Hack Into At&t Phone Account

How To : Shorten URLs from the Command Line with Python

Shortening URLs has become a necessity in this age of Twitter and limited-character status updates. It not only allows us to cram more words into our oh-so-important Twitter statuses, but it also helps us with a few other things. Some Benefits of URL Shorteners We can create ...more

How To : Hack Mac OS X Lion Passwords

This Null Byte is a doozey. On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely, to request to have the root user's password changed without knowing the password to the ...more

News : 10 Photography Apps for Android

Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more

How To : Create a 365-Day Photo Diary on Your Smartphone

A diary or personal blog is a great way to recapture the days behind you, but to a photographer, the best way to remember the glory days is with a picture—one single photograph that best describes the day and your mood at the time. Do it everyday for a year and you'll have 365 ...more

Altruistic Hacking : The Rise of the DIY Radiation Detector

Understandably, the tragedy in Japan has substantially risen the level of worldwide radiation-related hysteria. So much so, as an alternative to stampeding health food stores for iodine tablets, crafty individuals and organizations are hacking together personal radiation detec ...more

News : Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more

News : Secure your Wizard Booty!

Hello readers again! Sorry about the long wait (scary computer problems). Today I am going to talk to you about security problems on Wizard101. I have recently encountered many security flaws on Wizard101, including hacking, frauding and other crazy things. Wizard101 is the ta ...more

How To : Use Skype

Skype is definitely a revolutionary software for keeping in contact with your loved ones. It's a phone on the internet! What couldn't be good about that? If you are in Orlando, your spouse is at a conference in El Paso, your daughter’s at college in Raleigh, and your son is wo ...more

How To : Easily SSH into your iPhone/iPod Touch

iPodTouchedMaster shows how one can easily SSH into their iPod Touch with all firmware! To SSH is the ability to hack into your iPod Touch's file system. First, your iPod Touch must be jailbroken. Next, you'll have to open Cydia. Click "Featured Packages" or search for the ter ...more

How To : Sell a car online

Thinking of selling your car on the internet? Make sure you don’t get taken for a ride. You Will Need * A camera * A fair price * An appealing ad * A website on which to post it * Safety precautions Step 1. Take a picture Get your car washed and then take a good picture of ...more

How To : Have top-notch table manners

Impress dinner companions with your flawless manners—it’s as simple as observing a few key rules. You Will Need * A crash course in dining etiquette Step 1. Know the basics As soon as you take your seat at the table, place your napkin in your lap and obey the basic rules: ...more

Google Dorking : AmIDoinItRite?

What is Google Dorking? Well, simply put, "Google Dorking" is just an efficient way to utilise keywords in order to perform very specific searches on a given subject. In this case, one would look for websites/servers that are vulnerable to attacks or are configured improperly ...more

How To : Fix Your Notification Settings in Google+ Pages

Yesterday, I started receiving emails from Google+ that looked like this: I was really confused. I was confident that I had already gone through my personal Google+ account notification settings, and turned off all email notifications. I noticed that there was a link at the b ...more

How To : Things to Do on WonderHowTo (12/28 - 01/03)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A New Year's Eve cell phone phot ...more

How To : Securely & Anonymously Spend Money Online

Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more

How To : Things to Do on WonderHowTo (04/04 - 04/10)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

News : Should Kids Be Allowed to Use Facebook and Google+?

It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from ...more

How To : Reduce the Noise in Your Social Streams

Social network fatigue sets in when it starts to feel impossible to keep up with all that new content from your friends, followers, and acquaintances on a daily basis. You lose track of stuff you wanted to read more about, and you miss important news from your friends, but are ...more

Social Engineering, Part 1 : Scoring a Free Cell Phone

This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more

News : 10 Uses for the Front-Facing iPhone Camera

If you're a lucky owner of the iPhone 4, you know that the upgrade to its camera app includes a front-facing camera feature which acts like a video cam on your computer. Apple, of course, intends the front-facing feature to be mainly used for the FaceTime application which ena ...more

HowTo : Hack Any iPhone, iPod Touch or iPad

Hallelujah, a miracle tool has been released to the world. This Windows/Mac tool is called Spirit and it enables you to jailbreak any iPhone, iPod Touch or iPad quite easily. And Gizmodo is all over it, with an in-depth guide on exactly how to do it. Some of you may be hackin ...more

How To : Bypass Facebook captcha codes

In this tutorial, we learn how to bypass Captcha codes on Facebook. First, go to Facebook and log into your account. Next, go into your settings, then your accounts settings. In this section, click where it says "mobile". Next, it will take you to a section where you can activ ...more

How To : Hack Facebook with the Facebook Freezer

"Facebook is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they mee ...more

How To : Hack Facebook with Facebook Freezer

"Facebook is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they mee ...more

How To : Hack and Pwn your iPhone or iPod Touch

Ok first thing first, you need to download the HackPack. In there is necessary things I use in the video. If you are on XP you must install .net frame work. ( the dotnxfx file) vista users don't have too. Link include: http://www.mediafire.com/?mddzxxf12nl http://www.sendspa ...more

News : 4 Ways the OnePlus 6T Makes Rooting Easy

With the same starting price as its predecessor and a nice list of improvements, the OnePlus 6T is a great buy for a number of reasons. But for many Android users, the main selling point for the latest OnePlus flagship is how easy it will be to root and mod the device. We jus ...more

News : The Nokia 6 Is Finally Coming to the US (Maybe)

The Nokia 6 has been out since January, releasing in China before having a slow trickle of releases throughout the year. Despite announcing a global release, the United States never received a street date for the smartphone, and for all this time, Nokia has left us out to dry. ...more

How To : Hack Android Using Kali (Remotely)

Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this) Step 1: Fire-Up Kali: Open a terminal, and make a Troja ...more

Hack Like a Pro : The Ultimate Social Engineering Hack

Welcome back, my greenhorn hackers! Although we have focused primarily on technical hacks here, social engineering can sometimes be especially effective. This one requires a bit of technical skill, but not too much. In addition, it's limited by how specific a target you can c ...more

  • Hot
  • Latest