Privacy is important. Whether its a telemarketer or a crazy ex, sometimes you may need to block someone from contacting you. With this tutorial, learn how to get rid of those pesky callers. You Will Need • Internet access • Phone • Call-blocking service • Cell phone's owne ...more
Everybody gets phone calls from those strange numbers you kinda sorta recognize. Is that an old friend? Is it the guy you met last week? What's that area code anyway? Get to the bottom of the mystery by using reverse phone book services. This video will show you to find the so ...more
Jordy with AT&T teaches us how to block your cell phone number when making outgoing calls. By doing this, any person you call cannot read your ten digit cell phone number. It's as simple as entering a code before you dial the desired number. The code is *67 followed by the ten ...more
If you are having a difficult time getting someone's phone number this is the how to video for you. Watch and learn ten easy tips to getting a phone number and maybe even a date.
If you want to block your cell phone number for all calls, this is the video for you. Learn to block not just one call, but all further calls with the push of a few buttons. Now no one will be able to see your cell phone number.
A lot of phone numbers these days use letters so that you can remember them easier. For example, 1 800 BEST BUY or 1 800 FLOWERS. On a normal touchtone telephone, you would associate these letters with numbers on your keypad. With a Blackberry, however, this poses a problem. B ...more
Not only is Poptropica fun, it's also chock full of fun Easter eggs. In this clip from YouTube's Poptropica Cheats, you'll learn how to unlock and use a number of the better ones. Specifically, this clip will teach you how to customize your cell phone number as well as persona ...more
It seems like everyone has Caller ID these days, but not everyone wants to give up their privacy. Whether you're calling from a cell phone or a landline, you can dial *67 to block your phone number from appearing on Caller ID, and many phone companies offer a permanent option ...more
Every key on a telephone keypad has its own sonic signature, a sort of calling card composed of two distinct tones: one high, one low. While it's easy to tell the difference between the individual pitches in a single row—see, for example, this article on using your cell phone ...more
If you want to cause one of your friends some extreme discomfort and possibly ostracization, try doing this to them! This video will explain a simple prank that you can pull when one of your friends / enemies leaves their cell phone unattended in your presence. I won't give it ...more
The idea behind this prank is two of the guys will go head to head trying to get one girls number and one guys number, both just random people on the street. Sounds simple right? No, they must tattoo the number on themselves right there in the street to make it count. The firs ...more
Check out this hacking video tutorial to learn how to hack a cell phone with a magnet. You can easily hack Verizon's Motorola RAZR mobile phone to bypass the user password. Turn off the MOTORAZR phone and then turn it back on. After the red Verizon introduction screen comes o ...more
In this video, we learn how to hack your Android phone. First, plug your phone into the USB to your computer. Now, search for telnet on your phone and install it onto your phone. Download this client to your phone from the Google Marketplace, then you can unplug your phone fro ...more
This video is specifically for the C530 Slate cell phone from AT&T, though this procedure will probably work on similar models of phone. You can hack, or jailbreak, your phone to allow you to use third party apps or switch to a different service provider. You will need a non-A ...more
Want to get into both of the locked levels for the popular phone game Angry Birds? This video shows you how to access both of them when you're using a Droid phone. This is a very easy hack to replicate!
Hack your voicemail or answering machine with special information tones. Check this out. Hack phone voicemail to block telemarketers. Click through to watch this video on spike.com
Do you blog on FeedBurner? Want some more subscriber hits to make your blog look more impressive? Take a look at this tutorial and learn how you can multiply your blog's number of subscribers.
Open up your mobile phone and solder on a light sensing resistor to make an alarm go off when the phone is in the light. Possible uses?
Kipkay teaches you how to make a USB cell phone charger and first you need a standard USB cable. Cut off one end of the cable and use a voltmeter to check which of the four wires has five volts.
Need the newest copy of professorial design and photography software but cannot afford it? Find out how to crack Adobe photoshop without having to use a serial number.
If you've got an extra DVD drive laying around not being used, watch this video and learn how to give the lens new life—as a powerful macro lens for your camera phone! You'll be able to take incredible pictures on your camera phone using this clever mod. Video: .
Video: . Recycle your hard drive into a hidden flash memory device that only you know how to turn on and use in secret. This DIY hack project allows you to recycle your broken hard drives back to life and turn them into something useful. So far, this project has several funct ...more
Having the Internet on your phone is definitely handy. You can look up anything at anytime, and connect with friends in so many more ways. In this tutorial, learn how to use your PC and your Bluetooth enabled mobile phone to get free Internet on your cell phone and avoid buyi ...more
As much as it pains me to say it, without my phone, I would pretty much be useless. I can barely remember what I had for lunch yesterday, let alone all of the hundreds of numbers in my contact list. That's why whenever I forget my phone at home, I am pretty much stuck having t ...more
Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. I ...more
Facebook really wants your phone number, nagging you for one as soon as you join. This isn't all bad since it can help secure your account with two-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook, i ...more
Syncing your Google and Facebook friends to your smartphone gets your contacts list up-to-date quickly, so you'll never have a problem finding someone's number. But, there's always a negative side to things. In this case, you'll not only get contacts with phone digits, you'll ...more
Only scumbags hide their call and message history, right? Wrong. While it may seem like a tactic for the unfaithful, it's still a good thing to do for certain contacts on your phone that you don't want to block outright. Blocking someone on your phone seems cruel, because you ...more
There are tons of situations that require you to give out your phone number, and I think just about everyone has regretted doing so at some point. It can be incredibly convenient to have a secondary or temporary number on hand, so if you don't want to provide your real digits, ...more
Caller ID is great to have, but there are certain situations where you don't want the person you're calling to have your number. People who sometimes use their personal phones for work may not want clients knowing where to reach them outside of work, and anytime you're dealing ...more
I will guess your phone number and age in one minute. Video: .
Hello Elite Hackers! Welcome to my 3rd Post, which explains how to hack any account like G-mail, Facebook, etc. You can also use this technique to hack/spoof messengers like Facebook or WhatsApp etc. Step 1: Fire-Up Kali: I hope you know how to hack android and gain access t ...more
The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized ...more
With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device. UserLAnd, created by UserLAnd Technologies, is a completely free Android app that makes installing ...more
Black lights come in all shapes and sizes, and they're useful in a variety of ways. They can help you spot fake currency, urine stains, interesting rocks, and deadly scorpions, and they can even help you view cool fluorescent artwork. Most black lights work using a filter or ...more
Here's a list of the lifehacks shown in this video: Banana Foil Chain closet storage Phone Holder Bottle Flashlight WD-40 Gum Remover Video: . Make sure you subscribe for more awesome videos from the macobt projects.
You must have seen in movies, a person calls to another person and when the he picks up the phone, Boom! There is a bomb blast. So here is a video on how to convert a mobile phone into a bomb. The bomb is not exactly like the one in movies, but it can do your work. Please do ...more
Google Play has no shortage of Nintendo emulators: SuperGNES (Super Nintendo) Gameboy Color A.D. (Game Boy Color) My Boy! (Game Boy Advance) nds4droid (Nintendo DS) DroidEmu (SNES, NES, GBA, GBC, etc.) Those are just a few of what's available out there. The only problem with ...more
One of the most useful new features in iOS 7 is the ability to block phone calls, FaceTime calls, and text messages by blocking any phone number. Whether you've got a stalker, a crazy ex, a harassing bill collector, or just too many telemarketers, this new feature makes it ea ...more
The cell phone has come a long way. The very first "mobile devices" were made and used by the military in the late 1930s, with the first commercial mobile telephone service introduced by Bell in 1946. These devices were hardly what we'd call mobile today—some took up the whole ...more
Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with ...more
Google has just launched a new revolutionary augmented reality game for Android called Ingress. Their new mobile game centers around the fight for control of the minds of everyone here on Earth. It's a freaking worldwide fight—from your smartphone! While augmented reality in i ...more
Between the Cambridge Analytica scandal and the revelation that Facebook logs your calls and text history on Android, many are considering joining the #DeleteFacebook movement. But it can be difficult to leave the site, because so much of its content is only available to activ ...more
Smartphones are still "phones," which means communicating with others is usually a primary use. Ranging from a simple "hi" to a more personal conversation and even sharing passwords, our messages should remain private so that only the intended recipient sees their content. Whi ...more
When Facebook purchased WhatsApp for $19.3 billion back in 2014, we all knew this was coming—it just took longer than we thought. But starting today, the data mining became official, and now, information from your favorite messaging app is no longer out of reach for the world' ...more
If you've ever received an email from a sketchy address purporting to be Uber, asking you to sign in with your credentials, you might be a phishing target. Hackers use a fake login page from real-looking domains to trick you into giving up your account information, and while i ...more
Business hours and addresses change, but they're not always updated on Yelp by business owners for the rest of us to see. Showing up when a business is closed or going to the incorrect address is a major annoyance, which is why the company allows us, the customers, to help upd ...more
You would think that recovering your smartphone or another important item that you leave behind in an Uber ride would be a simple process, but it can actually be a pain in the ass. You have to find out how to report it to the driver, hope the driver is honest, pay a fee, and c ...more
So, you're on the way back from a restaurant and realize you left your iPhone there, but you're late for a meeting and can't go back yet. You may as well kiss that iPhone goodbye, right? Not yet, as long as the right person gets their hands on it first. But that potential do-g ...more
One thing you have to love about Google is their sense of humor. From their annual April Fool's Day pranks to the hidden Flappy Bird mini-game in Android to tons of hidden commands in Hangouts, you can just tell that those smart guys in Mountain View still like to have a littl ...more
When I review apps, I'll oftentimes end up downloading at least one or two "bad" apps that either lied about their functionality or were riddled with ads. These apps, while not as harmful as malware, can still be a major headache. This got me thinking about the other bad apps ...more
With a slab-style touchscreen device, butt dialing is always going to be a problem. While you're moving about, your phone can unlock itself and give your most recent contact a ring, leading to an awkward one-sided conversation where the other person gets to eavesdrop on everyt ...more
Two-factor authentication (also known as 2FA) adds a necessary additional layer of security to your username and password in many important apps. On Instagram, 2FA requires you to confirm it's you attempting to log in, with a special code sent to you via text message. Enter th ...more
NANDroid backups are one of the best reasons to root your Android device and install a custom recovery. They're essentially a snapshot of your phone's entire operating system and all installed apps, so if you ever screw something up when installing a flashable ZIP or custom RO ...more
As long as you're on the internet, you can be hacked. With an estimated 2.65 billion social media users, these apps are prime targets for hackers. While companies like Facebook, Snap, and Twitter do a formidable job against the waves of attacks they receive daily, they are no ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
For many, phones are starting to replace televisions as the primary device for watching videos. Thanks to their portability and easy to use apps, it's often simpler to watch Netflix, Hulu, YouTube, or Prime Instant Video on the smaller screen. But not every phone is suited to ...more
Sharing your personal information can come up for any number of reasons: you may want to get in touch with a colleague after work or you've been involved in a car accident and need to stay in contact with the other driver. Unfortunately, giving out information can be the key f ...more
T-Mobile just unveiled two new services—Scam ID and Scam Block—which specifically target those pestering robo-calls that reach out to 2.4 million Americans every month. The FCC, the country's telecom regulator, proposed new rules on Thursday that would allow phone companies t ...more
While iOS 12 is arguably the best iteration of Apple's mobile operating system yet, one major fault so far is security. On Sept. 26, Videosdebarraquito discovered a passcode bypass that gave access to contacts and photos from the lock screen. Apple has since patched that secur ...more