Run and Hide

Kick Ass Game Review Part 3 : Conclusion

Kick Ass Review Part 3: Conclusions [Spoiler Alert! Plot points are discussed from the movie and comic in this section!] Big Daddy as a selectable character presents problems for the story in the game. In the movie and in the comic, Bid Daddy dies. As a playable character th ...more

How To : Read Minds with a Simple Mentalism Effect

What if I told you that you could read minds? You'd most likely think I was crazy, and you'd be right. But what I really meant is that you could make people think that you could read minds, something that's not the least bit crazy. Performing mind reading — and it is a perfor ...more

News : How-to Design Amazing Web Pages Using Basic HTML

INTRODUCTION In this world of Internet era, almost everyone wants to create theirs own web presence by either hosting their own blog, articles, photos, videos, reviews, etc etc . But some people choose their own way and decide to have something bigger! What is it? Its a websi ...more

How To : Hide your IP address from Hackers

How to Hide IP from Hackers. Hide your IP address to get more security. Hotspot Shield (free) change your IP address and your location. To see the changes visit http://www.ip-adress.com/ before and after running program.

How To : Use a metal detector to uncover hidden bounty

Treasure may be buried as close as your own backyard. If you have some time to kill, try the art of treasure hunting. You’ll be sure to discover lots of interesting thing after learning how to use a metal detector to look for treasure. Think buried treasure is only for pirate ...more

News : Parking lot beat down

Have the victim park their car in a normal parking spot. While they are in the place they parked at have another car (the prankster) drive up and swipe the back of the victim's car, leaving huge dents in both cars. Have the prankster wait, hidden, outside for the victim to com ...more

News : Baby Wee-Man Birth

Set up one of the guys or an actual girl as a pregnant female in a restaurant and have her go into labor. She will lay down in a predetermined place over an area where Wee-Man is hiding underneath. Create a scene, have Preston pretend to be a patron/doctor in that restaurant a ...more

How To : Fish for bass using a square-billed crankbait

If you're bass fisherman, then you know that the lipless crankbait is the bait you want in your fishing box. It's great for catching roaming fish chasing bait fish. However, there is an alternative you could use— a square-billed shallow running crankbait. They both are used in ...more

How To : Bass fish using year-round buzz bait lures

You can't catch a fish if you don't have the bait… and a buzz bait are great for snagging bass. So, if you're a bass fisherman, you can't not know this information. Get the scoop on buzz baits. Wade Bourne of MyOutdoorTV shows you how buzz baits are good lures for catching bi ...more

News : The Old Pervert

Alright guys, I'm Aaron from Texas. I want to prank my bestfriend James that moved away to California outside of Oakland a few years back. He is now a guitar teacher and I think at work would set him up for the best prank ever. The idea is to set up an appointment with him for ...more

How To : Update your PSP to a full 5.50 Gen

This video will walk you through the process of updating a psp to the 5.50gen-a. This is information you may want if you are an avid psp user and would like to hide your Mac address. This video is a little hard to see but he will talk you through the main points. Requirements ...more

How To : Speed Up Your Computer (Windows 7 OS)

Are you tired of counting your hair while waiting for your computer or laptop to respond? Then, these easy steps are perfectly fit for you, especially if you're a Windows 7 user. It's time to speed up, my friend! Performance Over Appearance Modification Let's start with opt ...more

News : Yack Piss Water Balloons

the crew gets together with mopeds in a giant muddy pig pen and there armed with yack piss in water balloons starting a starting a yack piss waterballoon fight lol got a ring to it raab himself and novak run into eachother trying to hit eachother in the face with a piss balloo ...more

News : Scared Sh**less

The prank will involve : -A very high cliff -A car -A track for the car -An unsuspecting victim (preferably someone EXTREMELY afraid of heights) The idea would be to put a car near the edge of a cliff. Unknown to the victim, the car would be on a track to keep it from dri ...more

News : Never Drinking Again, Worst Hangover Wakeup

If you've gotten drunk and had a hangover, you know how bad it can be in the morning. The slightest thing is like tortue. This will make someone never wanna drink again. It gets pretty good, so you gotta read it all. Ok, get someone to drink very heavy that doesnt drink that o ...more

How To : Find Hidden Web Directories with Dirsearch

One of the first steps when pentesting a website should be scanning for hidden directories. It is essential for finding valuable information or potential attack vectors that might otherwise be unseen on the public-facing site. There are many tools out there that will perform t ...more

How To : The Ultimate Guide to Customizing Your iPhone

Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more

How To : Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more

How To : Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed ove ...more

How to Hack Databases : Hunting for Microsoft's SQL Server

Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Althoug ...more

How To : Enable the Built-in Screen Recorder on Android 10

Downloading third-party screen recording apps can be dangerous. The primary function of these apps is being able to record everything on one's display, so it's easy to see how a malicious developer could exploit this for their own gain. That's why the addition of Android 10's ...more

How To : Hide the Home Bar on Android 10 — No Root Needed

With the new navigation gestures in Android 10, you reclaim a lot of screen real estate that used to be occupied by the back, home, and recent apps buttons. But there's still a small bar on the bottom edge of the screen, and in most apps, it still sits atop a black background. ...more

How To : 60 iOS Features Apple Stole from Jailbreakers

Overall, iOS is more impressive than ever with its stability enhancements, security tools, suite of apps and services, and intuitive user interface. With each passing update, things just get better and better for iPhone users. But don't think for a second that this is all beca ...more

Hack Like a Pro : Abusing DNS for Reconnaissance

Welcome back, my tenderfoot hackers! As you know, DNS, or Domain Name System, is critical to the operation of the Internet. It provides us with the ability to type in domain names such as www.wonderhowto.com rather than the IP address. This simple service saves us from having ...more

How To : Steal macOS Files with the USB Rubber Ducky

If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more

How To : Mine Twitter for Targeted Information with Twint

Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more

How To : Hide a Virus Inside of a Fake Picture

In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenari ...more

How To : Essential Minecraft PVP Tips

In Minecraft, a large aspect of the game is PVP (Player vs. Player Combat). A hardcore Minecraft fan will remember that back in Beta 1.8, combat was switched up, and it really changed the game around. Here are some tips on what a two-year Minecraft player has to say. Step 1: ...more

How To : Maximize Your iPhone's Battery Life in iOS 8

The new iPhone 6 and 6 Plus are supposed to last a lot longer in your pocket with improved battery life, but that doesn't mean that iOS 8 will be that friendly on your older iPhone model. All of those awesome new features could be killing your battery, but with some simple twe ...more

How To : Set Up Private Internet Access in Linux

This tutorial is for those who've purchased an account with Private Internet Access to hide your VPN and would like to set it up in Kali. Please note, you can chose to run your PIA service from your Windows computer without configuring it in linux as long as you'll be using a ...more

  • Hot
  • Latest