Fake Videos

The Art of Trout Tickling : Myth or Reality?

Trout tickling is the mystical art of rubbing a trout's underbelly until it goes into a lax, trance-like state. The fish is then scooped out of the water and thrown onto land. Similar to catfish noodling, the sport is lauded for its lack of equipment or tools of any kind, as u ...more

News : Fake psychic powers and debunk Uri Gellar

I have never before showcased a tutorial from television. Until now. This one has a personal resonance for me. It is Sunday. So, sit back and learn a little something today. The life long and methodical debunking tutorials from the Amazing Randi have earned him a reputation ...more

News : Make a tomato glow in the dark

Gather all Mad Scientists. Science doesn't have to be all about hitting the books and memorizing formulas. Sometimes it's closer to Frankenstein or Dr.Jekyll than you can imagine. It's time to turn tomatoes into glow in the dark orbs. Video producers ShootingEggs did not incl ...more

How To : Make a Harley Quinn Costume for Halloween

More than a year after Harley Quinn made her splash in the summer of 2016, her popularity has not waned one bit. According to Google Trends, the Harley Quinn costume remains ever popular, trailing only Wonder Woman in searches. These two DC Comics characters provide a powerful ...more

How To : 5 Evil Prank Ideas for April Fools' Day!

In this video I'm going to teach you 5 pranks you can get away with at school or at home On April 1st. Video: . Step 1: Dry Board Eraser Prank Lets start with one you can do on you teacher. Get to class early before your teacher and mess with their dry board eraser, heres how ...more

How To : Citrus Fruit… Your New Favorite Facial Cleanser?

Switching your favorite facial cleanser isn't an easy choice. Since everyone's skin type can range from dry, to oily, to some complicated combination of both... well, let's just say that the conventional wisdom is to stick to what you know works. However, fruit—and citrus fru ...more

How To : Spot a Counterfeit iPhone or Android Smartphone

Cheap Chinese knockoffs have been around for ages, but recently, skyrocketing demand has led to a massive influx of counterfeit smartphones. Sellers on Craigslist seem to have no trouble getting ahold of these fake devices, then passing them off as the real deal and turning a ...more

How To : Analyze Wi-Fi Data Captures with Jupyter Notebook

When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more

How To : Haunt a Computer with SSH

If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more

How To : Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more

How To : Spy on Network Relationships with Airgraph-Ng

What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more

How To : Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more

How To : Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more

How To : Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulne ...more

  • Hot
  • Latest