Apple said goodbye to iTunes with the release of macOS Catalina, breaking up music, videos, and podcasts into their own respective apps, Music, TV, and Podcasts. But without iTunes, what app's in charge of interfacing with your iPhone? That would be Finder, and you use it to s ...more
You're in a Zoom meeting, and you're click-clacking away at your keyboard, typing important notes from the call. More realistically, you're doing something unrelated to the meeting, such as browsing the web, playing a game, or messaging friends. Whatever it is you're typing, i ...more
Just because you have a Mac doesn't mean you can't root your Nexus 7 tablet. In fact, rooting Android 4.4 KitKat on both the 2013 and original 2012 N7 models is easy, if not easier than rooting it using a Windows PC. After rooting, you can enjoy many of tomorrow's features to ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
Lock screen exploits are becoming increasingly common in the mobile world. Four weeks ago there was the iPhone 5 passcode bug (which just got fixed yesterday...kinda). Then there were a couple lock screen bugs on the Samsung Galaxy S3 two weeks ago. Now that GS3 lock screen b ...more
Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more
It's not enough for me to just listen to a mindless EDM song that can be retooled as a torturing method for Guantanamo Bay. As an actual fan of music, I yearn for substance and depth. Artists like Morrissey, Kurt Cobain, and John Lennon impacted lives with not only their music ...more
It's pretty clear with all of the annoying "Get YouTube Premium" pop-ups that litter the YouTube app that Google really wants you to pay for its Premium membership tier. That's why you'll see that "Get background play with YouTube Premium" ad after closing YouTube with a video ...more
If you somehow forgot the pattern, PIN, or password that locks your Android device, you might think you're out of luck and are destined to be locked out forever. These security methods are hard to crack by design, but in many cases, it's not entirely impossible to break into a ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
Now that you've updated your iPad, iPhone, or iPod touch to iOS 8, there's a lot of cool new things to explore. If you felt a little overwhelmed from all of the detailed information available in our Coolest Hidden Features of iOS 8 post, then I've got a simple breakdown of all ...more
While it's easy enough to take a screenshot of an end-to-end encrypted Telegram chat thread using an iPhone, it's an entirely different story on Android phones. Telegram disables screenshots for Secret Chats by default on Android, and not everyone can turn it on. Sometime in ...more
Have you ever noticed how your home screen and lock screen wallpaper moves underneath your notification, app icons, really anything on display? It's a cool effect, but to some, might be a bit jarring. On top of that, it also uses up precious battery life. If you're sick of see ...more
Gmail uses TLS, or Transport Layer Security, by default for all email communications, so all of your emails will use the standard encryption as long as the recipients also support TLS. But there's a way to add even more security to your Gmail emails, and you can use your iPhon ...more
When driving, you can get directions hands-free by asking Siri. You can also make general map searches, show a location's details, call a query's phone number, and view traffic details. However, Siri defaults to Apple Maps for all those. If you prefer Google Maps, Waze, or ano ...more
Since the San Bernardino shooting in 2014, Apple's been engaged in a game of cat and mouse with law enforcement. Authorities want access to evidence on criminals' iPhones, but Apple wants to protect all of its customers' personal data equally. The latest installment in this sa ...more
Leaving your computer unattended, whether at home, work, or a coffee shop, even for just a short while, is enough time for someone to steal it or look at your personal files. While there are ways to deter thieves, it's a little harder to keep snoops away. You could put your c ...more
Every Galaxy S20 sold in the US — even the S20+ and S20 Ultra — simply can't be rooted. With the bootloader permanently locked, you miss out on the world of rooting and the customization it opens up, but modifications are still possible. Thanks to some Samsung-developed apps ...more
Traditionally, if you were looking for end-to-end encrypted messaging, you'd stick with something like iMessage, WhatsApp, or Signal. However, if you already use Facebook Messenger, you have all you need for truly private chats with its built-in E2E encryption. It's available ...more
Recently, iPhone users have been bragging that they can set Live Photos as their lock screen wallpaper. While this is a great way to spice up a boring lock screen, Android users shouldn't feel left out in the cold. The highly customizable and feature-rich OS has a few tricks u ...more
I love my iPhone, but it would be a lie to say there aren't some Android features I wish would find their way to iOS. While iOS has plenty of its own advantages, Android has pulled ahead in many other areas. With iOS 12 coming later this year, we're hoping Apple takes a hint f ...more
If you're ever in a situation where you need to take a peek at the wireless spectrum, whether it's for Bluetooth or Wi-Fi devices, there's a fascinating Python 3-based tool called Sparrow-wifi you should check out. It's cross-platform, easy to use, and has an impressive GUI th ...more
There's always an iPhone in our list of top phones for privacy and security, due in large part to advanced security measures like Face ID, consistent iOS updates, and easy ways to prevent unwanted access and excessive data sharing. However, some of those options actually do th ...more
IS THIS ANNOYING? Would you rather not subject others to the virtual VITUPERATION implied by CAPS LOCK? This video will show you how to use these registry tweaks to disable caps lock on your Windows 7 or Vista PC.
In this Computers & Programming video tutorial you will learn how to hide and lock folders in Windows. When you want a private folder that you don’t want any one else to open and see. You will need this feature. For this open a new folder. Open the folder, right click on it an ...more
Ever wish there were a way to tell whether you've got your lock keys engaged without looking down at your keyboard? Well, there is, and this home-computing how-to from the folks at TekZilla will tell you all about it. For more information, including step-by-step instructions, ...more
Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise hig ...more
Modern versions of Windows have revamped the lock screen to make it a lot more useful. If you're coming from Windows 7 and older versions of the OS, this lock screen is both new and useful (though you can turn it off if you just don't want it). Don't Miss: Everything You Need ...more
For me, the idea of a smartphone with internet access was overkill for a cell phone. Wasn't that what my computer was for? Do I really need immediate access to the web? Must I update my Facebook every hour, from the palm of my hand? Do I need turn-by-turn directions from Googl ...more
Super Mario Brothers! No, wait... Super Meat Boy! Yep, that's right. Meat. As in "cube" steak. As in a square piece of beef with eyes and a shitty grin, who just happens to be in love with a band-aid. I have no idea why. And no matter how shocked you are to see your dinner on ...more
Have you ever had to close an application with private info in order to let someone else use your PC? LockThis! is a windows application that lets you secure individual programs without the hassle of having to save your progress and closing the program. To use LockThis! just h ...more
This video demonstrates how to turn Windows Vista to Windows 7 for free. Make sure that you are running your PC on a Windows Vista OS. First, unlock your taskbar by right-clicking on it and unchecking the option. The space where your smaller application icons are located can n ...more
Watch this video to learn how to cheat on a test with help from your iPod. Ask a trusted friend for their notes/answers the night before. Then at your computer, just type up their notes/answers, or the important parts, and then save it in your computer as "How to make Grandma' ...more
In order to prevent accidental CAP LOCKS, you can use a number of new, innovative and free software solutions. With your Windows 7, there are functions available to assist you. First, go to your start menu. Click on Control Panel. Next, select "Clock, Language, and Region". W ...more
Illustrator's gradient mesh tool is a powerful one for vector artists... if you know how to use it. This tool can help create beautiful and vivid mesh-based vector portraits, as long as your skills are up to par. If not, try out some of the beginner tutorials on WonderHowTo fo ...more
Keep your possessions safe from thieves with these tips. You Will Need * Motion detector lights * Locks * A locksmith * A security alarm system * A safety deposit box or home safe * An engraving pen * A trusted neighbor * Bolts or wooden dowels (optional) Step 1: Eliminate bu ...more
In this tutorial, we learn how to use Logic Pro: Screensets. First, open up the score editor in a separate window to do your editing. Then, open up your arrange menu and edit the piano part of the music. This is a good approach because the windows can both be large, but it can ...more
Does your desktop look messy and unorganized?? Are there hundreds of icons in your desktop?? And it takes minutes to just find one?? Try this... See my messy desktop: With a few minutes and a couple of simple and easy steps, you can turn this into a classy and organized vie ...more
Locked yourself out of your Windows Professional system? No problem—this video tutorial will show you the steps required to change the administrator's password in Windows XP. You can actually change this password without knowledge of the original one. To get started, go to Sta ...more
Locked yourself out of your computer? The Virtual Frank teaches you how to log in to Windows XP using the administrator account that you may not have known existed.
This week, we take a break from the holidays and focus on one of our favorite pastimes: video games. With new releases, hacks, and Easter eggs coming out every day, it's easy to be overwhelmed by the choices available. Never fear: we're here to help you sort out the wheat from ...more
Lock your Windows desktop wallpaper to prevent it from being changed. Lock your desktop wallpaper. Click through to watch this video on tricklife.com
WELCOME & THANKzZz For Your Contribution, Support And Time...! ...Hello, zZz~AKA~StanDP Here...; There are many ways to tweak, change, enhance your internet experience to suite your needs, I will discuss a few things I did to enhance my online experience along with Fire-Fox ...more
This video tutorial shows you some of the benefits of the SmartKey on the 2010 Toyota 4Runner. This key can be used as just like the standard version, using the remote controls to lock and unlock the car. This key also provides keyless entry; if you have the key in your posses ...more
In this 15-part video guide, you'll learn how to retrieve keys locked inside a car, use tools to unlock a car without a key, and prevent car theft, taught by an expert locksmith. Don't Miss: 15 Ways to Open a Locked House/Car Door Without a Key Don't Miss: 6 Easy DIY Ways to ...more
Child Safety Window Treatments Child safety in the home is always on the mind's of all parents. With the growing technology in today's modern home, there are more threats than ever! Luckily, most of the basics have been taken care of through innovation. Take for instance the ...more
Sometimes it's necessary to format your memory card in your mobile phone or digital camera, just like you need to format a hard drive, because of virus problems or slower speeds. This video will show you the steps to formatting (or reformatting) the SD memory card for a cell p ...more
If you're a Final Fantasy VII fan, this video will excite you. Learn how to install a custom graphic driver to play Final Fantasy 7 PC. This is an improvement for the game that makes it playing more enjoyable on your display. It fixes some bugs and glitches and allows you to c ...more
The Mac OS's Disc Utility allows for the encryption of files. To open Disc Utility click on the magnifying glass (spot light) up in the top right hand corner, and search for Disc Utility. Click on the first result in the list. Once Disc Utility is open, click on "create a new ...more
New to Windows? No problem... here's a beginner's video tutorial that will teach you how to prevent cut, paste, copy, and delete on Windows files. Preventing users from messing around with your file system is one of the toughest thing to implement on a Windows machine. Simply ...more
Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more
A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more
Download the Software Go to the Antiprism downloads page. Download and install Antiprism 0.20. Run the Programs You need a method of running programs on the command line. In Windows, that could be a DOS box, on other systems a terminal emulator (e.g. xterm). Start this up. ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
In this video tutorial, viewers learn how to paint the front door of their house to give it a new look. Begin by removing any dirt, grime, mold and mildew off the door. Users are recommended to use TSP cleaner or any bleach solution. Then take off any hardware on the door (loc ...more
A great free video training from tasktutorial on how to create a cartoon cloud in Adobe Illustrator. All the project files are available to download for free at the Adobe website. First create a background: select the rectangle tool then create a new layer and draw a rectangle ...more
There are varied approaches to using SketchUp with CAD files. This video series presents one method we suggest as it is quick and creates a good clean SketchUp model. In the first video we import a CAD plan, group and lock it, delete extra layers and create a unique layer for ...more
If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to i ...more
The United States is a hierarchical country where the weak ones are at the bottom and the powerful ones are at the top. Garment workers are at the bottom of the list although they are the most important. Without them there would be no fashion industry. They sew and cut the gar ...more