Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, w ...more
My first encounter with a phablet was late last year with the AT&T version of the Samsung Galaxy Note 2, having never touched or even seen its highly-acclaimed and pioneering predecessor. Initially, I was a bit overwhelmed by the enormous screen and taken aback by the dated st ...more
The "Zoombombing" trend is still strong on the Zoom video meetings service, despite security measures Zoom put in place to stop it. That's why it's up to you, as either a host or co-host, to be proactive about preventing Zoombomber harassment, as well as stopping it whenever i ...more
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more
Planning a vacation overseas can sometimes feel overwhelming with the number of things you need to remember before heading out. Since smartphones keep us connected at all times, it's essential that you have everything you need here as well. Unexpected events can arise while on ...more
It's official — the newest version of Google's mobile operating system is called Android 8.0 Oreo, and it's in the process of rolling out to many different devices. Oreo has plenty of changes in store, ranging from revamped looks to under-the-hood improvements, so there's tons ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more
Privacy is a growing concern in the tech industry, but Apple has fallen behind many of its peers when it comes to email security. Fortunately, iOS 15 changes that. Your email address is the key to a vast amount of personal information, not to mention a stepping stone into your ...more
There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help ...more
On the latest iOS software, your iPhone comes with significant privacy and security enhancements to protect your data even more than Apple did before. From safeguarding your iPhone to passcode-protecting files to making it easier to browse the web safely, there's a lot you nee ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
This past year was a big one for WonderHowTo. Our biggest yet. In 2014 our writers, curators, and community members helped over 100 million people learn over 270 million new things. That's 40% more people than the total number of students enrolled in every single school from e ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and ...more
The last iOS software update was a modest one, but iOS 17.4 has a lot more for your iPhone, including changes to emoji, Podcasts, security, Safari, widgets, Apple Cash, CarPlay, and more. Many of the exciting changes in iOS 17.4, as well as iPadOS 17.4, apply to users in the ...more
Don't want one of your Facebook "friends" knowing your status updates? Prefer to keep a few of those "friends" out of your photo albums? Would you like to prevent a few "friends" from accessing your address? The simple answer would be to remove all of those so-called friends— ...more
For me, the idea of a smartphone with internet access was overkill for a cell phone. Wasn't that what my computer was for? Do I really need immediate access to the web? Must I update my Facebook every hour, from the palm of my hand? Do I need turn-by-turn directions from Googl ...more
Ever since high school, I've been preparing my own taxes. Each year it gets more and more complicated, which results in me filing later and later, avoiding it until I have the time or just can't wait any longer. I even resorted to using TurboTax online to help do some of the g ...more
It's that time a year when winter storms begin causing havoc across the United States, and when "rotating outages" are common to help sustain the electrical grid during intense cold periods. That means pretty much anybody with snow and ice in their backyard can succumb to powe ...more
The worst can always happen. Even if you think you're absolutely prepared, you can somehow find yourself stranded in the middle of nowhere by yourself. It can happen. Without a map, without a compass, without a cell phone... without food and water. There are plenty of dange ...more
Battery life is a constant problem with cell phones today, and the Droid smartphones running Android software are no exception. If you want to learn how to get the most out of your Droid battery, then check out this helpful video that provides 8 tips on cutting battery-eating ...more
Someday, maybe not today, maybe not tomorrow, but someday, you'll find yourself on the road in your car, maybe on the highway, and you'll hear something. With your air conditioning on full blast and your stereo so loud your ears feel like they are bleeding, you normally would ...more
Have you ever locked your keys inside of your car before? I net you have, you've felt the frustration, you've felt the pain, but don't pull out that cell phone just yet... you don't need a locksmith. This video tutorial will show you step-by-step, how to break into your car t ...more
Thanks to the PlayStation 3 and Xbox 360, video games are constantly evolving to higher degrees of sophistication, with complex graphics, lifelike resemblances and storylines that create exciting experiences that relieve the tediousness of our everyday lives. It's a little di ...more
Some of the most popular cellular devices on the market today are the iPhone 4 and 4S models. Seeing as they are made of glass, it's not uncommon for the back panel to break. Also, with the popularity being so high, you might just be looking for a way to set your device apart ...more
With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighb ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
If you need to repair a broken component in an HTC My Touch mobile Android phone, take a look at this guide for a walkthrough of the teardown. The tutorial specifically focuses on repairing or replacing a glass digitizer that may have cracked or broken and needs to be fixed.
Learn how to load a cracked Hero ROM onto a rooted T-Mobile G1 Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiFi tethering. For all of the ...more
Unlock your mobile phone's hidden potential by running a Hero ROM on it! Loading custom ROMs lets you do fun things with your Hero like overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to learn how to put a custom RO ...more
"A major hardware update to the masterlock cracking robot. Upgraded the previously non-working latch opening mechanism to be geared down 1:25, allowing it to open the shackle. I also revamped the motor mount to be sturdier, and the base of the unit to hold the lock better and ...more
This week, we take a break from the holidays and focus on one of our favorite pastimes: video games. With new releases, hacks, and Easter eggs coming out every day, it's easy to be overwhelmed by the choices available. Never fear: we're here to help you sort out the wheat from ...more
A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more
Tinkernut demonstrates how to crack a wifi connection, as well as how to better secure your own personal connection. Also included in the video gallery is Tinkernut's previous tutorial on the same subject. LifeHacker posted a great detailed text guide to accompany the second ...more
You don't need to buy a whole new iPhone if your screen has accidentally cracked. You can effect this repair with a cheap repair kit you can buy online. Then follow the tutorial to replace your screen (be careful!). Much cheaper than getting a new phone!
In this tutorial, learn how to get a little bit of Droid on your iPhone. You will get a step by step on how to install the Android locking screen on your iPhone 3G or 3GS. This requires a jailbroken, Cydia-enabled phone and a little work, but the cool effect is totally worth i ...more
This is a great tutorial on cracking the iphone to record more than 30 seconds on the iPhone 3G's video camera. This is a hack of the previously still camera that comes stock with all of Apple's phones. Enable your iPhone to shoot video instantly and free! Download the iPhone ...more
Hi again, Just wanted to share a neat little code that I found way back, when I was presented with a spreadsheet which was locked and asked to ''unlock'' it or do whatever it takes to enable the user to edit it's contents. Well, I'm not one to say nay to a challenge, however ...more
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more
Sometimes it's necessary to format your memory card in your mobile phone or digital camera, just like you need to format a hard drive, because of virus problems or slower speeds. This video will show you the steps to formatting (or reformatting) the SD memory card for a cell p ...more
Since we all know Bam is terrified of Snakes I figured this would go above and beyond. The Proof Sneak into his hotel room while he's asleep and place the cameras. The Initiation Set loose some snakes (any kind) across the floor but make sure he has room to hop over and ge ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Protect your email with encryption Did you know that all you have to do to avoid getting spam i ...more
This video is about getting customize working on ANY iPhone/iPod Touch Open iPhone/iPod touch. You need to know SSH. You don't need to turn off Wi-Fi. Go to customize, edit system stings. Springboard English, Power lock. Change to desired name. Press save. Close. Go back to s ...more
Follow this video to learn some basics on how to use a Samsung Galaxy I7500 mobile phone. Switch on the phone by pressing the power key in the bottom right corner. To navigate around the screen press with your finger on the touch screen and swipe to the left or right. If you w ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
It was 5:30 AM when the bus I'm on passed by Gohotels when we noticed the road become like a huge river. I asked myself if it rained (Ondoy memories are still fresh) but everything was dry except the highway which was flooded with water almost knee deep. When we reached Boni A ...more
In this video from iPT2gGeec we learn how to change the font on the iPhone. Your phone needs to be jailbroken. Open up Cydia and search for Fonts. Select Font Swap. Install and confirm. Once loaded, go back to the home screen. It requires no reboot. You will see the Font Swap ...more
This video tutorial is in the Electronics category which will show you how to unlock your iPhone 3G on jailbroken firmware 3.0. By unlocking your iPhone you can use any GSM Sim carrier in your phone. For example, if you have an AT&T iPhone and you put a ROGERS Sim card from Ca ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Gone are the days when you had to carry a clunky DynaTAC to make phone calls, pocket phone book for you contact list, Sony Discman for your tunes, and wallet for you cash and credit cards. Today, all you need is your smartphone. To be specific, Google's Nexus S 4G on Sprint. ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
This Null Byte is a doozey. On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely, to request to have the root user's password changed without knowing the password to the ...more
A book query letter must be well written and brief. Heading Center on the top of the page: Your name, address, phone number, email address, and any websites or blogs. Tip Don't get fancy with font types. Keep it simple. 1st Paragraph Briefly explain why you are contactin ...more
David Wang of the iPhone Dev Team has achieved what is considered quite a jaw-dropping hacking feat. Yesterday Wang posted a video of Google's Android operating system up and running on an iPhone. Via CNET: "The Android-on-iPhone hack is a notable technical accomplishment, bu ...more
If you don't have a Wi-Fi network, you can still easily SSH into your iPhone. Just follow the steps outlined in this video tutorial. First, you will need a Mac or iPhone along with Fuju. Just download the program. Once you have all of this, click on the Wi-Fi bar and click on ...more
1. This video describes how to use the application Infinidock for the iPhone and iPod Touch. This is used to set how many icons to be placed per page, this Infinidock Cracked is doing full document customization like scrolling, adjustable icon amounts and can add as many icons ...more
Want to forget about always pulling out your credit card to purchase something on your BlackBerry? There's a little application that can do it all for you? But how? Best Buy has answers. The Best Buy Mobile team explains how to use the BlackBerry Wallet application. This appli ...more
Worried about your baby or toddler either wrecking or wrecking themselves in your home? Baby proofing time! Make sure your house is safe and secure for your child when they start exploring their turf. You Will Need: • Blankets • A smoke and carbon monoxide detector • Batte ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A double exposure cell phone photog ...more