This video shows you how to bypass expensive texting charges and use this free and easy way to text people without the need to download apps, go to websites, or jailbreak your device. Works on basically any cell phone. No need to ever pay $20.00 for unlimited texting with AT&T ...more
This video explains how to create a database text alert using Google Forms. In Google documents click on new, then form. After naming the form and typing in that standard text messaging rates apply, our presenter selects multiple choice yes or no options. Select it to be a req ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
The angry New Yorker stereotype sure doesn't miss anyone. A woman from New York is suing her former Catholic college for not doing 'enough' for her while her dorm roommate was having too much sex. We're not entirely sure if the college even handed out ties to hang on doorknobs ...more
Everybody has them. You can say you don't, but it's probably a lie. There's at least one person on your mobile phone that you never, ever want to pick up the phone for. When they call, you cringe and immediately hit the silent button. They're annoying. Overbearing. You hate th ...more
In this video, we learn how to use the ring/silent switch on your iPhone. First, you will find the switch which is on the side of the phone. This will allow you to turn your notifications on or off. Simply flick the switch until you see an orange dot, which means it's off. If ...more
In this video, we learn how to make January thank you notes with Stampin' Up. First, you want to choose what you want your notes to say. You can use a small card stock that is 3" x 3". Then, use a border hole punch and apply it on in different colors you prefer. After this, yo ...more
This video tutorial is in the Electronics category where you will learn how to enable Emoji icons on your iPhone. These icons are the yellow faces with emotions that you use in any internet messenger program. On your iPhone search for a program called spell number. Tap on the ...more
Addicted to text messaging? If so, you might want to consider giving chompSMS a go. This clip will show you how to use it. It's easy! So easy, that this video tutorial can present a complete, step-by-step overview of the process in about two and a half minutes. For more inform ...more
There's nothing like a greeting card to turn a frown upside down. In this day and age of emails and text messages, making your own greeting cards for someone can mean so much. From Valentine's Day to Christmas, greeting cards are a way to thank, welcome, congratulate, and even ...more
In this how to video, you will learn how to break up with your boyfriend or girlfriend. There are plenty of good and bad ways to do this. A bad way of doing this is breaking up with your partner over the phone. Breaking up over instant messages is also bad. Texting can also be ...more
The bookmarklet tool lets you send Gmail messages with the click of a button so you don't have to visit your Gmail account. It's an application called GmailThis! From the developer's website, drag the GmailThis! link to the browser's toolbar. Then, if you are already logged in ...more
In this how-to video, you will learn how to upload photos and videos to Facebook or MySpace using your mobile phone. First, go to messaging and scroll down to blogs. Here, enter whichever blog you want to upload to. Next, go to message and create a new picture message. A new o ...more
1. To disable the UAC (User Account Controls), first click start button and type "msconfig" into the start search text box. 2. And click on Continue to navigate into system configuration then select "Tools" menu. 3. And choose "Disable UAC" option and click on Launch button to ...more
In this video from MarketingTwins we learn how to use TweetDeck in order to retweet something on Twitter. In tweetdeck it is very easy to retweet. You hover over someone's picture that tweeted something, and then click the retweet symbol. This will then appear in your text box ...more
Hacked Gadgets recently featured Csaba Bleuer's LED wave display, a device that projects LED messages midair. Bleuer had also previously created a similar device that spins on a fan motor. "Csaba Bleuer sent in some pictures and a video of his new creation. It is a LED Wave D ...more
In this video by PI Classroom you get to learn how to remove the sim chip from an i-phone. The video provides a step by step process for removing the sim chip. The only tool required is a paper clip. *Turn the i-phone on its head so that the power button and the plug for the h ...more
This video tutorial shows how to get MMS on iPhone 3G for Tmobile on 3.0 or 3.0.1. Not that this works on T-Mobile's Network ONLY To add MMS go to: Settings-General-Network-Cellular Data Network Add this in MMS field: APN: wap.voicestream.com Username: *leave blank* Password ...more
Welcome to the Mad Science World! Hold onto your radiation-shielded hard hats—we're going to be posting a ton of great how-to articles and videos every week, showcasing the maddest of the mad science experiments on the web. We hope you will be inspired to try these projects at ...more
There's a handy new feature in Windows 7 called the Ease of Access Center, which brings together settings and programs that can make your PC easier to use. This is where you get quick access to programs like Magnifier, Narrator, On-Screen Keyboard and more. Learn about the acc ...more
In this video from DavidWygant he teaches about using the ultimate opening line with women. He talks about approach anxiety and how you can talk to women about that very thing. He also talks about the 10 PM rule. Talk to the girls before 10 pm because by around 10 she will be ...more
Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. You w ...more
Do you need to email your wife your Social Security number? Send confidential business plans to your partner in Thailand? Send your hacker buddies the recovered hashes from last night's breach? Try using GPG, a valuable and easy to use open-source encryption program. In my fi ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Traders are in a frenzy of instant messaging all day long. The best ones, at least. A recent study says the best traders are the ones that IM the most and the least successful traders were the ones that IM the least. So, it seems like if you can find a way to jump on the bandw ...more
There's no denying the coolness of an iPhone. But what if you pulled a homemade wooden cell phone out of your pocket instead? You'd probably be the talk of the town. If you like that idea, then make it a reality by building your own cell phone! A team over at MIT's High-Low T ...more
Have an HTC smartphone? Chances are that some of your stored personal data has been hijacked by malicious apps on your device. Android apps that have permission to access the Internet, which is pretty much every ad-supported app out there, can snag valuable information such as ...more
Remember what life was like before your iPhone? Before there were palm-sized smartphones with seemingly endless features, there were phones like Motorola's RAZR that peaked with its embedded camera. Before that, there were simple flip phones with texting capabilities, bulky tw ...more
It's happened to the best of us—a drunk dial or text; a humiliating Tweet or incriminating photo uploaded to Facebook. Spirits are high, gestures are fearless… If only we could take it all back once the cold, sober morning light creeps through the blinds. Familiar scenario? N ...more
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
These are great times. It is about time advertisers invaded our video games in the same way they do our driving (billboards), walking (fliyers, posters), and our private home (emails, bulk mail, text messages). It has been hard for advertisers. I applauded their perseverance ...more
What's the quickest way to get to an application on your Android phone? It's a shortcut icon, much like on your Windows and Mac computers that take you to the application quick without having to dig in your applications folder. So how do you add a shortcut on your phone? Best ...more
This video demonstrates how to set your Mac up to accept VNC connections.First we open up the "system preferences". Double click on Sharing and then go down to remote management and check this. We can see some options . Check the options Open and quit the application, Change s ...more
If you have files on your PC that you don't want other window's accounts to be able to access, you can encrypt them. Right click the file that you want to encrypt and select properties from the drop down menu. Once the properties page comes up, choose advanced. Now choose Encr ...more
One of the coolest features on a Blackberry is BBM or Blackberry Messenger. BBM allows you to talk to anyone with a Blackberry, anywhere in the world, absolutely free! You can send messages back and forth and you phone will even keep a record of the conversation in case you ne ...more
There's nothing worse than stalker, or someone who you just want to avoid. Fortunately, there are ways of dealing with it! This video shows you some of them. There are many reasons someone may want to ignore a guy. Follow these tips on how to succeed at it. Step 1: Do not re ...more
Everyone benefits from positive coping strategies when dealing with divorce – learn how. Step 1: Stay in touch with both parents Stay in regular contact with both parents. Call, send text messages, or e-mail to ease feelings of missing each other. Step 2: Develop a plan for ...more
As some of you Mad Science readers will remember, we recently covered the separation of water into hydrogen and oxygen using electrolysis. Passing a current through water can rend it apart, but we can also recombine that oxygen and hydrogen to make electricity! This is the pri ...more
In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorit ...more
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
There are plenty of options and shortcuts available on the iPhone, and one notable feature is the ability to copy, cut and paste text or images, just like you would on a normal computer. So how do you do it? Best Buy has answers. The Best Buy Mobile team explains how simple it ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do no ...more
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Welcome to the second Goonight Byte! Our second coding session was kindly hosted by th3m, so props to him for letting this happen. Our task this time was to hack the bot that we made the week prior, which was only capable of connecting to the channel and then printing message ...more
Our first Community Byte went well! We had around 8 people in the room coding collaboratively and watching to learn. LukeStav did the kind task of hosting it on Gobby for all of us, so big thanks to him! At minimum, our task was to create an IRC bot for #nullbytez that could ...more
Facebook has been "improving" their interface in several different ways in attempt to combat the threat of Google+. One big change is the introduction of a news ticker in the top right corner that constantly feeds updates from friends and organizations you are connected with o ...more
When your business is in constant communication with different companies using letter paper, one of the more essential things that you need is your own stationery set. This is made up of business cards, envelopes and letterheads which you need when you do corporate mailing. A ...more
There's an epidemic on the Internet, and the disease—Facebook. It's an addiction comparable to a hot cup of coffee in the morning or a soothing cigarette throughout the day—in worse case scenarios, a hit from the crack pipe. If you're on Facebook, you know what I'm talking abo ...more
With the Oscar nomination of "Exit Through the Gift Shop" and Banksys rise to global fame, street art is becoming more and more accepted into the global art establishment and mainstream culture. Shepard Faireys "Hope" poster is now one of the most recognized posters in the wor ...more
L4D2: Chapter two - The Underground "Ok explain something to me, how is an under-the-river tour scenic?" - Nick The second chapter(out of 3) of the Passing DLC is The Underground. The goal is to go though a passage under the river to reach the bridge generator on the other ...more
Is someone more interested in you than you are in them? Can't get them to go away or take the hint? Don't worry, this tutorial is here to help with tips and tricks for how to get that unwanted suitor out of your hair and avoid a remake of "Fatal Attraction". You Will Need • A ...more
Learn how to follow proper netiquette rules. You may be a model of decorum in person, but a bonehead online. Check out how much you know about Internet manners. Step 1. Be clear Be clear in your e-mails and text messages. Don’t include acronyms unless you’re sure the recipie ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
If you‘re new to Mac, you may not realize that the Dock is not the only place you can access applications and folders. The menu bar of your desktop can also hold a dozen or more applications and plug-ins for easy access to lots of content on your computer. In this article, I ...more
In this article, I'll be exploring the basics of Python, i.e. variables, input and output. You'll need Python (2.7+), a computer, and some free time. Variables Simply put, variables are like envelopes. They are empty and meaningless until we place objects and meaning into th ...more
Are you the expert hacker we're looking for? Do you have a great idea for an article on Null Byte? Do you have a passion to write, and more importantly... teach? We're officially looking for Null Byters on a weekly basis who are willing to take the time to educate the communi ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more