Any app on your iPhone could potentially listen in on your conversations and use that information to target you with tailored ads. Although most companies, including Facebook and Apple, have come out and vehemently denied these claims of spying on consumers, who's to say they' ...more
Apple's scheduled to show off the first look of iOS 13 at WWDC 2019 on June 3, but what will the new operating system hold for iPhone? Rumors suggest that many features initially planned for iOS 12 will show up in iOS 13, codenamed "Yukon," and dark mode will be the big ticket ...more
Your iPhone has a powerful feature that can keep your secrets hidden from other people, and you'll never have to worry about sharing or showing someone something embarrassing or incriminating ever again. No matter who you are, you likely use your iPhone's Photos app a lot sin ...more
Even though most phones don't have Oreo yet, Google has released Android 9.0 Pie. It's available on Google's own Pixel devices, and updates should soon be available to partnered devices from Essential, Nokia, Oppo, Sony, Vivo, and Xiaomi. We're already digging into it to highl ...more
|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Smartphones are now indispensable when traveling. Domestic and overseas travel alike require food, navigation, translation, and so much more to make work or vacation successful. Gone are the days of lugging multiple tourist books around with you everywhere you go — you need to ...more
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more
Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames can also be used to track or take over the data connection of nearby devices. We'll explain how to see nearby devices emitting ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
One UI has an exciting privacy feature that lets you lock apps, photos, videos, and files on your Galaxy device behind Samsung's defense-grade Knox security platform. Only you can unlock it using a pattern, PIN, or passcode, or with biometrics like fingerprint and iris locks. ...more
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more
New Year's Eve. It will be one hell of a chaotic night. Trust me. The overcrowded streets. Long lines for the urinal. Maxing out your credit card on that shot of Cuervo. You'll be lucky to make it out alive. If you do manage to stave off alcohol poisoning and survive the asc ...more
Did you know that you can unlock many hidden features and tweak several hidden options by installing a CHDK or Canon Hack Development Kit onto your Canon camera? This walkthrough will give you some insight into the different benefits of the CHDK and how to unlock your camera b ...more
Now that most computers have internal webcams in them, what are you going to do with that external webcam eating up precious desktop space? Kipkay shows you the perfect hack— the "Super SpyScope". The first thing you'll need to do is disassemble the webcam. Remove the main bo ...more
It may be intended as a toy, but this gizmo can be hacked for more than just watching a remote-controlled car's video spy cam. This HUD (heads-up display) comes with the Wild Planet Spy Gear Video Car, but it's said that you can purchase the video headset separately. And it's ...more
Learn how to hack Google with this amazing video. This video will teach you how to hack Google by using advanced search operators and esoteric search terms to find “hidden” files and mp3s quickly and easily; you'll also learn how to use Google to hack unprotected Internet-cont ...more
What if you could have a secret hard drive connected to your computer that only you could activate? You can! Samimy shows you how to hack a remote controlled toy car and make a super secret hard disk drive in your computer, accessed via a secret activation key. This hidden eme ...more
Learn how to eliminate cord clutter with the folks from Martha Stewart's REAL SIMPLE. Nothing is more annoying than a pile of messy cords. Those dozens of wires around your home?in your kitchen, by your computer, behind your TV?can be a tangled nuisance. Control cord clutter w ...more
Introduction In this article you will find instructions to replace a broken LCD screen of a LG KF600 phone. To execute these steps a new replacement LCD should be bought beforehand. Stores that sell replacement KF600 LCD screen can be found on the Internet. These instructions ...more
Destroy Black Ops Noobs First of all, these tips are great for any consoles that run Black Ops. Whether it be your Sony PS3, Nintendo Wii, XBox 360 or your PC. Internet Connection Before you put the game in to your console, make sure that your internet connection is consist ...more
Learn how to create a secret place to stash your spy gear, contraband, or other hidden objects within a hollowed out book.
Make a bionic hearing spy device by hacking a megaphone! Kipkay brings you this hack video on how to use a megaphone to spy on people. You can pull in conversations up to 100 feet away! Check out Kipkay hiding in a tree, spying on people. It also works through walls. That's ho ...more
Over the next few months, I'll be focusing on building a fully functional, long range UAV. This series will consist of several in-depth articles on my progress and the steps involved, so you can follow along and build your own unmanned aerial vehicle! The budget is $800 and w ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Google StreetView is watching everybody. In fact, Google captures so much, Jon Rafman has made art out of it. Rafman's blog 9eyes features the most interesting images found the cameras nine eyes (and no brain). Previously, Spy With Google Street View. "Dead" Girl Pranks the W ...more
Watch this how-to video from the hidden camera series, "Do Unto Others," as Justin Heimberg demonstrates the best ways to prank people using your cell phone. Video: . This video includes such tricks as the "Myth Hater" and the "Jim Fartsville"—all of which you can use on your ...more
Check out this video that will teach you how to make a double meaning sticker from reflective tape. The hidden message is barely visible with the naked eye but is illuminated with the flash of a camera.
Hacking into computer systems to steal passwords could be a bit complicated for the average everyday joe, but for all of your tech illiterate folks out there, there's any easy way to get that password, and all it takes is a camera. Check out this con video tutorial to learn h ...more
Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't ...more
You can take a bajillion photos on your smartphone or digital camera, but they'll eventually end up lost on your computer hiding within folders within folders within folders... you get the picture. To bring them to the physical world, you've got to print them, but you don't ha ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more
There are many, many playable characters in Naruto Shippuden: Ultimate Ninja Storm 2, some more hidden / secret than others. In this video you'll learn how to unlock two of the more difficult characters to unlock: Lars Alexandersson and Minato Yamikaze. From the Creator: Thi ...more
Naughty Bear is angry again! Those silly bears have set up birds with cameras to spy on him! How RUDE! It's time to get back at them and take those birds out! In this video you will get a complete walkthrough of the level along with tips on the best way to proceed. Just rememb ...more
Step One: Acquire a good amount of semi-fresh dog poop. 2. Step Two: Carefully place the poop under a friends car door handle, so that it remains hidden. 3. Step Three: Like any good prank, a hidden video camera is highly suggested. 4. Step Four: Si ...more
Google Street View has civilization well covered, but what about the great outdoors? Street View now travels via snowmobile in the unpaved Canadian wilderness, just in time for the winter games. Says Google, "In time for the Olympic Games in Vancouver and Whistler, we're th ...more
Computer crashes, fried hard drives, red rings of death, delinquent memory cards... nothing is worse than dysfunctional technology. In just a minute, your favorite and most used device has become the biggest headache of your life, frustrating you to the brink of madness. But w ...more
Dactyloscopy isn’t going anywhere. Forensic science has much relied on fingerprinting as a means of identification, largely because of the massive amount of fingerprints stored in the FBI’s biometric database (IAFIS), which houses over 150,000 million prints. And thanks to the ...more
SomeFamousProduction here has come with a new avatar of James Bond on Xbox. First we start off with his hair. Well, we need to keep it simple, yet spy-like and somewhat blackish in color, not too light, neither too dark. Next we move to the chin or jaw. Keep it sharp but not p ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. UPDATE: Minecraft 1.9.6 has been leaked! It's time for another pre-release folks! This time it's 1.9 Version 5, and it's better than ever. Confirmed changes include: Melons drop ...more
In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models. Now, I'd like to dive right back into Wireshark and start stealing packets. The filtering capabilities here are very comprehensive. You can filte ...more
This contest can be the ultimate prank on a fan- or another one can be created. Upon winning, the first day of the "prize" can start with a flight on a crappy airline with 2 long layovers. (one can be a hopper flight with a pilot that appears intoxicated) Once arriving in LA, ...more
Yanik Chauvin demonstrates how to do Non Destructive Dodging (lighten) and burning (darken) of images using the tools in Photoshop. He shows the image of a man lying on earth with his camera. To start the work he wants to make a new layer which can be done in two ways either b ...more
Repetition, repetition, repetition. Brainwashing, is it real? Watch these absolutely stunning segments of hidden camera containing both Bill Clinton, and Barbara Bush. Probably one of the most debatable segments is the one featuring Clinton talking to Larry King behind the sce ...more
Surveillance expert Julia Adams offers the different ways to secretly record a conversation in this how-to video. Step 1: Recording your phone conversations This can be done using a digital recorder and a lead to your phone. The type of lead will depend on the type of phone y ...more
A silhouette is an outline of a person or an object, usually dark or having little detail, against a brighter, more well-lit background. For this week's Phone Snap Challenge, we've asked you to capture your own silhouette photo with your cell phone for a chance to win a SuperH ...more
Got a knack for speeding? Like running red lights? Believe or not, the police have better things to be doing than pulling you over, like catching real criminals. That's why more and more cameras are popping up at known speeding zones and on street corners—so the cops can clean ...more
Pranks are fun, but finding a way to maximize the affect of a prank can be tricky. Toilet papering the whole campus or repainting all of the parking spaces slightly smaller can take a long time and a lot of resources. A better plan of attack is to booby trap the choke points w ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
With Microsoft's release of the Kinect SDK, things seem to have slowed down a bit in the world of Kinect development. Have developers exhausted the uses of Kinect already? No way! Four researchers at Cornell University have created an AI-based system on the Kinect that can rec ...more
Innovative or downright frightening? Popsci examines five of the world's scariest science experiments-in-progress. Suitcase Nukes "Scientists are trying to develop pure-fusion reactions—bursts that don’t require uranium or plutonium to ignite—for clean energy. But they could ...more
TOP MOVIES 2011 The Artist (2011) Hollywood, 1927: As silent movie star George Valentin wonders if the arrival of talking pictures will cause him to fade into oblivion, he sparks with Peppy Miller, a young dancer set for a big break.Dir: Michel Hazanavicius With: Jean Dujard ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
When I was attending college, my friends had a phantom thief in their dormitory. Almost every night, a different item of food would go missing, never to be seen again. There was constant speculation as to whom the thief was and how to catch them. Security cameras were deemed t ...more
The developing team Techland gets a free pass. Having thoroughly enjoyed their previous title, Call of Juarez: Bound in Blood, this sequel was bought on day one by good ol' fashion blind faith. After playing for most of today, it's still to early to tell if the game is a mess ...more
Day for Night courtesy of Videomaker.com Those 3 Words We Love to Hear, Day for Night (DFN). What better three words could a director ask to hear? No huge generators, no freezing temperatures, no vampire-style living... what's not to love? Are you perplexed? Well, long ago, ...more
Kick Ass Review Part 3: Conclusions [Spoiler Alert! Plot points are discussed from the movie and comic in this section!] Big Daddy as a selectable character presents problems for the story in the game. In the movie and in the comic, Bid Daddy dies. As a playable character th ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more