If there are people you just don't want to talk to, or texts you want to stop recieving, you can use the MCleaner app for iPhone. This app has a white list of approved numbers and a black list of disallowed numbers. You can even choose to let in phone calls from one number whi ...more
In this tutorial, we learn how to add a click-to-call Google Voice widget to a website to get more business! First, go to Google Voice and now click on "get an invite" or log into your account. If you need to set up an account, you will get a Google voice number that will forw ...more
The fine folks at The Pathfinder School present what they call a spring tune-up for for you knife techniques, which have presumable deteriorated during the winter. The host is trying out a new knife he has been asked to test, and uses it to make a trap knotch and drill into a ...more
Jordan Patterson the Cheap Geek has made a video showing you the steps to sync your contacts and calendars on three mobile devices together, the iPhone, a laptop running Windows, and a Mac running OS X utilizing a few downloaded programs and Google Calendar. First he shows you ...more
In this video Mike Callahan walks you through using Skype on the iPhone. To start, download it from the Apple App Store. Next, launch the application on your iPhone. It will immediately prompt you to enter your name and password. If you don't have one you can use this screen t ...more
This video demonstrates how to use Skype to make calls. The best thing about it is that it is free. You only need a computer, a microphone and a web camera. To use Skype, you first have to download the Skype software. This can be done through the website of Skype. Then install ...more
This is a very useful instructional video on how to use Skype to call anywhere in the world. You can go to Skype .com and click account and open a new account with Skype. Now log on Skype using your user name and pass word. now you can click the free calls button and you can c ...more
In this video brought to us by Google Nexus One, we are shown how to use the new Nexus One Android Phone. The demonstrator starts off by showing us how to use the phone's dial pad. A benefit of the Android is that you can use your apps while on a phone call. Next, she explains ...more
Nothing ruins a romantic fresh air picnic like the buzzing of angry yellow jackets—especially since, unlike the useful honey bee, they can use their stingers over and over again... Learn how to deal with bees without getting stung. This instructional video from Howcast offers ...more
Ho to remove your call log/history from Skype to protect your privacy.
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
WANIGAN 61 points (11 points without the bingo) Definition: a supply chest used in a logging camp [n] The most common definition of wanigan (or wannigan) is a small chest which holds supplies for lumberjacks. Some will just call it a lumberjack's trunk, but if you want to ta ...more
It looks like Sony is adding some cool features to their upcoming portable game system called NGP (Next Generation Portable). It will have a front and rear camera & Six-axis motion sensing system (three-axis gyroscope, three-axis accelerometer), Three-axis electronic compass. ...more
Google is great. They provide us with tons of free services and open source APIs that we can code fun tools for, one of which I don't think gets enough credit: Google Voice. Haven't you ever wanted to be able to protect your privacy when handing out your phone number? Or mayb ...more
There a ways to personalize your Gmail experience, and one of those is picking personalized Gmail themes which make emailing funner. But if you're not sure what kind of theme you want to use from all the available Gmail theme choices, there's an option called "Random" which pr ...more
There a ways to personalize your Gmail experience, and one of those is picking personalized Gmail themes which make emailing funner. But if you're not sure what kind of theme you want to use from all the available Gmail theme choices, there's an option called "Random" which pr ...more
The best way to get started in eMusic is to begin customizing your eMusic homepage. After you log in to eMusic, the first thing you'll see is a set of albums at the top of the page, called "Music You'll Love". It automatically delivers recommended music to your home page. The ...more
The bookmarklet tool lets you send Gmail messages with the click of a button so you don't have to visit your Gmail account. It's an application called GmailThis! From the developer's website, drag the GmailThis! link to the browser's toolbar. Then, if you are already logged in ...more
This video tutorial in Computers & Programming category will show you how to delete temporary files in Ubuntu, Linux Mint or Debian. For this you will need the program called bleachbit. You could get it from Bleachbit Sourceforge/ or from Synaptic package manager. For synaptic ...more
This video describes about accessing an iPhone in Ubuntu using open SSH, cyber-duck, Netatalk. For accessing using SSH, make sure your iPhone's Wi-Fi connectivity is on. Now open your terminal and type "SSH root@'address'". Here address refers to the IP address of your iPhone. ...more
The video shows us how to use a proxy to bypass the Internet Filters. Most of the times in our schools and colleges most of the websites including the social networking ones will be blocked for security reasons and makes us unable to log into those websites. In such cases even ...more
Is there anyone on your list of Facebook friends that you no longer wish to have access to your profile? This concise video shows how to remove "friend" statuses from unwanted Facebook friends. First, you must log into your Facebook profile. Near the top of the opening page yo ...more
User FL1PPY explains how to play an NES on an iPhone. First, log in to your iPod with Win SCP. Locate the Applications folder. Drag the NES.app folder into the 'Applications' folder. Open the NES folder and find the NES file. Right click, choose 'properties', and set permissio ...more
Many of you wizards out there still don't know what this Wizard101 is. Technically, I shouldn't call you wizards, but oh well, you will soon become one.So you read the overview of Wizard101 and are very interested in it. You head over to the Wizard101 website and click Play, s ...more
If you're hungry, eat now, because this list is probably going to put you off consuming vittles for so long that you'll end up looking like the love child of Nicole Richie and Skeletor. Now that you've been officially warned, help me count down the ten most WTF food items on t ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A New Year's Eve cell phone phot ...more
JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information with it in ways that HTML simply cannot. With JavaScript, you are able to access browser cookies, website preferences, real-time actions, s ...more
Good news. Facebook has finally listened. After severe criticism for ignoring the world's privacy norms, Facebook will finally release simplistic, user-friendly privacy settings soon. Wired reports: “'Now we’ve heard from our users that we have gotten a little bit complex,' ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. While mining is a basic aspect of Minecraft, it is often overlooked. Every adventure requires iron and diamonds and other ore and if you're playing in hardcore mode then you need al ...more
In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff. FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read onli ...more
Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more
There was a huge ban wave recently on Xbox Live. In the unfortunate event that you decided to do something against Microsoft policy, and have consequently gotten yourself banned from Xbox Live, you may have come to the realization that doing whatever got you banned from Xbox L ...more
I got hooked on origami sometime after Math Craft admin Cory Poole posted instructions for creating modular origami, but I had to take a break to finish a quilt I've been working on for a while now. It's my first quilt, and very simple in its construction (straight up squares, ...more
This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project ...more
Have an HTC smartphone? Chances are that some of your stored personal data has been hijacked by malicious apps on your device. Android apps that have permission to access the Internet, which is pretty much every ad-supported app out there, can snag valuable information such as ...more
Wondering why your inbox is looking a little threadbare? It may be that you've violated a few unwritten rules of email etiquette. Here are a few basic tips that the web-savvy know by heart. Use "Reply All" Sparingly Let's begin with an example. Say that your boss emails a ne ...more
If you would like to restrict what appears on your Facebook page, here's a novel way to retain ultimate control, coined the "super-logoff" method: "Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesn’t delete the ...more
This is prank is a 'bit' complicated to do but if you manage to do it, it will be the best prank ever made for good. I think the best man for this prank should be Bam as his chances not to die during the fall down are the best : - Go to some scene shooting somewhere in the wo ...more
Wartex8 demonstrates how to use remote desktop in Windows XP. Remote Desktop is a useful utility that you can use to control another computer and its applications.The necessary steps that are adopted to activate remote desktop are:1) Right click on my computer icon (either the ...more
In this video the instructor shows how to set parental controls for a user ID account in Windows 7. To do this go to the 'Start Menu' and go to 'Control Panel'. In the Control Panel window select the 'User accounts and Family Safety' link. There is an option called 'Set up par ...more
Video demonstrates tutorial of how to hide the logical drive icons in Windows. In the demonstration there is two partitions C and D and also there is a DVD drive, DVD Rom and DVD Writer. Here drives C, D and F from My computer is going to be hidden with help of utility called ...more
If you've received the "hal.dll is missing or corrupt" error message from your Windows machine, then you're in luck! This video will show you how to correct that problem with the Recovery Console tool that comes with the Windows 2000 and XP CDs. Using the Windows Recovery Cons ...more
Most people on Facebook accept friend requests without thinking much of it. If you're one of those people and want to figure out how to get rid of a friend, this video is for you. Trouble in social-media paradise? Get rid of those so-called friends with these simple steps. S ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. More amazing community contributions this w ...more
Collapse At Hand Ever since the beginning of the financial crisis and quantitative easing, the question has been before us: How can the Federal Reserve maintain zero interest rates for banks and negative real interest rates for savers and bond holders when the US government i ...more
There's a lot of talk going around about Google's new social network and how it's heavily influenced by Facebook, but truth be told, how could they build Google+ without taking a note or two from the world's most popular social network? One thing that's different (and better) ...more
Many people must be asking, how do you enter a coupon code on Wizard101? This is a follow-up of the "Promo Code: 1000 Gold Coins" post. So here's how you do it: Go to Wizard101.com The first thing you'll have to do is go to the site. From here, you can access all your accoun ...more
What happened to please and thank you? When did asking someone to come look at your build degenerate into COME NOW or FOLLOW or sending out teleport requests to any and all currently on the server without asking? Phillip Chan, a yahoo network contributor wrote this back in 20 ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
I admit, when the new iOS 5 update for Apple devices was coming out, I had iTunes open all morning with my iPhone 4 attached... waiting... waiting... waiting until finally the new version of iOS was available for download. I stopped everything I was doing and quickly initiated ...more
What happens when a person who has never played a building sandbox game tries it for the first time? Reality happens. The harsh reality of human nature. You would think playing with friends in a creation game would be utopia, but in truth it's more like being stuck with people ...more
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive infor ...more
Today I will show you how to create a simple keylogger in Visual C# Sharp, which will start up hidden from view, and record anything the user types on the keybord, then save it into a text file. Great if you share a PC and want to track what someone else is writing. You Will ...more
Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate h ...more
Even with Apple's forthcoming iOS 5 updates to its default camera application, those upcoming features can't match what already exists in Global Delight's Camera Plus Pro. For $1.99, Camera Plus Pro provides users with over 100 tools for every part of the picture taking proces ...more
Dactyloscopy isn’t going anywhere. Forensic science has much relied on fingerprinting as a means of identification, largely because of the massive amount of fingerprints stored in the FBI’s biometric database (IAFIS), which houses over 150,000 million prints. And thanks to the ...more
Get a little perspective on FarmVille hysteria, via FarmVille World, written by tenebrism: Did you know it only took five weeks to make FarmVille? That it currently has over 80,000,000 users? That FarmVille farmers outnumber real farmers in the United States by a ration of ...more