Feel Y

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

How To : Things to Do on WonderHowTo (02/15 - 02/21)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Things to Do on WonderHowTo (02/08 - 02/14)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Join the Fight Against SOPA and PIPA

Amazingly, a lot of people I know haven't even heard of SOPA or PIPA. Now, every English-reading person with an internet connection will finally have those two four-letter acronyms emblazoned in their minds. For the entire day today, Wikipedia's English-language site will be i ...more

News : Minecraft World's Ultimate Survival Guide, Part 5

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Part 5 in Minecraft World's Ultimate Survival Guide is, for me, the longest article to write. Since I squeezed out a lot of information from other areas to put into survivability, i ...more

Vidify : The Best Automatic Video Editor App for the iPhone

There’s a race on to see who'll be the Instagram of moving pictures. This makes sense, since many of our phones are clogged with video that, so far, no one is going to see. Wouldn’t it be great if there were a simple app that could take our video content, edit it for us, and t ...more

How To : Make Cool Sculptures with PVC Cut-Offs

PVC isn't something you want to send to the landfill. It's not going to do anything good for the ground when it's buried. It is also something you really, REALLY don't want to send to an incinerator. When burned, PVC releases some really nasty chemicals, including hydrochloric ...more

Chess : The Ultimate PvP On-the-Go

Sitting in the dentist’s waiting room, I found I couldn’t browse the internet on my smartphone anymore. My eyes were tired from reading and there were no headphones to listen to music. There are no magazines at this dentist’s office, just an old TV playing Russian music videos ...more

News : A Chileno Smile

One of the reasons I love living here in Northern Chile is the great variety of personalities represented in the people who live here. Truly, the culture we enjoy in Northern Chile is as diverse as the history of this region, and by reason of Zofri and the multinational custom ...more

Google+ Pro Tips Round-Up : Week 1

With the Google+ team members being generous and free-flowing with advice on some of the more advanced features of Google+, we'll be publishing a weekly summary of the latest pro tips. Chances are, if you've been following the Google+ team members, you've seen some of these al ...more

How To : Safely Share Files Online

Okay, stop me if you've heard this one. You have a document that you want your co-workers' advice on. You attach said document onto a mass email. The first reply comes back with an edited version of the document. You begin to make changes, but another email comes in, with yet ...more

How To : Interview And Choose A Nanny

Choosing a nanny or au pair for your children is a process that should be organized and performed carefully, to ensure you find someone who can be trusted, will contribute significantly to the development of your child and integrate well into your family. The step-by-step pro ...more

News : Disappearing Animals and broken buildings.

Update This issue has been resolved Animals and building materials have been returned! If you did not get something back that you had bought for farm cash, CONTACT SUPPORT! After the fix, I still hadn't gotten everything back so I contacted support again yesterday, and got ...more

Red Dead Review part 1 : Sandbox Gameplay

Red Dead Redemption is hard to pin down in game play and story. The game offers this massive multi-layered world in which the player can roam freely, offering plenty of challenges, beautiful graphics and atmosphere for the player to experience. Yet after some point the whole w ...more

News : Do the Do!

We are embarking upon a new year. As usual, some of us will make "resolutions." There isn't anything wrong with setting goals for the year. It's actually a good idea. It may help focus the energy we bring to life. A karateka may be excused if he or she makes only one resolutio ...more

How To : Shoot Day for Night

Day for Night courtesy of Videomaker.com Those 3 Words We Love to Hear, Day for Night (DFN). What better three words could a director ask to hear? No huge generators, no freezing temperatures, no vampire-style living... what's not to love? Are you perplexed? Well, long ago, ...more

News : Tipping cheat sheet

I just found out that I might be expected to tip all the vendors... on top of the exorbitant fee they charge! Sigh... Here is a great tipping cheat sheet courtesy of theknot.com. When you're already dipping deep into your (or your parents') savings for so many wedding expense ...more

How To : Make a Cheap & Easy Prop Skull

Skulls. What spooky Halloween décor or staging of Hamlet is complete without a skull or two popping up? For ghoulish special effect and/or setting a dramatic scene, skulls are absolutely integral. Well, with some artistry, hardware supplies, and a good dose of patience, you ca ...more

How To : Master Linux with This Extensive 12-Course Bundle

Regardless of whether you're an aspiring or established coding pro, knowing just one or two programming languages and platforms is no longer sufficient if you want to be truly competitive in an increasingly popular and lucrative field. But before you spend an excessive amount ...more

How To : Set Up a Private Facebook Room for Video Chat

It's open season on Zoom, the video conferencing platform that has grown in popularity during the COVID-19 pandemic but has come under fire due to privacy issues. First, Google has opened up Meet, its video conferencing services for G-Suite subscribers, as a free service for ...more

How To : Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool c ...more

How To : Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more

How To : Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to d ...more

How To : Hack MacOS with Digispark Ducky Script Payloads

The USB Rubber Ducky and the Digispark board both suffer from the same issue when attacking macOS computers: a keyboard profiler pop-up which tries to identify any non-Apple USB keyboards. While it's an annoying setback, the solution is a simple modification that allows Mac co ...more

How To : Conduct Recon on a Web Target with Python Tools

Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target. Thanks to a pair of recon tools coded in Python, it takes just seconds to research how a website or server might be vulnerable. No matter what platform ...more

How To : Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot ...more

  • Hot
  • Latest