Learn how to flash a custom recovery image and load a custom ROM onto a rooted Droid Eris Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiF ...more
Learn how to load a custom ROM onto a rooted CLIQ Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiFi tethering. For all of the details, and ...more
Learn how to load a custom ROM onto a rooted Nexus One Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiFi tethering. For all of the details ...more
Learn how to load a custom ROM onto a rooted HTC Magic Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiFi tethering. For all of the details ...more
Unlock your Hero's hidden potential by running a custom ROM on it! Loading custom ROMs lets you do fun things with your Hero like overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to learn how to put a custom ROM on y ...more
Unlock your mobile phone's hidden potential by running a Hero ROM on it! Loading custom ROMs lets you do fun things with your Hero like overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to learn how to put a custom RO ...more
Root your Donut smartphone the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Donut cell phone, take a l ...more
Root your G2 the easy way with an app you can download directly from the Android market! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get sta ...more
Root your MyTouch Slide the easy way with Exploid rooting tool! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC ...more
Root your Droid Eris the easy way with unrEVOked rooting tool! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC ...more
Root your Droid 2 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Droid 2 cell phone, take a look. L ...more
Root your HTC Incredible the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC Incredible cell phone, t ...more
Root your Cliq XT or Quench the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Moto Cliq XT or Quench ce ...more
Root your XT701 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own XT701 cell phone, take a look. Learn ...more
Root your Vibrant or Captivate the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Samsung Vibrant or Cap ...more
Root your Aria the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC Aria cell phone, take a look. Lea ...more
Root your MyTouch 3G the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own MyTouch 3G cell phone, take a lo ...more
Root your G1 the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own G1 cell phone, take a look. Learn how t ...more
Root your Liquid the easy way! Unlock your mobile phone's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Droid cell phone, take a look. Lear ...more
Root your Desire the easy way! Unlock your HTC Desire's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started making your own Desire more desirable by rooting it, ta ...more
Root your Legend the easy way! Unlock your Droid's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own HTC Legend mobile phone, take a look.
Root your Droid the easy way! Unlock your Droid's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to get started rooting your own Droid, take a look.
Root your Behold 2 the easy way with this video tutorial, which presents a complete, step-by-step overview of the process! Unlock your Behold 2's hidden potential by running custom ROMs, overclocking it, and even turning it into a wireless hotspot with WiFI tethering! For all ...more
In this tutorial, we learn how to use a number of useful tips & tricks for the Dashboard on an Apple computer running the Mac OS X operating system. It's an easy process and this video presents a complete guide. For more information, including a full demonstration and detailed ...more
In this clip, you'll learn how to turn on and access the hidden "GodMode" feature on a laptop or desktop computer running the Microsoft Windows 7 operating system. For more information, including a complete demonstration of the process and detailed, step-by-step instructions, ...more
No need to make a bad situation worse when running into an ex boyfriend or girlfriend. There is no need to be petty or spiteful when keeping to a nice yet vague conversation will ultimately leave you looking like a real class act. It’s bound to happen sooner or later, so you ...more
In this installment of the Lowe's home improvement series, host, Mike Kraft, one of Lowe's home improvement experts, demonstrates how to install lighting under your kitchen cabinets to make navigating your counter top easier. Mike lists all the necessary tools and materials yo ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more
Since the invention of the mechanical clock, enclosure of the commons, and proletarianization of labor, the alarm clock has been the bane of our existence. While not actually evil, it does represent the constant and uncompromising glare of our owners shaking a patronizing fing ...more
Computer crashes, fried hard drives, red rings of death, delinquent memory cards... nothing is worse than dysfunctional technology. In just a minute, your favorite and most used device has become the biggest headache of your life, frustrating you to the brink of madness. But w ...more
UPDATE: Minecraft 1.9.5 Has Been Leaked! Get it Here. You heard right. This one is hot off the presses! Last night, Notch promised a 1.9 Version 3 Update and here it is! Jens confirmed that this update would include: "simplified potion system, added some new items and enchan ...more
In this how to video, you will learn how to replace the touch glass screen digitizer on an iPod Touch. First, use a pry tool and run it along the sides of your iPod Touch. Once this is done, remove the cover. To remove the battery, run the pry tool along the edges and gently p ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
Every Modern Warfare game has had bits of enemy intel for you to recover, and they're always hidden within the level. The few pieces I've uncovered across the series has always been through dumb luck. But if you want that 'Scout Leader' achievement, you'll have to find all 46 ...more
Minecraft World user Xhoes is building an epic "Capture the Flag" arena. While still a work in progress, this epic arena boasts two fortresses with flags, obstacles and objects to hide behind in the battle field, and an underground passageway. In Capture the Flag, two teams c ...more
The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job. There are paid services th ...more
Unlock your Samsung Vibrant or Captivate's hidden potential by running a custom ROM on it! Loading custom ROMs lets you do fun things with your Vibrant/Captivate like overclocking it, and even turning it into a wireless hotspot with WiFi tethering. For all of the details, and ...more
Unlock your HTC HD2's hidden potential by running a custom ROM on it! Loading custom ROMs lets you do fun things with your HTC G1 like overclocking it, and even turning it into a wireless hotspot with WiFi tethering. For all of the details, and to learn how to put a custom ROM ...more
Unlock your Samsung Behold 2's hidden potential by running a custom ROM on it! Loading custom ROMs lets you do fun things with your Behold 2 like overclocking it, and even turning it into a wireless hotspot with WiFI tethering. For all of the details, and to learn how to put a ...more
Unlock your Galaxy's hidden potential by rooting it! Rooting your phone will enable you to do fun, against-the-rules things like running custom ROMs. Want to turn your Galaxy into a wireless hotspot with free WiFi tethering? You can do that too. Don't know how to root an Andr ...more
Unlock your HTC Tattoo's hidden potential by rooting it! Rooting your phone will enable you to do a great number of fun, against-the-rules things: Interested in running a custom ROM? It's easy. Want to turn your Milestone into a wireless hotspot with free WiFi tethering? Go ah ...more
Unlock your Motorola Milestone Google Android's hidden potential by rooting it! Rooting your phone will enable you to do fun, against-the-rules things. Interested in running a custom ROM? It's easy. Want to turn your Milestone into a wireless hotspot with free WiFi tethering? ...more
For this prank you will be pranking someone on the crew, well set up a fake prank with a nonpoisionous snake that the person who is being pranked must be bitten by....manny the expert can be there fake panicing say that the certain snake was hightly poisionness and that he nee ...more
Dress up like a raccoon, and wait for people to take out their trash. When ever they put the garbage can on the curb, run out from where you were hiding and spear the trash can. Then whenever they turn around to see what is going on, start hissing and growling at them like y ...more
First you are going to need some big speakers. Then you need to record the sound of a car accident. Now hide the speakers near a busy crosswalk. Turn up the volume and wait for people to cross the street. When the person or the people are passing right through the middle of t ...more
This tutorial will show you how to hide files on your computer using an image file. The first step is to get an image file and edit it with Microsoft Paint or Adobe Photoshop. The next step is to save the image file as a jpeg file. Now create a WinRaR archive file and copy the ...more
Ron Hazelton brings you this video on wainscoting. Wainscoting is paneling that runs about a third of the way up a wall. Ron shows you how to use a chair to figure exactly where to place the chair rail. When installing around electrical outlets be sure to turn off the electric ...more
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions ...more
Despite all the tragic stories you hear on the news, you'll probably never be involved in a shooting. But you never know. Nobody thinks it’s going to happen to them – until it does. Be prepared to survive a shooting rampage, just in case. You Will Need *A cool head *Quick re ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all fo ...more
Is that House? Built in Minecraft? Well, time to cross out one more item off my bucket list! As inspiration for this week's Minecraft-themed Tuesday Giveaway (enter here to win an awesome Minecraft Pickaxe!), I present a roundup of amazing things found in Minecraft. The great ...more
So you own the latest smart phone beast, the HTC Thunderbolt, but you don't get 4G service in your area yet and it's killing your battery life because of the constant 4G searching. What to do? The 4G network is spreading throughout the country which is great, but it's not prov ...more
In the wealthy oil man's world of Arabian camel racing, the tradition of using child jockeys has been replaced with the use of small robo-jockeys in recent years. But after finally ridding the game of the mistreatment of children, the sport is now under scrutiny again. The Dub ...more
Putting music on your iPod using Windows normally require having to use iTunes, which can be a real pain in the but if you hate using extra software for something that should be as easy and dragging and dropping. But using a cool trick, you can add music to your iPod in the e ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Jailbreak almost any Apple device If you haven't heard, it's now legal to "jailbreak" and unloc ...more
Up On the Roof: Urban Rooftop Farming and The Brooklyn Grange So sometimes something inspires me so much that it makes me want to run to the rooftop of my eastside L.A. apartment and shout out at the top of my lungs "LOOK AT THIS, THIS IS AMAZING!". The Brooklyn Grange is one ...more
In this how to video, you will learn how to make videos that mix live action with video. First, set up the camera in the back of the room. Zoom the camera in where the white area is. Once the camera is running, go in front of the screen and perform actions. Next, play the vide ...more
There's four shadow arena fights in this level of the Xbox 360 game Darksiders. In the Drowned Pass, there's the Counter Killer, Wrath of War, World of Pain, and Defender. The Drowned Pass features a deep lake in the middle of the area, a path that runs about the outer edge, a ...more
Have something you want no one else to find? The best hiding places are in plain sight. Follow these steps to create a shockingly sly storage space. You Will Need: • A plastic switch box • A rotary tool • An electrical socket • Screws • A Phillips-head screwdriver • A f ...more