformation which are T3,2. Values are A=(-5,-8), B=(-3,-4), C=(-8,-3), D=(-6,1). Find the points of the verticals on the graph and connect the points one by one until you ...more
While we personally like to learn a new software program by playing around with its buttons and various functions, sometimes it's a nice primer to actually read the instruction manual. And when it comes to video editing, knowing the particularities of each and every function i ...more
Have something you want no one else to find? The best hiding places are in plain sight. Follow these steps to create a shockingly sly storage space. You Will Need: • A plastic switch box • A rotary tool • An electrical socket • Screws • A Phillips-head screwdriver • A f ...more
What if your fridge knew your food and expiration dates? What if your fridge could tell you which ingredients are missing and where you can get them the cheapest? "In My Fridge" is a project designed to simplify the process of food management. Our focus was on the technical ...more
This video tutorial belongs to the Education category which is going to show you how to match exponential graphs. The video shows two graph sheets with three graphs marked A to F on each sheet and six equations. It starts off with matching the basic function, y = 2 to the powe ...more
Did you know that you can zoom in on your Mac laptop just as easily as you can on the iPhone? All you need is your fingers, your mouse and to activate the zoom function on your computer. Check it out! You Will Need * Mac Step 1: Open System Preferences Go to System Preference ...more
With the Kodak Zi8, the power to capture razor-sharp, full 1080p HD video fits in the palm of your hand. Its easy, one-touch operation and incredible versatility make it the perfect camera for beginners, experts, and everyone in between. Step 1: Get started Get started in a s ...more
Aesthetic Houses: What are they? If you've played Minecraft for some time now, you most surely know how hard it is to build a great looking house to live in, that meets both your vision of your dream house and expectations for functionality. This brings us to the definition: ...more
If you're a teacher in any type of school, whether it's high school, college, or middle school, it's imperative that you keep an attendance sheet. The paper and pen route can get pretty messy, and very disorganized, and that's where Microsoft Excel comes in. With this software ...more
In each day of our life, we see inflammation. We see it during sore throats and abscess formations in our bodies, and even slight tooth pain is a form of inflammation. Sometimes it's good when it fights to protect us from invading organisms, but sometimes it becomes bad when i ...more
This video shows the user how to use a T189 calculator to plot linear equations. The video demonstration is done using an ‘on screen’ representation of the calculator – there are also verbal instructions. The equations are plotted on the same axis by selecting the ‘y=’ functio ...more
In order to cleanse your body of toxins, you first need to determine the types of toxins you've been exposed to. This can be done with blood screening or urinalysis or liver function tests. If the liver isn't functioning properly, then there will need to be some steps taken or ...more
George Maestri from Lynda shows how to add interactivity in Google SketchUp Pro using a variety of tools in the program. Adding interactivity allows for added dimension and interaction with an object. The example used in the tutorial was that of a fridge, which after adding in ...more
In this video tutorial learn how to graph an equation using the slope and y-intercept. To show how this can be done, the equation 4X-5Y=20 is used as an example. The first step that needs to be done is to convert the equation into the y=mx+b format where m is the slope and b i ...more
The Formula AutoComplete feature in Office Excel 2007 helps you avoid syntax or typing mistakes that can break your formula and display an error in the cell. Every step of the way, Formula AutoComplete guides you with ScreenTips that show you how to build your formula. Watch t ...more
You want to put out a live web server, but you don't want to be owned in the process. An expert eye for security is not needed if you take a few basic steps in locking down the hatches. Most successful attacks today are not the complex, time-consuming tasks you might think, bu ...more
If you're always taking blurry and underexposed pics with your mobile device, try using some of the tips below to turn your phone into a valuable photography asset. It doesn't matter if you have an iPhone, Android smartphone, or even a first-gen camera phone... you can still t ...more
It's almost time for the new Xbox 360 dashboard to invade gamers everywhere. Microsoft expects to update the Xbox Live user interface sometime next month, which is said to be the most significant update to the dashboard since the NXE update three years ago. This new Metro-base ...more
Introduction I will not go into some time-waster of a story about how I came to build this app. It was a prerequisite in a bigger project I am still tinkering with from time to time. What are QR Codes? No doubt you have seen these all over the place in recent years. Origina ...more
Crossword puzzles are great way to exercise you mind and have something fun to do with breakfast. Don’t just do a puzzle, but make one yourself. You can do it by hand or try out the help of a crossword building software. For beginners, there are easy ways to create your first ...more
How much time have you wasted, wandering around your home trying to find one particular book? Without a good system of organization, finding the book you're looking for can become a hopeless task. Organize your book collection at home by following this tutorial. You Will Need ...more
It doesn’t matter how long ago your last geometry class was, you can still impress your friends by finding a geometric mean. The geometric mean can be used to find the average of numbers with out unusually high or low results effecting the result. The geometric mean of two nu ...more
This is an easy to follow step by step video explaining how to make a switch blade out of easy to find objects. This is not a real knife but still has the function of a switchblade.
Looking for a few new April Fool’s Day pranks? You’ll be sure to get a startled look on friends faces when you catch them off guard with some unexpected alterations to their favorite foods. Just remember that what goes around comes around. Watch what you eat – this is a day p ...more
If you're familiar with games like Half-Life 2, Left 4 Dead, Portal, and Team Fortress 2, then you've probably seen some of the cool animated movies that Valve has made for them using their Source Filmmaker moviemaking software. It's a tool built to make animated films inside ...more
Welcome back everyone. I apologize for the lack of training articles, but I've been rater busy lately. I've recently picked up a second job and my college courses are now back in session, so I'm a bit strapped for time. FTP is a very important protocol. It's not only importan ...more
These days I found a very beautifull python script that just prints the google chrome usernames and passwords that are stored on your machine. In simple terms the script is self explanatory and goes to: -"%APPDATA%\..\Local\Google\Chrome\User Data\Default\Login Data" where t ...more
Hello people, I'm back for Part-3. In this part, as promised, we are going to create a client program and then we are going to test it with our server program made in Part-2. Much of the code that we are going to use in our client program as already been explained in Part-2 w ...more
If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment. Using a directional Wi-Fi antenna and Wireshark, we can create a display filter to target any device in range to plot the signal strength on a gra ...more
What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more
Welcome back, my nascent hackers! In the conclusion of the Mr. Robot television series, Elliot and fsociety successfully completed their mission of encrypting all of Evil Corp's data with AES-128 encryption and destroying the key. Now that all of the data on Evil Corp's serv ...more
Man-in-the-Middle attacks can prove to be very useful, they allow us to do many things, such as monitoring, injection, and recon. What Is a Man-in-the-Middle Attack? Essentially, a man-in-the-middle attack is when an attacker places them self between two parties. This passes ...more
While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers di ...more
While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. ...more
Hello everybody. I'm back with Part-2 of this series. In this part we will be programming in C our server and i will be explaining one more "key concept" so everybody got a better understanding on this. Ok first let's see that concept. Little Endian and Big Endian So, as pe ...more
In my last how-to, we built a man-in-the-middle tool. The aforementioned script only established a man-in-the-middle. Today we'll be building a tool to utilize it. We'll be building a DNS packet sniffer. In a nutshell, this listens for DNS queries from the victim and shows the ...more
Greetings My Fellow Aspiring Hackers, Its been long since I last posted a tutorial. Its vacation and since I won't be coming home, I've decided to use my day for sharing. I was browsing through old posts and found OTW's article - Hack Like A Pro: How to Find the Exact Locatio ...more
Whether you're a celebrity or someone with something to hide, Facebook allows you to keep your "friends list" private so you can protect the identities of your Facebook friends. But it only kind of protects them. There's a simple Facebook hack that lets you unravel entire net ...more
After previously learning how to make the material of an object change with the focus of an object, we will build on that knowledge by adding new objects through code. We will accomplish this by creating our bounding box, which in the end is not actually a box, as you will see ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more
Hi I am a new member of null byte(although I am reading this website from the beginning) and this is going to be my first post. Let me introduce myself first ! I am from Greece, I am working as a network engineer and I am into system and network administration but definitely ...more
Welcome, in this tutorial we shall we looking at creating a safe(r) way to back up your important files. The contents we will be covering are as follows; Creating a partition Updating the /etc/fstab file Mounting a file system with Python Copying the contents of a file system ...more
In the previous section of this series on dynamic user interfaces for HoloLens, we learned about delegates and events. At the same time we used those delegates and events to not only attach our menu system to the users gaze, but also to enable and disable the menu based on cer ...more
IFTTT (short for If This, Then That) is an amazing piece of software that automagically links actions on your phone with online services and real-world objects. For example, an applet could read: "if you come home, then turn on Wi-Fi." IFTTT goes further than just using simple ...more
In this article, I'll be continuing my series on microcontrollers. If you haven't read part one, I'd recommend heading over there and reading it! So How Does Arduino Think? Arduino is programmed with ones and zeros, but hopefully that's not how we programmers have to write t ...more
I rarely receive spam mail, but every now and then I’ll get an email from Cat Fancy Magazine. I’ve never read an issue of Cat Fancy Magazine or been to their website. Actually, I’m allergic to cats. So how did they manage to get my information? Well, anytime you register for ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
Developing GUI apps in python is really cool. I ask those who understand the language to help convert some of the command-line or console programs or apps ( I mean programs that are useful to a hacker ) to GUI. I know GUI makes us lazy and not wanna learn but we should all kno ...more
The HoloToolkit offers a great many, simple ways to add what seems like extremely complex features of the HoloLens, but it can be a bit tricky if you're new to Windows Holographic. So this will be the first in an ongoing series designed to help new developers understand what e ...more
With a simple social engineering trick, sudo passwords can be captured in seconds without the target's knowledge. The passwords can then be saved to a file or exfiltrated to another computer on the network. After exploiting a system, penetration tester's and hackers will ofte ...more
Hello aspiring hackers, It's been a while since I wrote a tutorial, so I figured I might just share one of the tools that I have created to help the community grow. Scenario Let's say, that we have done all the recon(both passive and active) and we have scanned the web serve ...more