When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month. In order ...more
Have you ever wondered how credit card numbers work? I mean, how they really work? How do they come up with the numbers? Credit cards actually follow a very specific pattern. Let's take a look at how they're set up. Example of a Credit Card Number 4485 3151 5882 2849 These ...more
In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your i ...more
Welcome back, my fledgling hackers! As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely da ...more
PayPal is one of the most popular payment systems across the globe. It makes payments fast, easy, and secure, and with 250+ million users, it's not going anywhere. If you're new to the online service, one of the first things you should learn is how to add your bank account, cr ...more
Think credit card numbers are just a meaningless jumble of digits? A sort of number soup? Think again! Your credit card number isn't even number at all but rather a composite of four separate numbers, each of which plays an important, fixed role. Because of these roles, you c ...more
Uh, oh. You’re at your front door without a key. If you’ve got a credit card, see if you can get it to open the door before you use it to pay for a locksmith. Learn how to unlock a door with a credit card. The lock needs to be the right kind of lock & you need to have patience ...more
Are you under a backbreaking amount of debt? In this economy, we don't blame you. If credit card bills, mortgages, and bank loans are making you want to crawl into bed and pull the covers over your face, then check out this video to learn how to consolidate debt. You'll need ...more
Identity theft is a huge problem and one of he fastest growing crimes in America. A number of credit card companies now issue credit cards with embedded RFIDs (radio frequency ID tags), with promises of enhanced security and speedy transactions. But, on today's episode of Bo ...more
Check out this video for advice on how to build a brand new wallet out of duct tape. These aren't just ordinary wallets, either, they have slots for credit cards and everything! These are complete billfolds and can be made into plenty of different style depending on your prefe ...more
One way to keep your budget in line is with MoneyWell. This video tutorial for beginner users teaches you the ins and outs of setting up credit cards accounts, and how to manage them. MoneyWell from No Thirst Software is a personal finance software with powerful "envelope" bu ...more
Tetherd Cow Ahead posts an interesting science experiment. All you really need is a little bit of iron powder and a magnet, and you can unveil the info behind the magstripe on a credit card. You will need: A small amount of fine iron powder or iron oxide A magnet An old cre ...more
This Ruby on Rails instructional screencast demonstrates credit card validation within a Ruby on Rails application. It uses the credit card library from Lucas Carlson. This library validates the structure of a credit card number and can also return the type of card being used. ...more
Do you want an iTunes account, but either lack a credit card or the desire to give Apple your credit card information? Well, there's a way you can get around the part of the iTunes account creation process where you enter your credit card.
Living within your means can be done. You don't want to be a slave to the credit card company, do you? Learn what to do to stay out of credit card debt. This how to video will give you the tips. Credit card debt is a slippery slope. You Will Need * Budget * Debit card * Willp ...more
In this video tutorial, viewers learn how to negotiate with a credit card company. There are 3 main items that users can negotiate. The first item is the date of payment. Users are able arrange a more convenient date for payment. The second item is the annual fee. Users are ab ...more
Learn how to give the illusion of a credit card leaving your hands and reappearing. Make a credit card disappear and reappear. Click through to watch this video on tricklife.com
A novice card magic trick in which you change a card by swiping it through the deck like a credit card.
One thing that irks everyone, customer and seller, is fraud. And if you have an e-store, you're unfortunately going to come across some credit card fraud. There are some ways for you to protect yourself, your company and your customers from credit card fraud, and Volusion has ...more
Interested in obtaining an American Express Black or Centurion credit card? This video will teach you how to determine whether you qualify and how to apply for one if you do. For all of the details on how to get your own American Express Black card, take a look.
In this clip, learn how to make a very cool duct tape wallet with multiple credit card flaps. This detailed billfold can be made into a bi-fold or tri-fold shape and is sturdy enough to carry an array of cards and cash. So, follow along and start building your very own, totall ...more
Duct tape artists are known for their adherence to straight lines due to the difficulty of making more elaborate shapes in the medium. For advanced duct tape artists looking for a challenge, this video will teach you how to create a spider-web-like design as part of a credit c ...more
As you might guess, one of the domains in which Microsoft Excel really excels is business math. Brush up on the stuff for your next or current job with this how-to. In this tutorial from everyone's favorite digital spreadsheet guru, YouTube's ExcelIsFun, the 36th installment i ...more
Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (p ...more
Most of the duct-tape aficionados out there who are watching this video are probably familiar with duct tapes incredible versatility as a material for making backpacks, tuxedos, and other accessories and clothing items. What many don't realize, however, is the extent of the de ...more
For accepting payments on the go, try out the Square payment system. Square allows you to take your customer's credit cards as payment when selling your products out of food trucks, at events, or door-to-door. This guide will show you how to use Square to charge customers usin ...more
Looking for an easy way to make certain that your sensitive personal information is secure? With Identity Finder, it's easy! So easy, in fact, that this home-computing how-to from the folks at TekZilla can present a complete overview of the process in just over three minutes. ...more
Wallets are our least favorite item to purchase. Why? Well, they're either super crappy in quality and looks (think a pleather wallet you can purchase at the clearance bin at Wal-Mart) or gorgeous but out of this world expensive (Dior, anyone?). There's selmonly a space in bet ...more
Bad credit? No credit? A good way to improve your personal credit score is by getting and maintaining a credit card. Get your first credit card and learn the basics of credit finance.
Samy Kamkar, the security researcher known for the MySpace Worm and his combination lock cracking skills (using an online calculator), is back—and this time, he's after your credit cards! Well, not really, but his latest project, dubbed MagSpoof, can spoof any magnetic stripe ...more
There's a feature that debuted in iOS 7 that lets you to save your credit or debit card information in Safari so that you can auto-fill text boxes when purchasing something online. Unfortunately, you still had to manually fill in your card info the first time, and if you wante ...more
Locked out? Quit climbing through the windows or calling your ex to let you in. Get serious. Howcast says, do it yourself. This lock pick trick is elementary. I do it on my office door daily. It's a quick shimmy and flick of the wrist. Almost easier than finding my keys. Just ...more
You've probably noticed how we like to stress the importance of a strong password. After all, there are still people out there who continue to use passwords like 123456 and even just "password". But passwords aren't the only barriers that protect your information. According t ...more
Apple Card has generated quite the buzz since its March 2019 announcement. The iPhone maker's new credit card pairs with Apple Wallet on your device, is simple to sign up for, includes enhanced security over other cards, has zero fees, and provides daily rewards right to your ...more
Watch this Chinese language video tutorial and learn useful phrases and additional vocabulary when making purchases with a credit card, such as "Number" and "Can I use my credit card here?" Learn how to correctly pronounce the words and phrases, and how to use them properly in ...more
As you might guess, one of the domains in which Microsoft Excel really excels is finance math. Brush up on the stuff for your next or current job with this how-to. In this tutorial from everyone's favorite digital spreadsheet guru, YouTube's ExcelIsFun, the 39th installment in ...more
Believe it or not, you can put your money to use very efficiently in a new way: your credit or debit card can serve as a blade in desperate situations. (It might even be handier than dental floss as a brilliant substitution for specialized kitchen tools.) While I wouldn't take ...more
On Monday, Apple unveiled its Apple Card, the company's boldest move yet toward becoming a truly mainstream mobile payments company. And the product has vast implications for our augmented reality future, some of which may not be immediately obvious to many. Let's start with ...more
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more
Are you constantly traveling? Well, as a Hilton HHonors member, you can enjoy special treatment at all of their hotels and resorts. It's free to register, but the difficulty lies in climbing up their membership level. To reach Gold elite status, Hilton HHonors requires that yo ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Inspiration for tutorial: Foxtrot's "How to Trap a Tracker" If you have been following my past tutorials, (and it's fine if you haven't,) you would know how much social engineering and doxing I do. During these moments when we are convincing people that we are a different per ...more
After getting confirmation from Tim Sweeney, CEO of Epic Games, we now know Fortnite Battle Royale will not be available on the Play Store when it's finally released for Android. Instead, users will have to download the APK directly from Epic Games' website — and quite frankly ...more
Bed bugs are brown and creepy. Could you spot one in your hotel room? A new study reveals most people are freaked out by bed bugs, but only about 35% could identify one. In a new study published in American Entomologist, scientists from the University of Kentucky examined how ...more
I rarely receive spam mail, but every now and then I’ll get an email from Cat Fancy Magazine. I’ve never read an issue of Cat Fancy Magazine or been to their website. Actually, I’m allergic to cats. So how did they manage to get my information? Well, anytime you register for ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
When you really think about it, registering for any website is a little scary. Not only do they now have your name, email address, and a username/password combination you might've used elsewhere, but certain sites and services ask for quite a bit more private information. From ...more
A vending machine is an invaluable yet totally frustrating piece of equipment. It's a godsend whenever your tummy's growling or you need an ice-cold drink on a hot summer day. But when something gets stuck inside or the machine flat-out malfunctions, it quickly becomes your ar ...more
Super Mario Run was released for iOS on December 15, 2016. Even though it debuted as a "free" app, almost all of the playable content was hidden behind a ridiculous $10 unlocking package. Despite coming with such a hefty price tag and receiving a two-star rating on the day of ...more
Researchers at the University of California, Riverside and the University of Michigan announced recently that they have developed a hack that works 92% of the time on Google's Gmail system on Android, as well as with the H&R Block app. In addition, this hack worked 86% of the ...more
Before many games make it to the US-based iOS App Store, they get "soft launched" in a smaller country to get real-world testing for bugs. It's a pilot program, so to speak, as countries like Vietnam or the Philippines have far fewer iPhone users than the US, thus offer a more ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
If running out of battery while out and about weren't bad enough, the experience is a lot more painful if your iPhone has a semi-untethered jailbreak. With that kind of jailbreak, when the iPhone dies, all of the mods will be disabled after the device powers back up. Fortunate ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
Imagine walking up to enter a live event — but instead of pulling out a physical or mobile ticket to get admitted — you pull out your smartphone which lets out an ultrasonic sound tailored for you that lets you into the event. Yeah, that's what Ticketmaster is trying to do. ...more
This is second post in my series of posts for finding hacked accounts online. Please do read the part 1 of the post at http://null-byte.wonderhowto.com/how-to/find-hacked-accounts-online-part-1-0164611/ In this post we will explore more about finding hacked accounts online, w ...more
In most cases, when the free trial of software is over, that's it—you're left to either pay for it or find an alternative. But what happens if the trial wasn't long enough to sell you on the product? It'd be nice if there was a way to test it out again without having to whip o ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a " ...more