Cracking Search Results

How To: Cover a cake in minutes

Kate Hemmings on The Crafts Channel shows that covering a cake isn't as tricky as you may think. You will need a type of icing that rolls out, such as fondant icing. Ideally, you will want to have fondant icing with glycerine, and so the Pettinice brand is excellent in this case. If you use this icing, you will not encounter problems with cracking of the icing when you try to shape it over the cake.

How To: Milk a cow

Modern milking parlors use machines, but milking a cow by hand is an ancient art. Here’s the "udderly" perfect way to do it.

How To: Maintain your RV tires

Check out this instructional RV video that shows you how to maintain your RV tires. On the front tire of your motor home, make sure that they are maintained properly because if you do lose a tire while driving you can very easily lose control of the vehicle. The first thing that you want to check is the tire pressure. Just remove the cap and check the pressure with your tire pressure gauge. The pressure that is needed on your tire will be listed on the actual tire. If it reads cold that means...

How To: Dry bowls for wood turning

This instructional wood turning video demonstrates how to dry a green piece of wood and avoid cracking. Date the piece and mop a green wood sealer inside the bowl. Set it aside for 90-120 days in a dry climate. This is a necessary step when preparing wood to make a carved wooden bowl.

How To: Draw a skull with a Sharpie

In this tutorial, we learn how to draw a skull with a Sharpie. First you will draw the eyes, make sure to draw lots of little lines around them then cross them to create depth. From here, draw the outline to the head and then the nose and the teeth. Make sure to add lines in around the head to show cracking and marks around the head. Use shading to create darker lines along the head and then add in additional details. Make this unique to you, it doesn't have to look one certain way. When fini...

How To: Prepare eggs over easy

In this video, we learn how to make eggs over easy. You will need butter, a small cooking pan, eggs, a spatula and a little bit of water. First, put your pan on medium heat and put a tbsp in the pan while it's heating. Once the butter is melted, pick up the pan and swirl the butter around until it's gotten to all parts of the pan. Next, crack your eggs and let them fall out into the pan (without cracking the yolk). Now, pour a small amount of water around the edges of your eggs. After this, g...

How To: Style a cork bark oak for the first time

Graham Potter shows how to stylize cork bark oak. The main way to stylize is to avoid the carving of the bark, but to carving the branches. Its recommended to start carving when the branches are young. First you will start removing all the branches you have no use for (e.g.. shortening branches to about 4 to 5 leaves). Graham says while trimming the branches, do not worry about the immediate image of the branches, but of the image of what it will look like in the future when it fully grows. G...

How To: Use a tile nibblers on ceramic tiles

This video demonstrates how to make small cuts on ceramic tile by using Tile Nibblers. The video starts with a quick overview of the tile nibbler tool. It looks like a pair of pliers that have been sharpened. The presenter stresses that a tile nibbler should be just that; nibble away at the tile. If you try to cut out bigger chunks it will result in cracking. Once you get the cut close to how you want it, the presenter uses a tile file to remove the remaining tile and smooth the edges. This v...

How To: Make a glass out of a beer bottle

This video tutorial shows how to make a cool beer glass out of a beer bottle. This is also a great trick for cutting the bottle; forget the glass cutter or tricks with string and acetone. Just pour oil up to the level where you want the bottle cut off and place a red-hot piece of metal into it. Because of the great heat conductivity of oil and at the poor heat conductivity of glass, it will expand at the edge of the oil surface, cracking in a nice even line. Watch this instructional video and...

How To: Make a delicious vegetable tempura

In this video from hippygourmet we learn how to make a delicious vegetable tempura. For this you need asparagus, green beans, and bell pepper sticks. First in salted boiling water cook asparagus for a few minutes. Take out asparagus with strainer. Boil water again and put green beans in. Take out with strainer. To make the batter start by cracking an egg and whisking it, also pouring in ice water. Then sift in one cup of flour. Keep on whisking that and sprinkle in black sesame seeds and a pi...

Hacking Gear: 10 Essential Gadgets Every Hacker Should Try

If you've grown bored of day-to-day hacking and need a new toy to experiment with, we've compiled a list of gadgets to help you take password cracking and wireless hacking to the next level. If you're not a white hat or pentester yourself but have one to shop for, whether for a birthday, Christmas present, or other gift-giving reason, these also make great gift ideas.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences

Every summer for the last 26 years, hoards of hackers have descended on the Las Vegas Strip for DEFCON, the biggest hacker conference in the US. There's a wealth of talks every season (DEFCON 27 has at least 95 scheduled), and there have been some essential topics to learn from in past discussions. We've dug through the last ten years and found the 15 most popular talks you should watch.

How To: Hack Wi-Fi Networks with Bettercap

There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture handshakes from both attended and unattended Wi-Fi networks, we'll use two of Bettercap's modules to help us search for weak Wi-Fi passwords.

How To: Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky

Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for students in Pasadena Computer Science Club. We invited students and Null Byte writers to deliver talks on Wi-Fi hacking, MITM attacks, and rogue devices like the USB Rubber Ducky.

How To: Creating Unique and Safe Passwords, Part 1 Using Wordlists

Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happening? Of course you won't ask your friend if s|he is using the password you are about to create. Before I show you some of my tele-psychic powers like Professor Xavier, you might want to read this for advice on creating "s...

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 6 (Gaining Access to Tokens)

Welcome back, my tenderfoot hackers! Hacker newbies have an inordinate fixation on password cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resources, sometimes we can get it without a password. Good examples of this are replay attacks and MitM attacks. Neither requires us to have passwords to have access to the user's resources.

How To: Decorate ceramics with a torch

Try using a blowtorch to dry the outer portion of a ceramic pot. While the clay is still on the pottery wheel, cut light marks into the outer wall of the pot. Dry the outermost layer of wet clay with a blowtorch. When you continue to stretch and form the wet clay on the wheel, witness an interesting cracking effect.

Hack Like a Pro: How to Hack into Your Suspicious, Creepy Neighbor's Computer & Spy on Him

Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes you hear strange sounds coming from his home? You know he's up to no good, but you aren't sure what it is exactly.

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Share Wi-Fi Adapters Across a Network with Airserv-Ng

If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them over a Wi-Fi or Ethernet connection.

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.