NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more
On Monday, the social media giant Facebook suffered a massive outage that, as of this writing, is still in effect. The company's flagship services, including Facebook, Instagram, and WhatsApp are all currently inaccessible. But one unexpected development is that this outage i ...more
KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from the password vault to the web browser. It's within these few seconds that an a ...more
Want the convenience of a throwaway email address without all the hassle? How about anonymous text messaging so you can get to know someone before giving them your real information? Gliph has you covered. Gliph is a service that lets you create an identity around a set of thre ...more
Over the last few months I have been getting more and more into computers over the last few months, and I discovered my new favorite thing to do..... notepad stuff! I will teach you how to do a few basic things in notepad, notepad++, and how to use them to your advantage! Fi ...more
Google TV gives the new Chromecast a home screen full of curated content from your various streaming subscriptions, but it's just that — a home screen app. Underneath, Google's new dongle is running Android TV, meaning its home screen is just a launcher that can be installed o ...more
Earlier last week, there were a number of fake five-star WhatsApp reviews to be found on the Google Play Store. Now, Gmail, Chrome, Messenger, and Firefox are all the latest victims to be saturated in five-star spam that wrongly refers to the word "game" in reference to non-ga ...more
If your virtual assistant can't assist you, what's the point? Anyone who has ever failed to activate Google Assistant knows the frustration that error screen can be. But there are solutions for this problem — "The Google Assistant isn't available for this account" is one messa ...more
Using a combination of my phone, laptop, and an arsenal of apps and plugins, I can send pretty much anything to my Chromecast. However, nothing is ever perfect, and the file type that was still giving me headaches were torrent and magnet files. Yes, I could download them to m ...more
You can quickly correct a mistake in an iMessage you send, but the recipient will still see whatever you originally wrote since there's a history of edits. When you don't want the other person in the conversation to know what you originally sent, there's a better thing you can ...more
You're in constant communication with your friends and family. The only issue? Nobody uses the same app. Messenger, Instagram, WhatsApp — you have contacts spanning all three, and the resulting balancing-act to keep in touch can be overwhelming. That's why Facebook — who owns ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are going to talk as well as know of the possible dangers of metadata in our day to day images. ...more
An attacker can repurpose public MyBB forums to act as command-and-control servers. It only takes a few lines of code to configure a MacBook to fetch commands and send responses to any website the attacker desires. Before you keep reading, know that this project is not geared ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
AppleScript is quite an easy scripting language to use. In this guide, I will be showing you several commands. Near the end, I will show how these can be used to create a fake virus that actually does no harm. Of course, this is only one way to use these commands—use your ima ...more
Spammers are the bane of every email user. No matter what you do, junk mail always breaks through the spam filters. And some of the best ones seem to come from legit companies, and that's because they aren't legit companies— they're spammers masquerading as legit companies. W ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
And we meet again Crackers! Welcome to my 7th post (Part-2), this tutorial will explain about some more basics of Batch Scripting, with C00L Scripts, which in turn will help you learn and understand better #1 Script: Freezer: ----------------- @echo off :A start goto :A --- ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
If there's been one signature design element for Apple's iPhones, it was the circular Home button. It served as the "everything" button for each iPhone model until last year's iPhone X, but now, it's completely absent from the iPhone XS, XS Max, and XR. Should you be worried? ...more
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily act ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more
Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and ...more
In this video tutorial, Chris Pels will show you how to implement tracing in an ASP.NET web site to monitor or measure the performance and to diagnose errors. Learn how to add tracing to an entire web site as well as individual pages. See how to add custom trace messages in pa ...more
Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the following information can't be found by a random person who you didn't accept you as a friend: Birthdate E-mail address Hometown Pictures A hacker ca ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more
Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying vario ...more
Building Material Request Links for Brick, Nail, Wooden Board Update: Watering Can Request As the Make a Wish feature from the gift box often end up with errors, here are simple directions to create a personalized gift request that will allow your friends to send you the ite ...more
Free Tree Gift Request Links With the new orchards and tree mastery system everyone is looking for more trees! As wishlist requests often end up with errors, I've created this list that will provide links you can put your ID into allowing people to send you the item without g ...more
Want to optimize your computer for peak performance so you can avoid error messages and hiccups when using Pro Tools? This tutorial shows you how to go into your computer's system directly and set the power option to customize it for using Pro Tools.
This tutorial shows you a very simple thing you can do to your computer in order to maximize Pro Tools' performance on your hard drive and cut down on the number of error messages you might receive - just by making a a few changes to user account controls.
If you disable as many startup items as possible, you can remedy many common error messages in Pro Tools, as well as improve the overall performance of your machine. This tutorial shows you how use MSCONFIG to disable startup applications you don't want to run.
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more
I can't say it's absolutely true, but when it comes to mobile word gaming, there's Scrabble people and then there's Words with Friends people. It feels segregational. Rarely does one play both. At least, that's what I see when it comes to my family and friends. Everyone who l ...more
In this video from Defcon Computers we learn how to clean your computer keyboard. You can use cans of air, or take off your keys. But in this video we learn how to actually clean the keys themselves. With the computer off, put Windex on a paper towel, and rub the key. Put more ...more
In this video from iPT2gGeec we learn how to restore your tethered or semi tethered iPod 2G jailbroken device. To do this, open the Red Snow application. Go to Step 3 and click upload DFU file. Unplug your iPod for 2 seconds and plug it back in. You should get a white screen. ...more
Even, natural-looking foundation that covers up redness and flaws but doesn't look caked on or fake is the desired basis of any makeup look. But it just so happens that the rudimentary skill of applying foundation evenly is one of the hardest for women to master. So if you've ...more
Desktop shortcuts are a great way of making the programs you use a lot more accessible, but today many PC users overuse their desktop space and have icons covering over half the screen, including the one for a picture of a dog they looked at six months ago once. This prank is ...more
This video in the Pranks & Cons category will show you how to create a non-destructive fake virus on Windows. This video is from Tinkernut. For this right click on your desk top, go to new and select shortcut. Now type in this code 'shutdown 's 't 60 'c "this computer is shutt ...more
In this how to video, you will learn how to break up with your boyfriend or girlfriend. There are plenty of good and bad ways to do this. A bad way of doing this is breaking up with your partner over the phone. Breaking up over instant messages is also bad. Texting can also be ...more
Karn demonstrates how to make a fake and funny harmless virus that will shut down only your computer. First, go to your desktop and right click to access the right click menu. Then, choose new from the menu options and select the shortcut option. A window should open. In it ty ...more
iPodTouchHelping teaches you how to Jailbreak version 3.1.2 iPhone and iPod using Blackra1n. Connect your iPod or iPhone to your computer and make sure it appears in iTunes. You need to go to Blackra1n and click on the Windows icon. Download the program and run it. Click Make ...more
See how to repair invalid DVD navigation and structure with FixVTS. With FixVTS, you can easily repair the internal structure of a DVD. This is good for DVD menu correction, invalid DVD file structure and invalid navigation error messages. Check out the written instructions a ...more
Sometimes it's necessary to format your memory card in your mobile phone or digital camera, just like you need to format a hard drive, because of virus problems or slower speeds. This video will show you the steps to formatting (or reformatting) the SD memory card for a cell p ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Okay, look behind your shoulder. Now check behind the other. Anybody looking? No? Then read on... Here's the scenario: You're single. You're an avid Facebooker. You're tired of your sans hottie reputation, and you're yearning for some much needed street cred. Well, Facebook s ...more
There's a handy new feature in Windows 7 called the Ease of Access Center, which brings together settings and programs that can make your PC easier to use. This is where you get quick access to programs like Magnifier, Narrator, On-Screen Keyboard and more. Learn about the acc ...more
Shaking your cell phone is no longer a bad thing with the iPhone. Now, shaking is an actual feature, rather than a risky move. It really comes in handy when you're typing and you misspell a word. So how does shaking your iPhone work? Best Buy has answers. The Best Buy Mobile t ...more
Google started culling Google+ accounts. There are two main targets: businesses and those who are using pseudonyms. For businesses, Google is promising to provide their own version of Facebook Pages, which will be released later this year. For those who use pseudonyms, they ar ...more
There's an epidemic on the Internet, and the disease—Facebook. It's an addiction comparable to a hot cup of coffee in the morning or a soothing cigarette throughout the day—in worse case scenarios, a hit from the crack pipe. If you're on Facebook, you know what I'm talking abo ...more
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. For last week's Workshop, we decided to attempt to communicate long distance without the use of the chat bar. To accomplish this, we built an elementary redstone pulser that would a ...more
Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ accoun ...more
A few weeks ago I wrote about Atomic Web as the best web browser for iOS devices, and while I believe it is a superior option, Atomic Web is not the only alternative web browser you can use on your iOS device. There are three more—Dual Browser, iCabMobile, and iSwifter—that ar ...more
Can a free cloud-based video editor that lives in your browser replace iMovie? In three words: yes, it can. But whether you should use it instead of iMovie or an equivalent depends not on the functionality of the editor you need, as WeVideo can do what most of what iMovie doe ...more
Torus knots are beautiful knots formed by wrapping a line around a torus and tying the ends together to form a loop. The resulting knot has a star-like appearance when viewed from above. The 36 examples with the least number of crossings can be seen at the Knot Atlas's page on ...more
Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan hor ...more