Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, w ...more
Identifying vulnerable devices and services on a target router can be difficult without leaving logs and other traces of an active attacker on the network. However, there is a way to covertly decrypt and view Wi-Fi activity without ever connecting to the wireless network. Whe ...more
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
One of Android's most glaring weaknesses is its lack of an iMessage equivalent. That is, of course, until now. There's one app that will allow Android users to experience iMessage on their non-Apple phone, complete with end-to-end encryption, message effects, and group messagi ...more
While there aren't as many ways to customize your iPhone like there is on Android, there are still a lot of apps out there that can help streamline and enhance your experience beyond Apple's own default options — and we've hand-picked over 100 essentials. No matter if you've ...more
Whether you're new to Android or you just haven't kept up on the app scene lately, we hand-picked over one hundred essential apps that are all designed to improve your experience. From custom launchers and icon packs to weather apps and file explorers, there's something for ev ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
Kali Linux is the obvious first choice of an operating system for most new hackers, coming bundled with a curated collection of tools organized into easy-to-navigate menus and a live boot option that is very newbie-friendly. But Kali isn't the only distribution targeted at pen ...more
There's no denying that there are some seriously useful new features in iOS 11 for iPhone. But there's also no denying that Apple got a few things wrong with the latest iOS update, as well as left a few important features out. Some of the items listed below are things Apple b ...more
Codenamed "Nougat" after the sugary stuff that fills your Snickers bar, Android 7.0 is living up to its name with tons of sweet features. There's almost too many changes over Marshmallow to cover in one go, with new functionality ranging from a revamped Doze Mode for battery s ...more
This year, like every year before it, Black Friday sales are starting earlier than ever. A lot of stores will be opening their doors as early as 5pm on Thanksgiving to get a head start on the madness (and it really is madness). As we've discussed in the past, one of the keys t ...more
Sprint has their EVO 4G. AT&T has their Inspire 4G. And now HTC has designed Verizon Wireless's first 4G smartphone—the ThunderBolt. It launched last week with high praises amongst Android devotees, despite its hefty weight, mainly because of the blazing fast speeds Verizon us ...more
Here is an alternative method to run Ubuntu 10.04 on a Mac without actually installing it on your internal hard disk. The idea is to install Ubuntu on your USB flash disk, instead of installing it on your internal hard drive. I'm talking about a full disk installation. It won ...more
Been hacked once? Twice? Maybe more? You thought abc123 was the only password that is both 6 characters wide and easy to remember? I have some suggestions in store for you. Just read on... An Introduction There are passwords that look tremendously sexy (as opposed to gibberi ...more
The Kinect is sure to swarm the homes of Xbox 360 gamers this holiday season. Even though some of us are amazed at the hands-free gaming capabilities it offers, others feel it to be frustratingly limited. Adafruit Industries is one of them. They recently held a competition wi ...more
Kane and Lynch are at it again, and this time the action's in Shanghai, China. This walkthrough series will take you through the gameplay of Kane and Lynch 2: Dog Days on the PlayStation 3, but it's very similar for the Xbox 360 and Windows. Follow along as two of the most twi ...more
To decorate a fire truck birthday cake, you will need the following: three chocolate cakes baked in loaf pans, Oreo-type sandwich cookies, candies, and brightly colored icing. Level off the cakes by cutting away the beveled tops. Place one of them on your serving tray. Cut a ...more
Open the picture you wish to place a rainbow within. A good scene has clouds that are receding into the distance and the light angle coming in from the front of the scene. A rainbow effect appears when by the sun is shining from behind you into the mist-filled air where it is ...more
Want to play your video collection on any media extender, console or AppleTV? Step one is to get your movies off of the DVDs and onto your hard drive! If you're like most people you probably have a huge library of DVDs that you've bought and collected over the years. Unfortuna ...more
For a fun novelty project, try making a zoetrope at home. * A plastic coffee can lid * A strip of white paper 20" x 1.5" tall * A strip of black paper 20" x 3" tall * Glue, rubber cement or tape * A craft knife * A pencil * A ruler * A plastic coffee can lid * A strip of whit ...more
Google Earth is a great tool of the web, if you know how to use it the right way. Learn everything you need to know about using Google Earth in this powerful video series set to show you all the basic maneuvers and tricks to using the well known application. Google Earth is a ...more
Flickr is the most known and dependable photo sharing website to date, so if you haven't made an account yet, you better now, if you want to share your precious photos with family, friends, and even the whole world! Flickr allows you to store digital photographs online and sha ...more
By Camilla Cicconetti - Visit LifeStyleWebTV for more travel articles, videos, recipe demos and more. Located near the tip of the Brittany peninsula in northwestern France, Locronan is one of the region’s most spectacular villages. When you set foot on the cobblestone street ...more
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions ...more
Nearly everyone has the capacity to be a cheater. Sometime or another, all Xbox users have yearned to get their gamerscore to unimaginable thresholds—for bragging and egotistical purposes. I can relate to this desire. However, I also don't want to mod my gamerscore, because it ...more
Gamers like myself who have switched back and forth between Skyrim on PC and Xbox lack the ability to share game saves. This really sucks. I love playing Skyrim on a console. It's a very comfortable, easy and relaxed gaming experience. You don't have to worry about your frame ...more
The days of entering left, right, left, right, up, down, up, down, a, b to cheat your way through a video game are long gone. With achievements and trophies in existence, game developers have, for the most part, removed cheats from video games. But cheats aren't entirely gone ...more
How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters t ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
There are a lot of things on your computer that can reveal information about you when you are surfing the Internet. If you are like me, then you will do anything to maintain your privacy and prevent those little leaks of information from happening. Here's a list of a few of th ...more
JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that intera ...more
Visit the charming historical town of Quimper in Northwestern France. Enjoy ancient architecture, cobblestone streets, a stunning cathedral, and world-famous crepes.. Explore Ancient France: Quimper By Camilla Cicconetti Located in Northwestern France, the city of Quimper is ...more
Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for ...more
Welcome to part two in a series about steganography, the art of hiding things in plain sight. We are practicing steganography because it can be a useful skill if you don't have access to encryption software, or need a quick solution to make sure the sender and recipient are th ...more
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a she ...more
Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topolog ...more
Update: this article is referring to the 1.9 pre-release beta version, which is now commonly referred to as 0.1.9, released in October of 2011. As some of you may know, Jeb recently made the Minecraft 1.9 pre-release available to folks via a link on his twitter. Exciting, rig ...more
Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more
Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can stea ...more
Mozilla is scheduled to release their updated Firefox browser on Tuesday, bringing the popular web browser up to version 6. Lately, the Mozilla team has been releasing newer versions of Firefox without a slew of new features, focusing on fixing bugs and getting the improved pr ...more
There's an epidemic on the Internet, and the disease—Facebook. It's an addiction comparable to a hot cup of coffee in the morning or a soothing cigarette throughout the day—in worse case scenarios, a hit from the crack pipe. If you're on Facebook, you know what I'm talking abo ...more
In the last decade, burglary rates in the United States have fluctuated little with over 2 million burglaries each year. In 2009, nearly three quarters of all burglaries were from residential properties, with over sixty percent being forcible entry. But we all know burglars do ...more
At Google I/O this morning, Google finally announced the launch of its much awaited Google Music service. It's currently in invite-only beta mode, but they claim it will open up to the masses soon enough. To start syncing your music library with Google's Cloud now, you need ma ...more
With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of cou ...more
Despite the controversy over Scrabble Trickster across the word world, Mattel's modern take on the classic crossword board game is out in stores— but not in the United States. It's only available in and around the UK, but you can snag your copy just in time for Christmas from ...more
This is one of the easiest and best computer pranks ever invented. It's simple to do, and works great. This prank causes all of the icons on the desktop to be unclickable, as well as the start bar. 1. At your desktop, close all windows if any are open, and press Print Screen/ ...more
Gil Adam, a student of Industrial Design in Bezalel Academy of Arts and Design in Jerusalem, Israel, has created a 3:1 scale model of his favorite plastic camera, the Holga. While the camera is just a model (non-operational), it's pretty fun to see the oversized object next to ...more
So, you're all excited you went ahead and 'upgraded' your iPhone 3G to IOS 4.0X so you could reap all the benefits of all the new features. As it turns out, many of the best features in IOS 4.0X are not available for the 3G, such as the Bluetooth keyboard, selectable backgrou ...more
Skype is definitely a revolutionary software for keeping in contact with your loved ones. It's a phone on the internet! What couldn't be good about that? If you are in Orlando, your spouse is at a conference in El Paso, your daughter’s at college in Raleigh, and your son is wo ...more
So you need to find the p-value for your hypothesis test. To do so, employ the spreadsheet program Microsoft Excel. Using a simple formula, you can easily determine the p-value for your tests and thereby conclude strong or weak support of the null hypothesis. Probability valu ...more
It's a jailbreak in The Saboteur for the Xbox 360. You need to free your fellow resistance fighters and escape the Nazis in the sixth mission in Act 1: Liberty or Death. Speak with Luc in the slaughterhouse HQ. He needs you to free some fellow resistance fighters. Jump into a ...more
Champagne is great, rare champagne is even better in The Saboteur for the Xbox 360. Prove yourself and find the bottle in the second mission in Act 1: Bottle Shock. Luc needs antibiotics for his wounds. Luckily, Santos can provide them if you do him a favor. You'll need to ste ...more
Feeling unprepared for the next earthquake? In this tutorial, learn what to do and what not to do to survive "the big one". You'll be surprised to learn that hiding in a doorway is a myth! You Will Need: • A safe place • Sturdy shoes • A fire extinguisher • A flashlight ...more
This is the end of L4D2. Your last campaign. Your last chapter. See the best part: Campaign 5: The Parish - Bridge. Stock up on items and heal up. Climb the ladder and you should find some more medkits and weapons to take. Open the door and head outside. Use the radio on the g ...more
What's the worst place to be when the world is infested with zombies? The cemetery. Fresh graves. Lots of dead. Make your way through L4D2 by checking these tips out on Campaign 5: The Parish - Cemetery. Restock on weapons and health and head outside. You'll find yourself unde ...more
Don't get "bogged" down in L4D2! Check out this gameplay for all the hints on playing Campaign 3: Swamp Fever - Swamp. Stock up and get out the door. You'll have to wade in the water for a bit. Follow the path of leaves forward, watching out for zombies around you. For the ach ...more
Need a little help with your L4D2 gameplay? Watch for some tips and tricks for Campaign 2: Dark Carnival - Barns. Grab supplies and go out the door. Make your way to the left, past the booths. You will see a bumper cars attraction to your right. Go inside here and back out to ...more
In Boca Al Lupo: The end is almost here. This is the last mission you will need to complete. Talk to Mario and he'll send you on your final mission, to assassinate Rodrigo Boriga in the Vatican in Rome. The mission is more linear than any other you've done up to this point, an ...more