Someone Attack From Behind

News : Minecraft World's Ultimate Survival Guide, Part 2

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Welcome back to Minecraft World's Ultimate Survival guide! A few days ago, we reviewed a good way to start off right when you spawn, plus a small rundown of the mobs. Now we will co ...more

How To : Give an atomic wedgie like in Casper

How to pull someone's underwear over their head. This tutorial uses film stills from the movie Casper: A Spirited Beginning to illustrate this classic kids' prank. Pull the underwear up from behind, over the head. It's only an atomic wedgie if it goes over the head! Use this a ...more

How To : Practice a step back jumper with Manu Ginobili

This is how to do the Manu Ginobili step back jumper! NBA hot shot show's us how to pull the step back jumpshot, one of his Signature Moves on Nike's series. First the long step and catch your balance. Then setup for the rim. Go behind the back and then see what you have in fr ...more

How To : Apply and move a ball marker in golf

This video explains the importance of marking your ball on the putting green. If someone else is also playing golf, and theirs hits yours (and it isn't marked), its a two stroke penalty. In order to mark the ball, set a coin directly behind the ball onto the green. Then when y ...more

News : MegaUpload goes down - Anon retaliates.

As you may or may not know, MegaUpload - one of the largest file sharing services has been taken down by the feds. To us - this means no more 1gb free downloads. And we move onto MediaFire and Rapidshare. - But more importantly, this means that our inherent freedom to share f ...more

How To : Create a mousetrap noisemaker prank device

Besides being useful, mousetraps can be pretty loud, which makes them perfect for the prankster at heart. They can scare the crap out of your intended victim, but for some, giving them the heebie-jeebies can be more difficult than just a normal trap. They might not scare as ea ...more

How To : Stop a cough with acupressure

Learn how to stop a cough with acupressure. The next time you're hacking up a lung, try stopping it with the ancient Chinese healing art acupressure. You Will Need * Two hands * Friend WARNING: If you feel pain when using acupressure, stop immediately. Pregnant women should ...more

How To : Perform the Heimlich Maneuver (abdominal thrusts)

Abdominal thrusts—also known as the Heimlich maneuver—can be used to expel a foreign object lodged in a choking victim's windpipe. Watch this video tutorial to learn how to perform the Heimlich Maneuver (abdominal thrusts). You Will Need * Someone to call 911 * Firm resolve ...more

News : My Game

Where were you in 1993? Thinking about starting a tech company? Starting elementary school? Awaiting a 1996 Daft Punk party after which you would be conceived? It's been eighteen years, but the game that solidified my dorkdom for good is still coming out with new sets, still f ...more

News : OL's Breakfast, Lunch and Dinner in L.A.

Los Angeles is filled with a myriad of options restaurant wise for all of your foodie needs. I am indeed a foodie, but there is nothing better to me then simple produce inspired plates. Here are three of my favorite spots in Los Angeles to find great organic treats all around ...more

How To : How Businesses Can Prepare for Google+

WonderHowTo welcomes guest contributor, +Ryan Crowe - formerly the man behind GPlusTips. Crowe will be providing tips and tricks on how to use Google+ in interesting and innovative ways, and the self-proclaimed Google+ User Experience Enthusiast is nearly ready to launch a web ...more

How To : Join the Fight Against SOPA and PIPA

Amazingly, a lot of people I know haven't even heard of SOPA or PIPA. Now, every English-reading person with an internet connection will finally have those two four-letter acronyms emblazoned in their minds. For the entire day today, Wikipedia's English-language site will be i ...more

News : Gross Mouth to Mouth

Okay so it begins with someone either me or one of the jackass crew in the classic old person makeup that makes them look as nasty as possible. Then we get in an elevator with unsuspecting people and the "old person" pretends to be having a heart attack or something. finally, ...more

News : mannequin dool & Shot contest

1.dress like mannequin in stor in a loaded street and when people will stare sudenly washed by water hose that will operate by someone from behind!! it will bbbee soo fffuunnnyy2.place two poles with elastic ropes, on lake or sea shore and compete by throwing people.

News : The Poo Poo Pee Pee Attack

The Supplies You're going to need a lot of poop and pee for this one. Get guys with sling shots and squirt guns. If it's possible get a fire hose to shoot ALOT of piss at someone. Pick the victim Doesn't necessarily have to be a cast member, but someone associated with the ...more

HO HO HO MOTHERFUCKER!!! By : Melissa Barrett

Warning Make sure no one actually calls the cop man because if I ever saw some shit like this going down, shit that would be the first thing I did!!! The peoples involved in this prank can not be a woman or child just straight guys!!! when taping someone to the ceiling, mak ...more

News : Irving goes fishing and drowns to death.

The idea is to find a popular fishing spot like a pier or riverbank or low bridge and have zisman bring his pole. After a minute conversation with a local talkin bout how people don't fish like they used to hell back in my day we caught em with our bare hands you youngters are ...more

News : Ukraine Power Attacks; How, Who and Why?

Although there has been much speculation about how much damage could be done if hackers were to take control of a country's SCADA systems, there have been few examples - until a few months ago, with the power outage in Ukraine caused by hackers. How? The attackers used a wid ...more

How To : Hijacking Cookie Sessions

Let's say that we want to see what someone is doing on their computer? In this tutorial, we'll be hijacking cookie sessions to do just that! Step 1: Preparing Kali In order to do this, we need three tools: Ettercap (duh) Hamster Ferret Ferret is a nice little tool that run ...more

How To : The Difference Between Http and Https

With more people joining the internet scene each day it's important that it's security is.. well it has to be good. Of course everything can be hacked and that's the way hackers work. They know there IS a vulnerability but they don't don't know the rest. in this article i'll t ...more

News : Why Newbies Deserve Respect

Due to recent conflicts, I feel the urge to post this, in hopes that some of you will feel less hatred towards newbies, or a more respectable name, beginners. Let me remind you, we all were newbies at one point or another. One reason I loved Null Byte when I first joined was ...more

How To : Tactical Nmap for Beginner Network Reconnaissance

When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. Th ...more

How To : Learn More in Class by Leaving Your Laptop at Home

From laptops to tablets, technology is taking over classrooms. Elementary schools offer kids tablets, and college students are bringing laptops into lecture halls, leaving their notebooks behind. Today, many students prefer putting their fingers to a keyboard rather than pen t ...more

How To : Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you t ...more

How To : 8 Must-Have Magisk Modules for OnePlus Phones

The idea of a perfect phone is a myth. There are lots of pros when it comes to OnePlus devices, but there are also a few things that could be better. And even if there were a phone without flaw, there are still things that you might want to customize for personal preference. T ...more

How To : Hone Your BS Detector

Can you tell when your friends are serving up a bunch of BS, or are you constantly oblivious, unsure if they're spinning a valid story? With so many ways to lie and fake information floating around, it can be impossible to tell what's the truth from what's complete BS. Here's ...more

How to Hack Wi-Fi : Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more

  • Hot
  • Latest