Random Number Generator

How To : Make uTorrent 2.0 faster

This video is about how to make uTorrent 2.0 faster. The first step that you will have to do is to open your uTorrent 2.0. Once you have opened uTorrent 2.0, go to "options" then click "Preferences". Once you have clicked "Preferences", go to "Connection" found on the left sid ...more

How To : Create Strong, Safe Passwords

Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more

How To : Use secure online passwords

In this video, we learn how to use secure online passwords. There are a ton of things to consider when creating a password. A weak password is something that someone can easily guess. If you are using a birthday, common dictionary word, child's name, or something common then y ...more

How To : Convert to a higher equivalent fraction

A representative from Math Problem Generator explains in this video that converting a simple fraction from its current state to a higher equivalent can be very simple. He explains the process neatly and provides a great example. To convert a fraction, you must multiply the num ...more

DEBUNKED : 3 Viral Google+ Myths

It's only been a few weeks, and already there are a lot of misconceptions and myths floating around Google+. Let's take a deep breath, and tackle some of the more prominent ones. Myth #1: Google+ is Sexist At the onset, many respectable media outlets were reporting that most ...more

News : VARIOUS WINDOWS ISSUES RESOLVED BELOW...

STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more

How To : Calculate the probability of two dependent events

This video explains how to solve the problem of probability dependent events. In this video the problem is that a box contains three pens, 2 markers, and 1 highlighter. The person selects one item at random and does not return it to the box. So what is the probability that the ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

News : Official Phone Snap! Challenge Rules

Before you start snapping away and submitting your photos, please take some time to read the official rules below! No purchase necessary to enter or win; a purchase does not improve your chance of winning; void where prohibited by law. ELIGIBILITY: Only legal residents of t ...more

Google+ Pro Tips Round-Up : Week 1

With the Google+ team members being generous and free-flowing with advice on some of the more advanced features of Google+, we'll be publishing a weekly summary of the latest pro tips. Chances are, if you've been following the Google+ team members, you've seen some of these al ...more

News : Them's the Rules!

Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more

Red Dead Review part 1 : Sandbox Gameplay

Red Dead Redemption is hard to pin down in game play and story. The game offers this massive multi-layered world in which the player can roam freely, offering plenty of challenges, beautiful graphics and atmosphere for the player to experience. Yet after some point the whole w ...more

How To : GPU Accelerate Cracking Passwords with Hashcat

How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters t ...more

Checkmate and... Checkmate : Bizarre Three-Way Chess Game

In a recent episode of The Big Bang Theory, character Sheldon Cooper designed a highly complicated three-person game of chess, with an odd-shaped nonagon board and two new pieces—serpent and old woman. Seemingly pioneering, in truth, three-player chess has been around since th ...more

Hack Your Brain : Improving Memory with Dirty Pictures

If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to i ...more

How To : Fake Telepathy or ESP at the Bar with Scam School

In a double-stuffed episode of Scam School, you'll learn how to fake ESP powers — a diabolical method to fake telepathy between you and a friend — and see a mind control trick from outer space with Scam School's first intergalactic student! The Setup To prove that you and yo ...more

IPsec Tools of the Trade : Don't Bring a Knife to a Gunfight

Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security profe ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

Making Electromagnetic Weapons : EMP Generator, Part One

In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, a ...more

Minecraft : Her Crushed Dreams

What happens when a person who has never played a building sandbox game tries it for the first time? Reality happens. The harsh reality of human nature. You would think playing with friends in a creation game would be utopia, but in truth it's more like being stuck with people ...more

How To : Write the Action/Adventure Screenplay: Act 2

So our GUY has traded wallets with a gangster, met a beautiful Grocery Store cashier, and used the Gangsters credit card. Act 2 Now that GUY has used the gangster's credit card, this is a great time to show MUGGER (the villain). Let's say some things about MUGGER in the foll ...more

Red Dead Redemption : A bounty hunt

A bounty hunt is simple: Go to the wanted board in your ranch or city and look for a wanted poster. Look at the bill and if it's to your liking, accept the bounty. Once you get to the gang hideout, take the boss alive for more money and fame, or just kill him and bring back e ...more

News : The Role of a Gaffer

Both on and off the set, the Gaffer or Chief Lighting Technician is one of the most important positions around. Though the average movie goer most likely has no idea the job even exists, they probably don't know what 99% of the other crew is/does either.   From the time a DP ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

Kick Ass Review Part 2 : Gameplay and Design

Kick Ass Review Part 2: Gameplay and Design In the game, you can play as Kick Ass, Hit Girl, or Big Daddy. Each charater has a light and heavy attack that can be strung together into small combos. Each character also has three special attacks assigned to the Square, Triangle, ...more

How To : Perform a mind reading heads/tails trick

In this video, we learn how to perform a mind reading trick with Brian Brushwood. First, grab some random change out of your pocket and tell the other person to turn over any coin the choose. Then ask them to turn over two more. Now tell the person to pick a coin and slide it ...more

How To : Make your own crossword puzzle

Crossword puzzles are great way to exercise you mind and have something fun to do with breakfast. Don’t just do a puzzle, but make one yourself. You can do it by hand or try out the help of a crossword building software. For beginners, there are easy ways to create your first ...more

How To : Get a pet dog, wolf or bear in MyBrute (06/02/09)

Hack mybrute with this mybrute cheat. MyBrute hacks, cheats, tricks. Watch this video tutorial to learn how to get a pet dog, wolf or bear in MyBrute (06/02/09). So how do you get a pet dog, a pet wolf or a pet bear in MyBrute? 1. First, create a new MyBrute character but ma ...more

How To : Turn Your Boring To-Do List into a Real-Life RPG

When you think about it, isn't life just one big open-world RPG just begging to be conquered? We all have a set number of specific tasks or chores we must complete every single day like clockwork. Sometimes, these items on our to-do list can become tedious and cause us to lose ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

News : Apple Releases iOS 12.4 Public Beta 4 for iPhone

While iOS 13 is not ready for public beta testers just yet, Apple is still testing iOS 12.4 out, and you can install that right now on your iPhone. The latest version, iOS 12.4 public beta 4, was released June 12, a day after its developer version. Since iOS 12.4 developer be ...more

  • Hot
  • Latest