In this video tutorial, learn how to get auto tune, or the t-pain vocal effect, in Audacity using gsnap. To get the GSNAP (GSnap/Grymmjack skin), go here. The GSnap settings you will need: MIN. FREQ: 40 Hz MAX. FREQ: 2000 Hz GATE: -80 dB SPEED: 1 THRESH: 100 cents AMOUNT: 10 ...more
When you come home from the grocery store, you probably put away every single fruit and vegetable in the bins and drawers in your refrigerator. Any fifth grader knows that fridges work to preserve food, thus everything should go in there, right? Nope! Chances are, you've been ...more
A great many S8 and S8+ users have undoubtedly spent quite a bit of time figuring out ways to unlock their new Galaxy in as few steps as possible. One of the most endearing features of previous Galaxy models was the ability to unlock the phone by pressing the home button and m ...more
Your Apple Watch is a fantastic tool that can help you perform daily tasks on your iPhone. Notifications get filtered through it, you can respond to messages on it, and you can even use Apple Pay to purchase goods and services. Your Apple Watch is also a valuable asset when it ...more
Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a techni ...more
This how-to video proves tai chi isn't just for old people in the park. You can learn how to subdue your enemy in four seconds from a tai chi master. There is a pressure point on the neck that you can press that will render your enemy unconscious. Watch this instructional mart ...more
Whether it's embarrassing pictures and videos on your smartphone, or files you just don't want anyone reading, there are plenty of ways to hide them. For most devices, that means installing third-party apps like Gallery Plus - Hide Pictures, Sectos - Photo & Video Vault, TimeL ...more
The volume buttons on the side of your iPhone can do more than just adjust the volume levels for media, ringers, alerts, Siri, and other sounds and voices. You can use them to perform different actions in certain apps and even create custom actions using the Shortcuts app. It' ...more
Unless you've been living under a rock or ignoring recent news headlines, Ashley Madison, the dating site for married people (or individuals in a committed relationship) has recently been hacked. Millions of their users are shitting their pants, and for good reason, as all of ...more
A mention of the deep web can bring to mind images of drugs, hackers, and other criminal activity. Despite the presence of these elements, the Tor network is a valuable tool for preserving privacy and anonymity. And browsing the deep web and any hidden services can be as simpl ...more
Take a look at this instructional vidkeo and learn how to make your own computer numerical control (CNC) machine out of two old CD drives. CNC machines serve as controllers for a number of devices such as machine tools by reading G Code instructions. With a own CNC machine, yo ...more
First, I want to give credit to the author where I first found how to do this: Astr0baby's Blog. This article was dated, so I took the script on his page and reworked it to make it work today. (I also included the way to make it hide the cmd line popup.) Requirements Kali (or ...more
So you want to create a meterpreter virus, but you keep getting caught by AV. How do you create one that will go undetected? In this tutorial, I'll teach you how to code your own simple virus that will download a powershell payload from an apache webserver and execute it - byp ...more
In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using ...more
Your iPad has a superpower that iPhone models don't and probably never will have (even though they could) — one that will make you want to take your iPad with you everywhere you go from now on. While it's not a hidden or secret feature, it has eluded many iPad owners. Most of ...more
Your voice is the key to unlocking many features on your iPhone. For example, you can ask Siri to send a text message to a friend, add items to a list, run a custom shortcut, or turn on your lights, but Apple does not allow you to unlock your iPhone with a Siri voice command. ...more
With its white Apple logo on a plain black background, iOS 8's animated boot screen isn't very interesting. While there is no built-in way to change this boring animation, you can customize this boot screen animation if you have a jailbroken iPhone, and the process is fairly e ...more
Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more
In this video Mr.G puts a new spin on magnets and bare copper wire with just a simple battery. Motion via magic? Not quite, but pretty darn close! Join Mr. G, and build your own motor with its own unique new spin. This is a fun, easy, do it at home experiment.
Samsung phones have a pretty nifty little feature called Smart Stay that will prevent your screen from turning off while you're actively using your device. Trouble with this is that it's exclusive to Galaxy devices and it uses a ton of battery since it monitors the front-facin ...more
Welcome, my aspiring hackers! In this tutorial I'm gonna be showing you how to hack Wi-Fi using the wps compatibility of a router, in , of course, Kali. First, fire up Kali. Then, open up a terminal and type wifite. Wait for a minute, and watch closely as the BSSIDs begin to ...more
Your hair dryer can come in handy for a number of unexpected uses, from removing crayon marks on walls to helping mold your plastic store-bought glasses to fit your big head. Not surprisingly, your hair dryer can also be used to defrost things, quickly dry wet things, and spee ...more
Many Samsung fans were excited when the Galaxy S9 kept the 3.5 mm headphone jack. While this is a rare delight in 2018, you also have the option for high quality audio playback over Bluetooth. When used with compatible headphones, the S9's new Bluetooth audio codecs can greatl ...more
Is the finish on your rims peeling off or cracking? If so, you may want to refinish them. This video shows you how using Dupli-Color wheel paint.
Description: Admit it, having thousands of valid email Ids give you the power to do anything! Such as adding thousands of friends to your Facebook, MySpace, Twitter, etc profiles or promoting your article or blog in just a single click and much more! But how do we do it? I se ...more
Use the "Magic Wand" tool to select the color you wish to change. The next step is to open the replace color box. Go to Image > Adjustments > Replace Color. After the Replace Color box is open, you may have to select the color that you want to change in the image. Sometimes, i ...more
Find out how to get those plump and perky breasts that will have heads turning. Yes, it's a non surgical breast enhancement! Plastic surgery without the surgery.
One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines conn ...more
Remote Desktop gives you access to your Windows 8 PC or device from wherever you are to run your applications and access your files remotely. Left an important document on your work computer? Want to run a legacy x86 desktop app from your Surface? You can use Remote Desktop ...more
A huge chunk of my life revolves around my computer, and whenever I'm on my laptop and get a text message notification on my phone, I find it extremely distracting to stop whatever I'm doing to hunt it down. That's why I'm a big fan of text messaging via my computer. While we ...more
I've had a handlebar mustache for about five years now, and I've learned a lot over those years about how to grow and care for it. I will now share all of that information with you! Hopefully this will encourage you to grow one for Movember! The first thing I want to address r ...more
Bras are such wonderful inventions. Without them, our twins would stray and wander right out of our clothing, and cold weather would prove rather uncomfortable - not to mention awkward - anytime we take our sweater off (if you catch our drift). The one sucky thing about bras, ...more
Bloatware is a problem on Android, and it's not just a Samsung thing. Removing apps that have the Uninstall or Disable button grayed out in Settings has always involved sending ADB commands to your phone from a computer, which itself was always such a pain to set up. Thankfull ...more
With the iPhone X, Apple introduced a brand new way for iOS users to interact with their iPhones. Gestures took the spotlight, as they very apparently replaced functions you would normally execute on the Home button. But swipes aren't everything for the new iPhone XS, XS Max, ...more
One of the best aspects of Android is its customization options. You can change launchers and icons, add widgets, and replace standard apps with others that allow full customization. Android allows your device to really take on your personality, from the inside and out. Stock ...more
The Pixel 2 has finally arrived. Google unveiled their newest flagship phones on October 4th, and there's quite a few changes in store. For one thing, most of Google's official renders have already showed us something new: The Pixel 2 and Pixel 2 XL will have a Google Search b ...more
This video is about how to download movies, music, and software using torrents. The first thing that you will have to do is to download either uTorrent or BitTorrent. After you have download either of the two, go ahead and browse for a torrent website. After you have found the ...more
Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than othe ...more
Samsung's Galaxy S9 is officially on sale, so we ran through its best software features and even took a look at a few hidden things you might not know about. A new phone is always exciting, but there are a few annoying issues with any device. One such issue is the new persiste ...more
Tired of soldering? Well, there's a solder-less solution to joining pipes together. Check out this handy video tutorial on how to join copper pipe with "Just For Copper" pipe glue. Just For Copper is a solderless bonding solution for copper pipes and fittings. This is very use ...more
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more
Google Voice has a hidden feature that lets you record any phone call you're participating in, and unlike other apps, it doesn't cost a dime. When it comes to recording phone conversations, you may think the worst and associate it with something shady like obsessive exes and ...more
Hashes are commonly used to store sensitive information like credentials to avoid storing them in plaintext. With tools like Hashcat, it's possible to crack these hashes, but only if we know the algorithm used to generate the hash. Using a tool called hash-identifier, we can e ...more
In a previous article, I demonstrated an Arc Welder made using parts from old microwave ovens. Video: . Here is part 1 of 2 on how that arc welding machine was made, and how you could make one too! This is the first of two parts on building it, focusing on the modification of ...more
For anyone using open source information to conduct an investigation, a balance between powerful tools and privacy controls are a must. Buscador is a virtual machine packed full of useful OSINT tools and streamlined for online research. This program can easily be set up in Vir ...more
Cameras can be pretty pricey, but this one only costs a buck, though it's pretty limited in its functionality. That's because it's no ordinary camera, but an origami one made using nothing but a dollar bill. Of course, you don't need to spend a Washington to fold this origami ...more
In this tutorial, learn how to age yourself for any film or theatre project. This method of aging requires just a few simple makeup products that are cheap and easy to buy, if you don't already own them. Instead of waiting 50 years for wrinkles and sagging skin, why not creat ...more
Hands down, chips and dip are the best entertainment foods to ever exist. This fact can be confirmed in an instant by any grocery shopper strolling down the chip isle on Super Bowl Sunday or New Year's Eve. However, you may want to hold off on buying those standard salsas or d ...more
Tie loose ends together - in the literal and original sense sense of the phrase - by sewing together the ends and/or hems of your knitting projects like a pro. Whether you're fusing together two pieces of wool-knitted cloth to form the back of a beautiful winter sweater or jus ...more
This screencast shows you how to add a shake effect to your video in Sony Vegas. It is also known as Quake, Jitter, tremor etc. It can have an interesting impact on your productions.
Getting a new phone is exciting, but having access to its exclusive apps ahead of its release is what we're all about here on Gadget Hacks. If you have a Galaxy Note 3, you've probably only had it for a year or less, so upgrading to the Note 4 may not be a viable option when ...more
Watch this video tutorial to learn some very useful tricks in iMovie. In this video, you'll learn how to overlay both photos on video and also overlay video on video using iMovie. In addition, you'll learn how to turn on the greenscreen tool.
Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal the ...more
I've been told numerous times that I listen to music way too loud, to the point of potential hearing damage, especially when I have my headphones plugged in. Not only do my friends tell me this, but my Samsung Galaxy S4 likes to nag me as well. Once I pass a certain volume thr ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. As we all know, redstone can be a very useful tool for make basic things in Minecraft more complex and intricate. For beginners to redstone, today's article will give you a basic un ...more
Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll ...more
How to install concrete anchors.How to attach timber / wood to concrete or any other SOLID masonry surface using masonry anchors / DynaBolts. DynaBolts (that's the name for this particular anchor in Australia. They are know by other names in other countries) are the ideal anch ...more
It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to interce ...more
You can fuse metal together without having to solder it. By using a butane torch, you can heat your pieces of metal until they are almost but not quite melted. Once they reach this flashpoint, you can easily fuse the pieces together.