Got a digital camera, but no idea how to share pictures with friends and family? Try the photo-sharing site Flickr. You Will Need * Computer with internet access * Flickr or Yahoo! account * Digital photos Step 1 Go to Flickr.com. If you have a Yahoo! ID, hit “Sign In” to ent ...more
Who hasn't gone mad trying to fix his/her computer, trying to delete all of the harmful software? It may not be funny with a real virus, but a fake one is. Or course, you can make a simple virus just with Notepad. There's no need to download applications to fool others; in les ...more
Want to see something cool? Get some friends together because as soon as you see the easter egg in this video, you're going to want to find it for yourself. Watch and learn how to find this COD: Black Ops Annihilation Shangri-La Zombies easter egg.
Watch this video to learn how to upload and play video on your LG enV3 phone. Now you can watch your favorite videos at the gym, on the bus, or share them with friends. You'll have to first compress your video to about 400MB, format it, and use a card reader to move the files ...more
Computer pranks are some of the most insidious because computer are so expensive, necessary, and misunderstood by the general public. This video will show you how to take advantage of all of that by writing a quick script that will cause a computer's disc drive to open and clo ...more
John Gregory shows just how simple it is to make and edit videos using Windows Movie Maker. In you movie maker window, Just click on “Import Video” and import a video that you want to edit. Here, John takes up a video he has already created. You can see the different slides in ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Want to commemorate your recent trip to Spain with a professional slide show for family and friends? Then meet Flash CS4, your new BFF. Hit up this tutorial to learn how to craft a four-photo slide show in the Flash program for a beauteous piece of computer art that'll save y ...more
Cellular telephones? So 20th century! With this techy tutorial, you'll learn how to install Skype on your laptop and use it to make phone calls to your friends over the Internet – all without long distance rates! For more information, including step-by-step instructions on how ...more
3D with one camera? With no computer manipulation? With one lens from some sunglasses? How is this possible? Pulfrich Time Parallax, my friends ...more
Sick of paying for pricey text messaging plans? Down because your parents cut off or limited your texting? Let Hawks12thman offer his excellent, money-saving advice on how to send your texts for FREE from your computer. Especially helpful for those who cannot afford to keep a ...more
I can't say it's absolutely true, but when it comes to mobile word gaming, there's Scrabble people and then there's Words with Friends people. It feels segregational. Rarely does one play both. At least, that's what I see when it comes to my family and friends. Everyone who l ...more
Look good for your internet friends. Edit photos on social networking sites such as Facebook and Picasa as well as blogs without having to download them to your computer. Part 1 of 15 - How to Use Photoshop Express. Use Photoshop Express - Part 2 of 15. Click through to watch ...more
There are a lot of fantastic video games out there. Indie Games Ichiban's bread and butter is making sure that you steer clear of the bad ones and embrace the good. But really, the biggest goal here is to help everyone have more fun. To that end, today a game is not recommende ...more
Carol Platt was caught in the middle of the economic downturn with no backup plan. Searching for a stable job in an unstable economy proved to be difficult without a college degree. Her work history and past successes were overlooked. It had always been a dream of hers to comp ...more
I don't know what I'd do without my computer. I can't do my job without the internet. I communicate with employers, friends, and family through emails, video chat and Twitter. I schedule meetings and plan deadlines. I bank. I shop. I read the news. I play games. I watch my fav ...more
Learn to hide icons and use paint to prank friends. This prank makes friends think their computer froze or the have a virus.
Nobody likes it when a prank gets taken too far. Friendships are ruined, material possessions destroyed, even bodies broken. This video offers four perfect examples of pranks that go entirely too far and that you SHOULD NOT DO to your friends and neighbors. We're being serious ...more
Want to make a prank computer virus for your friends? Well, this video tutorial will show you just how to make a fake virus on a PC. You'll need to open up Notepad to do this fake virus, and just type start eight times. Then just hit enter twice and type in hax.bat. Save the f ...more
This is a very simple, but very funny prank to play on your friends using Windows. Creating the file Begin creating this prank file by opening up a text document in your word editor program. Once you have opened the text document copy this into the document: do msgbox"wha ...more
It can be hard finding fellow singles in the suburbs but it can be done! Keep your eyes peeled and make sure you are out and about meeting new people in public settings. Don’t forget about your online or in print options. If you want to meet a single someone in the suburbs, h ...more
If you work with a computer, at some point in time your computer is going to freeze. Hopefully, you've been saving any important data or writing you've been doing because there are a few easy steps to take to get that computer running smoothly. Don’t get locked down when your ...more
Have you taken spectacular photos with your iPhone? Want to share them with your friends across the country? Who wouldn't? Learn how to transfer pictures from your iPhone to your computer with help from this tutorial.
First off, I would like to say two things. One, this is not for beginners; if you don't feel that you understand this how-to at all, do not try it. Second, never ever install random software or change settings if you do not trust the source. If I haven't scared you yet, here ...more
CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer. Head of Security: Well let me tell you something my good friend. Many companies we have today they are still getting attacked from hackers ...more
The old school staple of many US homes with children, the remote control race track, has been given new life in augmented reality thanks to the Room Racer app for iPhones and iPads. Using ARKit, the app places a miniature race track on a floor or tabletop. The game includes n ...more
Having quick and immediate access to your notifications is one of the most important features for any modern day phone, but these alerts can be easily missed when your device isn't in the palm of your hand. When you're working (or playing) on your computer, it's fairly easy t ...more
Thanks to Apple's implementation of Continuity on Mac OS X Yosemite and iOS 8, communication is truly a seamless thing. Without even looking at my iPhone, I can message or call friends comfortably from my computer or iPad. Even better, with the latest iOS 8.1 update, you can ...more
RedRabbit is an ethical hacking toolkit built for pen-testing and reconnaissance. It can be used to identify attack vectors, brute-force protected files, extract saved network passwords, and obfuscate code. RedRabbit, which is made specifically for red teams, is the evil twin ...more
The COVID-19 pandemic has practically shut down all sports except for World Wrestling Entertainment, which has continued staging matches without an audience, leaving us sports fans with nothing much to cheer for. While they can't replace live games, smartphone games provide an ...more
Running out of storage space on your iPhone is annoying, but trying to free some up is downright aggravating. Until they figure out a way to throw a terabyte of flash memory in there, you're going to have to do some spring cleaning every now and then, especially if you're tryi ...more
Since most devices these days are mobile and wireless, a lot of people have a bunch of old hardware from a decade or two ago sitting around unused, just wasting away in dusty boxes. Look familiar? If you have an old mouse (or several) lying around, you can turn it into a wire ...more
Apple scrubbed the floor clean of all existing text-bombing apps in the iOS App Store, and even though there were once a ton of these apps in Cydia, the go-to store for jailbroken devices, there few and far between these days. If they do exist, they either cost money or don't ...more
If you're marginally inclined towards computers, you've probably been approached at some point by a family member who wants you to "fix" their system during a visit home. With the holidays coming up, these opportunities (or ambushes) are even more likely. Even if nothing is w ...more
Who said you need a smartphone to use Snapchat? A new application in the Mac App Store, appropriately dubbed Snappy, allows you to send and receive Snapchats directly on your computer. Check out the guide below to learn how to go through all of your Snapchat stories, take and ...more
If you ever imagined turning the surface of your desk into one large augmented computer, well the future might not be far off, my friends. Lampix, the company that transforms any surface into a smart surface, is currently working on a portable and quite fashionable lamp to pro ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
April Fool's Day, aka National Screw with Your Friends Day, is finally here. You can always pull a conventional prank, like strategically placing a whoopee cushion on your mom's chair, but that joke has been exhausted generations before smartphones were around. We live in a d ...more
One of the best gifts that someone with an iPhone can receive is a paid app, hot new movie, bestselling album, gift card, or anything else in iTunes, Books, or the App Store that costs money. Even if it's a small $0.99 game that you heard a friend talking about, a gesture like ...more
With GPS chips and Wi-Fi positioning systems, a modern smartphone is capable of tracking its user's location with pinpoint accuracy. This being the case, it's strange that the most common text message sent today is still "Where are you?" So if you're ready to get out of the s ...more
I spend a lot of time helping friends and family with their tech problems, like clearing a browser's cache, scanning a Windows computer for malware, and speeding up a Mac. However, the issue I deal with most frequently revolves around forgotten network passwords. Usually, the ...more
People are always looking for ways to save money, and for the most part, saving money and cheating the system are synonymous when it comes to things like free internet access. Practically every new gadget is capable of connecting to the web, which means more and more people ar ...more
One thing that gets overlooked on Facebook is the amount of videos you can watch, and I'm not just talking about videos uploaded directly by Facebook users—I mean everything ever shared—YouTube, Vine, Instagram, Vimeo, etc. Sometimes one of those videos is just so good that y ...more
Pandora has a simple rating system that works by hitting either the thumbs-up or thumbs-down icon on a track that's playing on your station. If you choose the former, the song you like along with others similar to it will play with more frequency, while selecting the latter wi ...more
Relentless in its fury, the iOS text messaging exploit that exploded onto the scene late last week seems to do more damage than initially reported. Used to reboot devices and crash the Messages app, the string of text can also be used to crash third-party apps such as Instagr ...more
Whether you're at work or in class, there are times when using your phone is unacceptable, regardless of that subtle yet sudden twitch in your arm that arises every time you hear the vibration of a text message. To combat being seen, addicted text messagers have devised ways ...more
While there aren't as many improvements compared to iOS 11's Photos additions, the tabs menu in Apple's updated Photos app for iOS 12 was revamped to include "Memories" inside a new "For You" tab that also houses featured photos and effects suggestions. This is also where you ...more
A group of researchers from Stanford University and Princeton University has put together the largest RGB-D video dataset to date with over 1,500 scans of over 700 different locations across the world, for a total of 2.5 million views. This dataset, called ScanNet, has been s ...more
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look ...more
The best part about April Fool's Day is that everyone is fair game. Even big tech companies like Google and Twitter get in on the action every year. It encourages even the most uptight, unfunny party-poopers among us to have a little fun driving each other crazy with pranks — ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data. The ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my first tutorial and in this tutorial we are basically going to create a port scanner in python ( I guess without external librarie ...more
While SSH is a powerful tool for controlling a computer remotely, not all applications can be run over the command line. Some apps (like Firefox) and hacking tools (like Airgeddon) require opening multiple X windows to function, which can be accomplished by taking advantage of ...more
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily act ...more
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on. Those are just the big ones that get reported in the news. Millions ...more
When you can't think of a way to respond in Messenger with words, emojis and stickers will do the trick. Since Facebook is all about the "likes," which use a thumbs-up icon, there's a shortcut to the symbol just to the right of the chat field. It's always there to send a quick ...more
Facebook just keeps coming up with more and more diversions to help you ignore your responsibilities. At least this diversion is a little more intellectual than most of the other things that can easily distract you on Facebook. Facebook Messenger has a secret chess game, and ...more
welcome back my masters , teachers and classmates , in this second part of this 0-day series we will learn the basic of fuzzing, and i bought some gift for nullbyte(a 0 day vuln that will be released today exclusively on null-byte) . INTRODUCTION As i love wikipedia so much a ...more
Windows 10 passwords stored as NTLM hashes can be dumped and exfiltrated to an attacker's system in seconds. The hashes can be very easily brute-forced and cracked to reveal the passwords in plaintext using a combination of tools, including Mimikatz, ProcDump, John the Ripper, ...more