Welcome back, my nascent hackers! One of the many reasons I write this blog is to help you keep the Internet free and open. Throughout human history, whenever a government or other powerful entity has wanted to subjugate a people or group, the first thing they do is isolate t ...more
One of the most frustrating things on the Internet are sites that make you register just to view content. I'm not talking about paywalls—I mean the sites that make you give them personal information to look at free articles or forum threads. Most people are uncomfortable with ...more
The next big iOS version for iPad, iPhone, and iPod touch was revealed by Apple at WWDC 2018 and dropped for everyone on Sept. 17, 2018, less than a week after Apple revealed the new iPhone lineup. We've rounded up all the big picture items and secret features and changes we c ...more
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending Presi ...more
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block ac ...more
Whether you're new to Android or you just haven't kept up on the app scene lately, we hand-picked over one hundred essential apps that are all designed to improve your experience. From custom launchers and icon packs to weather apps and file explorers, there's something for ev ...more
Imagine being able to play a video instantly on hundreds of thousands of devices across the globe. It's totally possible, as long as all of those devices have a Chromecast plugged in. When Chromecasts are left exposed to the internet, hackers can use add them to a botnet that ...more
Identifying vulnerable devices and services on a target router can be difficult without leaving logs and other traces of an active attacker on the network. However, there is a way to covertly decrypt and view Wi-Fi activity without ever connecting to the wireless network. Whe ...more
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
Welcome back, my aspiring hackers! Those of you who've been reading my tutorials for some time now know that I am adamant regarding the necessity of learning and using Linux to hack. There is no substitute, period. In this tutorial, though, we will be setting up a system to ...more
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across th ...more
Welcome back, my amateur hackers! Many of you here are new to hacking. If so, I strongly recommend that each of you set up a "laboratory" to practice your hacks. Just like any discipline, you need to practice, practice, and practice some more before you take it out to the rea ...more
Are you a messy burger eater? Ants and fruit flies invading your home? Hate drinking warm drinks? Find out the quick and easy DIY solutions to these problems with these 10 amazing tips and tricks for the summer. Video: . I had seen pictures of some of these useful ideas on the ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and co ...more
If you need to scan a large number of domains for a specific web app vulnerability, Dorkbot may be the tool for you. Dorkbot uses search engines to locate dorks and then scan potentially vulnerable apps with a scanner module. This tool is useful if you're managing a large num ...more
Smartphone games are getting pretty good these days, but they still can't beat the retro appeal of a good emulator. I mean, who wouldn't want to have their all-time favorite console and arcade games tucked neatly in their front pocket? Classics ranging from Super Mario Bros. t ...more
If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! mo ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more
It may sound irrational, but I bet a lot of you actually avoid doing any work at work—but not on purpose. You might be simply struggling with motivation, or you might just be overdosing on the caffeine. Whatever the issue, getting focused takes lots of time and effort. But we ...more
Whether it's a short road trip or an 18-hour flight, our phones are now essential travel companions. No longer do we need a GPS unit, maps, cameras, camcorders, or even boarding passes. However, not all phones are created equal in this regard. Some are more suited for travelin ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
The 68th Annual Golden Globe Awards take place this Sunday, January 16th, 2011 between the hours of 5 and 8 PM PST — that's 8 & 11 PM for those of you on the East Coast (and Somewhere in the Middle for those of you Somewhere in the Middle). Can't make it to the Beverly Hilton ...more
Getting used to your new Firefox 4 web browser? If so, you might have seen some improvements in the Location Bar. The updated features make browsing the web a cinch, so it's no wonder why more and more Internet junkies are calling it the Awesome Bar. It's faster and easier to ...more
Many FarmVille farmers want money fast, or experience fast, or want to level up, or want to speed things up— make and earn things faster. No matter how long they play, they're not getting what they want, and that is to outshine everybody else. But you can't reach the top by si ...more
In this tutorial, learn how to make a heart on your computer for such social Internet sites as MySpace and Facebook. It's very simple! Show your friends you care about them with this decorative love bonus!
Learn how to hack Google with this amazing video. This video will teach you how to hack Google by using advanced search operators and esoteric search terms to find “hidden” files and mp3s quickly and easily; you'll also learn how to use Google to hack unprotected Internet-cont ...more
If you are stuck using a computer in a place with safety filters, you can use this tutorial to bypass those controls and get to your YouTube account. So, whether you are in a school, library or your parents have parental controls activated, just follow along and you will be ab ...more
Hulu is a great video site, but unfortunately the TV shows and clips they show have a time limit and won't always be there for you to watch. If you love a series or a film and want to keep it, check out this tutorial. In this video, you will learn how to use an Internet progra ...more
Cookies serve their purpose in Internet Explorer 7. They let the browser know which sites you have visited so you don't have to get security prompts every time you back to them. However, they can also slow down your browser, which can be frustrating. This video will show you h ...more
As far as the world of consumer electronics goes, it doesn't get much greener than recycling solar panels. In this video tutorial, you'll learn how to solder together broken solar panels, giving them new life as a functional AA battery charger, which produces about 6 volts in ...more
This video tutorial will teach you a simple hack that will allow you to hide a secret message in any digital picture. Who knew a picture could actually be worth a thousand words? Real words, embedded within! For detailed, step-by-step instructions on recreating this hack yours ...more
Trevor4Ever595 teaches you how to hack mini tower defense using Cheat Engine. Start the game in your internet browser and then pause it. Start Cheat Engine and go to your process list - the little computer icon in the top left corner of the window. Select your browser and then ...more
Some governments and organizations employ proxy servers to filter web content, permitting access to some web sites while blocking others. Here are several ways to get around these censorship policies. This is employed in China with YouTube and many other voices of anti-goverme ...more
WPA-secured wireless networks, or WiFI Protected Access, is a form of internet security that secures your wireless LAN from being accessed by unauthorized users. Safer than WEP, or wireless equivalent privacy, WPA still has weaknesses that are prone to cracking - IF, that is, ...more
In this video tutorial, Chris Pels will show how to configure an ASP.NET web site to use a specific version of ASP.NET/.NET Framework. First see how to identify what version of the .NET Framework a web site is associated with by viewing the script map in Internet Information S ...more
If you have an Android-based cell phone and want to tether it to your MacBook, MacBook Pro, or other computer running Mac OS X software, the secret lies in a little application called PdaNet. Watch this video tutorial to see how to download PdaNet to both your Android phone a ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to hack Club Penguin for loads of money with WPE Pro (03/22/09). 1. Open Up you intern ...more
Users will need to use Cheat Engine version 5.5. This hack will increase the gold and food amount. Begin the game and play at least 2 levels to earn some gold and food. Open Cheat Engine, click one the computer icon and select the internet icon. Multiply the amount of gold or ...more
In this video tutorial, viewers learn how to hack the flash game, Palisade Guardian 2: Modern Combat with Cheat Engine. Begin the game by entering your name and play the first level. After that, open up Cheat Engine and select your internet in the process list. Change the Valu ...more
How to hack Pet Society! Pet Society cheats, tricks, hacks. Watch this video tutorial to learn how to hack poo and coins on Pet Society (09/10/09). See how to get unlimited poo: normal, gold, or rainbow! You can sell them for lots of money! What you need: -Flash Player 9 -Ch ...more
Most Flash games have holes in their programming that can be exploited if you have the right program - the right program in this case being Cheat Engine. Learn how to use it to cheat or hack nearly any Internet game.
It's easy to watch Hulu on your Playstation 3 console. Using a free trial version of PlayOn, you can watch a variety of internet TV & movie sites on almost any game console - including your Wii. Who needs cable anymore? This video will show you how to set up your PlayOn accoun ...more
One of the most important marketing tools we should always be developing to help reinforce our brand is our references. Just like many companies use their client list and client references to build credibility and confidence for their products and services, we should also leve ...more
Whether you are protecting your children or hiding personal information, there are ways to block unwanted websites from your computer. Follow this tutorial and learn how to accomplish this on a Windows PC easily. Step 1: Block websites Block web sites on Internet Explorer by o ...more
For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide t ...more
The day of interactive porn has arrived, all thanks to Steve Jobs. The iPhone 4's new video-call feature, FaceTime, enables users to have live video chat sessions over a Wi-Fi network, via the iPhone's camera and screen. Unsurprisingly, the porn industry was immediately inspir ...more
Most of the videos that you'll find on the internet from sites like youtube are probably flv format. There is now a handy new tool that you can use to convert those flv files and burn them onto a DVD, it's called Replay Converter. As the start the program up you'll see a butto ...more
One of the common mistakes I see a lot of candidates make when they go to an interview is that they think it is a question and answer session. They approach the interview with a mindset that their role is to be prepared to answer a bevy of questions thrown at them. This puts y ...more
Ever wondered how to go about deleting individual entries from the Internet Explorer address bar? While it's possible, it's not particularly easy. You can do it all at once by purging your entire history through Internet Options or you can hack your Windows registry. For more ...more
Nothing on the internet is ever truly private and this hack proves it! Learn how to use PhotoFucket to hack into Photobucket with this video. You'll be able to access Photobucket without a password and view private photos from users. Be careful what you leak though...you might ...more
A torrent is a small file (usually less than 100 KB in size), which contains file details, URL details and other data, that enables peer-to-peer download using a torrent client. In this video, the client used is BitTorrent. This video shows how to download and install the Bit ...more
See a basic netbios hack, showing what happenes to ppl who leave files and folders shared over the Internet. Hack computers with open shares. Click through to watch this video on tricklife.com
Consider this reason 1,001 why we love the internet: Using Google, you can hack into almost any webcam or security cam, in any part of the world and even control the webcam to move around so you can get your full panoramic shot. Don't believe us? Then check out this video tuto ...more
Need internet but don't want to pay? Well, try lusting of those around you by picking up their Wi-Fi signal. Live out in the boondocks? No problem… if you have an old satellite dish laying around. Watch this video tutorial to hack you way into free internet. See how to make a ...more
If you can't get access to a wifi hotspot or an Internet connection with your PSP, you can use this method to get online. You will need access to a computer that is online, and a USB cord that can connect the computer to your PSP. Then, open up the command prompt on your compu ...more
After a decent amount of downtime, one of the best indie game sites on the internet has finally relaunched! PixelProspector is a one-man gaming blog and YouTube channel devoted to the weird and beautiful world of indie games. In the first half of 2010, it received a huge boost ...more
Since the internet is becoming more and more important all the time in regards to overall marketing plans for many companies, it’s imperative that the company website be up to the task of attracting visitors and converting them into customers. There are many methods and techni ...more
Check out this cool hack from The Emo Lab. This video tutorial will show you how to speed up Internet Explorer! First, learn how to create a restore point, then get down to business learning how to boost the performance of you Windows Internet Explorer. Here is the Emo Lab p ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more