In this video, we learn how to pull a "virus of doom" prank. once you have this downloaded, you can place the program into your start menu. Then, when someone else clicks on it they will get a large skull on the computer. It will say that the hard drive is formatting and the h ...more
The prank is one of the most cherished traditional forms of expression around the world, from Japan to the Middle East to the good ol' US of A. Without them, how would people settle their disputes with one another while having a good laugh at the same time? Every time a new ph ...more
This article will show how to make a simple, fake computer error message. These message boxes are 100% harmless, and make for funny pranks. They will display any text you want them to. Required: - Windows XP/Vista/7 - Notepad Typing in the Code First, open Notepad, and ty ...more
After an assumedly nasty break up, Jack Weppler's ex-girlfriend decided to smite him in the most public way possible. The wronged girl uploaded a pile of defamatory images to a picture-hosting website with Weppler's name as the filename, and Google image search did its magic. ...more
Whether you have a PC or a Mac, error message windows are a regular and infuriating part of your life. In this video, you will learn a cool way to harness them for your own amusement by creating fake error message windows to prank your friends and family members on their Windo ...more
Desktop shortcuts are a great way of making the programs you use a lot more accessible, but today many PC users overuse their desktop space and have icons covering over half the screen, including the one for a picture of a dog they looked at six months ago once. This prank is ...more
Pulling a computer virus prank on your friends calls for good laughs. In this video you will learn exactly how to create a non-threatening "shutdown" command and disguise it as a real computer virus. shutdown -s -t 60 -c "Your message goes here" There is the code above, this ...more
Do you have coworkers who use the hunt-and-peck method of typing? This trick is guaranteed to drive them completely bonkers. You Will Need * Time * Your coworker's computer keyboard * A small screwdriver Step 1: Wait for coworker to leave This prank needs about an hour of uni ...more
Program a fake virus in Windows that will shutdown your friend's computer. Makes a great prank. Program a prank virus. Click through to watch this video on tricklife.com
Pull this prank your co-workers or fellow computer geeks! Make a confetti bomb out of a 35mm film canister.
A step-by-step tutorial on how to pull the infamous cracked computer screen prank on your family members or friends!
Tomorrow's the 1st of April which means it's the one day of the year you can put aside the daily grind, and go at it Dwight Schrute and Jim Halpert style. Yes, there are easy apps to do your dirty work, but if you're old school and you like to do it the old fashioned way, here ...more
If you want to prank someone with a water balloon, but don't actually have any water balloons lying around, just use some paper instead. Yes, I know... paper doesn't sound like something that will work, but with you'd be surprised what can be done with a little origami. Don't ...more
This article will teach you how to make an error similar to this one (also by me). This error message though, is a yes or no question. Clicking yes and no will give different results. Like the previous error message, this is 100% harmless. Works only on windows. Notepad is ne ...more
Bored and feel like customizing your Windows XP? Check out this tutorial and learn how to hack Windows and change the text on your "Start" menu button. With this video, you will learn how to change this icon, step by step. You can then turn the menu button into anything you'd ...more
Got 3D glasses leftover from the Superbowl? Time to break them out! You will need cheap 3D glasses from television promotions or you can grab them off eBay for this demonstration. Or you can simply make your own 3D glasses red and blue or yellow and blue cellophane. NOTE: Get ...more
Tutorial on how to create a shutdown shortcut on the desktop to shutdown the computer when clicked. shutdown -s -t 1000 -c "comment" -s = shutdown; -t = time; -c = comment. shutdown -a = abort current shutdown. Please comment/rate if I missed anything or how it worked for y ...more
Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand th ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Whether you're in an airport, restaurant or waiting room, the insidious grip of televisions on human life is omnipresent. Sometimes it's nice to talk to other human beings while looking at them directly—actually hearing what they have to say. Thankfully, there's a DIY device ...more
We've gathered some of our favorite pranks with the seasonally appropriate for all you college kids out there. You're more than likely cohabitating with a complete stranger, and what better way to make a good first impression and develop a strong personal relationship than sub ...more
Smartphones are crazy awesome. You can do your banking, track your children, find directions, and even pretend to have a mustache. The only thing that these personal supercomputers are missing is physical interaction with the environment. I wanted to be able to call my house ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Learn to hide icons and use paint to prank friends. This prank makes friends think their computer froze or the have a virus.
This is a very simple, but very funny prank to play on your friends using Windows. Creating the file Begin creating this prank file by opening up a text document in your word editor program. Once you have opened the text document copy this into the document: do msgbox"wha ...more
Nobody likes it when a prank gets taken too far. Friendships are ruined, material possessions destroyed, even bodies broken. This video offers four perfect examples of pranks that go entirely too far and that you SHOULD NOT DO to your friends and neighbors. We're being serious ...more
For this prank, get one of the guys from the crew (prob will be Dave England) to walk in a library ready to poop. Have him then get a book to read or maybe go on computer and just sit and not talk. Then have him begin to poop. While this is going on make sure he try's and play ...more
Hello, Hackers/Viewers! My name is nullf0x, and I have 4 years of experience as a hacker. You might see everyday that one of your friends or acquaintances get a new virus in their computer. You might think, How cool would it be if I made a virus? or How cool would I be if i c ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
April Fool's Day, aka National Screw with Your Friends Day, is finally here. You can always pull a conventional prank, like strategically placing a whoopee cushion on your mom's chair, but that joke has been exhausted generations before smartphones were around. We live in a d ...more
Want to get even this Halloween? Want to scare somebody with nothing but a few lines of code? Here's how it can be done... So, with arguably the best holiday quickly approaching us, I thought I'd do a fun post on a cool way to prank your friends, enemies, or maybe even the wh ...more
Welcome back, my amateur hackers! With Halloween right around the corner, I thought you could have a little fun with your newfound hacking skills using a hack that is guaranteed to freak out your boss, teacher, coworker, friend, etc. Any time someone's computer seems to act ...more
Hello Hackers/Viewers, It is a new day, and you might be thinking, It is so boring, why not try to be cool with computers in front of my friends? That is why, I have made this tutorial to make fake viruses using notepad to look cool! Step 1: Requirements for the Prank First ...more
Since most devices these days are mobile and wireless, a lot of people have a bunch of old hardware from a decade or two ago sitting around unused, just wasting away in dusty boxes. Look familiar? If you have an old mouse (or several) lying around, you can turn it into a wire ...more
Apple scrubbed the floor clean of all existing text-bombing apps in the iOS App Store, and even though there were once a ton of these apps in Cydia, the go-to store for jailbroken devices, there few and far between these days. If they do exist, they either cost money or don't ...more
If you read my previous post, "How to Hack into a Mac Without the Password", you know that it is very easy to break into someone's Mac if you have physical access to the computer. Now the question that lies is, how do we protect ourselves from this happening to us? Well, here ...more
You're at your friend's house. All you've heard about all day is his new laptop. He's got a brand new top-specced MacBook Pro, and he won't stop going on about it. It particularly annoys you as all you've got is a 4 year old cheap laptop, even if it is running Linux. If only ...more
Disclaimer: All information in this tutorial is for entertainment and educational purposes ONLY. You pesky teenagers. In my previous tutorial, I covered how to make a backdoor in an OSX system. I also covered some fun commands to try whilst the backdoor connection is in tact. ...more
Welcome back, my neophyte hackers! In today's hack, we're going to have a bit of Halloween fun. Have you ever had a boss who made you miserable with his micro-management and nagging? Maybe you thought he unfairly fired your friend/colleague? Well, now here's your chance to ge ...more
I spend practically all day surfing the web and writing on my laptop, and just as much time texting and checking emails on my smartphone. So, it's only natural for me to charge my iPhone using the USB port on my MacBook Pro. Since that USB port is located on the left side of ...more
It can be extremely frustrating when you've forgotten the pattern you use to lock your smartphone, and even more so if someone has managed to prank you by changing it. Luckily, there's an easy fix if you know the username and password for the Gmail account you used to set up t ...more
Before I start this tutorial, no, this is not that "Effective. Power." text that is going around. With that being said, let's talk about this attack. Hello, my hacker friends! Today we are going to look at how hackers can take advantage of the system, and repeatedly crash the ...more
If you have a Mac running Mountain Lion, I'm sorry to tell you that all it takes to crash almost any app on it is eight little characters. This strange bug seems to only affect Mountain Lion and doesn't cause your computer any harm. Apparently, it even crashes the error report ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more
Edit: Some of the methods I show you may be difficult, or not work at famous or high quality hotels. Welcome back, my excited hackers! Right now I am on vacation in the wonderful city of Tulum, Mexico. I thought it would be a great idea to teach you guys yet another social en ...more
Welcome back, my future hackers! After my first tutorial about doxing, I decided I would dive a little bit deeper into the world of social engineering. In this tutorial we will learn some basic social engineering techniques to get into a company building, find out more informa ...more
While clicking random links on the internet probably isn't the best idea to begin with, now you can rest easy knowing that your iPhone won't repeatedly dial 911 after tapping a malicious link in Twitter, Facebook, or other apps that use iOS's WebView. The links in question, w ...more
Ah, the art of the April Fool's Day prank. It has to walk a fine line: not enough prankish flair and the joke falls flat. If it's too mean, then you've just bummed everybody out. Fortunately, this prank is a perfect trifecta: it's surprising (even shocking), cheap and easy to ...more
Yellow buses are beginning to trickle into traffic. Retailers are pushing pens, pencils, and notebooks. Grumbling Facebook statuses run rampant through your feed. Surely you recognize the signs—school is starting. For some, it already has. There's some fun stuff about school, ...more
In college, I enjoyed eating, sleeping and making my roommate's life a living hell. My most satisfying prank involved 500 red cups stapled together, filled with water, and strewn across his bedroom floor. He was not happy. To clean up, he had to unstaple each cup, carry it to ...more
Tesla founder and CEO Elon Musk offered some insight into how hackers might seek to turn driverless cars into zombie fleets, but remained upbeat about what can be done about it. Speaking at the National Governors Association this weekend, Musk covered a lot of ground when ask ...more
This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more
Hello fellow grey hat hackers, as hackers it becomes necessary for us to be able to send emails anonymously. Whether for whistle blowing or pranks or social engineering or whatever, it just is necessary for us to do that. So then I tried with python smtplib but then that requ ...more
Relentless in its fury, the iOS text messaging exploit that exploded onto the scene late last week seems to do more damage than initially reported. Used to reboot devices and crash the Messages app, the string of text can also be used to crash third-party apps such as Instagr ...more
On the internet, everything is possible, even if it's not grounded in reality (check no further than anything The Onion publishes). Witty headlines combined with clever photo edits make even the most absurd topic seem like a serious news story. Some of these stories are so con ...more
During a contest in 2010 regarding which country Justin Bieber should visit next on his tour, North Korea won by a landslide. Unfortunately, he never went, and that's partly because nobody in the internet-less dictatorship probably voted. Instead, the contest was rigged by 4ch ...more
Have you ever been locked out of your iPhone? Maybe you forgot your passcode. Or perhaps someone with access changed the passcode as a prank. Your iPhone's display could have even been damaged and unresponsive. Whatever the reason, there's an easy way to get back access to you ...more
If we were to assign a theme for the 2019 edition of the Next Reality 30 (NR30), it might be something along the lines of, "What have you done for me lately?" Many of the top names in the industry from the 2018 edition remain the same, but their positions have shuffled. The p ...more
When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called r ...more
Code execution in Microsoft Word is easier than ever, thanks to recent research done by Etienne Stalmans and Saif El-Sherei. Executing code in MS Word can be complicated, in some cases requiring the use of Macros or memory corruption. Fortunately, Microsoft has a built in a fe ...more