Trying to figure out which music streaming service to subscribe to can be a difficult task when the playing field is so crowded. Each has its benefits, as well as downsides, so finding the right one for your needs and wants can take a lot of overwhelming research. But we've do ...more
So cute, so furry, and so chock full of parasites. While raccoons are fun to watch, they are neither friendly nor clean — and they can make you sick in more ways than one. Native to North America, you can find raccoons just about everywhere except for parts of the Rocky Mount ...more
In the race to outsmart "untreatable" antibiotic-resistant gonorrhea, one of the three new treatments on the track is about to enter Phase 3 clinical trials. Hopefully, it'll be widely accessible sooner rather than later, for the 78 million people who are diagnosed with gonorr ...more
Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (p ...more
Smartphones are more like computers than actual telephones. Unfortunately, thieves, hackers, and other bad actors know this and are always looking to make money off your personal data. Thankfully, your Galaxy S20, S20+, or S20 Ultra has tools to combat these threats — as long ...more
Secretly shoot your voice across the room in stealth mode on a laser beam in this fun and easy project! Make Magazine and Kipkay present this cool spy trick. Build a simple laser communicator that transmits your voice across a room. You need an amplifier, radio, laser pointer, ...more
Flight disruptions can cost billions of dollars, but most modern commercial flights rely on air traffic control systems that harbor serious vulnerabilities. The Federal Aviation Administration uses an infrastructure called NextGen, which relies on Automatic Dependent Surveilla ...more
What do Leo Tolstoy (writer), Beethoven (composer), Paul Gaugin (artist), and Adolf Hitler (politician) have in common? They are all considered to have suffered from the sexually transmitted disease syphilis. With the incidence of sexually transmitted infections (STIs) and se ...more
Kryptowire, a company specializing in mobile security solutions, released a report on Tuesday, November 15 that exposed firmware in a number of Android devices that was collecting personally identifying information (PII) and uploading it to third-party servers without users' k ...more
Sometimes a simple drowning trap is too boring, and you want something that's a little more stylish and exciting. That's where this trap comes in! This is what I like to call "The Mangler". It consists of a set of pistons that chomp together, literally chewing up your enemies ...more
Thanks to Project-Infrared, there's now a pretty straightforward way to add motion tracking to the HoloLens: Connect it to a Kinect. Wavelength LLC's created a way to get the Microsoft Kinect working as a motion-tracking input device for HoloLens, which my colleague Adam Dach ...more
INTRODUCTION Hello dear null_byters here we go again with our third part of this serie. in this third part of our series I'd like to do a demonstration or continuation on fuzzing, but I think I should leave for later because the next tutorials about fuzzing will require from ...more
All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are ...more
Welcome back everyone. I apologize for the lack of training articles, but I've been rater busy lately. I've recently picked up a second job and my college courses are now back in session, so I'm a bit strapped for time. FTP is a very important protocol. It's not only importan ...more
If you live with pets, you know where their tongue has been, yet you let them kiss and lick you all they want without even thinking twice about it. I've heard people say that a dog's mouth is very clean, and that their saliva, delivered by licking, can help heal wounds, but is ...more
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attac ...more
A Steampunk's Guide to Sex was the subject of a recent successful Kickstarter campaign, and I now hold the finished book in my hands. As such, I can say (mostly) unreservedly that you should buy this book. Allow me to tell you why, before I get into the nitty-gritty about the ...more
There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help ...more
Nowadays, even the dumbest thieves know that the first thing you should do after you steal a phone is turn on airplane mode. Not only does this make it harder for police to track the phone through cell tower triangulation, but it also disables security features the person you ...more
Take a close look at the image above. These bugs spread a deadly parasite that infects thousands of people each year. They also live in the US, and it's important to know where they are and whether you need to worry that they're carrying a dangerous infection. Triatoma bugs a ...more
There's really nothing safe about transmitting sensitive information electronically, but even if it gets there safely without being seen by prying eyes, there's no guarantee what happens to it once it reaches its destination. And let's face it, there are some things that you j ...more
After California college student Luis Ortiz blacked out and was taken to the hospital in 2015, doctors were startled to discover the reason his brain was swelling—a one-centimeter long, wriggling tapeworm living within a ventricle in the middle of his brain. Spoiler alert: If ...more
When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more
Having access to your computer from your cell phone is an extremely useful feature. Whether you need to edit documents or send files that are on your home desktop, or you simply want to watch movies you have saved on your computer, access is key. Kind of makes you wish you co ...more
Think you have what it takes to amputate your own arm? What about somebody else's foot? Now, thanks to the wide array of mobile apps available from the iTunes App Store, you might not need to attend medical school to perform a tracheostomy. Okay, so that's not really true—iPh ...more
Using a wireless video camera and an RC Car or Truck, you can make a working spy car that transmits live video to a nearby TV or computer.
Could the world really be coming to an end tomorrow? Presuming you believe the biblical prediction from 89-year-old Harold Camping, May 21st, 2011 is undeniably Judgment Day. If you have confidence in that prophecy, you're probably not even reading this because you're too busy ...more
On June 11, 2016, an Arizona woman died from what appeared to be several infections, including pneumonia. She likely caught at least one of these from her dog. The Centers for Disease Control and Prevention (CDC) were involved in the investigation into events leading up to he ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
Flying orbs. At first, you might think of the Tall Man and his army of flying sentinel spheres, equipped with zombie brains and a mini-arsenal of saw blades, drill bits and shooting lasers. But these flying orbs weren't conceived from the evil mind of a superhuman mortician—th ...more
This week, California, like a growing portion of America is now 'handsfree'. As of July 1st, mobile phone use in cars became prohibited without the use of a headset. If you happen to choose a wireless Bluetooth over a wired option...beware. It is not a secure technology. At a ...more
Understand how binary numbers work, including how to read binary numbers, and create your own. This mathematics or computer programming tutorial is a zip to get through. It covers practical and theoretical use and need for binary code understanding. Binary means zeroes and one ...more
Despite the availability of a vaccine against it, almost 50% of men aged 18-59 in the US are infected with the human papillomavirus (HPV). Why? A new study published in JAMA Oncology by at a team of researchers at the Womack Army Medical Center (WAMC) in Fort Bragg discusses ...more
A vulnerability in the design of LiDAR components in driverless cars is far worse than anything we've seen yet outside of the CAN bus sphere — with a potentially deadly consequence if exploited. The hack is also going to be hard to fix, researchers Hocheol Shin, Dohyun Kim, Y ...more
The Android Megaminxer is mind-bogglingly elaborate, impressively combining multiple geeky mediums to solve an incredibly complex puzzle. ARM, the genius behind the stunt, uses LEGOs (a Mindstorms NXT kit to be exact) to build a robot responsible for the mechanics; they then e ...more
While Lyme disease can be disabling, the wrong treatment for the infection can be fatal. The Centers for Disease Control and Prevention (CDC) estimate that the bacteria that causes Lyme disease infects about 30,000 people each year. Transmitted by the blacklegged tick, Ixodes ...more
Have you ever had the stomach flu, aka the 24-hour flu? Well, chances are high that you never had influenza, but an intestinal infection called gastroenteritis. While sometimes severe cold symptoms can be confused with the flu, the same is not true for the differences between ...more
Somewhere around 600–800 million people in the world are infected with whipworm (Trichuris trichiura), an infection they got from ingesting soil or water contaminated with feces of infected animals or people containing the parasite's eggs. Currently, treatment options are lim ...more
With the rapid demise of the 3.5 mm headphone jack, Bluetooth is fast becoming our best option for universal audio. The problem is, with over a decade of it being a standard component, many of us still own a reliable pair of wired headphones that we don't want to gather dust. ...more
IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected t ...more
In case you thought the long and unfortunate story of ODG was over, hold on, there's one last chapter to tell. As we reported in January, ODG's remaining patent assets were put up for auction, but the buyer was never revealed. However, we now have a pretty good idea of where ...more
As some of you may know, contemporary king of kitsch Jeff Koons exhibited at the French palace of Versailles last year. While the exhibition was embraced by many as an exciting context for contemporary art, predictably old fogies and critics of the art market balked. Jeff Koon ...more
Gonorrhea infections reached a peak in 1975, then decreased until 2009, when infection rate started rising and has increased each year since. With the rise of antibiotic resistance, those numbers are only going to get worse — unless we find new treatments against the bacteria. ...more
Among the revelations uncovered during the December unveiling of the Magic Leap One: Creator Edition was the fact that the Lightwear augmented reality headset would be tethered to a wearable computer called the Lightpack. Now, according to a recently-published patent applicat ...more
Ever wonder what you look like to someone else as you walk, talk? How it looks from above, behind, or to the side? Seeing yourself in a video flattens the experience into two dimensions, but this wireless camera rig experiment from Instructables member BigRedRocket brings it i ...more
Check with your ISP about alternatives to the Internet. The speed of your Internet connection is the most important variable in your download speed. If you have dial-up Internet access, consider upgrading to a Digital Subscriber Line (DSL) or cable connection. Even if you alre ...more
Were you horrified when Gwyneth Paltrow's head ended up in a box in Se7en? Do you share Harrison Ford's opinion that Han Solo should have died in Return of the Jedi? Think Kurt Russell could have handled aliens better in The Thing? Well, sorry—you're out of luck. There's nothi ...more
Can't remember when to water the plants? Wish they could just tell you when they need watering—just call you on the phone or something? Or maybe text you, "Help I'm desiccating!" Telecommunications researcher Kate Harman has come up with the device of an absent-minded plant ow ...more
Prion diseases are a group of infectious brain diseases that causes extensive tissue damage, resulting in sponge-like spaces in brain tissue. Prions include Creutzfeldt-Jakob disease in humans, bovine spongiform encephalopathy (often called mad cow disease), and chronic wastin ...more
In the latest example of life imitating art, IBM has applied for a patent for a video censoring system that looks a lot like the "Arkangel" child monitoring system from the latest collection of modern sci-fi fables from Black Mirror on Netflix. For those who haven't seen the ...more
QI and ZA. QI n pl. -S the vital force that in Chinese thought is inherent in all things ZA n pl. -S a pizza For over a decade, these words have been used in SCRABBLE play, but not in the US or Canada. It wasn't until their addition in the Official SCRABBLE Players Dictionar ...more
Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-d ...more
Regarding foodborne pathogens, eating fish is not as hazardous as it was a few years ago — but if fins are on the menu, it's good to have a heads-up about what's good and what's bad these days. Fish are typically considered a healthy, recommended food — except when they aren' ...more
Too lazy to take your phone out of your pocket? If so, then here's a must-have: a customizable inPulse wristwatch that can check into Facebook Places. Created by inPulse designer Eric Migicovsky, the hacked watch uses Bluetooth to pull Facebook Places from a connected Android ...more
Oh, Mario. The guy that's been a part of our lives since as long as we can all remember. Well, Adam Ringwood and his friends did something pretty cool with one of Mario's most exciting games at the HackIllinois event in February 2016—they hacked a Chevrolet Volt's steering whe ...more
There's a lot of talk about 5G these days. You might even think your iPhone is 5G-ready, since, well, it says so right in the status bar. 5G E, right? Sorry to burst your bubble, but no iPhone is capable of connecting to 5G networks yet, no matter how much you pay for that 11 ...more
You may not have heard of visceral leishmaniasis, onchocerciasis, or lymphatic filariasis, and there is a reason for that. These diseases, part of a group of infections called neglected tropical diseases (NTDs), impact more than a billion people on the planet in countries othe ...more
Transmitted by a sandfly one-third the size of a mosquito, parasitic Leishmania protozoa are responsible for a flesh-destroying disease that kills an estimated 20,000 people per year. Two new studies offer understanding of how the parasite provides immunity through persistence ...more
Having a Clostridium difficile infection means stomach pains, diarrhea, fever, and loss of appetite, and if the symptoms weren't bad enough, the disease often reoccurs. Now, new research has found an increased risk of recurrence in people who take medication to treat their sto ...more
Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more