Check out this video tutorial to learn more about the Phishing Filter on Internet Explorer 7. Web browsers such as Microsoft's Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web ...more
Some governments and organizations employ proxy servers to filter web content, permitting access to some web sites while blocking others. Here are several ways to get around these censorship policies. This is employed in China with YouTube and many other voices of anti-goverme ...more
Looking for an easy way to check Facebook when at school? In this quick and to-the-point hacker's how-to, you'll learn a method for circumventing your school's Internet filtering software. For more information, including detailed, step-by-step instructions, watch this video gu ...more
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block ac ...more
If you're worried about having your private information taken away from you by hackers and other malicious people, this tutorial may help you. This tutorial will help show you how to easily use and understand the phishing filter in Internet Explorer 8. It only takes a couple o ...more
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending Presi ...more
Getting used to your new Firefox 4 web browser? If so, you might have seen some improvements in the Location Bar. The updated features make browsing the web a cinch, so it's no wonder why more and more Internet junkies are calling it the Awesome Bar. It's faster and easier to ...more
Google's much anticipated eBook Store has finally opened. As of today, the digital bookselling enterprise is awaiting your needs, with over 3 million eBooks to read directly on the web or on other platforms, like Android, iPhone, iPad, Sony and Nook devices. And the best part ...more
In this how-to from Household Hacker, we learn of a number of free proxy services that make getting around your school's Internet filter software a breeze. For all of the details, and to start accessing and using all of your favorite websites when at school, watch this video g ...more
No more Internet Explorer 9 Beta. Not today. Now you can explore the web with Microsoft's new Internet Explorer 9 Release Candidate (RC). It wasn't supposed to be released until tomorrow, February 10th, but it's been leaked a little early, WinRumors reports. Microsoft’s main ...more
Want to save a JPEG image for use on the Internet? With Photoshop CS5, it's easy. Whether you're new to Adobe's popular raster graphics editing software or a seasoned professional just looking to better acquaint yourself with the program and its various features and filters, y ...more
It's easy to filter out junk mail with MobileMe Mail on me.com. This Apple video tutorial will show you that it's as easy as going to your MobileMe preferences and enabling junk mail filtering. Nobody wants spam on the Internet.
No website will be inaccessible and no web filter will deny you content once you learn the skills presented in this internet hacking video. In this tutorial you'll learn how to access blocked websites as well as to bypass web filters using URL scripting, HTTP proxies, and a w ...more
To test how fast your internet speed is an intermediate level skill. Start by picking an internet speed test. You can use Google or another search engine to find one. A service that is recommended in the video is DSLreports. This site does not require you to know a lot of info ...more
Check out this informative video tutorial from Apple on how to use Mac OS X Mail to its fullest. See how to filter out junk mail, use data detectors, and view RSS feeds in Mail. Mac OS X. It's what makes a Mac a Mac. Mac OS X is the world’s most advanced operating system. Bui ...more
Tired of seeing all of those ads in your browser? The flashing ones make for a terrible browsing experience, and those rollover ones are just downright annoying. If you don't want to be bothered by them again, you've got a few choices, depending on what web browser you're usin ...more
"Connect via Facebook" — these words are coated on over a million websites nowadays, but Facebook Connect poses a risk of leaking personally identifiable information to those third parties. If you're not convinced Facebook Connect is safe, then turn off the flow of personal da ...more
I am writing this quick post in response to the recent earthquakes and tsunamis that are affecting Japan. As soon as the news broke, and we began to hear of tsunami warning for our area, I immediately realized how under prepared I was for a natural disaster. The thing that dro ...more
Circumvent your school's Internet filter with a proxy. This hacker's how-to will show you how it's done. For all of the details, and to get started learning how to acess MySpace and other blocked sites like YouTube and Facebook when on a computer at your own school, take a look.
Circumvent your school's Internet filter with a proxy. This hacker's how-to will show you how it's done. For all of the details, and to get started learning how to acess YouTube and other blocked sites like Facebook when on a computer at your own school, take a look.
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then a ...more
In this clip, you'll learn how to use proxies to circumvent whatever Internet filters may be in place at your school or place of work. For more information, including a complete demonstration of the process and detailed, step-by-step instructions, watch this home-computing how ...more
In this clip, you'll learn how to circumvent Internet filters with Ultrasurf. For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started using this trick to access blocked websites at your own school or workplac ...more
This eight-minute guide presents an overview of how to create and export images for use on the Internet in Adobe Photoshop CS5. Whether you're new to Adobe's popular raster graphics editing software or a seasoned professional just looking to better acquaint yourself with the p ...more
Even with Apple's forthcoming iOS 5 updates to its default camera application, those upcoming features can't match what already exists in Global Delight's Camera Plus Pro. For $1.99, Camera Plus Pro provides users with over 100 tools for every part of the picture taking proces ...more
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this shou ...more
The video shows us how to use a proxy to bypass the Internet Filters. Most of the times in our schools and colleges most of the websites including the social networking ones will be blocked for security reasons and makes us unable to log into those websites. In such cases even ...more
Be warned before hand that by making changes your router settings that you know nothing about can damage your router. Start off by opening your internet browser and then in the address bar either type 192. 168. 1. 1 or www.routerlogin.com. A prompt will come up in which you ha ...more
This video helps you filter AOL search results for the protection of your children. In your internet browser, type in or go to http://search.aol.com/. AOL Search home appears. Click the link named "Settings" located on the upper right corner of the AOL Search home. Click the r ...more
This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol work ...more
If you ever wondered how you could make your internet web browsing faster, then this video will give you a crucial tip. The loading speed of web pages and web sites is greatly influenced by the type of web browser you are using. The narrator in this video suggests that you sea ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
In this video from AppleGenius0921 we learn how to export videos using Screenflow in HD. Launch Screenflow, make sure you're editing is complete and go to File, then Export. A window will come up asking the name you want to save it as and where you want to save it. Make a good ...more
In this how-to video, you will learn how to get 720p quality videos in Final Cut Pro HD. This is useful if you want to take advantage of the higher quality video settings found on YouTube. First, have your film ready. Go to Export and press QuickTime Conversion. Now, name the ...more
Privacy is important. Whether its a telemarketer or a crazy ex, sometimes you may need to block someone from contacting you. With this tutorial, learn how to get rid of those pesky callers. You Will Need • Internet access • Phone • Call-blocking service • Cell phone's owne ...more
Lifehacker provides a helpful guide for Facebook addicts everywhere. How does one get around an employer's website blocker? The trick is to set up a local web server running from home, from which you can use a proxy to access any site you please. For those who are tech-defici ...more
Finding Linux hard to handle after using Windows? Well this should help, here is how to install software on Linux. Start off by clicking on application launcher. Here go into applications, then into 'system' where you should find software management. In this program go straigh ...more
Whether you need to create realistic-looking bruises for a Halloween photo or need to look beaten up for a film project you're completing, sometimes you just need to add a few brown and purple spots to your face. Check out this Photoshop tutorial to learn how to retouch yours ...more
Today's digital cameras record not only the images themselves, but also the metadata behind the scenes, like camera settings, location, date, time, etc. But there's a lot more to say about a photograph. What's the subject? Is it night or day? Outside or inside? Person, place o ...more
Here's another delicious Byte. Ucha Gobejishvili, a Georgian Security Researcher under the handle of longrifle0x, discovered two cross site scripting (XSS) vulnerabilities on the official website of Forbes. He discovered the hole in two different locations on the site, and has ...more
PC Gamer represents all that was awesome about games journalism in the '90s, now sadly diminished. Brilliant, funny, full of integrity, and solid print sales were always present, and with the tragic exception of the latter, still are. Video game magazines were hit harder than ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Downloading images from Google Images search can be a time consuming and DANGEROUS process. On more than one occasion, while trying to save the full size image and being forced to the originating website, I have accidentally come across malicious websites. Because of this, a ...more
Hello readers again! Sorry about the long wait (scary computer problems). Today I am going to talk to you about security problems on Wizard101. I have recently encountered many security flaws on Wizard101, including hacking, frauding and other crazy things. Wizard101 is the ta ...more
When you're out and about in the dangerous world of Wi-Fi, it's hard for the average computer user to stay protected, or even know what being protected entails. Little do most people know, Windows 7 has a built-in security that few people take advantage of: a VPN (Virtual Priv ...more
While using Google+, it's been apparent that there are two types of posters. There are the people who post thoughtful, serious posts about everything from tech to dealing with cancer. And then there are the meme propagators, the people who decide to rick roll others (ahem, +Br ...more
INTRODUCTION In this Digital world now almost every one knows the a, b , c of computer. From a child of 5th grade to an old man, everyone knows how to operate computer and do simple work on it. Thats why you need to have something which makes you different from others. How q ...more
Warnings Warning! These links are not all approved by Zynga. You use them at your own risk! I'm providing these only to give you an idea of some things that are out there. Make sure you test them out for yourself or find a version that works for your browser before you commit ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Previously, we talked about how to secure Firefox. Today, we will talk about securing a Chromium based Browser. Why? Because Chrome recently beat Firefox in holding more customers. It is obvious that Google Chrome tracks our every move online, so what alternatives is out ther ...more
Are you finding that the Google+ features you've been waiting for are still not rolling out quickly enough for you? Although we've provided many solutions to Google+ issues with different Chrome extensions, it still seems like it's not enough. Now that we've been using Google+ ...more
Planning the Trip Get lots of brochures Send for brochures of the places you will be visiting. Make a travel book with the brochures to get the grandchildren and their families excited. The best place to contact for these brochures are the Visitors Bureaus or the Chamber of ...more
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
+Nik Cubrilovic discovered last week that Facebook could track your web activities even after you logged out of your Facebook account. After some blatant denials from Facebook spokespeople, Facebook decided to fix the logout issue, but not before +Michael Arrington, on his new ...more
How is it that we use Firefox tremendously and yet not care for its needs? You might have noticed Firefox sometimes tends to slow and not respond often. You might have installed countless add-on in Firefox to enhance your using experience, to get the most out of your Firefox u ...more
Learn a little bit about technology with help from EMBARQ. Watch this how-to video tutorial on installing DSL 2Wire Gateway filters on home phones. Make sure to repeat the install process for the Gateway filters for each telephone in your house that uses the same phone number ...more
How to bypass Websense and other web filters in Internet Explorer. Bypass Websense and other proxies. Click through to watch this video on tricklife.com
After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their M ...more
What you watch in the privacy of your own home should be no one's business but yours. That was the case until Prime Minister David Cameron decided that there was too much porn available to minors in the United Kingdom. "The impact it is having on the innocence of our children ...more