Hello, Hackers/Viewers! My name is nullf0x, and I have 4 years of experience as a hacker. You might see everyday that one of your friends or acquaintances get a new virus in their computer. You might think, How cool would it be if I made a virus? or How cool would I be if i c ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
A little fruit-flavored gelatin can go a long way in the prank department, especially on April Fool's Day. So, if you've got a friend or loved one who's addicted to their smartphone, make them squirm with this jiggly jello prank. The jello prank consists of encasing your targ ...more
This is a very easy tutorial - all you need is a chosen sound effect file (like a creepy growling animal or a person screaming) and a sneaky sound system. Play it during the middle of the night and freak out your friends.
(a jeff dahlin came to wonderhowto offices... hand delivered 26 written prank ideas.... and a motorized File cabinet from hell.) pj/jeff. this thing goes 20mph and the pic was taken in my office. too heavy to easily transport. toyota starter motor and big drycell battery. Du ...more
Whether you're new to Adobe's Bridge or a seasoned graphic design professional after a general overview of CS5's Mini Bridge, you're sure to be well served by this official video tutorial from the folks at Adobe TV. In it, you'll learn how to manage your media visually with Ad ...more
Prank a friend's Windows PC computer so that it plays embarrassing female orgasm noises every time the computer is turned on. The audio file that you need can be downloaded from http://www.freewebs.com/ivansdesign/orgasm1.wav
Household Hacker brings you fun hack how to projects in a variety of areas: electronic hacks, computer hacks, pranks, etc. Search Household Hacker on WonderHowTo for more videos by this creator. In this video, learn how to make YouTube paper. Template: http://www.householdhac ...more
Instead of using Photoshop, why not give Apple's Aperture a try? Aperture is designed more for post-production work for professional photographers, letting you cull through shoots, enhance images, manage massive libraries, and deliver stunning photos. Watch this video tutoria ...more
If you love computer pranks, this is one of the easiest ones to pull. This video will show you how to remove the Shut Down button from the start menu in Windows XP. Actually, it does't remove the shutdown button, it just disables it, giving the user a restriction message, stat ...more
Stuff you need You're gonna need some Dry Ice, a geek/nerd friend or anyone in general who's a complete and utter idiot when it comes to computers, a laptop (prefferably a brand new one), several accomplices and a high-resolution screen shot of this: (It can be any of the di ...more
Newton Virus is the first art virus by Troika. In the beginning were harmless computer viruses. Viruses born out of the wit of early computer adopters, viruses whose sole purpose was to surprise and amuse. A non-destructive form of artificial life. We wanted to revive this g ...more
Look what came in the mail today! The File Cabinet from hell. Die hard Jackass fan and file cabinet mod-junkie Jeff Dahlin tracked us down to drop off this gem at WonderHowTo HQ today. It is his official entry for the Jackass Prank Contest. It has three wheels.... so it's a tr ...more
It is the file cabinet from Hell. Look what came in the mail today! Die hard Jackass fan and file cabinet mod-junkie Jeff Dahlin tracked us down to drop off this gem at WonderHowTo HQ today. It is his official entry for the Jackass Prank Contest. It's a three-wheeler, does tha ...more
Prank your friends' computers and make a file which opens the CD-ROM TRAY and keeps it open (use this link below to find the ready txt file in case you can't copy it from the videohttp://rapidshare.com/files/29433710/cd_tray_prank.txt)
Pull off this easy prank, and – without causing any permanent damage – watch your coworker squirm with frustration. You Will Need * Access to a coworker's computer * A phony desktop graphic * A flash drive Step 1: Create a phony desktop Create a few on your desktop and give t ...more
This Windows XP video tutorial offers an explanation of how to use a little-utilized and known trick that gives you the power to rename multiple files both quickly and with ease. For more, or to get started batch renaming files yourself, take a look!
This article will show how to make a simple, fake computer error message. These message boxes are 100% harmless, and make for funny pranks. They will display any text you want them to. Required: - Windows XP/Vista/7 - Notepad Typing in the Code First, open Notepad, and ty ...more
The Linux command shell provides a very powerful interface for doing various system tasks. This video explains with an example, how to use a bit of programming techniques to batch rename files with similar naming conventions. The narrator first displays the names of the files ...more
This video shows you how to upload, encode and organize assets in the console. We have a new, faster and easier way for you to encode and upload content into Brightcove. It's a free desktop application called the Publishpod. If you have a small batch of files you need to uploa ...more
This article will teach you how to make an error similar to this one (also by me). This error message though, is a yes or no question. Clicking yes and no will give different results. Like the previous error message, this is 100% harmless. Works only on windows. Notepad is ne ...more
This video shows you how photographers can use Bridge to work effectively. You learn how to batch-rename files, add metadata and keywords, and rate, sort, and compare images. You also learn how to inspect images with the new Loupe tool, and create a slide-show with new transit ...more
In the last Bridge episode we started to look at the Camera RAW features of the Bridge. In this video we go even deeper and look at the synchronization features as well as the ability to batch process your camera RAW files into other formats such as JPEG. Check it out!
Nemo PDF to Word is a powerful but free tool to help us to convert PDF to Word with a few simple clicks. Even beginners who don't have much computer knowledge can easily manage it. How to Convert PDF to Word for free?. Install the tool. Download the free Nemo PDF to Word from ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
We always have so many file formats in our computer, we use MS Word to view .doc files, MS Excel to view .xls files, Adobe Reader to view PDF files, image viewers to view all kinds of image formats, and browser to view html files. It seems we need to install many programs to v ...more
Warning Don't torrent things that you do not have the rights to torrent. Everything I torrent, I have a physical copy of, and just want a copy on my computer without causing wear-and-tear on my DVD drive's laser. Piracy is naughty. I used to get extremely frustrated with Bit ...more
the ultimate: prank all audiences and theater employees: the lights dim, "please put on your 3d glasses now" flashes across the screen. jackass 3d begins with a ridiculously expensive and inspired opening setpiece. the audience is immediately confused, because despite wearing ...more
The My Computer section of most PC computers is an absolute mess, especially if you're trying to navigate someone else's computer. Why not take advantage of this fact by pulling this awesome prank on one of your data-loving friends? The video above will show you how to make a ...more
Store-bought fake blood isn't too expensive, but the consistency and color are always the same. Real blood varies, from bright red when oxygenated (arterial blood) to deep, dark red when deoxygenated (venous blood), and it can be either thick or thin. So to achieve the best sp ...more
Here at Null Byte, we try to inform and teach the community on ways to navigate the Internet in that special way, as well as staying safe along the trip. That being said, I need some help from all of you! There is a lot of information to cover and I know we have some smart use ...more
Smartphones are crazy awesome. You can do your banking, track your children, find directions, and even pretend to have a mustache. The only thing that these personal supercomputers are missing is physical interaction with the environment. I wanted to be able to call my house ...more
Whether you're in an airport, restaurant or waiting room, the insidious grip of televisions on human life is omnipresent. Sometimes it's nice to talk to other human beings while looking at them directly—actually hearing what they have to say. Thankfully, there's a DIY device ...more
Wondering why your inbox is looking a little threadbare? It may be that you've violated a few unwritten rules of email etiquette. Here are a few basic tips that the web-savvy know by heart. Use "Reply All" Sparingly Let's begin with an example. Say that your boss emails a ne ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
I love making my own printed circuit boards. It really gives a professional look to a finished project, and having all the design files means I can whip up another batch whenever I need to. However, when I need to make, say, three thousand swarmbots or fill an order for a doze ...more
This is a very simple, but very funny prank to play on your friends using Windows. Creating the file Begin creating this prank file by opening up a text document in your word editor program. Once you have opened the text document copy this into the document: do msgbox"wha ...more
For this prank it will be required to take place within a crowded area, where there are porto potty's frequently used by the public. Under the toilet seat where the you open the lid different types of fireworks need to be placed at the bottom to go off at different times, (Whe ...more
Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing u ...more
At last, what you all finally waited for! Hi! Fire Crackers, Welcome to my 7th post (Part-3), this tutorial will explain about some situations and how to make the Victim's Life like Hell! And fill his system with Malware. #1 Situation: After Exploiting... Go ahead and explo ...more
This is a video that I created for teaching you(the viewer) how to batch unrar, unzip, or extract a lot of files at a time but I do it in rap form. I know it sounds weird but I still hope you like it. Video: .
A good prank requires decent effort, creativity, and impeccable timing. If you're in the office, there are plenty of hilarious pranks to play on coworkers, and for your family and friends, there's everything from toothpaste-filled Oreos, to solid milk, to impossible-to-solve ...more
If you have a Mac running Mountain Lion, I'm sorry to tell you that all it takes to crash almost any app on it is eight little characters. This strange bug seems to only affect Mountain Lion and doesn't cause your computer any harm. Apparently, it even crashes the error report ...more
Welcome, everyone! While Linux distributions are almost always used for exploits, security, pentesting and other stuff covered in Null Byte, knowing the Windows Command Line (or Command Prompt) is a useful skill that can help you in various ways, such as using exploit program ...more
Welcome back, my amateur hackers! With Halloween right around the corner, I thought you could have a little fun with your newfound hacking skills using a hack that is guaranteed to freak out your boss, teacher, coworker, friend, etc. Any time someone's computer seems to act ...more
We might not be able to hang out with friends in-person during a mandatory lockdown or self-quarantine, but we sure can in "Animal Crossing: New Horizons." Snapping pictures with the new NookPhone feels almost as personal as taking selfies in real life, so, naturally, we want ...more
The default tool for payload generation is MSFvenom, a Metasploit standalone payload generator as well as encoder. This tool is an incredibly powerful tool for payload generation, but it can be difficult and requires a bit of reading for newer users. Even after the initial re ...more
Megaupload was one of the very first file-sharing sites I ever used. But since 2005, the beloved (and pretty gangster) Kim Dotcom, has been in a legal battle with the U.S. Justice Department over copyright infringement. Major movie studios and music labels went after Megauplo ...more
Apple scrubbed the floor clean of all existing text-bombing apps in the iOS App Store, and even though there were once a ton of these apps in Cydia, the go-to store for jailbroken devices, there few and far between these days. If they do exist, they either cost money or don't ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
Facebook really wants your phone number, nagging you for one as soon as you join. This isn't all bad since it can help secure your account with two-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook, i ...more
If you weren't aware, all music purchased online through iTunes, Amazon, and other digital audio providers have information embedded that can be used to identify the buyer and transaction of the digital music file. This may seem like something you should be disclosed about in ...more
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more
Gaining remote access to a phone isn't only for super hackers and spies. There are plenty of times when the average smartphone user would want to have remote access to their device. Maybe you left your Android phone at home and coincidentally forgot to stop farming coins in y ...more
If you're ever in a situation where you need to take a peek at the wireless spectrum, whether it's for Bluetooth or Wi-Fi devices, there's a fascinating Python 3-based tool called Sparrow-wifi you should check out. It's cross-platform, easy to use, and has an impressive GUI th ...more
In case you thought the long and unfortunate story of ODG was over, hold on, there's one last chapter to tell. As we reported in January, ODG's remaining patent assets were put up for auction, but the buyer was never revealed. However, we now have a pretty good idea of where ...more
This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more
With the sheer amount of photos, videos, and miscellaneous files we place on our computers, proper organization becomes necessary. Not only so that we can quickly get to a file when it's needed, but also to declutter folders and keep them from looking like random file dumps. ...more
The majority of our documents and music are digital, which is great for convenience, but it presents a problem for those with a lot of stuff—where do you store it all? There are tons of sites that offer cloud storage, like Dropbox, SkyDrive, and even Flickr, but most of them h ...more