Thai spicy stir-fried chicken (phat khee mao kai) is so good, when served with rice. You will need chicken breast, chili, sweet basil, prik khing paste, chicken stock, oyster sauce, fish sauce, sugar, and cooking oil. Watch this video cooking tutorial and learn how to make phat khee mao kai, stir-fried chicken, with Thai chef Kai.
Forget the take out tonight, cook some Thai food at home instead. Watch this how to video tutorial as professional Thai chef Kai shows you how to cook up an authentic dish of phat thai (or pad thai). This Thai style fried noodle dish can be found at an Thai restaurant, but now you can make it at home.
If you are looking to install custom firmware on your PSP check out this tutorial. Whether you are trying to update your PSP Slim or PSP Phat, you will find all you need to know right here. This video will show you step by step everything you need to know.
This pork stir fry has a nice spicy flavor to it, which makes it really satisfying. For this recipe, you will need pork, red curry paste, lime leaves, chili, sugar, fish sauce, sweet basil, and cooking oil. Watch this video cooking tutorial and learn how to make phat phet moo, stir-fried pork, with Thai chef Kai.
Many people are having trouble getting ChickHEN R2 to work on the PSP 1000/PHAT, so this video will show you how to get it working. There are many little tricks to getting ChickHEN working after installing it. Try scrolling around for a bit and heading into your pictures.
For most synth players the goal is to acquire legendary pieces of 1980's gear with great amounts of money or luck. Why bother when you can make your own direct digital synthesizer (DDS) at home? Watch this video to learn how to make a DDS out of common electrical parts that will make a phat Theramin sound.
Learn how to pronounce the 'ng' sound in American English. This video provides a basic guide for pronunciations for ESL students.
The TB-303 is nothing short of legendary on the electronic music scene. It is possible there would be no such thing as house music without it. They are rare and extremely complicated, so if you're lucky enough to have one you should pursue whatever help you can get on playing it properly. Enter this video, which will teach you how to quickly and easily program your 303 and get on your way to making phat old-skool tracks.
The Roland TB-303 and TR-909 synths are two of the four most important pieces of gear in the history of electronic music, but every year they get older, more cranky, and further away from our contemporary ideas of what an interface should look like. They can be really hard to figure out how to use, but fortunately for you this video will teach you how to program both instruments and start creating the phat tracks these devices were made to create.
Learn how to layer sounds to make a phat beat with this animated video.
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on how to hack Wi-Fi.
Welcome back, my novice hackers! As many of you know, recon is crucial to a successful hack/pentest. In most cases, hackers spend more time doing good reconnaissance than actually hacking. Without proper recon, you are simply guessing at what type of approach or exploit is going to work and, as a result, your time is wasted without any useful outcomes.
WPA-secured wireless networks, or WiFI Protected Access, is a form of internet security that secures your wireless LAN from being accessed by unauthorized users. Safer than WEP, or wireless equivalent privacy, WPA still has weaknesses that are prone to cracking - IF, that is, you know what you're doing.
Baidu's self-driving car unit has had a tough week. Today, the company's leading artificial intelligence (AI) expert, Andrew Ng, announced in an optimistic blog post that he would be leaving the Chinese search engine company to pursue AI research on his own.
In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless guard interface name. Next, type "airodump-ng wlan0" and press enter. This will tell it what wireless card to use and scan for wireless networks. You are looking for the one that comes up WPA. Copy the MAC address then typ...
Usher and Justin Bieber have created a monster, the youngest R&B phenom since Michael Jackson was fronting the Jackson 5. Since Usher's involved, you know that the dances that go along with Just in Bieber songs are going to be phat. This video will teach you how to do the dance from the video for his song "Somebody to Love" ft. Usher. It breaks it down very slowly and should be as easy as possible for you to learn.
This free video science lesson from YouTube's bionerd23 demonstrates a simple technique for modding a Bresser Biolux NG or Bresser Biolux AL microscope to view larger objects like minerals. You'll also learn how to mod your microscope to allow you to take pictures and shoot video through it. For all of the relevant details and detailed, step-by-step instructions, watch this home-science how-to.
Want to test the security of your WEP WiFi wireless network? In this clip, you'll learn how to use the Backtrack Linux distro and the Aircrack-ng WiFi security app to crack a WEP key. The process is simple. For more information, including step-by-step instructions, and to get started testing the security of your own WiFi networks, watch this hacker's how-to.
In this clip, you'll learn how to use the Backtrack Linux distro and the Aircrack-ng WiFi security app to crack a 64-bit WEP key. The process is simple. For more information, including step-by-step instructions, and to get started testing the security of your own WiFi networks, watch this hacker's how-to.
In this clip, you'll learn how to use the Backtrack Linux distro and the Aircrack-ng WiFi security app to crack a WEP key. The process is simple. For more information, including step-by-step instructions, and to get started testing the security of your own WiFi networks, watch this hacker's how-to.
When Sony released the new versions of the PSP Slim and 3000 in 2009, it thought that it had solved the PSP's rampant hacking problem. They hadn't. This video will show you how to load the popular exploit / CFW installer ChickHEN R2 onto a slim or 3000 PSP, leaving it ready and waiting for whatever homebrew hacks and games you'd like to put on it.
This how-to video is about how to cook Filipino sinigang na ulo ng salmon, normally this dish is salmon boiled with spinach, the best thing about a Filipino dish is that they used to add spinach to most of their dishes which makes the dish more nutritive.
This video demonstrates how to insert an NG tube. An NG tube is a plastic tube inserted to the nose, through the pharynx and into the stomach.
If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them over a Wi-Fi or Ethernet connection.
Welcome back, my greenhorn hackers. When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. You can read more about that in my beginner's guide to hacking Wi-Fi.
Welcome back, my budding hackers! I began this series on Linux basics because several of you have expressed befuddlement at working with BackTrack on Linux. As a hacker, there is no substitute for Linux skills.
In this video, we learn how to make pad thai and stir fry. First, take a hot skillet and add in vegetable or canola oil, shallots, garlic and shrimp. Fry this with beaten egg and add in rice noodles and cook for 2-3 minutes. The pan should be very hot, but do not burn the noodles or shrimp. Next, add in a fish sauce then finally add in your choice of vegetables. Cook this until you see the shrimp is pink all the way through and the vegetables are tender. You can add more seasoning as you wish...
In this video tutorial, viewers learn how to make "Pad Thai" with chicken recipe. Begin by slicing some scallions. Put 2-3 eggs and sprouts on the side. Slice 6-8 oz of chicken breast per serving. Then add cooking oil into a pan and heat it at medium-high temperature. Bring water into a boil and turn off the heat. Soak the noodles into the water for 1 minute. In a hot pan, scramble 2-3 eggs and stir-fry it with the chicken breast. Add in the noodles and pour in the Pad Thai sauce. Mix it well...
Hello All, So to recap in part 1 I went through setting up the dchp server. Part 2 detailed the bash script. Now in part 3 I will post the entire bash script. I am doing this in its own post because Part 2 is just way to much info on one post IMO.
Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic.
This origami project is fun if for no other reason than we get to blow into it at the end of folding and turn it from flat to so phat (sorry). This origami cube is simple and quick to make and is a great introductory project for origami beginners who are looking to increase their finger prowess.
First of all you have to open your internet browser. Now you have to type in mYouTube. Now you have to type in 'psps3psn' in your browser and then click 'enter'. Now you have to select the first search item. This shall ask you to watch ‘YouTube’ video on your ‘PSP’ (slim or ‘phat’) with an official ‘firmware’. There is no need of computer, only your ‘PSP’ and internet connection are required. Now when you click on to it, the video link shall be opened in a new browser. You have to click on 'd...
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show you how a hacker would do so and explain why they should be careful to avoid hacking into a honeypot.
I see that there are a lot of people that want to install and try the Aircrack-ng program for wireless auditing. But have problems because their Linux knowledge isn't that great. This How-To video tutorial explains step by step exactly what you have to do. No loud background music.
Going to be a nurse? Then here are a few things you should know how to do. Follow along with this nursing how-to video to learn how to insert a nasogastric tube in a live person. Watch the demonstration of NG insertion on a live patient. Once you pass around the septum ask the patient to bend their head forward to advance the NG tube into the stomach. Practice inserting a nasogastric tube on a manikin during lab to perfect this technique. And remember to always have your equipment ready befor...
Going to be a nurse? Then here are a few things you should know how to do. Follow along with this nursing how-to video to learn how to insert a nasogastric tube. Watch the demonstration of NG insertion on a manikin. Once you pass around the septum ask the patient to bend their head forward to advance the NG tube into the stomach. Practice inserting a nasogastric tube during lab.
Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. I strongly suggest that you look at some of my earlier posts, such as "Getting Started with Terms and Technologies" and "Getting Started with the Aircrack-ng Suite of Wi-Fi Hacking Tools," before continuing here. If you're ready, you can also check out our updated 2017 buying guide here.
Welcome back, my hacker apprentices! My recent posts here in Null Byte have been very technical in nature, so I thought that I'd have a little fun with this one.
Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified.