For many young people, their computer is the most expensive and cherished thing that they own. If you want to pull a prank of them, why not hit them where it hurts? This video presents a novel idea for a computer prank: loading an image of a cracked LCD screen full-screen on t ...more
If you'd like to play a nice little prank on someone, this next tutorial will show you a quick and easy one. This involves messing around with someone's computer and in no way will it harm or crash the computer. But, if the person you are playing the prank on gets mad easily, ...more
1.) If you do not know something, keep our mouth shut.* No-one, I repeat no-one, is interested in your uneducated guesses about why something is the way it is, or why someone did something a certain way. At best, you will trick them into temporarily thinking you know what you’ ...more
There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're conc ...more
You saw our post on the 18 coolest new features of iOS 7, but now that you've had a chance to play around with your updated iPhone, it's time to lock it down. There are a surprising number of new privacy and security-related issues in iOS 7's default settings, from allowing A ...more
Voice-activated digital assistants from Amazon, Apple, and Google currently have the upper hand for home automation integrations, but a new augmented reality mobile app promises to give homeowners and renters visual control over their connected appliances. Smart AR Home, avai ...more
Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, w ...more
Computer system authentication is critical to keeping systems safe from unwanted users, intruders, and abusers. Basically, authentication is the process of the potential user proving they are an authorized user. As most of you know, authentication into secure computer systems ...more
In this article, I am most likely going to humiliate myself by showing you all the horrible hashtagging I am wont to do. When it comes to hashtags, well, everybody knows if you desire any chance at all of getting noticed on Instagram, you got to hashtag. The thing is, within ...more
Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. Our hacking Windows 10 and hacking macOS articles might make it seem like a reasonably secure operating system doesn't exist. But I'm here to tell you that there is a viable alterna ...more
It's confession time. Through a couple of sources, I managed to get an early look at the HoloLens 2. But I was sworn to secrecy, and I take my tech oaths seriously (shame on you, leakers). But now that it's out in the wild, we can finally talk about how the HoloLens 2 looks c ...more
For as long as I've loved SCRABBLE, I can't believe I've never come across this before. "CRAZIEST" - A short story by Liz Dubelman about words and numbers as a religion (think Pi), about SCRABBLE being the oracle, about her quest for the "triple-triple". This spoke words to m ...more
Gone are the days when you had to carry a clunky DynaTAC to make phone calls, pocket phone book for you contact list, Sony Discman for your tunes, and wallet for you cash and credit cards. Today, all you need is your smartphone. To be specific, Google's Nexus S 4G on Sprint. ...more
Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happeni ...more
If you've ever played the game of Would You Rather, you've probably been given the ultimatum between eating insects or doing something else that sounds absurd, like licking a cactus. I'm advising you to always choose the insects, and here's why: Entomophagy, the practice of c ...more
Over the years, we've seen security breach after security breach, as well as high-profile data scandals where collected personal information was misused by companies. Apple makes customer privacy a priority, so there have been few issues to worry about when it comes to its ser ...more
When you misplace your Android device, finding it with the Android Device Manager, or even better, Whistle Me, can help you find it no problem. But what about when your phone is not just hiding under the couch cushions? Your worst nightmare just came true. It's officially gone ...more
I truly don't understand why anyone would pay $10.99 for a case of carbonated water just to feel like a Midwest mom on a diet. Every time I talk about LaCroix, pronounced La-CROY (rhymes with enjoy), it's like I take all the money I spent on my French major and light it on fir ...more
This prank/stunt pays tribute the original Happy Days episode that started the phrase, "Jump the Shark". The elaborate prank involves setting up a ski ramp to an ocean buoyed caged (a la Happy Days). The shark is a realistic animatronic rental (I looked into it...they do exist ...more
In this video Eric Joneckis gives you a few tips on acting like a true skateboarder. If you want other people to take you seriously as a skateboarder, you need to look the part. Here are a few tips: Always wear a shoelace belt, skateboarding shoes that shouldn't be untied to t ...more
www.jailbreakme.com has recently created a new way to Jailbreak any iPod Touch, iPhone, or iPad, regardless of the firmware it is running. It is EXTREMELY easy! If you were thinking about Jailbreaking, but were afraid you did not have the technical abilities to do so, now you ...more
A tutorial for a beginner's magic trick, the 18 Cards trick. In this card trick you appear to guess someone's card out of a stack of 18.
In this video, we learn how to use secure online passwords. There are a ton of things to consider when creating a password. A weak password is something that someone can easily guess. If you are using a birthday, common dictionary word, child's name, or something common then y ...more
In this video, we learn how to recruit a great staff for your business. When hiring, you want to find someone that has great thinking ability and that you have really good chemistry with. You want to be able to get alone with the person and make sure they have experience. If t ...more
If you're serious about keeping your diary for your eyes only then you might have to take some drastic steps. There are some very clever ways to distract from, encrypt, hide, or disguise a diary if you're willing to put in the work. If you keep a diary, you’re likely to want ...more
In this video, we learn how to use psychic dice trick to punk the drunk. First, place the dice in a clear glass, then tell the other person to look at the numbers on the dice through the bottom of the cup. Next, guess that number they are thinking of, and then look at the die ...more
Having a secure password is essential in today's interconnected world. Hackers are just around the corner, and if you have an easy to guess or hack password that you use for all of your accounts, someone can login to all of your websites very easily. Look at this guide on how ...more
Your boss is pursing her lips and drumming her fingers on the table during your presentation. Your best friend is gazing downwards and crossing his arms when you ask him why the car you lent him for the weekend has a big dent. What could these body language signals all mean? ...more
Learn how to play "Thinking of You" by Katy Perry, an acoustic guitar tutorial. Follow along with this demonstration, tabs and lyrics here: Standard Tuning: (verse 1) E B comparasons are easily done C#m A once you’ve had a taste of perfection E B like an apple handing from ...more
Make sure you could everything Exact as possible. This prank is called the Ground Hog Prank. I've been thinking of this prank for years. One morning when someone wakes up just make shit happen. Like break something wreck a car and remember every detail. Then the next morning ...more
In this Spirituality video tutorial you will learn how to palm read; crosses and islands on the main lines. These very often come on the main lines and sometimes they show a lot of changes in the person's life. If there is a cross on the heart line, it implies an emotional cha ...more
When stories are told about people in need, the ones with happy endings include the details of someone that produced an action that caused the people in need to be better off than before. Do we have to wait for the identification of a need? Could we on purpose just plan to pre ...more
Gift baskets are a great way to celebrate the holidays and special occasions. They also are a great way for you to cheer a friend up and cure their blues. In this quick guide you will learn how to put together a kind and caring gift basket for someone recovering from illness. ...more
Ever wonder what your brain looks like on video games? Below, Matt Richtel of the New York Times lies in a $3 million M.R.I. scanning tube while playing a simple driving game, as researchers sit by and observe the real-time images inside Richtel's brain. Why? To measure and m ...more
Record an old lottery Ticket winning. Then get a group of friends over and make someone go get a lottery ticket but you have someone give them a specific Ticket you made. Then you and all your friends can watch the Recording and you can prank either one or alot of friends into ...more
This is a really neat trick that makes it appear that someone takes a picture of the video, then the picture appears in a picture frame. In order to do this, you need to know how to keyframe. If you don't, well, I guess you're out of luck, aren't you?
In this video tutorial, viewers learn how to create easy, natural openers when talking to women. Conversations can easily be started all the time based on simple observations. Usually guys make a mistake when they try to use a pickup line on a women. Pickup lines don't work be ...more
You need to realize that you can waste a lot of time thinking about a crush when you could be saying "hey, let's go out, let's go study, etc." You don't want to play it safe and find out 20 years later that someone had a crush on you and you didn't do anything about it. Don't ...more
This is it! That last basic mission. Last Friday's mission was to accomplish solving HackThisSite, basic mission 11. This final mission in the basic series was made to give us the skills and a place to apply our Apache server knowledge. This will teach us how to traverse throu ...more
RESPECT - What It Means (in the picture above are my parents, both of whom I respect and cherish dearly) http://dictionary.reference.com/ defines RESPECT in 19 different ways. However, for the purpose of this article, we are going to focus on just 3 - 3. esteem for or a s ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
What's your Twitter handle worth? If it's considered "desirable" (aka short and simple), it'll get you around 100 bucks, or, if you prefer, the affections of a teenage girl. A user with the handle @blanket found out the hard way that Twitter's security is atrocious when his a ...more
Every phone has its issues and quirks, and the Nexus 5 is no exception to this rule. One of the most common troubleshooting questions asked by its owners is "Why does my Nexus 5 keep shutting off or restarting?" where the device suddenly decides to reboot or power off randomly ...more
The importance of body language is stressed from an early age: watch those around you, and you'll know what they're thinking. While you might be skilled at deciphering the messages of crossed arms, slouched sitting, eye movements, and hand gestures, the key to understanding th ...more
The most complicated logic-gate to build in Minecraft is the XOR-gate. (Well, actually it is the XNOR but it is just a XOR with a NOT at the end.) On a XOR-gate any of the inputs (usually two) can be high but only one at a time. So far I haven't seen good XOR-gates with more t ...more
In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
Trivia games are among the most entertaining ways to learn factoids and interesting info you may have never known about before. They're also the perfect genre to enjoy with friends and family, as they're particularly great at breaking the ice to make for a more memorable time ...more
A week into my internship, I experienced pretty serious back pain and slight difficulty breathing. I scheduled a doctor's appointment to make sure nothing was wrong, and I got a surprising diagnosis: bad posture. Yep, slouching at my desk had caused all of my maladies. In an ...more
Often someone who is bone-tired will lay down in bed and flip on the TV or his laptop thinking that it would be nice to relax for a few minutes before going to sleep. And often, he'll end up catching a second wind and stay awake another hour or two watching some old movie or ...more
When the iPhone first came out, using them seemed like an impossibility to the visually impaired. Luckily, the iPhone now provides a multitude of resources to make sure that the visually impaired have accessibility to the phone. In fact, many blind people use their iPhone to ...more
How many times have you heard someone utter the phrase, "Now, let's break into groups"? From classroom discussions to workplace think tanks, gathering into groups to generate ideas is common practice. These forced get-togethers are intended to encourage creativity and unique t ...more
Passwords are everywhere. We use them to unlock phones, computers, websites, encrypted disks, encrypted files... the list just goes on and on. Savvy users will already have a password manager of some sort that can generate a very strong password on a per site basis. However, t ...more
Texting is a godsend to mobile devices, but it also has its caveats. Sending a text to someone requires visual, manual, and cognitive attention—looking at what you're typing, holding the phone steady, and thinking about what you're trying to say. So, texting while doing pretty ...more
It's that time of year again. No, not Thanksgiving. Black Friday. There are a lot deals available this holiday weekend, many of which include flagship Android devices. Whether you are thinking of buying a phone for yourself or looking for a gift for someone else, you can find ...more
It's been a rough week for Instagram. First they came out with a new terms of service that suggested the right to let companies use people's photos for advertisements without the user's permission. Then everyone started freaking out and debating whether or not to leave the onl ...more
Netflix has received a lot of publicity lately, and not because of its impressive worldwide library. From blog wars with Comcast to streaming deals with Verizon, it's easy to forget that the company exists for our entertainment, but sometimes that entertainment has drawbacks. ...more
Altruism was first explained as kin selection: "I would lay down my life for two brothers or eight cousins", as J.B.S. Haldane put it. Then Robert Axelrod showed that in repeated interactions, individuals will sacrifice well being in return for an expectation that those with ...more
Valentine's Day can seem like Singles Awareness Day if you're newly broken up, but that's all the more reason to treat yourself on this pink-and-red consumerist holiday. Whether you're happily single or bitter and bitchy, there's definitely something on this list of Anti-Valen ...more
In recent years, many software publishers have tried to sell the business community on remote meetings via VR, but if social media chatter is any indication, it hasn't taken off in a big way just yet. However, for some, the notion of holding remote meetings using augmented rea ...more