Spy

How To : Make a cheap heads-up display (HUD)

It may be intended as a toy, but this gizmo can be hacked for more than just watching a remote-controlled car's video spy cam. This HUD (heads-up display) comes with the Wild Planet Spy Gear Video Car, but it's said that you can purchase the video headset separately. And it's ...more

The Hacks of Mr. Robot : How to Send Ultra-Secure Emails

Welcome back, my nascent hackers! Although my favorite TV show, Mr. Robot, had completed its first season already, I have not completed demonstrating the hacks that Elliot used in the show. (By the way, I can't wait for season 2!) In several episodes, Elliot was seen sending ...more

How To : Set up a hidden camera system

This video shows you how to set up a mini wireless spy cam. Where you put it is up to you. Who you spy on is up to you. If you're wanting to keep an extra set of eyes on someone, watch and learn. So whether you're looking to put a camera in your bathroom or garage, go for it.

How To : Make home made night vision goggles

OK master spy, it's time to get your lurk on. If you're going to be spying, you'll need to be able to spy at night. This video will show you how-to make your very own night vision goggles so you can keep up with your mark well after the sun goes down. You'll need a 9V battery, ...more

How To : 9 Alternative Uses for Your Android's Volume Keys

As touchscreen phones continue to evolve, the need for physical buttons seems less and less pronounced. While hard keys may seem like an endangered component on mobile devices, save for the Samsung Galaxy line, it'd be difficult to fathom a world where volume keys are absent. ...more

How To : Turn Off All Tracking Sensors on Android 10

Apps can collect a lot of data. Even if they don't have permission to access your GPS or camera, they can still read other sensors and learn a lot more than you'd think. Your gyroscope could be used as a keylogger. The light sensor could read your visited links. But if you're ...more

How To : Force Switch to T-Mobile or Sprint on Project Fi

If you own a Pixel or Nexus device, Project Fi is a great alternative for cellular service outside of the four major US carriers. Project Fi is a Google-managed MVNO, providing service primarily through the T-Mobile and Sprint networks. One of the biggest mysteries on Fi is wh ...more

How To : Turn an Old Android Device into a Security Camera

One of the best uses for an old Android device is to turn it into a security webcam that can be accessed over the internet. But most of the time, this is a rather difficult process, because existing apps usually require you to mess around with network settings and configure a ...more

News : The Anti-Cheater Hidden Camera Wall Hook

WonderHowTo loves gadgets. We also tend to enjoy getting our hands (just a little bit) dirty. So, naturally, Brando's Wall Hook Coat Hanger Camcorder is the latest gadget to excite. Disguised as a coat hanger, the device is actually a camera triggered by motion detection. And ...more

How To : Make Invisible Ink

Need to pass along an important message on paper without having it accidentally discovered by your archenemy? Using very common household products, you can easily whip up an invisible ink recipe and write out your secret message with the solution. All the recipient needs to do ...more

How To : Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more

How To : Eavesdrop with a cell phone

Want to bug a room on the cheap? This video how-to demonstrates how to make a simple eavesdropping device using a cell phone with auto-answer support and conventional plug-in type headset. For detailed advice on setting up this expedient spy bugging device, consult this friend ...more

How To : How & Why You Should Change Your iPhone's Name

You might be giving out your name to every stranger you see, and you don't even know it. That iPhone of yours has a name — generally a combination of your first name and device model — and it broadcasts it to others via AirDrop, Personal Hotspot, Bluetooth, Wi-Fi, and other co ...more

How To : View your printer's secret dots (fingerprints)

Imagine that every time you print a document, it automatically includes a secret code that could be used to identify the printer -- and, potentially, the person who used it. Sounds like something from a spy movie, right? Unfortunately, this scenario isn't fictional. Most colo ...more

How To : Take Control of the Mouse & Keyboard in Python

While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we ha ...more

How To : Make a military-style night vision goggles prop

Night vision goggles are one of the iconic pieces of equipment of the modern military. Getting a real pair is prohibitively expensive, especially if you just want to use it as a prop in your film instead of actually seeing at night. This video features instructions for making ...more

How To : Build a remote-controlled camera mount

Kip Kay, from Make Magazine, shows you how to take your radio controlled vehicle and turn it into a spy car, by mounting a camera onto it. Follow Kip, as he shows you how to remove the body from your radio controlled car, mount the camera inside the chassis using the triPod mo ...more

How To : Send secret messages with a laser

Secretly shoot your voice across the room in stealth mode on a laser beam in this fun and easy project! Make Magazine and Kipkay present this cool spy trick. Build a simple laser communicator that transmits your voice across a room. You need an amplifier, radio, laser pointer, ...more

How To : Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more

How To : Things to Do on WonderHowTo (03/28 - 04/03)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Why You Should Study to Be a Hacker

Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more

  • Hot
  • Latest