Hack Registration Key

How To : Hack Metasploitable 2 Part 1

This tutorial is for people who want to try different types of hacks in an environment that is the same for everyone so it will help people to ask questions and learn. This series assumes you know how to run a VM and network them together. This series also assumes that the ser ...more

How To : Keeping Your Hacking Identity Secret

So, how does someone keep their hacking life completely secret? What This Is: I'd like to know how hackers keep their hacking life secret. So with a bit of experience and knowledge obtained from elsewhere I want to share what I know, and also ask a few questions to become ev ...more

Hack Like a Pro : How to Evade AV Software with Shellter

Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more

Hack Like a Pro : How to Hack Facebook (Same-Origin Policy)

Welcome back, my budding hackers! This is the initial post of a new series on how to hack Facebook. It's important to note here that each hack I'll be covering is very specific. I have said it before, but I feel I need to repeat it again: there is NO SILVER BULLET that works ...more

How To : Things to Do on WonderHowTo (01/11 - 01/17)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more

How To : Shorten URLs from the Command Line with Python

Shortening URLs has become a necessity in this age of Twitter and limited-character status updates. It not only allows us to cram more words into our oh-so-important Twitter statuses, but it also helps us with a few other things. Some Benefits of URL Shorteners We can create ...more

How To : Get iOS 9 Beta on Your iPhone or iPad Right Now

Apple just showed off iOS 9 and its new features at WWDC 2015, including multitasking support for iPads (finally!), a new Low Power Mode to save battery, local area search and transit directions in Maps, a highly improved "Proactive" Siri, a better Spotlight search, new apps, ...more

How To : Easily Generate Hundreds of Phishing Domains

A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : Find North in Minecraft Without Using a Compass

It's easy to lose oneself when playing Minecraft and easier still to get plum lost. That's why it's always good to have a compass on hand. No compass? No problem. There are, in fact, no fewer than seven methods at your disposal for finding true north in a Minecraft world. Bett ...more

How To : Create a tween with Motion Tween in Flash CS4

Creating a motion tween in Flash CS4, which is moving one image from one position to another position. 1. Open a blank document in Flash CS4. 2. Drag and drop an image onto the stage. 3. Then convert the image into a movie symbol. Make the registration point to the center. 4. ...more

How To : Deal with having your website hacked

Google is one of the most powerful forces on the Internet, and their technology can be the key to helping you find success in whatever your online endeavor might be, from web design to filmmaking. This video is a part of their Google Webmaster Series, offering help to webmaste ...more

How To : Hang Curtains Without Making Holes in the Wall

For anyone who lives in a space that may frown upon making holes in the walls, or for anyone who may not want to take on such a task, there's a simple alternative to hanging curtains or drapes. And the answer is brilliantly simple. Look no further than 3M Command hooks. Yes, ...more

How To : Make an iPhone stand, fart gadget & mini BB gun

It's amazing what you can create with a few, everyday household and office supplies. Most of these items are already sitting in your junk drawers, so there's no need to spend money! Kipkay shows you 4 awesome hacks you can make in this "household hack pack" video. 1. iPod/iPh ...more

How To : Build a 3D scanner from a $25 laser level

Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episode ...more

How To : Use Your Kindle 3 eBook Reader Device from Amazon

According to Amazon.com, Kindle was their best-selling item this year, which means many, if not all of you are playing with a brand new Kindle on Christmas Day. Of all of Amazon's Kindle models, the Kindle 3 (6") will be the most common eReader in everyone's hands, either the ...more

News : Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more

How To : Make lock picks for hacking locks

Do you ever lose your house keys? Well here is one extreme way of dealing with the problem, create your own lock pick! To create your own lock pick, you will need your own dremel, an electric grinder, and some hack saws. Follow along with this instructional how-to video to lea ...more

How To : Hack Crazy Cabbie for easy points (12/04/09)

Cheaters may never win but, boy, do they ever get high scores. With this hacker's how-to, you'll learn how to use Cheat Engine 5.5 to earn an absurd amount of points, guarunteeing yourself a spot on the high scores list. Learn how to hack Crazy Cabbie on Facebook! This video ...more

How To : Hack Crazy Cabbie with Cheat Engine 5.5 (01/06/10)

Have a need for speed? And high scores? Look no further than this cheater's guide, which demonstrates a method for hacking Crazy Cabbie for high speeds and maximum points. Learn how to hack Crazy Cabbie on Facebook! This video tutorial shows you how to hack Crazy Cabbie (01/0 ...more

How To : Cheat Plock on Facebook (09/15/09)

If you're looking to get on top of the game Plock for Facebook, then sometimes cheating is the best answer (and easiest). With Cheat Engine, you can easily hack Plock. This video shows how to cheat Plock on Facebook (09/15/09). Download Cheat Engine 5.5 to do this Plock cheat ...more

How To : Make a sweater dress with Gianny L

With the winter coming, a sweater is your key to warmth. But you don't have to sacrifice your sexiness with a big, bulky sweater. Transform it into a slim and sexy dress. See how to make a sweater dress in this video from GiannyL. This DIY closet hack is simple and easy, and ...more

How To : Get all the Fallout 3 achievement in seconds

This video shows you how to get every single Fallout 3 achievement, almost instantly, with no mods, or hacks. The steps performed are the following: Install Fallout 3 Sign into your account Press the ~ button to open the console (It's left of your 1 key and above the TAB butt ...more

News : Door Locked? Send a Text Message & Open Sesame

When choosing a security system for the office, Billy Chasen decided to ditch the traditional lock & key barricade for something a little more 21st century. He hacked together a device that uses a web server, servo motor and some parts from Home Depot to enable locking & unloc ...more

  • Hot
  • Latest