This video shows the method to unlock Blackberry Storm like an old Blackberry. The Blackberry does not come with a top button to lock or unlock your keypad. But you can download one from App World. Just slide your finger across the screen and your Blackberry will be unlock it. ...more
Arthur Cavallin demonstrates how to pick a door lock. To pick a lock, you will need to push up the pins and align them so that the mechanism will open. You will need a tension wrench which you can make with an alan key. You will also need a lock pick which you can make out of ...more
This video from Lowe's will show you how to install a deadbolt lock in just a few easy steps. You can install a deadbolt lock on almost any exterior door, including those made from wood or steel. Deadbolt locks come in several types including the conventional ones requiring a ...more
The BlackBerry Storm did not come with a lock/unlock option. Here are some directions on how to download an application to make it possible. On your BlackBerry Storm go to the download icon. Once you have it open select App World. Search for the BlackBerry Slider application ...more
Whether you locked yourself out of your house, or just into experimenting with locks, check out this video to learn how to open a deadbolt door lock. No skill, no experience, and no professional pick tools needed -- just 2 bobby pins. Using very light torque to the tension wre ...more
Check out this instructional con video that offers some basic tips and tricks on lock picking. This tutorial covers the various types of locks and the different tools that you can use. Learn how to organize your keys to avoid losing them. Put them in a safe place! This video a ...more
Have a lock on your bike or shed but you have lost the key? Watch this hacking how-to video and learn the art of picking a lock using a common kitchen utensil. Yes all you need to crack open a lock is a fork for your kitchen drawer. Follow along and see how easy it is to pick ...more
SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and e ...more
Follow this video to learn some basics on how to use a Samsung Galaxy I7500 mobile phone. Switch on the phone by pressing the power key in the bottom right corner. To navigate around the screen press with your finger on the touch screen and swipe to the left or right. If you w ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Did you lose your key or forget the combination to you lock? This tutorial is here to help you with tips on how to pick just about any combination or padlock without breaking them. All you need is a few household items and a bit of patience and you will be on your way! You Wil ...more
It may look like a modern take on Oliver Twist but, we assure you, this is for real. Before you get too alarmed, however, you should note that the headline reads "how to steal cars" and not simply "to steal cars." We are, after all, dealing with the fine people at Machine Pro ...more
One day, you may find yourself in an emergency situation where you need to undo the chain lock of your home's front door, or somebody else's front door. Maybe someone forgot the unlock it when exiting the back door. Maybe you're grandfather is having a heart attack. Maybe your ...more
Materials Needed! Video: Undo a door's chain lock from outside with string, yarn or shoelaces. Basically all you need is some kind of rope like material. For example, you can use the following: Yarn, Thread, Floss, Ribbon, shoe lace. Just make sure it's about 2 to 3 feet in l ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Farm achievements in Halo: Reach Can't wait for Halo: Reach to come out next week? We've got an ...more
This video is about finding duplicate entries in excel sheet. The example excel sheet contains different names. There are around 1000 different names in the sample excel sheet. CountIf(range,criteria) formula has been used to do the comparison and return of results in True or ...more
Rick Pitts takes us through how to do a push up using a coffee table. First, he starts by doing a push up for shoulders and triceps. You do this by placing your hands slightly wider than shoulders with fingers pointing forward. Keep your elbows near body as you lower yourself ...more
The Mac OS's Disc Utility allows for the encryption of files. To open Disc Utility click on the magnifying glass (spot light) up in the top right hand corner, and search for Disc Utility. Click on the first result in the list. Once Disc Utility is open, click on "create a new ...more
A great free video training from tasktutorial on how to create a cartoon cloud in Adobe Illustrator. All the project files are available to download for free at the Adobe website. First create a background: select the rectangle tool then create a new layer and draw a rectangle ...more
1. To create a clipping mask in Adobe Illustrator, go to File menu select Place button. It will open a dialog box select any picture from there. 2. Click and Embed the image. 3. Now, to write a text click on the text button from the toolbar and write a text on the picture. ...more
A series of videos that help show just how tough it can be to install a remote car starter. Unless your an electrician or a technician, this complex job can result in a variety of electronic failures in your car including prevention of actually getting into your car as well as ...more
Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more
This exercise is great for shaping and strengthening the chest muscles. The chest is scientifically named the pectoralis. This muscle is used any time you push a chair up to the table, shut a car door, or push a shopping cart. There are two muscles that make up the pectoralis. ...more
If you already have your basic keyboard shortcuts under control—we're talking classics here, Control-C (copy for PC) or Command-C (copy for Mac)—it's time to load up your memory bank. There are endless shortcuts available (truly endless—since you can customize them yourself), ...more
If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to i ...more
If you want to create a Pareto Chart for categorical data in MS Excel you should first have your data input into Excel already. From your data, you should highlight the cells that you want to count the frequency for and in the frequency box you should type in =COUNTIF and high ...more
There's a lot of fighting to endure in the Xbox 360 game Bayonetta. In Chapter 1 - The Angel's Metropolis, it's your first real battle. Central Station Platform - Go to the far side of the platform and go through the security gates. The door on the far side of this hall is loc ...more
Super Fly Life brings this traveling video tutorial to teach you how to travel with a cat on an airplane. Traveling and need to fly with your pet kitty? Learn these five travel tips, from cat carriers to travel accessories to supplies, go with style and grace. As anyone in th ...more
If anybody knows how to pick a lock, it's Schuyler Towne. Towne is a competitive lockpicker, professional security researcher, founder of Non-Destructive Entry Magazine, and the genius behind Open Locksport. He's also a frequent presenter at DEFCON, talking in the past about ...more
Do you have an awesome rig that is able to run anything you throw at it at 60 fps with maximum settings? Prepare to be humbled. The Witcher 2 is the first game in quite some time to tax your system the same way Crysis did when it first came out. On my system ( i5 at 4.9, ATI ...more
TOP MOVIES 2011 The Artist (2011) Hollywood, 1927: As silent movie star George Valentin wonders if the arrival of talking pictures will cause him to fade into oblivion, he sparks with Peppy Miller, a young dancer set for a big break.Dir: Michel Hazanavicius With: Jean Dujard ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
Difficulty Level: Moderate Photoshop Skills Photoshop isn't just for zapping zits and adding freaky colors to sunset pictures! You can use it for fun, altered-reality pictures, too. If you have a tripod and some friends, you can combine many exposures as separate layers and u ...more
The Holy Grail of chicken has just been found by an unsuspecting reporter of the Chicago Tribune. Yes, that's right: The secret 11 herbs and spices in Colonel Sanders' Original Recipe chicken has finally been revealed, and it looks legit as hell. While a copy of the Original ...more
You want to put out a live web server, but you don't want to be owned in the process. An expert eye for security is not needed if you take a few basic steps in locking down the hatches. Most successful attacks today are not the complex, time-consuming tasks you might think, bu ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Laptops are almost a necessity in today's society. It doesn't help that a laptop that can actually increase your work productivity will put at least a $1,500 dent in your wallet. I'm sure you have searched around to try to find factory direct deals, or (shiver) even looked at ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
In this video tutorial, viewers learn how to pick the lock of a garage door. It is not recommended for users to learn this technique to use to open other people's garage doors to break in someone's home or steal their possessions. The tools needed for this technique are a L-ke ...more
It's a trick that never fails to amaze. You're placed in handcuffs, but with a flick of the wrist, you're free! Kick off your career as a daring escape artist with these simple tips. You Will Need *A pair of handcuffs *A handcuff key *A bobby pin or paper clip *An assistant ...more
By LukeLiu4434 Knowing how to pick a lock can come in handy if you ever lose your key to your house, bike, or anything else secured by a padlock. While it may sound difficult, picking a lock is a very basic skill and very doable. Here's how you can do it. First lets understa ...more
Using simply 2 bobby pins and a tension wrench, you should be able to open up a padlock without needing the key. When properly wiggling the pins around, with the right tension, you should be able to break right in. Remember, only pick locks that you own, otherwise it could be ...more
In this Webcast, Password Management for Windows and Beyond, you will learn how to: Increase security standards cross-organization by easily customizing and enforcing password policies for Windows, Unix, Linux, and Java users. Decrease the cost associated with password resets ...more
To use this stainless steel Deadbolt trailer hitch lock is pretty simple, you flip open the cap and get your key. The video also shows you how it gets installed on a 1 1/4 inch receiver hitch.
The delicious key lime pie martini can be made easily by using the following instructions. First by using your shot glass pour four counts of Stoli Vanilla into your martini shaker. Then, Pour two counts of pineapple juice, and two counts of lime juice into the martini shaker. ...more
Keep you and your family safe by equipping your home to prevent home invasion. Discourage home invasions by being cautious and making a break-in more difficult. Have a plan in the case your home is invaded. The best defense against a home invasion is careful planning. You Wi ...more
One of the most frustrating events in life is a computer freeze. When your Mac freezes don’t freak-out. Stay calm there are things you can do. And, hey, if you can’t do them, there is a professional out the happy to help you out...for a price. Hypnotized by the spinning beach ...more
If you work with a computer, at some point in time your computer is going to freeze. Hopefully, you've been saving any important data or writing you've been doing because there are a few easy steps to take to get that computer running smoothly. Don’t get locked down when your ...more
Jim Koch has worked as a repo man and a locksmith. He gives you an insider's perspective on how to theft-proof your home by setting up surveillance systems and engraving your possessions. He also explains the basic workings of several kinds of locks and how to pick them. So ne ...more
Many operators use elevators to control access to particular floors, whether it be the penthouse at a hotel or a server room in an office building. However, the law requires them all to have a fire service mode, which gives emergency access to restricted floors, and a hacker c ...more
Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking e ...more
When you need to type in all caps on a computer, you just press the "caps lock" key. But no such key seems to exist on iOS. The "shift" key appears to work at first but will deactivate once you type one capital letter. Holding down the shift key while you type gets the job don ...more
Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet. So no, there's no such ...more
On the latest iOS software, your iPhone comes with significant privacy and security enhancements to protect your data even more than Apple did before. From safeguarding your iPhone to passcode-protecting files to making it easier to browse the web safely, there's a lot you nee ...more
If your PC setup includes a mouse and keyboard, you'll be happy to know that most of the touchscreen-first features of Windows 8 have gone by the wayside in Windows 10. Where it once required awkward gestures to access key features, Windows now recognizes when you're using a t ...more
A few years ago, the Hilton hotel group unrolled the Digital Key, a feature of the Hilton Honors app that allows you to unlock your hotel room with your smartphone. While there may be concern that this technology could be hacked and thus give others access to your room, Hilto ...more
PUT THE PHONE DOWN!!! Don't call the locksmith just yet! Watch this video and l will save you at least $100.00 How to repair a door lock. How to fix a sticking door lock. Lets face it, there's nothing more annoying than not being able to insert your key or remove your key fro ...more
Hello people again, I wrote my last post about crypto about 10 months ago, now I will introduce something not fresh for the science, but fresh for the people who wants to learn. In my http://null-byte.wonderhowto.com/forum/cryptography-0161538/ post of crypto concepts, there i ...more
App-locking apps have been around for a while, but none have had quite the panache of developer Fazil Kunhamed's latest offering, Oops! AppLock. While others use a PIN or password to restrict access to apps that are installed on Android, AppLock uses a stealthy volume button c ...more