Firesheep is a packet sniffing browser exploit that can access the exposed accounts of people on Facebook and Twitter while they use public Wi-Fi connections. This video shows what steps can be taken to protect yourself against someone accessing your Facebook account. Links: ...more
iChat is gaining steam as a mainstream online chat program. Fortunately for you, you little prankster, it is exceptionally easy to change someone else's iChat away message to whatever hilarious thing you want from your computer! This video will show you exactly how to do it, w ...more
Prank your friends by hacking some ordinary bubble gum to ooze fake blood when someone chews it. It can take 3-4 days for the "blood" to disappear. Use this as inspiration for one of your April Fools Day pranks! Make bloody prank bubblegum. Click through to watch this video on ...more
No website will be inaccessible and no web filter will deny you content once you learn the skills presented in this internet hacking video. In this tutorial you'll learn how to access blocked websites as well as to bypass web filters using URL scripting, HTTP proxies, and a w ...more
The League of Legends champion Kayle, or Judicator, received a rework a while back and now plays slightly differently because of that. Take a look at this champion spotlight guide by Riot Games on how to build Kayle as a hybrid support champion using the right runes and master ...more
In this tutorial, we learn how to use salty hashes to keep passwords secure. A hash is stored in a database that is hashed with an algorithm, so not everyone can see exactly what your password is. When you type your password into a website, it doesn't actually register as word ...more
This video shows you how to install OSX on a Windows Netbook. They create a "Mini Mac" and show you what the steps are. This is a good thing to do for someone who is used to a Mac but wants the portability of a Netbook, which weighs only 2 pounds. They start with a Dell Netboo ...more
Household Hacker brings you fun hack how to projects in a variety of areas: electronic hacks, computer hacks, pranks, etc. Search Household Hacker on WonderHowTo for more videos by this creator. In this video, learn how to make YouTube paper. Template: http://www.householdhac ...more
The video shows us how to use a proxy server with Firefox to hide your IP address. you can actually use this to avoid the hacking and various things that are blocking you from websites. Firefox is one of the easiest way to do this and for doing this you need to Google search t ...more
St. Valentine's Day is coming up soon in February, but do you have a special outfit planned for that special someone? Well, even if you don't have a valentine, this tattered heart black shirt will show the world you care. See how to make a tattered heart Valentine's Day T-shir ...more
They are after you from all over the globe. Looking for ways to exploit you. Ways to hurt you. Not political terrorists, but rather "info terrorists." Each month thousands of websites get hacked into and have hidden links inserted into the pages by people wanting their spam si ...more
XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection betwe ...more
Many have tried to prove (or disprove) that tennis ball lock picking really works, but it still seems up for debate. Mythbusters have supposedly debunked this technique (watch the video). Someone over at the Auto Blog also has tested this car lock method with failed results (w ...more
Been hacked once? Twice? Maybe more? You thought abc123 was the only password that is both 6 characters wide and easy to remember? I have some suggestions in store for you. Just read on... An Introduction There are passwords that look tremendously sexy (as opposed to gibberi ...more
Manicures are beautiful and can add class and style to any person. Here are some step-by-step instructions for giving yourself a DIY manicure. Gather Materials bowl soapy water olive oil cuticle pusher nail clippers nail file with pointed end nail buffer (or nail file) cotto ...more
Spammers are the bane of every email user. No matter what you do, junk mail always breaks through the spam filters. And some of the best ones seem to come from legit companies, and that's because they aren't legit companies— they're spammers masquerading as legit companies. W ...more
When's the next full moon? Every time I've looked at the moon, I've wondered if it was full. Sometimes it looked like it was, but it's really hard to tell for sure unless you know the exact date of the full moon. Seriously, there's at a couple days before and after the full m ...more
Have you ever seen Whose Line Is It Anyway? Many people enjoy watching this show, where they can see people do comedy off the top of their heads. There's no prior thought involved and it can be a lot of fun to participate in. What is improv? Improv, which stands for improvi ...more
It's mid-January and some of you happy tax-paying citizens have already started receiving your W-4s and 1099s in the mail. But before you start filling out your 2010 Federal Tax Return, make sure you're hip to all the tax tricks in 2011. You could end up saving some money! Be ...more
General Electric isn't known for their Christmas lights, but maybe they should be, because their GE Color Effects are pretty awesome. Especially the LED Color Effects G-35 String sets. And especially when someone named Darco hacks them. Darco, whose real name is Robert Sun Qu ...more
The Motorola XOOM was just released last week to Android-hungry fans waiting the next best thing to Apple's iPad. But should it have been released, considering Verizon's switching to the 4G LTE network soon? From what I saw across Android forums, yes—because most could not wa ...more
What's the easiest way to keep track of your website passwords? Maybe in a password-protected document on your computer? Makes sense. But surprisingly, this is no easy task in Mac OS X. Snow Leopard does not have an easy one-click option for password protecting files and fold ...more
Deadly natural disasters can happen at any moment— earthquakes, hurricanes, tsunamis, floods, fires and especially tornadoes. That's why you have to be prepared. According to Secrets of Survival: The greatest and most frequent tornado occurrences happen in the United States. ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
Last Friday's mission was to accomplish solving HackThisSite, realistic 4. The fourth in a series of realistic simulation missions was designed to be exactly like a situation you may encounter in the real world. This time, we are told "Fischer's Animal Products is a company th ...more
Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" be ...more
Whatever your reasons for doing it, if you are trying to hack passwords, it helps to have the right software for getting the job done. With the Cain and Abel program, you will be well on your way to hacking even the toughest personal passwords. Visit us at bleedingedgesecurit ...more
Last Friday's mission was to accomplish solving HackThisSite, realistic 3. The third mission in a series of realistic simulation missions was designed to be exactly like situations you may encounter in the real world, requesting we help a friend restore a defaced website about ...more
Google AdSense is a beautiful thing. They pay you for posting content online, whether it be through a third-party website like WonderHowTo or on your own website. WonderHowTo seems to be a good place to start from if you plan to make money with AdSense, but it's not the only p ...more
This video will show you how-to hack Bluetooth on your iPhone with an app called BlueSn0W. You'll need a jailbroken Apple device to begin with, so make sure that step is done first. After that you'll be able to hop on someone else's signal.
This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionar ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
Advancements in technology usually lead to the miniaturization of old technologies, and video games are no exception. Since at least 1990, game hardware manufacturers and enterprising DIY electronics enthusiasts have poured their efforts into making full-size video game consol ...more
Anonymous hacktivists announced via Twitter that they had successfully hacked the website of New York Iron Works, a police-equipment supplier, and replaced the homepage with a tribute of love to arrested hacker and Chicagoan Jeremy Hammond. Image by PictureDJ
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
Keep your Runescape account safe from hackers by following the instructions in this video. Don't get hacked by giving your password away or using unsafe websites. Watch this video and learn how to take precautions against hackers so you can enjoy Runescape worry free.
Sick and tired of fighting over the remote? Build an easy Remote Jammer that puts YOU in control. Kipkay does some circuit hacking to power a jammer that can hijack the TV. Use this as inspiration for one of your April Fools Day pranks!
This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that ...more
This video shows how to make a camera setup for filming what you're doing on a table. It's a great video even if you don't intend to make one, but if you're trying to teach someone how to do something, this is an awesome setup. Either way, it's entertaining to watch. The creat ...more
In this tutorial, we learn how to drive traffic to your website using Twitter. To get started, you will sign up for an account and then go to your profile. Start to follow people and have them follow you back as well. If someone mentions your name then all of their followers w ...more
In this video, we learn how to tweak the Windows 7 taskbar. First, go to the website RamMichael, then click on 7 Taskbar Tweaker. Once you download and install this to your computer, you will be able to customize your Windows 7 even further than you already have. When you open ...more
Bored and feel like customizing your Windows XP? Check out this tutorial and learn how to hack Windows and change the text on your "Start" menu button. With this video, you will learn how to change this icon, step by step. You can then turn the menu button into anything you'd ...more
It's important to be able to convey to someone that you are feeling ill in their language. In this video, learn how to say "I'm sick" in Polish, as well as "I'm hungry" and "I'm tired". Study & learn the correct pronunciation by stopping and pausing this short language tutoria ...more
Deleting cookies in your Internet browser allows you the freedom to surf privately. Cookies are little chips that store your information for different websites. For example, when you visit your e-mail, a cookie is attached to your browser that remembers your sign in informatio ...more
This video tutorial shows you how to jailbreak and unlock your iPhone 2G, iPhone 3G, and iPhone 3GS on firmware version 3.0.1 with Redsn0w and Ultrasn0w. Firmware 3.0.1 fixes the SMS hack/vulneravility Download Redsn0w v0.8: http://thebigboss.org/hostedfiles/red... Download ...more
Want a cartoon avatar of yourself to load onto all of those websites you belong to? Well, in this video, see how to obtain a cartoon avatar of yourself to display on Twitter, FriendFeed, your blog, and your corporate logo (if you want to go that far). The process is fairly sim ...more
Notice: This is probably not new to many people. This *IS* new for some people however, and meant for them! Post interesting cameras you find. Website at http://householdhacker.com Today we'll show you how to look through various security cameras using search engines. For t ...more
Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will m ...more
You may have asked yourself, "How do hackers take my password, if the website owner can't?" The answer is simple. When a website stores your login password for the site, it is run through a cryptographic hash function before it enters the database (if the website isn't Sony). ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
The Internet is full of crooks just waiting and waiting for the chance to steal your information. One way that people are getting into your system these days is with fake or rogue applications. These viruses sneak themselves onto your PC either through hacked websites or when ...more
The idea is to buy a few items from IKEA and use them to make a back garden BBQ smoker. The concept is also know as IKEA hacking and the principles are simple, re-engineer IKEA products to make a entirely different item. This video will take you step by step through the buying ...more
The most successful video game packaged with almost all Windows PC's is probably Minesweeper, so it was just a matter of time before someone figured out how to beat the system and detect all of those mines without getting blown to smithereens. This video shows you the trick to ...more
In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff. FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. ...more
Hi everyone! I love the ideas what you showed us and the how to make does electric stuffs, but I had some ideas: How can I make a good power-plant at home so that I wouldn't need to pay taxes on electricity(like in my basement)? How to build robots or just machines that coul ...more
As you may or may not know, MegaUpload - one of the largest file sharing services has been taken down by the feds. To us - this means no more 1gb free downloads. And we move onto MediaFire and Rapidshare. - But more importantly, this means that our inherent freedom to share f ...more
You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see ...more
Can you really make an explosive from salt, sugar and weed killer? Does glycerol and water actually recover text from burnt paper? Is it possible to develop film with a first aid kit and some orange juice? MacGyver says yes. Want to know more of MacGyver's ingenious household ...more
Hacking can't be that hard, can it? At least, that's what it seems like thanks to movies like Hackers, The Net and that last Die Hard flick. Even the Jurassic Park girl's got some game. They all look like they're typing 20wpm, yet can generate a screen full of code in the blin ...more
As with most every other thing there is to do on the internet, people claim that they will pay you to do it. Participating in surveys are probably the most prevalent thing there is to do whilst getting paid. There are a ton of websites that hook you up with a list of free surv ...more