Answering Machine

How To : Make a giant spider web for Halloween

Now the werewolf and the vampire are no longer threats, but we have heard reports of the giant spider going on drinking binges and webbing up large buildings and even entire towns in the California wine regions as well as in Kentucky bourbon country. It even left a slurred mes ...more

How To : Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more

How To : Make Chain Mail Armor from Start to Finish

This article is a guide for making Chainmail Armor from start (simple wire) to finish (a finished chainmail shirt). We will be using the European 4 in 1 weave, as this is the most common weave. This is the weave that you usually see in movies. There are several sections to thi ...more

How To : Make a miniature fog machine with dry ice

For great looking fog, you no longer need to go to the local film prop store or Halloween store (which is almost always closed 11 months of the year). You can make your own homemade version of a fog machine. Okay, it's not as strong as a electric-powered fog machine, but if y ...more

How To : Join a data center for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the ...more

How To : Pass a California DMV Driving Test

If all things go well, you'll only have to take your road test once. That's the goal: to ace your test on the first try and then start driving on your own. Granted, it's a nerve-racking experience, but keep in mind that the California Department of Motor Vehicles wants you to ...more

How To : Dominate the New York Times Crossword Puzzle

First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more

How To : Stop auto dimming on your Mac

While it's great way to save on juice, a Mac's auto dim feature can be a real nuisance when you're trying to watch a video clip or DVD on your machine. Luckily Tekzilla has the answer in this video.

How To : Find the healthier options in vending machines

When vending machines are your only midday eating option at work, how on earth do you manage to keep up a regimen of eating healthy? The answer is to watch this video, then choose your snack with a guilt-free grin! Health Guru is a site that produces videos which provide medi ...more

News : Five-Arm Turntable Has Got It on Lock

If you have a fear of needles, you may want to sit this one out. Billed as an "analog answer for the digitalized DJ," this five-arm turntable plays an ode to the lock groove. What's a lock groove? Glad you asked. Whereas normal grooves lead the stylus in toward the label of th ...more

How To : Run Windows on your Mac while running OS X

There's nothing wrong with running Windows on your OS X machine: all you need is Boot Camp, right? Wrong. There's a better way: virtualization software, such as the Parallels Desktop for Mac or VMware's Fusion. If you run virtualization software, you can run Windows operating ...more

News : Become Your Own Souvenir

As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more

How To : Answer to Scrabble Challenge #20

It's sad to say, but I will no longer be writing up anymore Scrabble Challenges. Frankly, I just don't have the time to make them now. And though they are incredibly fun and "challenging" to conjure up, I'm not sure that people are finding them as useful as I had hoped. But re ...more

News : FOX News Outraged Over Liberal Eco-Minded Kids Games

We've all seen FOX News commentators get worked up about silly non-issues. It occurs more than we'd like, but what happened last week on popular morning show FOX and Friends was not only a misleading and pointless attack on video games, it was an unintelligible attack on a med ...more

News : Is Your Dream Gaming PC Worth It?

The last week has been a trying one for me. On Sunday, there were four computers in my office, three of which were broken. The fourth was not really a computer, but more of a collection of parts that were cobbled together for the purpose of constructing a PC that would sneer d ...more

News : The Good and the Ugly of Console Controller Add-Ons

Video game controllers are our windows into the soul of the machine, our sole means of interacting with them. More often than not, consumers seem displeased by their controllers; it's comforting to blame sticky, poorly laid out buttons for messing up your game than your own la ...more

How To : Write a Press Release

A press release should be about news. It should have a sense of urgency about it and grab the reader’s attention from the outset. A good press release must quickly answer the journalist’s immediate questions: Who? What? When? Where? Why? How? The release should ideally conta ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

How To : Things to Do on WonderHowTo (12/07 - 12/13)

WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A double exposure cell phone photog ...more

News : The Money Making Macro

In Google definitions a macro is defined as "a single computer instruction that results in a series of instructions in machine language". Basically a macro is a programming script that tells the computer what to do. You can tell a computer (via a macro) to move a mouse, click, ...more

News : Basic Email Etiquette

Wondering why your inbox is looking a little threadbare? It may be that you've violated a few unwritten rules of email etiquette. Here are a few basic tips that the web-savvy know by heart. Use "Reply All" Sparingly Let's begin with an example. Say that your boss emails a ne ...more

Hacker Fundamentals : A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC a ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

How To : Use Kitchen Foil with Your Embossing Folders

All papercrafters and cardmakers and scrapbookers use metallic paper and card but what happens when you run out? and what is an easy why of making some? well here is the answer. Step 1: Tools Needed Die cutting machine.. I used a Big shot but whatever your machine this metho ...more

News : Commit voter fraud - Ivy League style

The last two US Presidential elections were marred by reports of voter fraud. So Princeton University took it upon themselves to investigate how easy it could be to hack the election.Answer: easy. They bought a Diebold voting machine, the system used across the country and in ...more

How To : Stay as Anonymous as Possible Online

There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely s ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Set Up & Use Apple Pay on Your Apple Watch

As you're probably well aware by now, the Apple Watch isn't just for sending text messages and checking Instagram—you can also use it as your wallet. With Apple Pay compatibility, you can use your Watch to make purchases at any retailer that accepts the payment service. Lucki ...more

SPLOIT : How to Make an SSH Brute-Forcer in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more

Prev Page
  • Hot
  • Latest