By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
"Facebook is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they mee ...more
You have an iPhone now… but how do you add your email, so you can stay connected to everyone wherever you go? Setting up your email accounts always seem trick, but not on this device. Want to know how? Best Buy has answers. The Best Buy Mobile team explains how simple it is to ...more
This video explains how to send the Text message to any where specifically to mobile using Yahoo mail. To do that first type the "www.yahoo.com" or "www.yahoomail.com" in the browser. And then choose the Mail option from the front page of the yahoo website. From that click the ...more
As hard as you try to protect your valuable information with strong passwords and anti-doxing measures, there's nothing you can really do when someone else gives up your goods. And that is the case with the recent Global Payments breach. Global Payments is just one of the mid ...more
Having a secure password is essential in today's interconnected world. Hackers are just around the corner, and if you have an easy to guess or hack password that you use for all of your accounts, someone can login to all of your websites very easily. Look at this guide on how ...more
This past Sunday, a group called Gnosis launched a massive hacker attack on Gawker media, one of the web's most popular blog networks (Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot). 1.3 million registered users' passwords were compromised, and 188 ...more
Unlock your mobile phone's hidden potential by running a Hero ROM on it! Loading custom ROMs lets you do fun things with your Hero like overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to learn how to put a custom RO ...more
Root your Donut smartphone the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Donut cell phone, take a l ...more
Root your MyTouch Slide the easy way with Exploid rooting tool! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC ...more
Root your Droid Eris the easy way with unrEVOked rooting tool! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC ...more
Root your Droid 2 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Droid 2 cell phone, take a look. L ...more
Root your HTC Incredible the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC Incredible cell phone, t ...more
Root your Cliq XT or Quench the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Moto Cliq XT or Quench ce ...more
Root your XT701 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own XT701 cell phone, take a look. Learn ...more
Root your Vibrant or Captivate the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Samsung Vibrant or Cap ...more
Root your Aria the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC Aria cell phone, take a look. Lea ...more
Root your MyTouch 3G the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own MyTouch 3G cell phone, take a lo ...more
Root your G1 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own G1 cell phone, take a look. Learn how t ...more
Root your Liquid the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Droid cell phone, take a look. Lear ...more
Looking for the easiest way to root your HTC Magic or T-Mobile MyTouch 3G Google Android smartphone? You've found it. Rooting techniques don't come any easier than the one-click method demonstrated in this video guide. For all of the details, and to learn how to hack your own ...more
Android smartphones have all sorts of connectivity chips built in, including Bluetooth, Wi-Fi, GPS, NFC, and mobile data. But what about AM or FM radio, two of the most common methods of wireless communication? The truth is, it really depends on your device. Some phones come ...more
Gaia Hollywood is a virtual Hollywood created for the game Gaia Online. Hacking it is a snap using the steps provided. Be sure to get WPE Pro before you proceed. Have fun as you hack Gaia Hollywood accounts!
Learn how to install Aircrack on your iPhone to hack into almost any WiFi network. First download Aircrack from iHackMyi, then follow these steps: -Set every files' permission to: 777 -Open Terminal in WinSCP from /var/ -Enter the following command: sysctl -w security.mac.pr ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
Keep your Runescape account safe from hackers by following the instructions in this video. Don't get hacked by giving your password away or using unsafe websites. Watch this video and learn how to take precautions against hackers so you can enjoy Runescape worry free.
Want more gold in the game Mousehunt? Of course you do! And this technique shows you how to get it without having to resort to a hacking program like Cheat Engine or Charles - intead, you can create a different account and then use that to send gold to your main account!
A mobile phone is capable of all kinds of hacks. You can use your cell for more than just photos, texts, and phone calls. Here are some great ways for messing about with your mobile handset, whether it be using a phone to unlock a car, or entering the mobile phone throwing cha ...more
Instagram is one of the hottest mobile apps to date, yet they have no way to upload photos straight from your computer. You can log into the Instagram web app to like and comment on photos in your feed, but that's about it. Fortunately, there are third-party apps that let you ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
As I was listening to Apple's WWDC conference today, what ran through my mind the most is if there were ever a time to switch to the world of Apple computing now is it. Today's WWDC keynote presentation was chock-full of new and updated iOS mobile software—too much to cover in ...more
Despite the discontinuation of Microsoft's KIN mobile phones, some still have a KIN ONE or KIN TWO cell phone. Actually, it can probably be found on the market somewhere for a relatively cheap price. Almost too cheap. If you're one of the lucky owners of Microsoft's KIN ONE o ...more
This is a very useful instructional video on how to use Skype to call anywhere in the world. You can go to Skype .com and click account and open a new account with Skype. Now log on Skype using your user name and pass word. now you can click the free calls button and you can c ...more
This video shows you how to get every single Fallout 3 achievement, almost instantly, with no mods, or hacks. The steps performed are the following: Install Fallout 3 Sign into your account Press the ~ button to open the console (It's left of your 1 key and above the TAB butt ...more
"Facebook is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they mee ...more
SAS: Zombie Assault 2 is flash game from Ninja Kiwi. Learn how to hack Zombie Assault 2 with tricks and cheats. Watch this video tutorial to learn how to hack Zombie Assault 2 with Cheat Engine (09/13/09). -Health Hack -Ammo Hack -Infinite Grenade Hack Description of the app ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
Unless you avoid the news entirely, you've almost certainly heard about the hacking sprees that have been taking place over the past several weeks. Tens of thousands of usernames, passwords and email addresses have been released online for anyone to download. Thankfully, it se ...more
In this article, I'll show you how to prank your friends on April Fool's Day with the very popular Google Voice, a computer to land/mobile calling feature. Basically, Google allows you to play whatever you like through the microphone port on your computer, and play it right th ...more
As many of you may have noticed, nearly every Google product (i.e. Gmail, Google search, etc.) has gone through a bit of a makeover since the release of Google+. Big blocky buttons and enormous font sizes are apparently the thing of the future, and with a cool JavaScript hack, ...more
Remember last month when we introduced you to Trover? Well, now this great little discovery app for iPhone has completed its beta mode and has officially launched in wide release. Trover can be classified in the travel section, but it's not your standard tourist app. Instead, ...more
You're in a new city and you want to explore—what mobile app is best? If you want to know what club is hopping that night, use SceneTap. If you want to know if any friends are at a nearby get-together, use Foursquare. If you want to know what restaurant is best, try Yelp. But ...more
Can you really make an explosive from salt, sugar and weed killer? Does glycerol and water actually recover text from burnt paper? Is it possible to develop film with a first aid kit and some orange juice? MacGyver says yes. Want to know more of MacGyver's ingenious household ...more
It seems the French have carefully observed the hacking achievements of one super clever Carnegie Mellon grad, turning his hack into a modern iPad application-to-be. A couple years back, we told you about the fantastic Johnnie Chung Lee who used headtracking to create a three ...more
Google AdSense is a beautiful thing. They pay you for posting content online, whether it be through a third-party website like WonderHowTo or on your own website. WonderHowTo seems to be a good place to start from if you plan to make money with AdSense, but it's not the only p ...more
For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide t ...more
Android-enabled mobile devices are taking the world by storm, giving Apple's iPhone a run for their money. And if you're holding an Android cell phone in your hand, getting accustomed to all the flashy features can be daunting, especially if you're new to multimedia smartphone ...more
There's a ton of great applications you can buy and download for your iPhone, even your iPod Touch, and they're all at the tip of your finger (literally), right there in the Apple App Store. So how do you actually get one of those apps on your iPhone? Best Buy has answers. The ...more
If you have any Google applications, like Gmail or Google Calendar, that you want to sync to your new Android enabled mobile phone, it's a simple task to complete. There's nothing hard about it, but if you think you need help, Best Buy has answers. The Best Buy Mobile team exp ...more
Jordan Patterson the Cheap Geek has made a video showing you the steps to sync your contacts and calendars on three mobile devices together, the iPhone, a laptop running Windows, and a Mac running OS X utilizing a few downloaded programs and Google Calendar. First he shows you ...more
Systm presents this detailed tutorial on how to make a custom Star Wars style light saber. Luke, Darth and Obi-Wan's Lightsabers were pieced out of junk piles. David shows you how to build exact replicas and an original design from The Custom Saber Shop. Then he picks a fight ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Video: . Recycle your hard drive into a hidden flash memory device that only you know how to turn on and use in secret. This DIY hack project allows you to recycle your broken hard drives back to life and turn them into something useful. So far, this project has several funct ...more
Google is great. They provide us with tons of free services and open source APIs that we can code fun tools for, one of which I don't think gets enough credit: Google Voice. Haven't you ever wanted to be able to protect your privacy when handing out your phone number? Or mayb ...more
Watch out Instagram, there's a new free, sociable photography filter app that hit the iTunes App Store recently, and it just might be some good competition. It's called PicYou and might sound familiar to some of you photo sharing fiends out there. That's because it's been a su ...more
Null Byte is looking for forum moderators! Last Friday's mission was to accomplish solving HackThisSite, basic mission 9. This mission delves a little further into Unix commands and remote directory traversal (which is just a fancy term for going through folders blindly). Th ...more
Null Byte is looking for moderators! In today's Null Byte, we're hacking Netflix. As most of you know, Netflix is a subscription service that streams movies and TV shows to your devices over the internet. A common stance amongst my Xbox Live friends is that Netflix isn't wort ...more
With the rather large success of the Community Byte activities, both programming and HackThisSite, I have decided to continue to do both activities every session! With that said, when programming sessions occur, they will be lead by Sol Gates in Gobby. Also, the programming mi ...more
This is the Windows OS counterpart to my tutorial on how to burn the new XDG3 formatted games on Xbox 360. Microsoft invented a new disc format system to trump piracy, it's called XDG3. XDG3's standard is to burn a whole extra gigabyte of data to the disc, to allow more conten ...more
Welcome to another Community Byte announcement! For the past few Community Bytes, we coded an IRC bot, and hacked it. Then, we created a web-based login bruteforcer! This week we are going to start something a bit different. We are going to start going through the missions at ...more