A radical art group of Russian political pranksters, who go by the name of Voina, have delivered a giant "Up Yours!" to the Russian government... in the form of a 213-foot-tall penis. Animal New York reports on the background of the group and how this particular prank was exe ...more
1. First of all you need to have a folder containing stock of various photos downloaded from the internet. The width of these images is ‘780’ and you need to resize them to ‘550’. 2. Drag all these images into Photoshop. The tutor advises you can save a copy of the or ...more
First of all open the image of Daniel Craig. Go to 'layer' and create a 'duplicate' the current layer. Then from top choose 'colors' then 'saturation'. Now click the 'r' from right side bar and also adjust up the 'hue' to 108 till he looks green. Now adjust the 'saturation' ba ...more
In this video tutorial, Mad Cow Moo shows you how to do blurs on footage in Sony Vegas. Looking on the time line for a break in the audio, place the cursor at this point and hit s on the keyboard to split the video into segments Go to the time line to the final frame you want ...more
Open up the GIMP on your computer, and then proceed to open up the photo you wish to modify. Now, select the scissors tool from your Tool palette or by clicking "Tools" on the menu bar, then click "Selection Tools," and also click "Intelligent Scissors." Use this tool to outl ...more
Ever hear of SmillaEnlarger? It's a small graphical tool (based on QT) to resize, especially magnify bitmaps in high quality. Check out this video tutorial on how to back up and restore data easily on Ubuntu Linux. Hundreds of different solutions exist to reduce the resolutio ...more
This one's pretty easy. Here's the solution to the 16th puzzle, entitled "The Cavalry", in Assassin's Creed 2. Image 1: Just move the cursor to the word “Tunguska.” Image 2: Move the cursor onto the staff and drag it onto Tesla’s photo. For more info, watch the whole gameplay. ...more
Learn about the 8th puzzle, titled Martyrs, in Assassin's Creed 2. Image 1: Highlight Czar Nicholas’ staff. Image 2: Highlight Joan of Arc’s sword. Image 3: Move the fireball to Joan of Arc’s portrait. Image 4: Move the photo of Rasputin onto Czar Nicholas’ portrait. For more ...more
There are seemingly endless photography apps for the iPhone—it is perhaps one of the most popular arenas for application developers. We've covered a few in Giveaway Tuesdays, but nothing comprehensive. We would be remiss to omit the two most popular frontrunners—Hipstamatic ( ...more
Okay, so you've decided to take the plunge, and participate in our Love. Earn program with a how-to article. But, for whatever reason, your article keeps getting rejected by WonderHowTo, and you're wondering, well, where's the love? We've decided to provide you with a few gui ...more
You're probably already impressed at some of the photos amateur astrophotographers can capture with their 16-megapixel digital cameras. I know I am. That's why I'm beefing up my camera skills, so I can also take some amazing pictures of our skies above. But if you can take pho ...more
Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise hig ...more
If you slept in during the peak of the Quadrantid meteor shower this morning, don't fret, because plenty of early risers did manage to wake up—with their cameras. Even if you did wake up and managed to withstand the cold morning air, you might not have seen anything. Cloud cov ...more
Nearly everyone has the capacity to be a cheater. Sometime or another, all Xbox users have yearned to get their gamerscore to unimaginable thresholds—for bragging and egotistical purposes. I can relate to this desire. However, I also don't want to mod my gamerscore, because it ...more
More password cracking action from Null Byte! Today we aren't going to be cracking passwords per se, rather, we are going to learn the basics of generating rainbow tables and how to use them. First, let's go over how passwords are stored and recovered. Passwords are normally ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Visit the charming historical town of Quimper in Northwestern France. Enjoy ancient architecture, cobblestone streets, a stunning cathedral, and world-famous crepes.. Explore Ancient France: Quimper By Camilla Cicconetti Located in Northwestern France, the city of Quimper is ...more
Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topolog ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Mozilla is scheduled to release their updated Firefox browser on Tuesday, bringing the popular web browser up to version 6. Lately, the Mozilla team has been releasing newer versions of Firefox without a slew of new features, focusing on fixing bugs and getting the improved pr ...more
American whiskeys tend to get an undeservedly bad rap from Scotch whisky snobs. Prove haters wrong by inviting them over for an American bourbon tasting with your favorite Wild Turkey varieties. Choose Your Wild Turkey Bourbon Whiskeys The best part of having a tasting is ge ...more
There are over 425,000 apps in the iTunes App Store and the Android Market has over 300,000 available, which makes it really hard to tell which ones you want and which ones you don't. One of the best ways to find new mobile apps is from your family, friends and colleagues—thos ...more
At Google I/O this morning, Google finally announced the launch of its much awaited Google Music service. It's currently in invite-only beta mode, but they claim it will open up to the masses soon enough. To start syncing your music library with Google's Cloud now, you need ma ...more
Private browsing is all the rage with browsers these days. Once you go into private browsing mode, you can traverse the internet without leaving a trail. Your history? Deleted. Your cookies? Destroyed. Your bookmarks and non-private history? Preserved for when you come back to ...more
Penny pincher? A true believer in "waste not want not"? Then listen up—here's a quick tip that will save you some spare change. Scenario 1: We're all guilty of negligently abandoning a freshly bought sponge in a pot full of dirty dishes and food-littered water. Let that bad b ...more
Building Material Request Links for Brick, Nail, Wooden Board Update: Watering Can Request As the Make a Wish feature from the gift box often end up with errors, here are simple directions to create a personalized gift request that will allow your friends to send you the ite ...more
Gil Adam, a student of Industrial Design in Bezalel Academy of Arts and Design in Jerusalem, Israel, has created a 3:1 scale model of his favorite plastic camera, the Holga. While the camera is just a model (non-operational), it's pretty fun to see the oversized object next to ...more
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it. Why Meterprete ...more
I may be a bit weird, but I enjoy listening to music at night as I fall asleep. Sure, you could create a playlist of songs so that it stopped after all the songs finished playing, but I have a rather extensive database of music and I enjoy listening to them randomly. Also, I l ...more
Since the day of the Xbox 360 release, storage space for the device has been overpriced beyond belief. OEM 250GB HDD models still cost $110 USD! A 250GB hard drive should not destroy my wallet, Microsoft. Storage space, especially on HDDs, is cheap. You can buy a removable 2TB ...more
When you're out and about in the dangerous world of Wi-Fi, it's hard for the average computer user to stay protected, or even know what being protected entails. Little do most people know, Windows 7 has a built-in security that few people take advantage of: a VPN (Virtual Priv ...more
The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job. There are paid services th ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
Hallelujah, a miracle tool has been released to the world. This Windows/Mac tool is called Spirit and it enables you to jailbreak any iPhone, iPod Touch or iPad quite easily. And Gizmodo is all over it, with an in-depth guide on exactly how to do it. Some of you may be hackin ...more
House plants are a refreshing reminder of the rich biosphere teaming with life just outside of our hermetically sealed human dens. They calm us and clean our air. But what would you do if you came across a glowing green flower on your dinner table? I would be startled, but not ...more
Are you the expert hacker we're looking for? Do you have a great idea for an article on Null Byte? Do you have a passion to write, and more importantly... teach? We're officially looking for Null Byters on a weekly basis who are willing to take the time to educate the communi ...more
Although +Google Chrome has been getting many deserved kudos for its innovations and speed, many people still prefer to use +Mozilla Firefox as their primary browser. If you’re a dedicated Google+ user, you know that there are many Google+ Chrome browser extensions available t ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
We've all seen the breathtaking, colorful photos of the Eagle, Egg and Cat's Eye Nebulae. You may not recognize them by name, but you've seen them, whether in astronomy textbooks, magazines, websites, album covers, or tee shirts. They are some of the most striking photographs ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out, such as Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc form ...more
Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. ...more
Game design is sedentary work. Generally its practitioners do their work with their butts planted securely in front of a computer in an office (be it home or away) as their muscles and verbal skills atrophy. Even game journalists are prone to this condition. Not so with Colin ...more
In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because the ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Last week in New York, I saw the new show Otherworldly: Optical Delusions and Small Realities at the Museum of Arts and Design, at Columbus Circle near the edge of Central Park, between Broadway and Eighth. Below is the museum’s description of the show: “Otherworldly: Optical ...more
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is down ...more
Technology: The Less You Know the Better? I'm sure everyone is now aware of GPS technologies and tracking techniques these days, with the release of numerous documents (even lawsuits) on big name companies like Apple, Microsoft, and Google. Yes, 2011 was a good year for eye-o ...more
Creating any object you want is as simple as point and click if you have a 3D printer at home. If you don't have one handy, there are a few companies that offer printing services online. But to help services realize your design in extruded plastic, you have to make a 3D comput ...more
Graffiti is a great way of getting your message out to the masses. The earliest known graffiti dates back to 30,000 years ago and used the traditional apply-paint-to-wall technique. Though our paint now comes in cans and not from scavenged berries, the actual graffiti process ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A phoneography challenge on silh ...more
Haven't you ever wanted to live in a futuristic home? I think that homes are headed towards an era where they will be controlled by our computers and smartphones. No longer will you have to find your keys to unlock your door, or wait until you get home to monitor your security ...more
Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster tha ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Hacking, crafting, mining & more… just another ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: mathematical sculptures, burning Xb ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
If you‘re new to Mac, you may not realize that the Dock is not the only place you can access applications and folders. The menu bar of your desktop can also hold a dozen or more applications and plug-ins for easy access to lots of content on your computer. In this article, I ...more