In this video, we learn how to create a memorable birth video. You will first need to buy a video camera or use a digital camera that takes movies as well. Make sure it has a microphone so you capture all the action. Make sure you have a large memory card to capture everything ...more
Every magician needs to know how to do a little manipulation with playing cards! So grab a deck and get ready to learn The Toss Up Vanish! You need a single playing card to perform the Toss Up Vanish. Sometimes we use materials that require adult supervision... like scissors s ...more
Got video files on your computer? Watch them on your big-screen TV – using your Xbox! You Will Need * A computer with wireless internet connection * An Xbox 360 * A USB drive or memory card capable of storing video files * Windows XP or higher * Windows Media Player 11 Step ...more
So after months and months of pleading with your parents and weeks of doing chores to earn your keep, you've finally scored yourself an iPhone. But before you get ahead of yourself and try to add applications or message all of your friends that you just got a new iPhone, there ...more
This video is about how to play AVI files on a Playstation 2 You need a third party tool such as mod chip or swap magic in order to create the exploited memory card. If you don't want to spend money on a mod chip or swap magic, you can send your memory card to places on line ...more
Want to get the Wii Opera Browser for free? This will not work with a USB, only a SD-card. Steps according to corradostyler94 listed below. 1.) Downloading and unpacking the browser on your Computer: Download the browser for your Wii-System Download link for USA: http://ul. ...more
ReadyBoost in Windows 7 can give your PC a boost. How? This feature takes advantage of unused space and can quickly free up room and make your computer faster. Watch this Microsoft video for more details. Just plug in a USB flash drive or card and let ReadyBoost borrow it. Re ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
Purchase a silver XBox 360 faceplate from your local gaming retailer. You can also remove the faceplate currently on your XBox 360. Sketch out your faceplate design using a piece of paper and pencils. The design should incorporate both the memory card flaps and the USB flap; ...more
This easy-to-follow video tutorial walks you through steps of converting old VHS tapes to DVD. Roxio Easy VHS to DVD is a combination of software and hardware that allows you to easily and quickly digitize old analog recordings. You simply attach the included hardware to a fr ...more
Sometimes it's necessary to format your memory card in your mobile phone or digital camera, just like you need to format a hard drive, because of virus problems or slower speeds. This video will show you the steps to formatting (or reformatting) the SD memory card for a cell p ...more
If you've rooted your Motorola Droid chances are that you are enjoying the results, but are concerned about the consequences if you phone updates or in any way become incapacitated since your phone manufacturer will not be pleased with what you've done to the phone. One way to ...more
Before you go running off to the Apple store, you may want to educate yourself. DVICE is kind enough to compile the 20 biggest complaints about the iPad from a whole slew of reviewers. 1. Upscaling makes old iPhone/iPod Touch apps ugly. "Here's the problem: It looks terrible ...more
Earlier this month, game developer David Braben and his Rasberry Pi nonprofit foundation revealed a $25 USB PC. The computer can connect to an HDMI monitor on one end, and a USB peripheral on the other (such as a keyboard or a USB hub). You can use the USB hub to connect multi ...more
Glasses-free 3D is devouring the United States, one mobile device at a time. First, gamers experienced autostereoscopic play with the Nintendo 3DS, then smartphone users got the HTC EVO 3D, and now laptops users can enjoy glasses-free 3D technology with Toshiba's upcoming Qosm ...more
Thanks to modern "smart phones" and the internet, media by the people, for the people is finally a reality. Here's how to use your phone to be a mobile journalist. You Will Need * A cell phone that can record video * A memory card * A steady arm * A cell phone tripod WARNING: ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our moderators and contrib ...more
Watch this video tutorial to learn how to play war. Not only is War a great way to pass the time with a friend, but it's so easy to learn that both children and adults can play. You Will Need * A deck of cards * Two players Step 1. Deal the cards Shuffle the deck and deal ...more
In this video tutorial, viewers learn how to import media from devices in Corel Video Studio. Begin by connecting your mobile device to the computer. It can be any device with a memory card or hard drive. Open the program and click on the Capture tab. Click on the option, Impo ...more
In this hacker's how-to, you'll learn how to softmod your old Playstation 2 to enable you to run third party software and how to use CogSwapLoader and HDLoader to backup your PS2 games and play them either from a burned DVD or off your hard drive. This will let you hack the PS ...more
In this tutorial, we learn how to root your G1 or MyTouch 3G with one click. First, go to theunlockr and download the MyTough 3G Root video. Now, go on your phone and click on the settings. Go to applications, then check "unknown sources", then go back and click on "sd card" a ...more
With the Kodak Zi8, the power to capture razor-sharp, full 1080p HD video fits in the palm of your hand. Its easy, one-touch operation and incredible versatility make it the perfect camera for beginners, experts, and everyone in between. Step 1: Get started Get started in a s ...more
Pull off this easy prank, and – without causing any permanent damage – watch your coworker squirm with frustration. You Will Need * Access to a coworker's computer * A phony desktop graphic * A flash drive Step 1: Create a phony desktop Create a few on your desktop and give t ...more
In this Video Games video tutorial you are going to learn how to flash the Benq VAD6038 Xbox 360 DVD drive. This video will show how to do this with the connectivity kit and the jungle flasher. You will need a compatible card for this. VIA 6421a SATA PCI card is probably the b ...more
In this video tutorial, viewers learn how to convert VHS tapes to DVD. Users will need a computer with an analog input or an external converter. If the computer has an analog converter, simply connect the RCA cord from the VCR to the computer. If the computer does not have an ...more
Learn how to operate the latest Blackberry 8330 in simple steps. Follow the steps below to overview the Blackberry 8330: 1. First switch on your Blackberry by pressing the power button on its top. 2. Use the 'Trackball' to navigate around the menu options and press it to selec ...more
This video shows you how to easily copy data to and from your Motorola Droid. The first step is to connect your Motorola Droid to PC, using the data cable. Now, simply drag down the bar in the upper side of the screen and select USB Connected. Then, click on Mount in the poppe ...more
Staying organized with your digital music library can be frustrating, especially when you're downloading songs on different devices. Transferring music files to one central location doesn't have to be hard though, even when you download music on your Android mobile phone. So h ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
Keystroke injection attacks are popular because they exploit the trust computers have in human interface devices (HIDs). One of the most popular and easily accessible keystroke injection tools is the USB Rubber Ducky from Hack5, which has a huge range of uses beyond simple HID ...more
Mobile carriers have been the bane of my existence for as long as I've had a phone. First, they take away unlimited data, and then when you try and switch carriers, they hold your phone hostage for a up to a week before unlocking it from their network. There are services out ...more
If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more
Whether you're job searching, networking, or just giving your information out to someone you just met at a bar, this circuit board business card made by Brian Carrigan will make sure no one ever forgets meeting you! Sure, you could buy a customized USB business card on some on ...more
It has been 7 long years since the PlayStation 3 was released, which makes it no surprise that over 1 million gamers purchased the new PlayStation 4 this weekend. One of the coolest new features on the PS4 is its all-in-one video and screenshot editor. Recording your gameplay ...more
Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more
When Android 5.0 rolls out to the Nexus 5, several changes and new features will come along with it. The over-the-air update is already rolling out, and if you don't want to wait, you can get it right now. We've pored through the massive changelog—which includes over 700 Nexu ...more
Now that Samsung upgraded DeX in the Galaxy Note 10 and Note 10+, more users will be looking to use their phone as an "anywhere PC." With a simple USB-C to HDMI cable or adapter, you can turn your Note 10 into a desktop, complete with full access to your apps. But not all USB ...more
Remember the Power Pwn, the clever little hacking tool disguised as a power strip? It's great in theory, but with a $1,295 price tag, it definitely doesn't fit into most people's budgets. But what if you could make your own for a fraction of the cost? That's exactly what the ...more
We might not be able to hang out with friends in-person during a mandatory lockdown or self-quarantine, but we sure can in "Animal Crossing: New Horizons." Snapping pictures with the new NookPhone feels almost as personal as taking selfies in real life, so, naturally, we want ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
Welcome back, my tenderfoot hackers! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network. I am also a huge fan! If you haven't seen it yet, you should. It may be the best show on TV right now. Mr. Robot is about a young man with ...more
Your HTC EVO 4G LTE has been lying to you. It will tell you when you're connected to a 4G network, but it will say 3G even if you're connected on 1X, which is a 2G CDMA network! This issue is just one of the many things you can fix after rooting, which allows you to take full ...more
Welcome back, my budding hackers! In my continuing series on Linux basics for aspiring hackers, I now want to address Loadable kernel modules (LKMs), which are key to the Linux administrator because they provide us the capability to add functionality to the kernel without hav ...more
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
Starting with Android 9 and 10, Google made privacy and security the main priorities for Android updates. Both versions brought numerous changes to help erase the notion that Android isn't safe, but Android 11 might even have them beat. In Android 11, Google is building upon ...more
It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orie ...more
Wi-Fi networks come in two flavors: the more common 2.4 GHz used by most routers and IoT devices, and the 5 GHz one offered as an alternative by newer routers. While it can be frustrating to attack a device that moves out of reach to a 5 GHz Wi-Fi network, we can use an Alfa d ...more
The upcoming W3D gaming smartphone by Snail isn't like anything you've ever seen before. It's pretty much a cross between an Android phone, Nintendo 3DS, and PlayStation Vita. It runs on Android, has a 3D screen similar to the 3DS, and gamepad controls like the Vita, making it ...more
With the FBI getting access to iPhones, and apps like Waze being used to track people's locations, you've got to wonder just how safe and secure your smartphone is... or isn't. When you consider everything you do on your phone, from taking and sharing pictures to mobile bankin ...more
Hi , Today i will show you how to do HID Keyboard Attacks With Android BUT without using Kali NetHunter BUT You will need to install custom kernel to your Android device, that will add keyboard+mouse functions to it's USB port,So Lets Get Started Step 1: Prerequisites For Th ...more
When you want to post a breathtaking landscape or picture-perfect portrait that you just took with your DSLR camera to Instagram, Facebook, or some other social platform, there's an easy way to do so — even if you don't have a computer handy, which is typical when you're out a ...more
Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary fl ...more
In an effort to appease iPhone fans eager for an NFC-equipped device, an option that is available on many other smartphones, Apple created Passbook, their version of a digital wallet. Passbook allows iOS 6 users to upload supported coupons, gift cards, and tickets directly on ...more
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
Welcome back, my fledgling hackers! As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely da ...more
A Brooklyn-based startup has launched a glasses-free holographic display for less than the cost of an iPhone 8 Plus. HoloPlayer One (see what they did there?), from Looking Glass Factory, consists of a light-field display, such as those rumored to appear in Magic Leap's devic ...more