Do-it-yourselfer Kipkay salvaged parts from an old parallel port scanner and made a flexible, super-bright light in this how-to video. The modification is done by extracting the lamp and running it through clear tubing. He mounted the new lamp above his keyboard for night typing. Watch this video tutorial and learn how to turn an old scanner into a keyboard light.
The Unreal Development Kit lets you create terrains and add textures. This tutorial shows you a few tips to making a terrain, and then demonstrates how you can take this textured terrain and port it into Papervision 3D for your own projects.
Warm up your muscles with simple ballet barre exercises including: simple lies, tendus, degages, ronde de jambes, port de bras and frappes. Get a free demonstration and lesson from this ballet and pointe expert: Mikael Monson is an instructor specializing in ballet and pointe at the Virtuosity Performing Arts Studio/Vancouver Elite Gymnastics Academy in Camas, Washington. Learn more ballet from this expert by searching WonderHowTo! You're only practice time away from ruling the dance floor!
Looking for an easy way to view and inspect your Windows computer's TCP and UDP ports? This clip will teach you everything you'll need to know. It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over four minutes. For more information, including detailed, step-by-step instructions, take a look.
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block access to the educational material in National Geographic or forbid searching terms like "China," "Iran," or "Russia"—because, you know, breasts and commies.
Welcome back, my hacker novitiates! In an earlier Linux Basics tutorial, I had demonstrated the basics of the Apache web server. Since Apache is the world's most widely used web server on the Internet (as of July 2015, Apache was 38%, IIS was 26%, and Nginx is 15%), the more you know about it and understand it, the more success you are likely to have hacking it.
Need a good way to hold your iPhone up? There are a ton of smartphone stands out on the market, but they can be pricey or just downright ugly—and potentially phone damaging. But like the Une Bobine above, they do have their perks, like movability at almost any angle. But to alleviate pressure off of the connection port, Sharon Vaknin from CNET developed her own flexible iPhone stand—from an old desk lamp and suction cup.
First off, I would like to say two things. One, this is not for beginners; if you don't feel that you understand this how-to at all, do not try it. Second, never ever install random software or change settings if you do not trust the source.
Watch this video to learn how to download, install and configure a Minecraft Server. If you want to play Mineecraft multiplayer online with friends, this video has all of the information you need to know. This is the Port Forwarding technique. Happy crafting!
In this clip, we learn how to use the Nokia C5's various buttons and ports. The C5 is the first offering in Nokia's new "C" series of mobile phones. It runs on Nokia's Symbian OS and features a 2.2-inch screen and 3.2-megapixel camera. Want more? Search WonderHowTo's sizable collection of C5 video tutorials.
If you want to port mods or other items into your games, you need to know first where Minecraft stores the save files. It's in a hidden folder, and here's how you can uncover it in either Windows XP or Vista.
Want to port your love of all things Twilight to Sims 3? You can build a replica of the Cullen house as featured in the Twilight film, right in your Sims game! This tutorial shows you exactly how to construct this spacious vampire mansion.
Charge your iPhone or iPod while you're killing zombies! You can actually charge many types of Apple products from an Xbox. Your Xbox certainly has enough USB ports to support plugging in your Apple sync cable into your Xbox or Xbox 360 and start charging.
Does your desk need some holiday flare? Do you have an extra USB port on your computer? Then check this out. This video will show you how to make a USB-powered Christmas light set that will spruce up your desk and not require an outlet.
This video will show you how to set up a Garry's Mod server and allow others to access it. In order to get your Garry's Mod server public, you need to ensure that your router is properly configured to allow Garry's Mod ports.
5 things you didn't know that your xbox 360 could do! These are just 5 cool tricks just to make your xbox 360 experience a little more enjoyable. You can use the USB port for more than just HDs. Plug in a keyboard. Or play movies on the drive.
In this installment from the Unorthodox Hacking series of Internet security tutorials, you'll learn how to get a shell on an Oracle database. To see how to pop a shell from within Oracle or even perform a port scan from the database itself, watch this hacking how-to.
All you'll need to connect your Rock Band microphone to a personal computer is an empty USB port. This brief, step-by-step tutorial will show you precisely what to do (and guide Windows users through the driver installation process). Start digitally recording with your Rock Band mic today.
Ever wanted to take apart your Western Digital "My Book" enclosure? If you also happen to think that the drive inside that enclosure runs too hot, this brief how-to video will also guide you through the process of placing the drive in another enclosure with a fan and an eSATA port. As always, be careful, use a set of high-quality tools, and be certain to backup the data on your My Book hard drive.
Sometimes it can be annoying to have to put in a cd in the dark. No worries, this tutorial video will help you to illuminate that CD port with a few LED lights.
Use a few simple household items to make a flashlight powered by you computer through the USB port.
Roasting figs with port makes delicious appetizer, or dessert. Fig season is from the end of June to the end of August.
If you've figured out your short-field approaches and landings, then it's time to tackle "soft-field" approaches and landings. As a pilot, you need to be able to perform all types of landings, and you have to be prepared for inadvertent reactions in the air and on the ground.
Do you like chess? How about Japanese chess? Aren't there different chess variants in Japan though? Maybe, but this specific chess variant is called Shogi. The chess-like game Shogi is won by capturing the king, just like chess, but defeat is conceded at mate, or when mate becomes unavoidable.
The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.
Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.
When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. This information lets a hacker design an attack that perfectly suits the target environment.
The rumors are still hot that Apple might include an 18-watt USB Type-C power adapter with the upcoming iPhone lineup so that there's fast-charging capability right out of the box. Leaked photos have surfaced that substantiate this rumor, though, they could also be fake. But how would ditching the old-style 5-watt USB Type-A power cube affect you if it's true?
Traditional subdomain enumeration techniques create a lot of noise on the target server and may alert intrusion detection systems to an attacker's intentions. For a stealthier approach, there's a tool with the capability of finding hundreds of subdomains related to the target website without alarming the server administrators.
Ever since QuickPic was sold to a known adware company, there's been a glaring need for lightweight and fast third-party gallery apps on Android. For the folks that don't want to use Google Photos and other cloud-based solutions, a gallery app that loads your locally-stored pictures quickly without taking up much storage space is the best possible fit.
There are two types of bad USBs out there. One lets you trick the computer into thinking it's a keyboard or other USB device, and the other goes straight over malicious into computer killing territory.
The hatred is almost universal—by now, even late night TV hosts are bashing Apple's move to ditch the headphone jack in the iPhone 7. It's not like the disdain is baseless, either, because there are plenty of problems that come along with removing the iPhone's only analog sound output.
Alright, this will be my first tutorial in C. Note that this guide is written for Linux.
Today I will show you how to make a metasploit exploit really quickly. This tutorial is mainly applied to stack based buffer overflows and seh buffer overflows exploits .There is a simple way for rop exploits too but I will dedicate a special tutorial on this subject.
Recently, I've been learning Ruby as a second scripting language. But one topic I never covered with the many lessons online were sockets. So I did some research and came up with a very simple client/server connection that sends a string over the socket.
Welcome back, my hacker noviates! In a recent post, I introduced you to Shodan, the world's most dangerous search engine. Shodan crawls the globe from IP to IP address, attempting to pull the banners of each web-enabled device and server it finds.
Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes.
Welcome back, my fledgling hackers! One of the first issues any hacker has to address is reconnaissance. Before we even begin to hack, we need to know quite a bit about the target systems. We should know their IP address, what ports are open, what services are running, and what operating system the target is using. Only after gathering this information can we begin to plan our attack. Most hackers spend far more time doing reconnaissance than exploiting.
There are very few things Android users would want to borrow from Apple's iOS, but let's move beyond the fanboy/girl biases and admit that Apple actually does a few things pretty well. One of those things is looks, and the new iOS 7 looks pretty amazing to me.
With more people joining the internet scene each day it's important that it's security is.. well it has to be good. Of course everything can be hacked and that's the way hackers work. They know there IS a vulnerability but they don't don't know the rest. in this article i'll try to explain the big difference between HTTP and HTTPS