Give Someone Diarrhea

Google+ Pro Tips Round Up : Week 4

Last week, I demonstrated how to go a little deeper into your Google+ profiles, photos, and introduced cross-posting. This week, I'm highlighting a bunch of different unofficial resources that have sprung up that will help improve your Google+ experience, and give you the late ...more

News : Long-Term Strategies

Long-Term Strategies for FrontierVilleWhen you first start to play FrontierVille, after you’ve cleared a bunch of trees and brush and started to build a schoolhouse or a barn and you’ve added a few neighbors, you look up at the people around Level 90 or Level 100, and wonder h ...more

How To : Interview And Choose A Nanny

Choosing a nanny or au pair for your children is a process that should be organized and performed carefully, to ensure you find someone who can be trusted, will contribute significantly to the development of your child and integrate well into your family. The step-by-step pro ...more

News : Gross Mouth to Mouth

Okay so it begins with someone either me or one of the jackass crew in the classic old person makeup that makes them look as nasty as possible. Then we get in an elevator with unsuspecting people and the "old person" pretends to be having a heart attack or something. finally, ...more

How To : Body paint a dragon on a leg

This tutorial is set-up for the novice or beginning body painter or face painter, giving step by step instructions on how to body paint a dragon on someone's leg. Paint colors needed include blue, white, black, red, yellow, gold sparkles and green. Materials are a must and inc ...more

News : Fun at a Funeral

This is a stunt i think would best be suited for Bam Margera due to how "close" he is to his family. The basic idea is to fake Bam's death. Due to his dangerous life as a stunt man it would be easy to believe. Once Bam's family has been informed he "died" set up a fake funeral ...more

How To : Track an email

How to track an email address. Useful if you meet someone who says they are from somewhere e.g. LA as given in the video and you don't believe them. Go to the Rate a Bull site type in their email address and then hit return or 'find them'. The site will give you options to see ...more

How To : Play limit Texas Hold'Em

This video shows the basics of limit Texas Hold 'em. Limit means that there are set amounts that you can bet, unlike no limit where at any given time you can bet your whole stack. He explains a game of $2 /$4 limit Hold 'em. This means that before the flop and after the flop y ...more

News : Unintended Bungie Jump

Alright, so while I can't claim to be a huge, oh my god there's Steve-O jump for joy everytime a new Jackass movie comes out, fan, I do enjoy watching the show. Now, there's a prank that I would never have the means nor balls to pull on someone I know, but those kind of pranks ...more

News : Convict Sleepover

Get a scary looking dude. Print up a fake newspaper with the guy’s face on it saying he just broke out of prison. Give the victim the newspaper. Later that night disconnect the phone line and take his/her cell phone. Make sure there are no weapons in the bedroom. After the per ...more

News : Rodeo Games

First Prank: Title: Bull-ish Thugs Location: Bull Arena or rodeo in some ranch somewhere Description: Someone dresses up as a woman while two others are dressed up as robbers in prison attire. From there you act out some sort of play in which the robbers steal the woman's pur ...more

How To : Draw a quick rose step by step

A bouquet of roses is a lovely thought but will quickly wilt and die. Give your loved one a bouquet of roses that will last for years to come and it will only cost you the price of a pencil and paper. They’re quick and easy to sketch. With a little patience, you can learn the ...more

How To : Become a mentor

Mentoring is a way to help others and improve your community. There are established mentoring organizations to join or you can go seek out those already in your life who you can help with your time end knowledge. Make a difference in someone else’s life by being a mentor. You ...more

How To : Deal with an aggressive driver

In this series of driving safety videos, our professional law officer shares his experience in dealing with road rage and similar unsafe driving situations. Corporal Shaun Appler gives you tips on how to recognize an overly aggressive driver and how to avoid confrontations wit ...more

News : "Jailbird"

The key to this skit is to get someone incredibly drunk to the point that you can move them without their knowledge. As soon as they pass out, dress them in an orange jumpsuit and take them to a prison or a studio made to look like a prison. The cell-mate (actor) needs to be s ...more

How To : Get a MyBrute bear or pet (06/19/09)

Basically, the whole point of this video is to be really clear about how to get a Bear as a pet or any of the others available. First of all, you need to pupil someone who already has a bear pet, or the one of your choice. The lower the lvl of your masters, the higher the per ...more

How To : Advertise Efficiently on Facebook

Marketers from Facebook who design ads for advertisers can ask them to switch over to higher end product in which Facebook would be designing or hosting themes based on their products. This product theme will have a separate scroll area where advertisers (after buying rights f ...more

How To : Choose the Right Path

Choose the Right Path Making a choice What do you do, when you do not know what to do? Perhaps, you do nothing. But such inaction may be unhealthy and even suicidal. Someone said, “The only thing for the evil to triumph is the good should do nothing”. Many people have been i ...more

News : the wal-mart bandit

I THINK THIS COULD BE GREAT..IVE BEEN TALKING ABOUT IT FOR EVER.. WE SHOULD DRESS UP IN A BLUE CAP WITH A BIG YELLOW SMILEY FACE ON IT AND HAVE A YELLOW MASK ACROSS OUR EYES.. WALK INTO WAL-MART GRAB A CART AND SHAKE THE DOOR GREETERS HAND AND JUMP IN THE CART AND USE IT KINDA ...more

How To : Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more

How To : So, You're a Steampunk… Now What?

Let's say that you've got the look down, and you have your Steampunk props all ready to go. Congratulations! You're a Steampunk! But now what do you do with yourself? You can sit there, patting yourself on the back, but that gets lonely after awhile. Your props will look nic ...more

News : 91 Cool New iOS 11 Features You Didn't Know About

Apple's iOS 11 is finally here, and while they showed off several of the new features it brings to your iPhone, iPad, and iPod touch back at WWDC 2017, they've only just touched the surface of what iOS 11 has to offer. There are a lot of cool new (and sometimes secret) feature ...more

How To : Eat for Free at DragonCon 2012

If you're like me, you've already spent a ton of money on your costumes, your badge, and your hotel room, and now you're looking for ways to cut costs. There are all kinds of ways to save money at DragonCon, but many of them involve violating the rules in some way, such as not ...more

How To : The 4 Best Phones for Privacy & Security in 2020

Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet. So no, there's no such ...more

How To : Make Anonymous Calls from Your iPhone

When you don't want somebody you're calling to know the real phone number associated with your iPhone, whether it's for privacy reasons, to avoid being called back, or to prevent being ignored, there are multiple things you can do to block it on their caller ID. Some of the b ...more

How To : The Ultimate Guide to Hacking macOS

Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more

  • Hot
  • Latest