Learn how to set up an Epson printer wirelessly when you bring your new printer home you will want to start by installing the software that came with the new printer. You can set up your printer to work without wires and it will print from all over the house. There are 3 ways ...more
This how-to video is about how to make PS3 controller work on the computer that have either Windows XP, or Vista or 7 as their operating system. Installation of PS3 controller is very for playing emulators with it, or online games like "duty four" or any PC games using PS3 co ...more
It’s that time of year (in the U.S. anyway) when people are focused on getting organized -- or rather wishing they were organized. Being organized is great, it affords physical space, mental space and all but insures higher efficiency. But wishing and doing are two entirely di ...more
I think it's fair to say that every maker yearns for a 3D printer. You can replace circuit board connectors, fix your glasses, create ski grips, and make whole machines out of printed plastic parts—even a 3D printer. But without a 3D printer on hand, you can always resort to S ...more
Earlier this month, game developer David Braben and his Rasberry Pi nonprofit foundation revealed a $25 USB PC. The computer can connect to an HDMI monitor on one end, and a USB peripheral on the other (such as a keyboard or a USB hub). You can use the USB hub to connect multi ...more
It's Monday, which means once again, it's time to highlight some of the recent community submissions posted to the Math Craft corkboard. In this post, we'll also make a flexagon, which is a type of transformable object. Rachel Mansur of Giveaway Tuesdays posted several pictur ...more
When you're out and about in the dangerous world of Wi-Fi, it's hard for the average computer user to stay protected, or even know what being protected entails. Little do most people know, Windows 7 has a built-in security that few people take advantage of: a VPN (Virtual Priv ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Ok, so you've memorized the list of valid 2-letter words, but when challenged after playing one, can you smugly demonstrate your dominating intellect by spouting out the proper definition? If you're anything like me, chances are you'll find yourself babbling something defensi ...more
If you've gone through the process of refilling your ink cartridges and your printer still isn't printing, don't get your hair in a bunch, watch this video! This video will give you some tips on how to get that old print cartridge working again for your Brother MFC-240C. This ...more
Have on of the guys go into a coffee shop where lots of people are working on their sleek laptops and have him assemble an enormous, old, clunky computer and printer right there while everyone watches.
With smartphone cameras and software getting better and better every year, more and more users are getting passionate about photography. So when you're shopping for a gift to get someone, if they have a smartphone, chances are they'll more than appreciate some tools and access ...more
Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking e ...more
Have you ever seen a paper plane that comes back to its owner? In this video, you'll see how to make a paper plane that flies like a boomerang and keeps coming back. Paper size: 8.5'' x 11'' (printer paper works fine for this origami paper plane) Video: .
3D printing has been around for a while, but until recently it was used mostly for prototyping and research. Now, with technological advancements, it seems like everyone is using 3D printers, from crime scene investigators to garage hobbyists and hackers. Below are some of the ...more
It's no secret that devices leak data, but sometimes they do so in ways you may not expect. Your phone, laptop, printer, and IOT devices leak Wi-Fi information that can (and is) used to track you. Today, we'll make a Wi-Fi probe logger with Probemon.py to track nearby devices ...more
3D printing is getting closer and closer to becoming an everyday reality—which means revolutionary things are going to start happening for the home cook. Already there's a 3D printer that can produce edible tailored fruit and the Foodini, which can print full meals, including ...more
There's something special about Laika Inc.'s Paranorman... Hey! Did you love Coraline? Are you interested at all in stop-motion animation? Well, watch this feature on Laika Inc.’s new film, Paranorman. Holy freakin’ cow, amirite? Let alone the fact that we now live in a world ...more
Life is too chaotic to be organized all the time, but little steps in the right direction make things easier overall. File folders keep paperwork from spiraling out of control. Spice jars take the clutter out of cabinets. Storage totes keep basements neat and tidy. But to find ...more
Hello my anxious hackers, the week has started and here we begin a new series that I think will help many here and not only, for those that have the opportunity to follow our tutorials but they are not yet part of the community. Don't be a script-kid? what do you mean? In pro ...more
Want to build your own life-sized, working replica of WALL-E? Be prepared to take on a second job! Mike Senna spent two years perfecting his own version, working 25 hours a week and totaling somewhere around 3,800 hours for the whole project. He had no blueprints to go by, so ...more
You may be familiar with image-based or audio-based steganography, the art of hiding messages or code inside of pictures, but that's not the only way to conceal secret communications. With zero-width characters, we can use text-based steganography to stash hidden information i ...more
With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardri ...more
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python to ...more
There are thousands of fonts you can download online. Some are free, some you have to pay for, but they all have something in common—if you can get them, so can everyone else. If you want a truly unique font that no one else is using, you have to make your own, and what's more ...more
YouTube illusionist Brusspup has used everything from mirrors to fire to create his optical illusions, but his latest trick is a little more 2D. Using a printer, a transparency sheet and a piece of regular paper, he made several illusions that trick your brain into thinking th ...more
If you want your own lightsaber, you don't need to be a Jedi or have kyber crystals in your possession; now, thanks to augmented reality, all you need is an iPhone and a rolled up piece of paper. On Wednesday, app developer 2020CV released InstaSaber on the iOS App Store. The ...more
It sounds like a dream come true: just press a button on your phone, and 30 seconds later, a machine produces a custom-made, ready-to-eat meal. Finally, science comes through for the truly lazy! Impossible, you say? Not according to Israeli inventors from White Innovation who ...more
Sharing your Wi-Fi password is like giving an unlimited pass to snoop around your network, allowing direct access even to LAN-connected devices like printers, routers, and security cameras. Most networks allow users to scan and attempt to log in to these connected devices. And ...more
Welcome back, my greenhorn hackers! Earlier in this series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to use netcat and connect to port 80 and pull the webserver banner. The banner is simply the application advertisi ...more
One of the many reasons Circuit City should go out of business is their sale of ridiculously expensive cables, wire and cords. The secret to the industry of Monster Cables is that it is unnecessary and ineffective. Gold-plated or otherwise, Monster's $100 cables are not intrin ...more
RIP Touch ID. Apple's fingerprint sensor on iPhone and iPad models with Home buttons is about to become phased out on Wednesday, Sept. 12. While Touch ID will remain an integral part of models from the iPhone 5S to the iPhone 8 Plus, as well as the iPad Air 2 through the sixth ...more
Who likes to buy apps? The answer is no one, of course. Unfortunately, as in life, the best apps and games don't come free. That's why it makes sense to wait until those apps go on sale before handing over your hard-earned cash. And what better day to find discounts in the iOS ...more
Augmented reality can be used to fascinate and entertain, but it can be applied in the workplace. While companies on the entertainment end received their votes of confidence via funding, two companies working with enterprises demonstrated their worth by teaming up to pursue c ...more
Fighting fires has always been a dangerous and noble venture, even with the proliferation of aerial firefighting. But things are looking to get a lot safer for firefighters with the help of the Boeing and mixed reality. Boeing, now with 100 years of experience under its belt ...more
With non-fungible tokens (NFTs), particularly those that are 3D in nature, holographic displays are becoming more indispensable for those looking to show off their valuable works of art. Now, Japanese electronics maker Ricoh, a name typically associated with printers and copi ...more
Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machi ...more
With the announcement of ARKit 2.0 at WWDC 2018, Apple is bringing some powerful new capabilities to mobile augmented reality apps this fall. Shared experiences, persistent content, and 3D object recognition will enable more social, transcendent, and immersive experiences for ...more
Space might be the final frontier, but NASA is making a detour into augmented reality first. The Spacecraft AR app, developed by NASA's Jet Propulsion Laboratory (JPL) in collaboration with Google, debuted exclusively for Android this week (an iOS version is also in the works ...more
In the perpetual search for a renewable and convenient energy source, our bacterial friends have once again stolen the limelight. Since bacteria multiply so fast, they are the ultimate renewable resource. And since they are living organisms, their metabolism produces by-produ ...more
3D printers have been surging in popularity for both professional and personal applications, and now OLO is on the verge of making 3D printing practical wherever you go. Their eponymous 3D printer is battery-powered and uses the light from your smartphone's screen to create 3D ...more
Welcome back, my greenhorn hackers! My preference for Linux as a hacking platform is well documented, and I have even created a series of tutorials to train new hackers. Without being proficient in Linux, you can't really call yourself a hacker. Every once in while, though, ...more
Back in 2007, YouTube user HouseholdHacker posted a parody video on how to make a high-def speaker for under a buck. MythBusters took on the challenge and busted it. Although that particular method doesn't seem to work, that doesn't mean you can't make your own speaker for le ...more
Hi, gang! Time for another hack using Metasploit. We have exploited Windows XP (a very insecure operating system) and we have exploited Ubuntu and installed Meterpreter on a Linux system exploiting the Samba service. Several of you have asked for a hack on more modern Windows ...more
We've all tried writing with lemon juice (a.k.a. invisible ink). It's a mess. And the main draw back is definitely efficiency. Spy work requires extensive (and sometimes wordy) communication. Enter: the printer mod. We were super impressed when our friend Loup sent us this v ...more
3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something b ...more
Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerabl ...more
Giving up your Wi-Fi password can be giving up more control than you think. Because of the way Chromecast and other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we ...more
Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, ...more
Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen and keyboard. With the help of an old-school connecting standard, though, you can log into your Pi from any computer using a si ...more
Walsh, a new community under construction on 7,200 acres of former ranch land near Fort Worth, Texas, will one day contain 15,000 homes. To sell prospective home buyers on the development before it is fully built, Republic Property Group is leaning on technology. A high-spee ...more
So, you want to perform an exploit on a victim, but you're not on the same network as their machine. In this tutorial, I'll be showing you how to set up a meterpreter reverse_tcp attack to work over the internet. Understanding the Process Here is the connection we wish to es ...more
Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wou ...more
Chrome apps and extensions are powerful tools for students: they can help optimize your web browsing experience by helping you take notes, check your grammar as you compose documents and emails, and even help you squeeze a little more juice out of your laptop's battery by free ...more
One of Android's biggest strengths, when compared to other mobile operating systems is its open file structure. Google introduced a built-in file manager with Marshmallow that provides basic file management, but like with most apps on Android, there are alternatives. Third-par ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames can also be used to track or take over the data connection of nearby devices. We'll explain how to see nearby devices emitting ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
Modern life is almost completely digital ... almost. While you can get by in many cases with just your iPhone, sometimes a situation requires a hard copy. In the past, there was really no convenient way for you to get a Reminders list from your iPhone onto paper, but iOS 14.5 ...more