Install Car Security

How To : Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more

How To : Turn Your House Lights On & Off Using the Internet

Haven't you ever wanted to live in a futuristic home? I think that homes are headed towards an era where they will be controlled by our computers and smartphones. No longer will you have to find your keys to unlock your door, or wait until you get home to monitor your security ...more

How To : Code Your Own Twitter Client in Python Using OAuth

This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project ...more

How To : Recover a Windows Password with Ophcrack

When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using ...more

How To : Remove a Windows Password with a Linux Live CD

Back when I was a Windows user, I know I'm not the only one who has experienced password loss—that moment where you just can't remember your password. Sometimes it happens to the best of us. So, how can we get into the system without paying a local geek or geeksquad to do it? ...more

News : GTA 4 First Person View Mod

GTA4 1st Person View Mod This mod has been out for a while, but with some people gettings Grand Theft Auto 4 for the PC last week because of the Steam sale, there has been talk about what are the best mods to get. There is a thread on Neogaf that talks about playing the game ...more

How To : Easily SSH into your iPhone/iPod Touch

iPodTouchedMaster shows how one can easily SSH into their iPod Touch with all firmware! To SSH is the ability to hack into your iPod Touch's file system. First, your iPod Touch must be jailbroken. Next, you'll have to open Cydia. Click "Featured Packages" or search for the ter ...more

How To : Add night vision to your car to see at night

Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episode ...more

News : The Basics of Facebook Privacy Settings

Just how private is your Facebook profile? To some extent, that's up to you. Many Facebook users share and poke their days away, never knowing about the plethora of custom privacy settings that lie just a click away. Facebook's privacy menus can look a little complicated to th ...more

How To : Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan hor ...more

How To : capture video from your 360, PS3, Wii with $9

Hey, would you like to be as cool as this: You wish! But you could do the next best thing, and that's capturing your earth shattering game play with the Easycap DC60. Originally retailing for forty dollars, you can buy this at Amazon for $8.50. This device will capture video ...more

News : Student group hopes to keep bikes on campus

Student group hopes to keep bikes on campus By Conrad wilton · Daily Trojan Posted Today at 12:22 am (14 hours ago) in Featured, News Faced with the possibility of reduced bike access and storage on campus, student group SC for Alternative Transportation has dedicated its e ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

How To : Things to Do on WonderHowTo (02/08 - 02/14)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Things to Do on WonderHowTo (01/25 - 01/31)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. First off, thanks to all of our moderators ...more

HowTo : Hack Any iPhone, iPod Touch or iPad

Hallelujah, a miracle tool has been released to the world. This Windows/Mac tool is called Spirit and it enables you to jailbreak any iPhone, iPod Touch or iPad quite easily. And Gizmodo is all over it, with an in-depth guide on exactly how to do it. Some of you may be hackin ...more

How To : Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-di ...more

How To : Edit Your Google+ Account Settings

If you've gained entry into Google+, one of the first things you should do is adjust your Google account settings. Your settings will now look quite different, and you can adjust your notifications, password retrieval methods, and more. There are many settings that you may not ...more

How To : Install a throttle body spacer

In this video tutorial, you'll learn how to install an Airaid Poweraid throttle body spacer on a 5.3L 2006 Chevy Z71 Crew Cab truck to improve its engine power–when combined with a complete Airaid intake system, one can see up to 25-horsepower gains–as well as yield slight imp ...more

How To : Completely format a hard drive

In this video tutorial, viewers learn how to completely format a hard drive. Begin by downloading the Knoppix Live Boot CD. Then burn the newly download ISO onto a CD as a bootable disc. Use your BIOS to tell your computer to boot from the CD-ROM instead of the hard drive. Wit ...more

How To : Install an LED light on your bicycle.

Safety is important. If you are going to be riding a bike at night, make sure you are wearing light colored clothing and that you have lights. Lights help cars and other cyclists see you in the dark so you stay safe. You Will Need • LED bike light • A bicycle Step 1: Instal ...more

How To : Install a rear sway bar on a Honda Civic EP3

Check out this video tutorial to see how to remove and install a rear sway bar on a Honda Civic EP3 (SI or SIR). This may be the same on other vehicles. You will need a 5mm allen wrench, a 14mm wrench, a long nose vise grip, and a 12mm socket with a long extension. Some lube ...more

How To : Secure your home

In these home security and safety videos, learn how to upgrade your house in some important ways. Our expert, Jon Olson, will show you how to secure your windows and sliding glass doors, some of your home’s most vulnerable entries, with bar locks. Learn how to install a door g ...more

How To : Set up and secure a wireless network on a laptop

In this video, Karlyn M. Campbell, an Information Technology student, goes through how to set up and secure a wireless network on a laptop. For a wireless network you will need your computer, a wireless router and its CD, and a USB wire. First the video goes through how to set ...more

How To : Restore your PC to factory settings by rebooting

Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the comput ...more

How To : Change an alternator

In this online video series learn how to change the alternator on your car from certified mechanic Nathan McCullough. Watch these videos and learn alternator diagnosis as well as how to disconnect the battery on your car; and how to locate the alternator; how to remove the alt ...more

News : The Escapee (A Must Read)

Get a white van, maybe block out the windows except for the front, have two Jackass members driving the van, stop at a stop light or a stop sign in a busy residential area where there are lots of pedestrians and cars. then have a single person in the back of the van break out ...more

News : Wake Up Sunshine

One night after partying, find the most wasted person in the group. For security purposes, don't be afraid to slip him a roofie or two throughout the night. The next morning, while he is still sleeping, strip him down butt-naked, put a blindfold and a pair of ear muffs on him, ...more

News : The Infant Drop

For this crazy insane prank it will involve 3 people and it will have to take place in a mall with two floors for shopping. You will need a fake baby, with a loud voicebox installed so everyone can hear it cry, you will need to drill a hole into the fake baby's head and fill i ...more

How To : Get Started with Kali Linux (2014 Version)

Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more

How To : Take Control of Sonos IoT Devices with Python

Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more

  • Hot
  • Latest