One way to really mock your friends on their behalf is to pull this awesome shower prank! This practical joke video tutorial will show you how to prank a showering friend with a school girl outfit. It's pretty simple: Get one wet man in the shower and one Catholic school girl ...more
We've all heard that death comes in threes. In our tireless hours of prank research here at Wonderhowto, we've observed that pranks often do as well. By stringing three simple pranks together, you can achieve all of the annoyance and laughter of a much more elaborate / expensi ...more
Neck pain can be the worst. Be aware of daily habits that may be causing your chronic neck pain and replace them with healthy choices. In this tutorial, learn how to soothe chronic neck pain. You Will Need: • An ice pack • Neck and shoulder exercises • A massage • Good po ...more
A bit rusty on the banjo? This video lesson from the BCC will get you going again. If your banjo hasn't been played for some time it's possible the vellum might need replacing - this is the skin, like the head on a drum, which is stretched over the banjo's circular sound body ...more
Taking this formula 9x²+y²=9 your instructor shows you how to find the solution for the variable y. Finding a second derivative is no more difficult that finding the first derivative, you only have to do the problem equation through twice. The derivative of 9x² will be 18, of ...more
TCP/IP Client / Server Application Hello! Today's blog post will be about coding a very rudimentary Client and Server application duo, which will communicate by using TCP Sockets. It is, as illustrated, in principle, just two cans and a string that ties them together. The se ...more
Chi gyo ichi nyo is a familiar expression in the dojo. The word chi means knowledge. Gyo means doing, or action. Ichi nyo means inseparable. Action and knowledge are one! Acting without adequate knowledge or understanding is a constant source of frustration and problems. In ou ...more
BPA: Why Plastic Ain't Good For You BPA or Bisphenol A is in many of the products we use. Everything from Ziploc bags to shower curtains, we are exposed to BPA all the time. If you're living the organic life hardcore already, you've noticed Nalgene bottles are out and have b ...more
Stop throwing out the rolls when the paper towels are gone. There are dozens of good uses for them. You Will Need * Empty paper rolls * Imagination Step 1. Make gift boxes Turn them into gift boxes. Paper rolls are great for holding small items, plus they’ll keep the recip ...more
Smartphones are crazy awesome. You can do your banking, track your children, find directions, and even pretend to have a mustache. The only thing that these personal supercomputers are missing is physical interaction with the environment. I wanted to be able to call my house ...more
In this article, I'll be exploring the basics of Python, i.e. variables, input and output. You'll need Python (2.7+), a computer, and some free time. Variables Simply put, variables are like envelopes. They are empty and meaningless until we place objects and meaning into th ...more
It’s been a pretty big week for Google, and Google+ itself. There were a number of articles proclaiming the end of Google+, because allegedly traffic dropped over 60% after it opened to the public. Then +Steve Yegge accidentally posted a long rant on Google+ itself, which was ...more
For this particular example, I will be working on Wndows (sorry X users). I might write a similar guide once I am more comfortable with programming in Linux. What You Will Need Visual C# 2010 Express (Get it here) Pirate Metal Source Code (For when you are done with the guid ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
This week, Google held back on introducing a slew of new Google+ features, and introduced new Chrome extensions instead. The new additions won't replace of your favorite Chrome extensions, but they are very useful, and elegant. Google+ Chrome Extensions From Google +Timothy ...more
Today concludes our Gamer's Guide to Video Game Software (see Part 1 & Part 2). In our final installment, we will shift away from engines toward video games that allow you to make your own games within them. Many games have featured level editors that allow users to create th ...more
I love my laptop. It goes wherever I go. Unfortunately, that means that it also gets pretty grubby after a while. The screen gets dusty. The frame gets smudgy. The spaces between the keys fill up with crumbs of questionable origins. And my desktop? That thing is a dust bunny m ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
Planning the Trip Get lots of brochures Send for brochures of the places you will be visiting. Make a travel book with the brochures to get the grandchildren and their families excited. The best place to contact for these brochures are the Visitors Bureaus or the Chamber of ...more
Jezebel's back with another Beauty 101 (1, 2, 3), and this time the issue at hand is body odor. Everybody gets a little stinky from time to time (some more than others), but have no fear- there are solutions. Jezebel readers also address problems such as pit stains, excessive ...more
Tomorrow's the 1st of April which means it's the one day of the year you can put aside the daily grind, and go at it Dwight Schrute and Jim Halpert style. Yes, there are easy apps to do your dirty work, but if you're old school and you like to do it the old fashioned way, here ...more
You Want White Teeth Without Expensive Over-The-Counter Products? Here's An Inexpensive, Effective Solution. Everywhere you look there are products for whitening teeth. You could spend a fortune on products you have to use everyday. This tutorial will show you a natural, inex ...more
This prank is an all day type prank. basically your just going to fuck with the person all day. The day before you are going to fuck with that person set video camera up all over the house or hotel room. ~Shampoo Sink-Up Before you wake the person up go in to the bathroom emp ...more
Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing u ...more
In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exp ...more
Acanthamoeba keratitis (AK), a rare eye infection caused by the Acanthamoeba ameba found in tap water, affects a few dozen people in the US every year. In some cases, it can have devastating effects, like what Irenie Ekkeshis has experienced; She was blinded by AK in her right ...more
As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editi ...more
Welcome to a tutorial on XOR encryption. We'll be looking at what XOR is and how we can use it to encrypt or decrypt data. What Is XOR? XOR is a bitwise operation in which each of the bits are compared and applied with the XOR operation according to the following table: We c ...more
Election day is less than two weeks away and the political rhetoric is at an all time high. From the constant political commercials to the endless cable news coverage, it's hard to escape the noise. And nothing is worse than your social media sanctuaries being invaded by some ...more
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get ...more
It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our ...more
If you enjoy watching music videos, live concert recordings, or bedroom cover songs on YouTube, then YouTube Music is worth your consideration. In fact, YouTube will show a "Switch to YouTube Music" button on some music videos that opens the song in the YouTube Music app — but ...more
The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data ...more
If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding. Today we are going to explore some of the inner workings of Bitcoin. As we previously learned in th ...more
As a contact lens wearer, are you using the same contact lens case you've been using for years? Do you ever use tap water as emergency cleaning solution overnight? Do you shower or sleep in your contacts? If you do any of those aforementioned things, stop right now. These bad ...more
Do you have two dollars and a water bottle? Then you can put together this simple but awesome solar-powered lantern that will provide more than enough light to read by at night. To begin, you'll need a water bottle, of course, some string, and optionally, a little bleach. You ...more
An attacker with shell access to a Linux server can manipulate, or perhaps even ruin, anything they have access to. While many more subtle attacks could provide significant value to a hacker, most attacks also leave traces. These traces, of course, can also be manipulated and ...more
In a bold move, Samsung has decided to forgo the Galaxy S11 moniker and jump straight to the S20. Perhaps it's marketing for the new 20:9 aspect ratio and 120 Hz display, or maybe it's just the fact that it's releasing in 2020. Besides the number, Samsung is borrowing from Ap ...more
A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because browser-stored passwords are hacker gold mines. With a USB Rubber Ducky and physi ...more
There's nothing worse than driving up to your destination only to discover that there isn't a parking spot in sight — but thankfully, Google Maps will soon have you covered. Android Police reports that the latest beta version of Maps V9.5 will incorporate a number of handy to ...more
Besides the obvious, fingernail polish can be pretty useful around the house—for men and women. It can keep your buttons from falling off, sort your keys, prevent your shoelaces and hoodie strings from fraying, and even curb rust rings in the shower. Turns out, nail polish als ...more
When you think of nail polish, it's probably almost always in the context of a manicure. I mean, that's what it's made for, right? But there are plenty of other things you can use clear or colored nail polish for besides painting your nails. Even if you're a guy living on his ...more
Popsci has posted 2009's most amazing scientific images, and there's quite a few great ones in there. A few of our favorites below, click through for all 62. In short, Cow Farts. "Scientists measure methane at the source: In a lush pasture near Buenos Aires, this cow and its ...more
A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website d ...more
While our time with the Protostar VM from Exploit Exercises was lovely, we must move on to bigger things and harder challenges. Exploit Exercises' Fusion VM offers some more challenging binary exploitation levels for us to tackle. The biggest change is that these levels are al ...more
A mention of the deep web can bring to mind images of drugs, hackers, and other criminal activity. Despite the presence of these elements, the Tor network is a valuable tool for preserving privacy and anonymity. And browsing the deep web and any hidden services can be as simpl ...more
A long time ago, we recommended the Hover Zoom extension for Chrome as an easy way to blow up small image thumbnails without actually have to "click" on the images themselves. Over the past year, there have been reports that Hover Zoom now collects and sells your browsing data ...more
The first sneak peak of Android O is finally here. The developer preview promises more features, stabilization, and better performance, according to the Android Developers Blog. Furthermore, there's speculation that the latest operating system will be code-named "Android Oreo, ...more
Greetings null-bytians. Firstly, I would like to apologize for the no images thing. I guess I can't upload them. If you have watched the documentary titled "In the Realm of the Hackers", the one about two Australian hackers, Electron and Phoenix, you will know that it was a g ...more
When setting up a new Mac, there can be a bunch of settings that need to be changed in order to get the system running the way you like it. That usually involves going through tons of System Preferences panes and app settings—but it doesn't have to. If you'd rather get everyt ...more
Welcome back, my novice hackers! In a recent tutorial, I showed how the SNMP protocol can be a gold mine of information for reconnaissance on a potential target. If you haven't already, I strongly suggest that you read it before progressing here, as little of this will make m ...more
There is no shortage of defenses against cross-site scripting (XSS) since it is so prevalent on the web today. Filters are one of the most common implementations used to prevent this type of attack, usually configured as a blacklist of known bad expressions or based on regex e ...more
Although the Galaxy Note 9 is an amazing phone, many members of the Android community won't even look at it. This isn't just because of the Samsung Experience skin, but the large amount of bloatware that comes with this device. However, with a little work, you can remove all o ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more
In the ongoing search to find better ways to use antibiotics, an extract made from maple syrup has some surprisingly important medical benefits. As bacteria continue to outmaneuver antibiotics, our options for treating infections narrow. Plus, slimy bacterial communities call ...more
Welcome back, everyone! In this lesson, I'm going to go over the use of the echo function and variables, as well as basic syntax. You will need: A text editor - I personally recommend the free (and amazing) Notepad ++, but you can use any text editor you want, even Windows' ...more
The lingering smell of cigarette smoke can bother just about anyone, including smokers themselves. Unfortunately, it can be quite difficult to mask or completely get rid of the smell altogether. While you can go through extremes like washing and even repainting the walls in yo ...more
When performing something such as a mass mailer attack on a company, sending executables usually isn't the best option. That's why, in this tutorial, I'll be teaching you how to code a VBA script macro into a Word document in order to compromise a system. Combined with a littl ...more