In this tutorial, we learn how to edit the registry on a Windows machine. This is a major part of your computer that will change if you delete something that you shouldn't have deleted. Make sure you back up your computer before you do this, just in case you do something wrong ...more
Want to know how to remove viruses, adware and other sorts of malware from the Windows command line? It's simple! So simple, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over four minutes. For more inf ...more
Want to know how to make HijackThis, the popular malware scanning program, display only malicious registry entries? Learn how to use the Ignore List to acheive just that with this free home computing how-to from the folks at CNET TV, which offers complete instructions on how t ...more
Computers are vulnerable to all kinds of viruses, hacks and other attacks that can do serious damage and cost you money. Make sure your version of Windows is the real deal and protect it from counterfeiters by making it genuine. This video will show you how to make Windows XP ...more
About Today's topic Today we will talk about diagnosing and fixing connection problems. Let's face it - the truth is everyone who uses a computer and has an internet connection will have to deal with this at some point. Connection problems often occur at the wrong time and it ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
In this tutorial, we learn how to protect a Windows PC from spyware & malicious software with Dave. You can get spyware from downloading random things, so a great way to make sure you don't download these things, is to use Firefox and search your items before you download them ...more
In this tutorial, learn how to disable the annoying UAC or User Account Control on your Windows Vista computer. This clip will show you how to do this without compromising your security. No doubt the Vista User Account Control (UAC) is the single biggest irritation in the who ...more
In this video the instructor shows how to activate Windows 7 forever. There is a program called 7Loader that will activate your Windows forever without having to pay for anything. Download the program from the internet or from the link given in this video. After downloading it ...more
Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the ...more
If you want to learn how to add a fake depth of field in Photoshop this is for you. First start off with a picture that has clarity throughout the picture. The first thing to do is add another layer. To do this you must grab your first layer and drag it to the bottom right whe ...more
Merry Christmas all! I hope you are all having a very wonderful day! Today we will be talking about further measures you can take to secure your Windows 7 logon screen. To see my previous post on how to add a username and password to your logon screen, see here. Introductio ...more
Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic functio ...more
If you have a friend who always leaves their valuable possession out in their car, where anyone can see them and only need break into the car to take them, you owe this prank to them to teach them a lesson. Get some broken glass and a key to their car, wait until they're out o ...more
There are times when you must start up your Windows XP computer system in Safe Mode, for example if you need to remove certain viruses, key loggers, adware, etc. that cannot be removed while in standard mode. If you want to learn how to boot in safe mode in Windows XP, you sho ...more
AntiVirus Live is a fake antivirus software which comes onto your system and asks you to buy it. It doesn't provide any security to the computer. Here is the procedure to remove it: (1) disable the proxy server for your LAN in Internet Explorer. 2) download the process explore ...more
You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a ...more
Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websi ...more
You've probably heard a lot about computer viruses — but how do you stop them? This home-computing how-to from the folks at CNET TV will teach you what you'll need to know. For detailed information, and to get started protecting your own Windows PC from malicious code, watch t ...more
Open another canvas. It doesn't matter what size you make it, as long as it is the same size or bigger than the area you want it to cover on the image. Open a new canvas by going to "File" and clicking "New." Select your dimensions and click "Okay." Draw your tattoo design on ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Going to miss the fireworks extravaganza this Fourth of July? Doesn't mean you can't fake the experience, and that's exactly what we're going to do here—in Photoshop. You're going to learn how to take any night photograph and insert fireworks into it. It's the next best thing ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
Update 2: 1.9 Version3 is currently out. Click here to download and install 1.9 Version 3. Update: 1.8 is now officially out! It'll prompt you to update the next time you launch. Be sure to read the rundown of the new 1.8 features and share your thoughts in the 1.8 general im ...more
Since Angry Birds is apparently an "indie game", here's an interesting tidbit. Changsa, China's Window of the World theme park recently added an especially zeitgeisty activity to their collection of diverse attractions: a real-life Angry Birds game, which allows participants ...more
Private browsing is all the rage with browsers these days. Once you go into private browsing mode, you can traverse the internet without leaving a trail. Your history? Deleted. Your cookies? Destroyed. Your bookmarks and non-private history? Preserved for when you come back to ...more
What Is Needed? Marker Caps, about 4 or 5 Fake Blood How To Set It Up Remove the caps from your pens or markers because that's pretty much all you'll be needing for this prank besides fake blood. Fill each cap with fake blood and make sure to fill it to the top Carefully ...more
In this video, we learn how to remove body fat or stretch marks in GIMP. First, go to filters, then distort, then warp. When you are in this window, you will be able to see all the different distortions that you can do. To help you remove the fat, use the "move" tool and a pro ...more
Your Windows computer may be experiencing some issues, and those issues may be a direct result of computer viruses and malicious software from the internet. One of the simplest ways to find these issues and repair them is by using a freeware program called System Repair Engine ...more
In this video tutorial, viewers learn how to reformat an Acer computer hard drive. Begin by clicking on the "Empowering Technology" logo on the top of the screen and select Recovery Management. Then click on the Restore button and click on Restore system to factory default. En ...more
There are 10 major ways to protect your PC. Disable Autorun, in Windows. Make sure that your system is up to date, by setting automatic updates. Always use a log on for your computer that does not have administrative privileges. Use different passwords, and change your passwor ...more
In this how to video, you will learn how to keep your Windows operating system secure by look for and closing open ports. First, you will need to run the program called Net State. Once this is open, type in netstat -a. This will list main connections. Next, type in netstat -an ...more
This video is about how to download movies, music, and software using torrents. The first thing that you will have to do is to download either uTorrent or BitTorrent. After you have download either of the two, go ahead and browse for a torrent website. After you have found the ...more
CCleaner is a executable freeware that will help clean up some space in your bogged down Windows machine. This tutorial will demonstrate exactly how to use CCleaner to drastically boost your machine's speed up to 40%. Good way to make computer faster How to make your pc fast ...more
Is your PC too slow? Want your PC performance to increase without paying any money? Well, in this video the viewers will be taught how to speed up their PC and internet speed without spending a dime. First of all, the video goes through some of the potential applications that ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to create fake HD from low quality vids in Avidemux on Ubuntu. Note: Upscaling is never a good idea. The lower the resolut ...more
Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the ...more
You may not do it in public, and you might not admit to it among your friends, but you do it. We all do it... sing. We sing when we're alone in our cars, at home when no one's listening, and when we've had a little too much to drink and don't care anymore, all inhibitions asid ...more
Hey, would you like to be as cool as this: You wish! But you could do the next best thing, and that's capturing your earth shattering game play with the Easycap DC60. Originally retailing for forty dollars, you can buy this at Amazon for $8.50. This device will capture video ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
Being a male, I may be the only one among my gender stating this, but I'm sick of girls using Halloween as an excuse to dress scantily. Why can't more girls skip the playboy bunny costume and get this gnarly? Below, ten badass Halloween looks executed by girls only... 1. The ...more
Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more
There's an epidemic on the Internet, and the disease—Facebook. It's an addiction comparable to a hot cup of coffee in the morning or a soothing cigarette throughout the day—in worse case scenarios, a hit from the crack pipe. If you're on Facebook, you know what I'm talking abo ...more
In this video series, our expert John Carstarphen will show you how to use walls, windows, and spline objects. He will also show you how to use the NURBS loft, copy and scale objects, use floor trim, and add a backdrop. He will also show you how to texture the trim, add a back ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
While a lot of internet threats are rather over-hyped, there are some serious things to be cautious of when going online. Probably the biggest risk to the average internet user is malicious software. Commonly knows as "malware," this term refers to any program that exists sole ...more
There's nothing better than playing a game of Scrabble, feeling the smooth wooden tiles in your hand and savoring the heavy fumes of cardboard, cheap wood and plastic as you rearrange the letters on your rack into the perfect word. You try to keep a straight face while you wat ...more
Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan hor ...more
INTRODUCTION The everyday PC user doesn't think much about its PC and problems that can cause critical damage to their data or other stuffs stored on Hard drive and other electronic parts until the problem actually occurs. Once a failure happens, the repairs can be costly and ...more
Tomorrow's the 1st of April which means it's the one day of the year you can put aside the daily grind, and go at it Dwight Schrute and Jim Halpert style. Yes, there are easy apps to do your dirty work, but if you're old school and you like to do it the old fashioned way, here ...more
In this Software video tutorial you will learn how to use Daemon Tools Lite to mount an image or ISO file. This is a software that takes ISO files and puts them on a fake hard DVD drive. This is really very easy and simple to do and takes practically no time. Go to start > all ...more
A computer’s safe mode is useful when fixing problems or saving work after, say, your hard drive malfunctions. Safe mode can easily be accessed as your computer starts up and is a useful tool to have in your belt. Maintaining your computer sometimes requires you to boot up in ...more
Get a scary looking dude. Print up a fake newspaper with the guy’s face on it saying he just broke out of prison. Give the victim the newspaper. Later that night disconnect the phone line and take his/her cell phone. Make sure there are no weapons in the bedroom. After the per ...more
have someone walk out of a building then turn back and yell to the top story window that he forgot his baby. the man upstairs will act careless and act like hes too lazy to come down, he will then throw the fake baby out of the window. BTW HAVE A FAKE BABY. kinda obvious lol
The stunt is not simple. FOLLOWING THIS IS A NO AIRPLANE VERSION, and you do not need to get your freinds drunk in the no airplane version you need to get them into the fake house and using the fake bathroom. etc. Real Airplane Version step 1 and 2 Step 1 Part 1 Rent a F ...more