In these video clips you’ll learn how to make your own curtains. Expert artist and fashion designer Lindsay Sanders demonstrates the process of making window treatments composed of a valence and panels in easy to follow steps. She discusses the types and styles of valences and ...more
There are many video formats and video players out in this world today; and just the same, there are many video converters that allow you to convert your videos to just about any format imaginable. But as you might have already found out, these converters take hours to convert ...more
This will be a prank on cops. You've heard of a designated driver, right? Well this is the designated decoy.Have. a bunch of guys at a bar or club, somewhere that has cops outside looking for drunks. Have a group of people walk out of the bar and have one of the guys look comp ...more
Get a scary looking dude. Print up a fake newspaper with the guy’s face on it saying he just broke out of prison. Give the victim the newspaper. Later that night disconnect the phone line and take his/her cell phone. Make sure there are no weapons in the bedroom. After the per ...more
This video is a tutorial for Windows computer users in order to write very simple java programs very quickly. The first thing that you do is open a brand new text edit window. Then you should write in html code your java program, by using html you will need to include all of y ...more
Mrs. Victoria explains us how to change the language on your Keyboard (Windows)1. Go to the control panel and select the option ‘Change keyboard or other input methods’ and a dialog box (regional and language options) pops up.2. Click on change Keyboard, and another dialog box ...more
Sometimes data is lost on your hard drive by accidental deletion from recycle bin, or due to reformat or other reasons. In this video the instructor shows how to recover data even after a reformat. Contrary to popular belief that data is completely lost after a permanent delet ...more
Depending on where you live, you will have to prepare for the hazards from different types of natural disasters. You can sleep easy if you have a secure location, stalked with food and supplied you might need if there is an emergency. Don’t panic when the skies turn dark – th ...more
SyncVue announced at NAB that they would be offering a new version of their remote collaboration software for editors and producers. Well the long awaited update is finally here and all existing SyncVue users will definitely want to grab it. The functionality is improved and t ...more
There are many applications you can use to record and edit audio on your computer. This video discusses two others besides Audacity – QuickTime Pro for Mac and Windows, and GarageBand, which is only available for the Mac. QuickTime Pro is a great little $30 cross-platform aud ...more
These are some tricks for advanced computer use. These are PC only and meant for use on Windows XP machines. Part 1 of 14 - How to Learn advanced computer skills for PC. Learn advanced computer skills for PC - Part 2 of 14. Click through to watch this video on expertvillage.co ...more
Repairs to doors and windows are some of the easiest home repairs you can do. Our expert will show you a simple way to fix a broken window by removing it and then installing a new piece of glass in the old frame. You will also learn how to replace exterior door trim, a repair ...more
In these home security and safety videos, learn how to upgrade your house in some important ways. Our expert, Jon Olson, will show you how to secure your windows and sliding glass doors, some of your home’s most vulnerable entries, with bar locks. Learn how to install a door g ...more
In this online video series learn tips and techniques on how to apply window tint to a car from expert window tint specialist Ronald Sanders. He will teach you about tint tools, different shades of tint, how to prep windows for tinting, how to apply window tint, how to heat sh ...more
Using a location thats already being utilized, It could be a house or an apartment, mount cameras in various hidden areas throughout. Some at chest level and some up near the ceiling for good shots. Be sure that the windows and doors can be locked FROM THE OUTSIDE. Enter this ...more
WHEEL OF HUMILITY!!!! BY: Chris Turner Each person of the Jackass crew (excluding me) will pick a straw; the person with the shortest straw does not have to do the stunt Each member of the Jackass crew including me (if I win) including the person that does no have to do the st ...more
Here's our prank. Start off by getting a shit car, you know what im talking about...one of those shit cars you get from a junk yard. have one of you take it and park it outside of a public place where a ton of people are everyday.(cafe, coffee shop, etc.) Then have Bam act sup ...more
If you want to control electronic devices, such as a relay or motor, you can do so using MicroPython with an ESP8266 and web browser. Usually, you'd program an ESP8266 using Arduino, but C++, which Arduino uses, is not always the easiest programming language for beginners to l ...more
The global gaming market is expected to generate $160 billion in 2020. With emerging markets in the Middle East and Africa, the planet's 2.5 billion gamers are always looking for the next great adventure. Many gamers are exceptional at their craft. Someone has to design the w ...more
These days, AirDrop's distinct "doo-doo-doo-doo" sound is almost as iconic as Apple's classic Marimba ringtone. And just like with ringtones, that AirDrop alert on your iPhone doesn't need to sound like everyone else's. In just a few taps, you can make it sound like anything y ...more
You might know the feeling: the sinking stomach that informs you something terrible has happened. You click on your trash bin. Nothing is there. Your hard drive has been wiped clean. There's nothing worse than realizing everything on your computer is gone. You scold yourself ...more
The term "hacker" often has negative associations attached to it, yet the world is in dire need of professionals with hacking skills. White hat hackers are ethical computer hackers that use their hacking skills to pinpoint network vulnerabilities and patch them up before they ...more
It's no secret that the vast majority of Null Byte readers range from beginner to seasoned coding pros and developers. Regardless of whether you're interested primarily in building websites or creating best-selling apps and games, working with a wide variety of programming lan ...more
Have you ever gotten into a taxi in a foreign country and had trouble expressing where you want to go? Or tried to ask a waiter what's in the dish you're eyeing on the menu? Perhaps you just want to know what's happening in another country, and the news outlets don't offer a t ...more
A macOS computer can reveal a lot of information about the owner, including which Wi-Fi network they have permission to access. With an Arduino-based attack, we'll use a five-dollar setup to inject a rogue Wi-Fi network and steal the list of trusted Wi-Fi networks, allowing us ...more
The Alt-Tab keyboard shortcut makes switching between apps and programs a breeze on your Windows PC. Just like your computer, your Android phone has the same feature baked in to make switching between recent apps just as hassle-free. With Android 10, switching between apps is ...more
Everyone seems to be talking about Elon Musk's new futuristic Tesla Cybertruck, the vehicle that either looks like a cool moon rover or an outlandish video game replica, depending on your tastes. That's why it's no surprise that early HoloLens 2 partner Trimble decided to joi ...more
We've all seen the login pages that allow you to log in to third-party accounts using your credentials from Facebook, Google, or Twitter. It saves you the trouble of creating another account and remembering more passwords — but it can also become a privacy and security issue, ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
When new Android versions come out, the modding community has to find new ways to root the OS. It's a fun cat and mouse game to follow, but it also means the process of rooting isn't exactly the same as it was the last time you did it. Android 10 changes how root works on a sy ...more
Metadata contained in images and other files can give away a lot more information than the average user might think. By tricking a target into sending a photo containing GPS coordinates and additional information, a hacker can learn where a mark lives or works simply by extrac ...more
The Pixel 3a came out of nowhere and flexed its muscles to show the industry that you can have a great phone without a hefty price tag. Since Pixel smartphones are first-party devices straight from Google, you can be sure you'll have root access one way or another. For right n ...more
By using almost any packet-crafting tool, a hacker can perform denial-of-service (DoS) attacks. With the power to create just about any packet with any characteristics, a hacker can easily find one that will take down a host or network. Nmap and Hping are effective packet mani ...more
Encrypting payloads and encoding stagers are more effective against macOS than one might think. It's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of this project was to locate a known and easily detectable macOS payload, then ...more
Samsung isn't known for its timely rollout of major Android updates, and Android 9.0 Pie won't be an exception. If we go by their Oreo update timeline, we can expect Android Pie to officially touch down for the Galaxy S9 and S9+ sometime around November, with the final version ...more
Over the last few years, the only thing teased by Magic Leap more than the Magic Leap One itself has been the company's flagship gaming title Dr. Grordbort's Invaders. The game, developed by New Zealand studio Weta Workshop, finally got its debut last week during the L.E.A.P. ...more
Since getting our hands on the Magic Leap One last week, we've been methodically delving into each feature and reporting our findings step-by-step. Earlier this week, we took a look at the Screens app (a video viewer) and the Helio app (an AR web browser). This time around, we ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
The latest augmented reality feature from The New York Times gives readers a close-up view of the damage left behind by the eruption of Volcán de Fuego in Guatemala earlier this month. Through the NY Times app for iOS and Android, readers can walk around a truck in the villag ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
Now that we have our payload hosted on our VPS, as well as Metasploit installed, we can begin developing the webpage which will trick our "John Smith" target into opening our malicious file. Once he has, we can take over his computer. This part is more involved, but the first ...more
It looks like Magic Leap is getting its ducks in a row to launch its Magic Leap One: Creator Edition as the company's name is once again showing up in US Patent and Trademark Office (USPTO) filings. According to a trademark application filed earlier this month, "Lumin" might ...more
Thanks to Apple's beta preview of iOS 11.3 released last week, app developers are already experimenting with the ARKit capabilities that will be available to regular users this spring. The highlight of ARKit 1.5 is vertical surface detection. The first iteration of ARKit was ...more
While flying can be a frustrating and sometimes nerve-racking experience, Airbus is banking on augmented reality features in its new iflyA380 app for iPhones and iPads to help passengers learn to love the ordeal. In addition to booking flights on an Airbus A380, discovering n ...more
A new telemedicine application for the Microsoft HoloLens is promising paramedics and EMTs a new tool for diagnosis and treatment of patients in the field. Designed through a partnership between medical software company Exelus and HoloLens developer HoloForge, Nomadeec levera ...more
Honeywell recently completed successful testing of virtual window technology that enabled drivers to maneuver an otherwise windowless combat vehicle on rough terrain at speeds exceeding 35 miles per hour. The testing was conducted under contract with the Defense Advanced Rese ...more
In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, ...more
Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecur ...more
In 2013, Offensive Security released Kali Linux, a rebuild of BackTrack Linux derived from Debian. Since then, Kali has gone on to become somewhat of a standard for penetration testing. It comes preconfigured with a collection of tools accessible by a menu system, tied togethe ...more
We started with our system manager in the previous lesson in our series on building dynamic user interfaces, but to get there, aside from the actual transform, rotation, and scaling objects, we need to make objects out of code in multiple ways, establish delegates and events, ...more
While The Walking Dead has brand recognition for its AR game, ARZombi has ARKit. Their forthcoming app, built on ARKit by an independent team of horror aficionados, is more reminiscent of zombie mode in recent installments of the Call of Duty franchise than AMC's location-bas ...more
HoloLens developer Arvizio has expanded its collaboration suite of tools for enterprises with a device that can stream and record mixed reality experiences in high-definition for local and remote audiences. Launched earlier this year, MR Studio enables enterprises to created ...more
Lenovo has been no stranger augmented reality, both in products for consumers and services for developers. At IFA 2017 in Berlin, after taking the wraps off of their AR headset and controllers for the Star Wars: Jedi Challenges AR game, the company introduced the latest smart ...more
Developers looking to create shared experiences that support both HoloLens as well as ARKit may be able to get it working in Unity since that the engine supports both platforms — though, the amount of effort it might take to get that working could be a bit much. Up to this poi ...more
Move over, Spike Jonze; Microsoft has published a mixed reality music video featuring holograms of Reggie Watts filmed through a HoloLens. With HoloLens, the user in the video places various holograms of the musician and trippy visual effects on location. The images run the s ...more
Screen mirroring app iDisplay has arrived for Vuzix M300 Smart Glasses. With the app installed on the M300 and the companion software running on a Mac or Windows computer, users can mirror or extend the computer's desktop to the headset's display, which is connected to the co ...more
A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer ...more
It's that time of year again — Apple will be hitting the stage in California to talk about new features coming to iOS and macOS devices in the near future. Of course, you're going to want to tune in and be up to date on all the changes coming to your Apple products. The offic ...more
Full disclosure: I really like Apple's stock ringtones on the iPhone. After all, there are over 50 to choose from if you include the classic ones. With all that choice, why would you ever need more? Personally, I get bored easily, and I'd like my music to play when people call ...more
Google's Pixel phones claimed the top spot in our ranking of the best phones for rooting, but they do have one drawback from a modder's perspective: Because of their A/B partition layout for seamless updates, the devices don't have official support for Magisk. Thankfully, thou ...more