Hack Peter Answer

How To : Use Peter Answers to prank your friends

Peter Answers is a fun website online that you can use to play pranks on your friends. This site is easy to access, free and requires no downloads. Peter Answers is an online fortune teller than you can hack to make it look like he is 'all knowing.' This site will seem innocen ...more

How To : The Foolproof Way to Perfect Home-Baked Bread

Almost every bread recipe will tell you to look for a golden brown crust or to tap on the bottom of your loaf and listen for a hollow sound. That visual and sound technique will work most of the time, but it can still come up short, leaving you with a soft and gooey spot in th ...more

How To : Protect Yourself from Hackers

Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the following information can't be found by a random person who you didn't accept you as a friend: Birthdate E-mail address Hometown Pictures A hacker ca ...more

How To : Hang Curtains Without Making Holes in the Wall

For anyone who lives in a space that may frown upon making holes in the walls, or for anyone who may not want to take on such a task, there's a simple alternative to hanging curtains or drapes. And the answer is brilliantly simple. Look no further than 3M Command hooks. Yes, ...more

How To : Use Peter Answers website to mess with friends

In this video tutorial, viewers learn how to use the Peter Answers - Virtual Tarot website. Peter Answers is a fake fortune telling website that is usually used as a prank. Begin by going to the website. In the Petition space, type in a period. A "P" will be displayed. Then ty ...more

How To : Cheat Plock on Facebook (09/15/09)

If you're looking to get on top of the game Plock for Facebook, then sometimes cheating is the best answer (and easiest). With Cheat Engine, you can easily hack Plock. This video shows how to cheat Plock on Facebook (09/15/09). Download Cheat Engine 5.5 to do this Plock cheat ...more

How To : Hack Happy Island money (12/20/09)

There's an easy way to get more money in Happy Island, and the answer is Cheat Engine. With CE, you can easily earn more money, so start hacking today! See this video tutorial for learning how to hack Happy Island money (12/20/09). Download Cheat Engine 5.5 first, then start ...more

How To : Download Cheat Engine 5.5

Need the newest version of the flash game hacking tool, Cheat Engine? You can hack just about any game you please with this handy dandy application, but where exactly do you find it? That answer is easier than you think. A simple Google search will bring the Cheat Engine 5.5 d ...more

HowTo : Skip the Wait, Upgrade NOW to iPhone 4

Attention all iPhone users. Engadget posts a helpful tip on possibly avoiding that painfully long iPhone 4 upgrade wait: "Apple and AT&T have worked to give folks a little leniency, with existing AT&T users able to upgrade to the iPhone 4 'up to six months early.' In other w ...more

News : Commit voter fraud - Ivy League style

The last two US Presidential elections were marred by reports of voter fraud. So Princeton University took it upon themselves to investigate how easy it could be to hack the election.Answer: easy. They bought a Diebold voting machine, the system used across the country and in ...more

Hack Video Games, Part 1 : Introduction

Hello, fellow hackers. I'm sure we've all seen it somewhere: the undying question of "How do I hack the game so-and-so?" And the answer usually is, "Come back when you actually know how to hack!" But how does one even go about "hacking" a game? What could that even mean? Wha ...more

News : Creepy Talking-Piano Hack

Austrian composer Peter Ablinger has created a "speaking" piano. Ablinger digitized a child's voice reciting the Proclamation of the European Environmental Criminal Court to "play" on the piano via MIDI sequencer.  Apparently, the computer is connected to the piano, which ana ...more

How to Hack Wi-Fi : Cracking WEP Passwords with Aircrack-Ng

Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic. The first a ...more

How To : Connect an Android Wear Smartwatch to Your iPhone

Believe it or not, not every Apple lover is willing to make the commitment and fork over $350+ for the Apple Watch. Like many others, I'm not willing to put that much faith into Apple's first attempt at wearable tech. Thankfully, if you or a buddy have a Moto 360 (which costs ...more

How To : ALL-in-ONE HACKING GUIDE

Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more

How To : Post to Null Byte [4.10.15 Revision]

Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more

How To : Hide Folder Names on Your iPhone for Good

I hate folder names, especially the one Apple shoves down our digital throats. On a computer, they make total sense, but on my iPhone, it's just more clutter on the home screen. You can tell what folder is what just by looking at the app icons within it, so why are we forced t ...more

How to Hack Netflix : Free DVDs and Money Saving Tips

I remember a time when I had to rent a VHS from the local video rental store. It wasn't all that bad, with the only real annoyances being the trip to and fro, having to rewind the movie and the possible malfunction of my VHS player, which liked to eat tape from time to time. ...more

How To : Remotely Bug Hacked Bluetooth Headsets

Tinkernut presents the Bluetooth headset hack! This video shows one of the vulnerabilities of some bluetooth headsets. To prevent this vulnerability, it's best to invest a little more money into a more secure headset and making sure your headset is turned off when not in use. ...more

How To : Dominate the New York Times Crossword Puzzle

First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more

How To : Put trees on top of crops in FarmVille (12/13/09)

Everybody wants to find out the answer to "How do I put trees on my crops?", but it's a tricky one to figure out. But this video walkthrough will show you the steps necessary to finally Put trees on top of crops in FarmVille (12/13/09). Just watch and learn. It's a little tri ...more

How To : Play the Ninja Saga chunin exam (12/03/09)

The chunin exam. It's one of the hardest parts of Ninja Saga. Can you pass the test? Or do you need a little help on this exam? Hack Ninja Saga. The flash-based game Ninja Saga is role-playing game involving… you guess it… NINJAS! Check out this seven-part video tutorial so y ...more

How To : Root Motorola's Droid X cell phone from Verizon

It seemed like an impossible task. No one could figure it out. Only God himself knew the answer. But the impossible has become possibly after only a week of trying. The Droid X has been rooted. Yes, it's true. Everybody who owns Verizon Wireless's Droid X from Motorola can no ...more

How To : Hack a Voicemail Account Using SpoofApp

Have you ever noticed that whenever you setup your voicemail account after getting a new cell phone number, it asks you to create a security pin to access your voicemail from other phone lines? When you call your home or cell number from another phone, after a few rings your ...more

How To : Make Money Writing Online with Google AdSense

Google AdSense is a beautiful thing. They pay you for posting content online, whether it be through a third-party website like WonderHowTo or on your own website. WonderHowTo seems to be a good place to start from if you plan to make money with AdSense, but it's not the only p ...more

How To : Homebrew and hack the PSP

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to homebrew ...more

How To : Break down IP and TCP header with Wireshark

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to break dow ...more

HowTo : Save Wet Electronics

It's one of the most popular queries on the web, meaning the wet electronic disaster is likely a common mishap. There are many answers out there, but if you're lucky enough to have never googled it, pay attention now. You never know when you may drop your cell phone or iPod in ...more

News : Data Pirates (AKA Cops) Can Hack Your Cell Phone

By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more

Farewell Byte : Goodbye Alex, Welcome Allen

Hello, fellow Null Byters. Today, with mixed feelings, I want to let you know that this is my last official post as the admin of Null Byte. I've come to the decision that I need to spend more time focusing on my studies. Over the past 5 months, I have enjoyed building this co ...more

News : Become Your Own Souvenir

As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more

How To : Track a USB device

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to track a U ...more

News : The Ultimate SCRABBLE Word List Resource

To some, SCRABBLE is just a board game to play during family game night or during a casual get-together. Others think of SCRABBLE as a mere hobby. But with any activity, there will always be fanatics—the ones who would rather sell their soul than stop—the ones with a constant ...more

Prev Page
  • Hot
  • Latest