Programmed Search Results

How To: Turn Any Phone into a Hacking Super Weapon with the Sonic

The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized flavor of Kali Linux to allow you to unleash the power of Kali from any smartphone — all without the need to create a hotspot to control it.

How To: Make Your iPhone Speak Its Battery Level Every Time You Start or Stop Charging

While there are many ways to see the exact battery life left on your iPhone, you can take all the work out of it by making your iPhone verbally tell you the current percentage every time you start or stop charging it. Best of all, this trick works whether you use wired or wireless chargers.

How To: A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. In this guide, we'll build an Arduino program from scratch and explain the code structure in a way anyone can understand.

How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users

Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal their real trackable MAC address, and it can even let an attacker take over the phone's data connection with no warning.

How To: Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can discover, access, and drop custom payloads on any weak Pi connected to the same network.

How To: The Ultimate Guide to Customizing Your iPhone

Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's literally over 100 ways to make iOS on your iPhone genuinely unique, some of which are hiding in plain sight.

How To: Make toy robot scorpions

This scorpion toy was constructed by Make Magazine with a Twitchie Robot Kit. If you're afraid of real life scorpions this friendly toy might help you get used to them. His plush body is made from some fabric aiming to make him look like an Arizona bark scorpion, which are tan/yellowish/translucent. Twitchie is Arduino powered and comes pre-programmed, so it's an excellent kit for beginners in robotics, because no programming is required! You can download and modify the code if you want, and ...

How To: Break a fast

Dr. Aris Latham suggests setting standard plans for breaking a fast for most of people that he interacts with because the animal body has been programmed to eat in a certain way. This is necessary to train your body well so as to survive and be healthy. Divide your day into 3 equal parts of 8 hours. Take the sleep part of the day where you deal with the waste in your body and create energy within the body. The next period when you get up is basically when you break your fast when your were sl...

How To: Operate the Nikon D80 digital camera

Watch this instructional video brought to you by Nikon's Digitutor to learn how to operate the Nikon D80. This Nikon D80 video tutorial demonstrates how to use different solutions for various shooting situations, search from control panel, search from viewfinder, use the caerma body: front, top, back, maulti selector and mode dial, attach a lens, insert the battery, set the time and date, insert a memory card, format a memory card, adjust the viewfinder focus, use different shooting modes suc...

How To: Get started with programming in Visual Basic

This beginner's guide is designed for people with little or no prior knowledge of computer languages, who want to learn to program by using the Visual Basic language. If you have some previous programming experience, maybe in another language or from a few years ago, then you may also find this guide useful. Whether or not you have programmed before, you should already be familiar with computers before reading this guide. It assumes that you can perform simple tasks like starting a program, a...

News: Compose DIY Meditiative Music with Otomata, an Online Audio Toy

It's more addictive than Angry Birds, perhaps as relaxing as transcendental meditation, and satisfyingly simpler than GarageBand. It's Otomata, a newly programmed generative sequencer designed by Batuhan Bozkurt, a Turkish sound artist, computer programmer, and performer. But really, it's best described as an audio/visual music toy that anybody can play online—with beautiful results.

News: Battling Wii Soccer Robots

These soccer playing robots from TU Freiberg Robotics are programmed using Knesthetic Bootstrapping, which control the Bioloid's motions. Players can send commands to the soccer bots via Wii Remotes, and users abroad can control them directly online.  If soccer's not your game, robots can play chess, too.

News: Print Yourself in 3D

Since the early genesis of the brilliant Microsoft Kinect hack, inventive applications have been popping up nonstop. One of the most fascinating projects to surface recently falls within the realm of 3D printing. "Fabricate Yourself"—a hack presented at the Tangible, Embedded and Embodied Interaction Conference in January—allows users to pose in front of an Xbox Kinect, which then converts a captured image into a 3D printable file. What does this mean exactly? Think Han Solo trapped in carbon...

News: What Was the First Adventure Game?

Adventure gamers would love to know what was the first adventure game. Well, it was a 1970s computer game titled "Colossal Cave Adventure", also known as "Adventure". Designed by Will Crowther, the game was in FORTRAN and initially had 700 lines of code and data, which was later expanded to 3,000 lines of code and more than 1000 lines of data.

News: Time-Saving Tricks for Working Smarter and Faster in 3ds Max 8

You may be familiar with the general layout of 3ds Max 8's user interface, but a few of version 8's interface features aren't readily apparent to new users. They are, however, critical if you want to navigate quickly in 3D space. The goal of this chapter isn't to show you the nuts and bolts of the interface, but rather to introduce you to a few of these fundamental features that will enhance your productivity.

News: Amazing Solar-Powered Printer Uses Sunlight to Sculpt 3D Objects Out of Sand

No matter if you've used one or not, you've got to admit that 3D printers are pretty darn awesome, especially the self-replicating ones that extrude molten plastic and the shoebox-sized versions that use mesmerizing stereolithography to build tiny objects layer by layer. But what's even cooler? A solar-powered printer that uses the sun's energy to melt sand and make 3D objects out of glass.