Get as many points as you want when playing the game Pandemic 2. You will need Cheat Engine, the game and possibly a calculator so you can figure out the right values to enter in the fields to help you hack.
This video shows how to hack My Pet Protector 2. You can hack health by taking the amount you have and multiply it with 8. When you lose some health you will need to repeat it. Then drop it down and freeze it and change the value to 80000. Come to the cheat engine then put the ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to hack Farkle with Cheat Engine (09/12/09). You need Cheat Engine 5.5 for this hack. 1. Enter 0, then scan, then simply multiply by 8 2. Whatever number you want your score to be, jus ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Everybody loves Oprah Winfrey. Maybe it's because of her philanthropy. Maybe it's her onscreen personality. Maybe it's the fact that it was a rags to riches story. Or maybe it's because she likes SCRABBLE... The iPad SCRABBLE App by Electronic Arts had made it onto Oprah's Ul ...more
This is a video about "How to Hack: Demolition City 2" by Travis. This is a flash game. To begin hacking, go to the game and enter the first level. At this point, you do not have any cash. Specify that you are using Mozilla in the cheat engine. After you have completed the fir ...more
This video explains how to bold, italicize, underline or center text in a MySpace bulletin to those of us who are used to simply pressing a button in Microsoft Word. The instructor explained and demonstrated how to post in each of these styles in a clear and concise manner. In ...more
You can hack into nearly any Facebook or Flash based game on the Internet - no cheat codes or special strategies needed. All you really need is the free game hack program Cheat Engine, and a compatible browser like Firefox.
Get tons of money to spend in the free online game Ninja Saga! This tutorial is easy - all you need is the latest version of Cheat Engine. Open Ninja Saga, scan it with Cheat Engine and then enter in however much money you want!
Bejeweled Blitz is a hard game to play, but easy game to cheat. These new hacks are sure to get you your next record breaking game for the whole Facebook community to admire. Watch this video tutorial to learn how to cheat Bejeweled Blitz (11/06/09). In order to perform this ...more
Hacking levels in Pet Society is easier than you think, especially with Cheat Engine. You can't do much these days on Pet Society without CE, unless you just like to play fair. But c'mon… nobody plays fair these days. Check out this video tutorial to learn how to hack levels ...more
Download Cheat Engine You can get Cheat Engine here. After downloading, install it on your computer. Log Into Christmas Crunch Log into your Facebook account and go to MindJolt's Christmas Crunch game. Open Cheat Engine / Play Game Open the Cheat Engine and start the game ...more
In this tutorial, we learn how to bypass Captcha codes on Facebook. First, go to Facebook and log into your account. Next, go into your settings, then your accounts settings. In this section, click where it says "mobile". Next, it will take you to a section where you can activ ...more
If you're like seventy percent of America and find it hard to focus on just one thing at a time, the Xbox One had you in mind. If you ever thought that being able to watch The Walking Dead while playing The Walking Dead video game would be awesome, you're in luck. How about lo ...more
Many of our online accounts now come with an added two-factor authentication (2FA) functionality to help keep our data safe. This essentially means no one would be able to access the account until a specific set of requirements were met. It could be a combination of a password ...more
From Instagram bot farms in China all the way to vending machines in Moscow that promise to sell you fake followers — the Facebook-owned empire is attracting the attention of the world around. When it comes to Russia especially, the country seems to be developing a little crus ...more
Tired of playing old-school Game Boy Advance, Game Boy Color, Nintendo, and Nintendo DS games on your iPhone? We've got another retro video game system for you to add to your arsenal of emulators—Super Nintendo. Yep, that's right. Thanks to Lucas Menge, you can now play Super ...more
One of the best-selling video game consoles of all time is the Nintendo Entertainment System, better known by its acronym, NES. However, cartridge-based gaming consoles are a pain now when compared to the newer download-and-play alternatives. If you miss the days of old schoo ...more
There's actually more to the dialer screen on your OnePlus than meets the eye. Besides its obvious purpose of calling people, there's a vast array of secret codes that you can input to troubleshoot your device, in addition to revealing important information, making anonymous p ...more
Normally, you'd have to jailbreak your iPad or iPhone to play any games that aren't available in the iOS App Store, like the now-extinct Flappy Bird game. But this isn't the case if you want to play some of your favorite old school Nintendo classics. There's a web app called ...more
Apple announced the successor to Mac OS X Mavericks at their Worldwide Developer's Conference 2014, and it's called Yosemite. Named after California's Yosemite National Park, it will be available as a free upgrade from the Mac App Store for everyone this fall. If you want to ...more
In a world increasingly regulated by computers, bugs are like real-life cheat codes. They give you the power to break the rules and do good or bad without ever leaving your seat. And government agencies around the world are discovering and stockpiling unreported bugs as cyberw ...more
As one of the most powerful Android apps for connecting your phone or tablet to your other devices in various ways, Pushbullet had always been a fan—and Gadget Hacks—favorite. However, ever since late last year, many of the app's popular and once-free features now require a c ...more
If you've ever received an email from a sketchy address purporting to be Uber, asking you to sign in with your credentials, you might be a phishing target. Hackers use a fake login page from real-looking domains to trick you into giving up your account information, and while i ...more
There's a lot more to your iPhone's dialer screen than just entering phone numbers and hitting the green call button. It's not very obvious, but there are secret codes that you can enter on the dialer to find out information about your device, help troubleshoot issues, and mas ...more
We all know about partying like it's 1999, but what about gaming like it's 1999? The folks over at Irrational Games, the studio behind the new BioShock: Infinite, which was just released today, decided to go a little retro and include a hidden game mode for the most hardcore g ...more
YouTube's main player interface got a pretty big makeover recently, but chances are, the new UI hasn't made it your way just yet. Google has a habit of slowly testing the waters as they roll out new features, so cool tweaks like this can take some time to reach all users. But ...more
Two-factor authentication (also known as 2FA) adds a necessary additional layer of security to your username and password in many important apps. On Instagram, 2FA requires you to confirm it's you attempting to log in, with a special code sent to you via text message. Enter th ...more
It's easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down to prevent such use. School, work, or library PCs can be secured with a BIOS password, which is often an easily recovered default ...more
With the amount of time we spend glued to our smartphones, they could be considered a second job (if only we got paid). I spend a large part of my day scrolling through Reddit, Facebook, Instagram, and countless other apps, and burn through hours and hours without even noticin ...more
Many of your accounts online likely require two-factor authentication (2FA) or two-step verification (2SV) to confirm your identity when logging in, and there's a good chance the second factor or step for each is a one-time email or SMS verification code. If you get a lot of e ...more
As great as the Internet is, it is not without its dangers. Hackers at any time may be breaking into your online accounts and compromising your sensitive information. Last year, hackers broke into Facebook, Gmail, and Twitter and made off with 2 million stolen passwords. It's ...more
There aren't many complaints I can think of when it comes to the Instagram interface, and finding one would just be nitpicking. But like with most things in life, if given the opportunity, why not take advantage? "When in Rome," as they say. So when developer Daniel Osinski r ...more
Ask around anywhere that Android users gather online, and you'll find that SwiftKey is almost unilaterally the most highly-recommended keyboard for our favorite mobile operating system. It's no surprise either—SwiftKey's combination of insanely accurate word predictions and ra ...more
Despite newer phones having larger batteries, after a few months, my battery life drops significantly. I started researching solutions after my third phone. No matter who I asked, the most recommended solution was always Greenify. And unlike other solutions, you don't need roo ...more
Uber is one of the best ways to get around, but nobody said it was cheap. What's even more infuriating is when you have a bad experience with a ride. Sure, you can get a refund, but then you need to figure out where to enter in the promo code for the coupon that Uber sends you ...more
If there's one strength of Apple's that iOS and Android fans can agree on, it's the company's dedication to user privacy. With each new iteration of iOS, Apple builds upon these foundations, enhancing and increasing each iPhone's ability to protect its user's data. In iOS 12, ...more
Two-factor authentication has been around since iOS 10. It's a handy option that adds an extra layer of security to your iPhone and makes its almost impenetrable security even stronger. This feature has remained intact in iOS 11 and iOS 12, and thanks to the straightforward na ...more
hello hackers,newbies and followers of this great community, after some research here in our community, I noticed that there is not even one tutorial that teach Web Development. We have a lot of tutorials on how to hack web site but many do not know exactly how a web site is c ...more
An awesome new feature appeared in iOS 11 that lets you easily share your Wi-Fi password to anyone else with iOS 11 or higher just by tapping "Share Password" on your iPhone when they try to connect to the same network. However, if your friend is using Android or another mobil ...more
It's not easy staying fit and healthy these days with addicting phones, oversized portions, and long workdays, to name just a few things. To succeed, it takes work, commitment, and an understanding of your mind and body — and your iPhone can help you with some of that. While A ...more
Open your Spotify app, search for an artist, view its "Spotify Code," and display it to that friend lurking over your shoulder. Sound familiar? Probably not ... yet. Before, if you wanted to share songs with a friend — or some weirdo stranger on the bus — you would've had to ...more
While Apple's tech used for Face ID on the iPhone is impressive, it's debatable whether it's more convenient than Touch ID. There are also concerns that your face could be used to track shopping patterns or be seen during mass surveillance by intelligence agencies. More import ...more
Back in 2010, iOS developer Daniel Amitay developed a camera security app for iPhones that used an unlock screen almost identical to that of the iPhone. The app was removed in mid-2011 (though, it eventually reappeared in early-2013, still available in the iOS App Store today ...more
Your iPhone's Messages app has some impressive new features and changes with iOS 17, and you've probably already noticed some of them just by using the updated app. But there are less apparent features, even hidden ones, that have likely eluded you that you're going to want to ...more
Safari's massive upgrade in Apple's latest iPhone software update includes new features you won't find in any other web browsers on iOS, from better ways to stay organized to enhanced security and further privacy protections. Apple's latest Safari improvements make web browsi ...more
Cami, theburntmatches, shows us how to unlock all songs on Rock Band! It is a simple way to unlock all the songs in XBOX 360, PS3 or Wii Rock Band . This probably doesn't work with Rock Band 2 (RBII or RB2). This is a simple glitch or cheat code for the guitar hero like game.
Hack the hex code in Bejeweled Blitz for a higher score! Everyone wants the top score in this popular web game, but it all comes down to how you get it. Do you have what it takes to come out on top? Check out this video tutorial to learn how to hack Bejeweled Blitz (07/24/10). ...more
Google loves their little Konami Code Easter eggs. The Konami Code is famous among gamers for letting you cheat in video games. The latest one they come up with lets you try it out on Google Docs. All you have to do is open up Google Docs, and type in with the following keys: ...more
A friend of mine has a crazy amount of Reddit karma and gold, and yesterday he let me in on his secret. This person, who will remain unnamed for obvious reasons, created a Python script called Reddit Karma Crawler that finds rising posts before they get too popular. Every goo ...more
With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighb ...more
!!! READ THIS FIRST !!! - 4 april 2009 - First of all: make sure that you're using FlashPlayer version 9 - A usefull tool to switch from version at any time is FlashSwitcher get it here: http://tinyurl.com/55up92 Howto: Buy an apple in the foodstore. Setup Cheat Engine: htt ...more
In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend ...more
What Is IPython? IPython is a richly featured replacement for the standard python interpreter. It offers a wider range of functionality, that the standard interpreter, which generally ships with python, sorely lacks. It's a great tool for learning Python faster than you would ...more
You wouldn't send your GPS coordinates to a completely random stranger just because he or she asked you for it, right? So why are you constantly sharing your location (and other data) to apps on a daily basis? While there are many apps that need your location in order to func ...more
Many FarmVille farmers want money fast, or experience fast, or want to level up, or want to speed things up— make and earn things faster. No matter how long they play, they're not getting what they want, and that is to outshine everybody else. But you can't reach the top by si ...more
Not long ago in Rome during a Master’s Tennis Tournament something remarkable happened. In a tightly contested game, American Andy Roddick challenged a linesman’s call on a ball hit by his opponent. The remarkable thing about this incident was that Roddick argued against his o ...more
Generative artificial intelligence has taken the tech world by storm, and Google's AI chatbot will give you a taste of what it offers. By learning patterns from existing data, generative AI can create new text, images, music, and other types of content from simple commands. W ...more
One of the first steps in reconnaissance is determining the open ports on a system. Nmap is widely considered the undisputed king of port scanning, but certain situations call for different tools. Metasploit makes it easy to conduct port scanning from directly inside the frame ...more
Every industry has its own jargon, acronyms, initializations, and terminology that serve as shorthand to make communication more efficient among veteran members of that particular space. But while handy for insiders, those same terms can often create a learning curve for novic ...more