Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that privacy, they're not perfect. There is another option, though, called Noisy, which was created by Itay Hury. It floods your ISP wit ...more
When researching a person using open source intelligence, the goal is to find clues that tie information about a target into a bigger picture. Screen names are perfect for this because they are unique and link data together, as people often reuse them in accounts across the in ...more
Wi-Fi networks come in two flavors: the more common 2.4 GHz used by most routers and IoT devices, and the 5 GHz one offered as an alternative by newer routers. While it can be frustrating to attack a device that moves out of reach to a 5 GHz Wi-Fi network, we can use an Alfa d ...more
Fireworks are the best part about the Fourth of July and other celebrations, but they can easily cause accidental injuries. It's both safer and more fun to set them off remotely, so we'll hack some standard fireworks with nichrome wire, a relay, and an Arduino to ignite remote ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target. Thanks to a pair of recon tools coded in Python, it takes just seconds to research how a website or server might be vulnerable. No matter what platform ...more
Ever notice how some augmented reality apps can pin specific 3D objects on the ground? Many AR games and apps can accurately plant various 3D characters and objects on the ground in such a way that, when we look down upon them, the objects appear to be entirely pinned to the g ...more
In a previous tutorial, we were able to measure horizontal surfaces such as the ground, tables, etc., all using ARKit. With ARKit 1.5, we're now able to measure vertical surfaces like walls! In this tutorial, you'll learn how to make your augmented reality app for iPads and i ...more
In our last ARKit tutorial, we learned how to measure the sizes of horizontal planes. It was a helpful entryway into the arena of determining spatial relationships with real world spaces versus virtual objects and experiences. This time around, we'll dive into a slightly diff ...more
While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatic ...more
In a previous tutorial, we were able to measure vertical surfaces such as walls, books, and monitors using ARKit 1.5. With the advent of vertical plane anchors, we can now also attach objects onto these vertical walls. In this tutorial, you'll learn how to make your augmented ...more
Have you noticed the many utility ARKit apps on the App Store that allow you to measure the sizes of horizontal planes in the world? Guess what? After this tutorial, you'll be able to do this yourself! In this tutorial, you'll learn how to make your augmented reality app for ...more
Computers all over the world rely on a program called "libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you alre ...more
Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and wha ...more
Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more
Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, ...more
There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more
In 2019, the Raspberry Pi 4 was released with specs including either 1 GB, 2 GB, or 4 GB of memory, a Broadcom BCM2711B0 quad-core A72 SoC, a USB Type-C power supply, and dual Micro-HDMI outputs. Performance and hardware changes aside, the Pi 4 Model B runs Kali Linux just as ...more
With every new Galaxy flagship release comes the age-old dilemma: do I choose great hardware or great software? For years, Samsung has given users the best components available on any smartphone. The problem is the software is an acquired taste. But there is something you can ...more
Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like the Arduino. We'll exercise both sets of sk ...more
If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Obje ...more
When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called r ...more
If you use Office 2008 for Mac and all its applications (Word, PowerPoint, Entourage, Excel), than you need to know about the predefined workflows available using the Script menu that uses Automator to help perform mind-numbing tasks. The Microsoft Office for Mac team shows yo ...more
We all want a faster, more efficient web browsing experience. Some immediately flocked to Google Chrome as soon as it was released, because of its super fast speeds. Others restrained themselves and continued to wait for Microsoft and Mozilla to play catchup. And the time is a ...more
You've all probably heard about Apple's attempts to thwart iPhone 4 users from opening up their own devices, thanks to their sly maneuvers in switching out everyone's screws with those funky pentalobular screws. But one thing Apple will never learn— they will never have comple ...more
This six-part guitar lesson series blow-by-blow account of how to get a nice sound when playing (the Bert Jansch veresion of) Jackson C Frank's folk classic, "Blues Run the Game." While this tutorial is geared toward intermediate and advanced players, even beginners will find ...more
Microsoft Visual Studio 2008 is an integrated development environment that lets you develop websites, web applications, and web services. It requires a bit of computer coding to run (C#, Visual Basic, ASP, C++) and will work on any web server that supports Microsoft. This vid ...more
Take classic origami moving cubes to the third dimension by attempting this box-like version of moving cubes, which moves on both the x and y axes. This amazing craft can be shaped into as many forms as you can make with Legos. Watch this video by origami folder Jo Nakashima ...more
Need a new wallet? Why not make one out of dollar bills? In this video, professional paper folder and co-founder of Origamido Studio, Michael LaFosse, shows WBUR's Here & Now how to fold, origami-style, an "X wallet" out of dollar bills.
In general, no one actually WANTS a black eye. But if you're filming a movie, in a play, or just want to freak out your mom and dad or friends, it's nice to know how to "put on" a fake one. Check out this props and SFX video to learn how to give yourself a black eye using new ...more
Are you having a monster mash theme party for Halloween? If you're looking to really spice up your festivities, then match your ghoulish monster decor with your party eats. In this video, you'll be run through how to decorate your cupcakes - dress them up for Halloween, if yo ...more
It's pretty odd that summer's hottest braided hairstyles are modeled after fish tails, given that fish don't possess much hair of their own. Either way, the fishtail braid/plait is a sexy look for everyone, especially adult women who want to wear braids without looking like Pi ...more
A multi-angle parkour / free running video showing you how to execute a wall run from a running start in both real time and slow motion. This is a great technique for climbing high walls.
Most PC tower cases have the power supply mounted near the top of the case in the back. However, if you want your PSU to run a little cooler, watch this video to learn how you can mount your PSU on the bottom of a tower case, allowing it to draw cooler air from the bottom of t ...more
This plump goldfish requires even less maintenance than the real things, and will look adorable as a conversation piece on your desk or a countertop. Composed of orange origami tissue paper, this fish stands up all on its own despite its rotund belly. Watch this video to see ...more
Step-by-step instructions for how to make an origami azalea (flower and stamen). This video is for intermediate or advanced folder, as it may be to difficult for a beginner to make an origami azalea. Part 1 of 3 - How to Origami an azalea. Part 2 of 3 - How to Origami an azal ...more
In this video tutorial, viewers learn how to run 4 Google searches in 1 tab. This task is very easy, simple and fast to do. Begin by opening your web browser and go to the website: GoogleGoogleGoogleGoogle. There, users will be provided with 4 windows of Google. There users ar ...more
In this video tutorial, viewers learn how to remember Windows Explorer positions. Users will need to download the Shell Folder Fix program provided in the video. Once downloaded and installed, the program will remember the position of every Windows Explorer window that is open ...more
If you're a habitual runner - or you want to become one - then it's super important that you run correctly. Even if you don't notice it at first, running with the wrong alignment can cause leg and back issues later on that are extremely painful and difficult to deal with. So ...more
This square dance video teaches the following square dance calls on the mainstream list: Cross Run, Left Swing Thru, Single Hinge, Separate, Trade By, Wheel & Deal (Lines of 4).
Paulant Films has some great information on how to download and rip Xbox 360 games. In these four video tutorials, you'll learn how to hotswap, stealth patch, and burn Xbox 360 games. In the first video, watch to see how to hot swap or copy Xbox 360 games to ISO format using ...more
This square dance video teaches the following square dance calls on the mainstream list: Ocean Wave, Swing Thru, Run (Boys, Girls, Centers, Ends), Pass the Ocean, Trades (Boys, Girls, Ends, Centers), Dive Thru, Extend.
In this video, we learn how to do the Prologue Speed Run achievement in Mirror's Edge. You can unlock this after finishing the main story. The prologue has a qualifying time of three minutes. Rather than jumping to the left, you can jump straight and hang onto ropes. You can a ...more
Drawing a person sitting down and other sittign positions can sometimes be really tricky. The next time you run into a problem, be sure to use this great video as a guide. In this video, black charcoal is used and three different sitting positions are gone over.
With this video tutorial, you'll learn how to hack demo versions of applications such that they'll run indefinitely. You'll just need to modify the date and time on your computer. Learn how to use trials of programs without them ever expiring instead of buying the real thing w ...more
Interested in using Cinebench to benchmark your Microsoft Windows or Apple Mac OS X computer? You've come to the right place. This home-computing how-to from the Greyscale Gorilla will teach you everything you'll need to know. For detailed, step-by-step instructions on how to ...more
This video will show you how to record video on your Apple iPhone 3G for free! This is a complete guide to installing the iPhone Video Recorder on your iPhone 3G, which also works on the First Generation iPhone. Learn how to fill in the missing feature of video recording on y ...more
Need a little help with your new Adobe Photoshop graphics editing program? Working with Photoshop can be a bit tough if you don't know what you're doing, so instead of getting out the books, check out this 'no nonsense' video tutorial to learn how to create a simple folder in ...more
If you've forgotten the password to one or more of the Windows XP accounts on your computer, take heart: This video tutorial will show you how to bypass, and then change, a Windows XP start-up password. For a detailed run through of this simple Windows log-in hack, watch this ...more
You may remember the recipe for a basic non-Newtonian fluid from grade school science experiments (one part water to one and one third part corn flour or cornstarch), but those trials probably stopped at squeezing the mixture in your hands. While a regular fluid's viscosity wo ...more
It's 1976. The hottest arcade game on the market is Blockade (or Blokade), an 8-bit maze game for 2 players. You and your opponent must move your characters around the screen in 90-degree angles, leaving a solid line behind them. Whoever runs into one of the solid lines first, ...more
A banana cheesecake is ripe for summer, with a pefectly portioned dash of sweet fruit and rich, creamy cheesecake. Make this tasty variation on your run of the mill cheesecakes by watching this cake making video by Honeysuckcle Bakery. Bananas are healthy sources of potassium ...more
Want to run Windows Vista or 7 on your Apple computer without having to install Bootcamp? With virtualization software like Parallels, it's easy! Learn how to run Microsoft Windows within Mac OS X with this free video tutorial from the folks at CNET TV. For specifics, and to g ...more
Have you ever wanted to make your own Minecraft server on Windows? This tutorial will teach you how, without having to download Hamachi. The whole process is a lot simpler than you might think, and it will only take a few minutes! You will need: Firefox web browser Computer ...more
In this Super Smash Bros Brawl (SSBB) for the Nintendo Wii video, I showcase how Dedede and Lucario work, including their move properties and what I believe will be key strategies to learn with them in the long run. I came into this video with a plan, written on paper, so I sh ...more
At the end of last year Google released Chromium OS, the source code to their soon-to-be-released operating system Google Chrome OS. This has allowed millions of people to preview the new OS and make suggestions. Do you want in on that action? This video will show you how to i ...more
Top-Windows-Tutorials is a great site dedicated to Windows tutorials for almost all things Windows. Whether you are a computer novice or an expert in Windows operating systems, you'll find useful information in these guides catering to your level of expertise. These user frien ...more
If you've got something on your Windows PC that you don't want to share with the world you're going to want to create a private, password protected folder. This simple video shows how to easily set it up. This works for Windows 7, Vista and XP. Get the locker.bat code you'll ...more
This video shows you how to set up a scheduled task to run anytime your computer is idle that defragments your computer. Defragmenting is important because it will allow your programs to open much faster.