Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary fl ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
Most of the time, when I’m bored during math class, I play with my calculator to satisfy my boredom. Recently, I've discovered that when multiplying any number by 11, 111, or any number similar to it, that it has a pattern (though I guess everything in math has a pattern). I d ...more
Hello my anxious hackers, the week has started and here we begin a new series that I think will help many here and not only, for those that have the opportunity to follow our tutorials but they are not yet part of the community. Don't be a script-kid? what do you mean? In pro ...more
If you're like me, you take more than just a few screenshots throughout the day, and they add up fast on your iPhone. When you snap that many images of the screen, your Photos app's "Screenshots" folder can swell beyond triple digits if you don't manage it, and your "Recents" ...more
Keeping your OnePlus One running smoothly can be taxing, especially if you spend most of your day looking for ways to tweak performance settings like me. Sometimes I get lucky and end up with a faster phone, but because I experiment so much, I often end up restoring it back to ...more
While there are a variety of privacy-focused search engines available like StartPage and DuckDuckGo, nothing can offer the complete trust offered by creating one's own search engine. For complete trust and security, Searx can be used as free metasearch engine which can be host ...more
Pasting on your iPhone has never been easier. You're familiar with the old way of doing things — long-press in the text field to bring up the "Paste" option, then tap that option to paste your text. It's not necessarily hard, but trust me when I say there's a better way. Wit ...more
In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the ...more
In this series on weaponized lasers, I'll be exploring the function, operation, strength and building instructions for three basic laser weapons; CO2, Diode, and Flashlamp. These laser types are just a few of many, selected because of their simplicity and basic construction (d ...more
This video demonstrates how to make a loud and annoying paper popper. Prepare a regular sheet of paper and lay it down on the table or a flat surface. Fold the lower portion of the paper at about an inch and a half (1.5") or two inches (2"). Fold it the second time at about th ...more
Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detec ...more
LG, like many other OEMs, usually locks down their bootloaders with an airtight seal. There are a few good reasons for this, the big one being that an unlocked bootloader technically compromises some device security measures. LG would also argue that unlocking your bootloader ...more
I was a vegetarian from age 6 until age 23. When I started eating meat again for the first time in 17 years, most people I knew (including me) expected me to be pretty conservative about it: chicken breasts, hot dogs, and all the other "basic" meats that everyone loves. Don't ...more
When it comes to streaming services, Google Play Music is one of the best options for both Android and iOS. Perhaps its single greatest feature is the fact that you can upload as many as 50,000 of your own songs to Google's servers, then stream your library to any device witho ...more
Samsung may not be the best when it comes to redesigning their devices (hopefully that will change with Galaxy Note 4), but they do have a knack for including some pretty awesome features into their TouchWiz software. In its latest version, the one that shipped with the Galax ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
In this tutorial, we learn how to make paper rose with construction paper. First, take a piece of pink paper and cut a thin strip out of it. Next, take that strip and fold it in half twice. Now, cut the paper in half so you have several strips of paper. Now, fold in the strips ...more
Cloud storage looks pretty good compared to the heavy restrictions that hard drives and other types of external memory carry. The cloud is not only limitless in what it can hold, but it can also easily be accessed from any device that has Internet—your smartphone, work compute ...more
The card trick in this tutorial is great for beginners and seasoned magicians alike. In the video you will learn how to present a deck of cards to two spectators and amaze them with slight of hand. Most magicians can trick an audience member into choosing the right card from ...more
Using a green screen is an affordable and easy way to transport your video to anywhere imaginable, even to places that don't exist. You can use it to sit behind a desk in a busy newsroom or dance on the moon, but first, you have to know how to properly perform chroma key compo ...more
In this how-to video, you will learn how to play "Twinkle Twinkle, Little Star" on a recorder. The first note you have to play is a D. The D note is made of a G. This means three fingers on the top, and three fingers on the bottom. The left hand will be on the top. Play an A n ...more
There are so many different ways to cast on knitting. I have my own favorite. It's the way I learned when I first started knitting. My way is called TWO NEEDLE CAST ON. I like this 2 needle method because you don't have to guess how much you need to measure out a length of yar ...more
WonderHowTo is pleased to introduce Yumi Sakugawa, who first graced our front page last week when featured in the David Lynch meditation post. Yumi is an artist and illustrator currently working on a 100-page graphic short story collection, and she's officially joined the Wond ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
Thanks to all who participated in last week's Giveaway Tuesday Smartphone Photography Challenge. It was difficult selecting the winners, as there were many amazing photos to choose from! Winner #1: Grasshoppers A moment in mating season: "Grasshoppers", shot with the iPhone/ ...more
So, here we are with the second part to whats going to happen to Minecraft in 1.7 (you can see the first part here). Let's start off with the new biomes. Biomes Roofed Forest: This biome is filled with short trees that are close together, forming a canopy. The trees have 2x2 ...more
The Google Now Launcher that was introduced with the Nexus 5 seems to have a lot of folks torn. On the one hand, having a home screen page dedicated to Google Now, as well as the always-listening voice search, are killer features. On the other hand, its lack of customization o ...more
As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid fo ...more
Throwing a party means making sure everyone has fun, but that pursuit can quickly get out-of-hand. Before you know it, you're once laid back get-together has received so many RSVPs that it becomes obvious you're throwing the party of the century. With an over-abundance of beer ...more
One of the longest-running cat and mouse games in Android has to be that of Google's SafetyNet feature and specific apps that can trip the flag. Many developers have resorted to using Magisk to create their modules since it can systemlessly pass SafetyNet in most cases. Howeve ...more
Here we assemble the RED ONE camera into a 22 lbs ultra light hand-held version, perfect for documentary filmmakers and ENG crews. Thanks to Indie Rentals - http://indierentals.com/
In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exp ...more
Progressive Web Apps hope to one day bridge the gap between websites and apps by giving the former more access to your phone's features, but they're not very common yet. In the meantime, you can take matters into your own hands with an app that uses your system WebView to rend ...more
While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we ha ...more
With the release of iOS 11, Apple promised to give us person-to-person transactions by way of iMessages. In the iOS 11.2 update, the new Apple Pay Cash system is now ready for you to send money to family and friends right from your iPhone — and there are multiple ways to get i ...more
If you ever want to root your OnePlus 6, install TWRP, get Magisk and Xposed, or flash a custom ROM, the first thing you'll need to do is unlock your bootloader. Your bootloader is a piece of firmware that loads up the operating system on your phone. Normally, it's programmed ...more
This is a pretty simple how-to, because a doorbell is a pretty simple mechanism! The difficult part is in understanding music note blocks. First of all, here's what a finished, two-tone doorbell looks like: That's seriously all there is to it. There's a button outside your ho ...more
Changing the rear disc brakes on your 2001 Chrysler Town & Country (henceforth referred to as T&C) can be quite a challenge, but if you can spare a few hours (remember that you need to budget time to get the brake parts from the parts house) and are willing to get a little dir ...more
One of iOS 13's coolest features is the ability to download, install, and choose fonts in select apps like Pages and Mail. However, you might notice an issue when writing an email with a custom typeface: there's no option to return to the default font. What gives? First of al ...more
Among the younger generation, Roblox rivals major titles like Minecraft as one of the most popular online games out there. In fact, it's common to hear children tell new playmates to "friend me in Roblox!" so they can play together online. There's nothing inherently sinister h ...more
See the key to the sixth puzzle "Brothers" in Assassin's Creed 2. This is where things start to get tricky; while the first batch of ring puzzles were simple, these link some of their rings together, so that you can’t move one without moving another. For more info, watch the w ...more
Back in the '80s, I was just a kid with a LEGO hobby. I remember building castles and floating boats, spaceships and monster trucks, even a working LEGO train powered by battery, lights and all. But I wasn't aware of the advancements underway in the educational department—lik ...more
While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and ...more
How to avoid that awkward, annoying, traditional scenario due to a one night stand. Play your cards right, and s/he could be out the door in no time, 100% painless. Watch this how to video and learn how easy it is to get rid of an unwanted one night stand.
Winter weather always looks so pretty on postcards. A blanket of fluffy white snow, icicles hanging from the trees, little woodland creatures scampering about...it's like a picture straight out of a storybook. But in the real world, after a day or two it usually looks more lik ...more
Facebook and HTC's First was a complete disaster. Soon after its release, carriers were literally giving them away with a two-year contract—or just trying to send them back. It was supposed to be the flagship device for Facebook Home, an Android launcher for Facebook fiends. ...more
Kali Linux is probably the most well-known hacking distribution among penetration testers. However, there are alternative distros which offer versatility and advanced package management systems that are absolutely worth considering. One such distribution is Pentoo, a Gentoo-b ...more
Group chats can get annoying real quick if the people in them are sending rapid-fire texts without hesitation, especially if none of them are any interest to you specifically. Luckily, it's easy to mute notifications for specific message threads. You can even leave a group cha ...more
Google's Android Device Manager makes it extremely easy to track down your phone or tablet, but while it's simple to set up and use, it does require your device to have an active data connection, which can be an issue in some areas. SMSLocator, by T3KBAU5, works a little diff ...more
Part I Start by casting on the required number of stitches, onto one of the double-point needles. Divide these stitches between three needles by slipping 1/3 of the stitches (beginning with the first stitch you cast on) onto each of the other two needles. Making sure the stitc ...more
When installing flashable ZIPs and custom ROMs, we always hear the same old adage: "Make a full NANDroid backup first." Trouble with this is that you don't always need an entire system backup, since many mods only apply to specific folders on your device. And while custom reco ...more
If you don't want to wait for Android 4.3 Jelly Bean to hit your HTC One, you don't have to. Android developer LlabTooFeR released his MaximusHD ROM, which includes a leaked copy of HTC's own 4.3 update, complete with Sense 5. Warning This will only work on GSM models of the ...more
So you're typing a fairly long sentence to a friend in WhatsApp and you realize five words down you forgot to capitalize their name, what do you do? The lazy way is to delete your way back to the last word. The slightly better approach is to delete the one letter and retype it ...more
In my tutorials, I often talk about the things you can do to improve your builds in Minecraft. However, this time I'm covering 5 things you should never do in your builds. These tips will improve your projects because they help you avoid making mistakes that can leave your con ...more
If you have a custom recovery installed on your Android device, the first thing you should have done as soon as you finished installing it was to create a Nandroid backup. But if you didn't, I'm not here to judge—I'm here to show you a much easier way. What Exactly Is a Nandr ...more
It's no secret that you can protect notes on your iPhone with a password, but one thing that most people don't know is that you can actually set unique passwords for each note instead of a blanket password for all of them. It's not obvious at all in the Notes app, but it's eas ...more
Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your sys ...more
If you want to auto-tune your voice to make it sound better you first need to decide if you actually need an Auto-tune. You may just be looking for a talk box or vocoder. An auto-tune makes your voice auto-tuned and sets it to sound much better. A vocoder only makes your voice ...more
It's 1976. The hottest arcade game on the market is Blockade (or Blokade), an 8-bit maze game for 2 players. You and your opponent must move your characters around the screen in 90-degree angles, leaving a solid line behind them. Whoever runs into one of the solid lines first, ...more