Need to break out of the restrictions your school or workplace have on internet browsing? Maybe you want to waste some time on YouTube, check out some gaming action on Twitch, or simply just browse Facebook or Twitter.
Nowadays many schools and colleges have blocked the social community sites from accessing them through school computers. The video shows how one can access to these sites using a command prompt.
Facebook is powerful and affluential, even when it comes down to its applications. But some applications are just downright annoying! With the new layout and other changes affecting Facebook recently, you can take ease in the fact that blocking and unblocking Facebook applications is still as easy as before.
Nothing on the internet is ever truly private and this hack proves it! Learn how to use PhotoFucket to hack into Photobucket with this video. You'll be able to access Photobucket without a password and view private photos from users. Be careful what you leak though...you might unwittingly create the next big reality TV star!
Tinkernut demonstrates how to crack a wifi connection, as well as how to better secure your own personal connection. Also included in the video gallery is Tinkernut's previous tutorial on the same subject.
Believe it or not, people are still using Friendster. Which is great news for all you hackers because that means there are accounts to hack! With this video you'll find out how to exploit a programming loop hole in order to hack into someone's Friendster account. We can't promise you'll find anything interesting!
Last week, Google updated the YouTube layout to be more in tune with other Google properties. One thing that's different is the new, more Google+ look of your YouTube homepage. Though some may like the change, some definitely do not. Also new is the "Guide" on the left side when you're watching a YouTube video. for you folks looking to get back to the normal YouTube layout, it's as easy as copying and pasting some code into your browser.
If I'm in a hurry, sometimes I'll just turn my computer off and rush out of the house. Sometimes, I'm in the middle of a long YouTube video when I dash off, only to come back and find that my video position has been tragically lost. Hopefully I don't lose my place in that motorcycle accident compilation video when I get ba... damn it.
Looking for a quick guide on how to edit your account information when using Pandora Radio? This brief video tutorial from the folks at Butterscotch will teach you everything you need to know. For more information, including detailed, step-by-step instructions, and to get started changing your own account information on Pandora, take a look.
This video will show you how to make your own command prompt and how to use command prompts to get onto blocked sites .
This is a Computers & Programming video tutorial where you will learn how to hack Google to find anything. There are no audio instructions; only a demonstration of the steps to follow. Go to Google and type into the search box: intitle:”index.of” (type anything here) and search. For example, type in: intitle:”index.of”Shakira mp3. And click search. Then you will get the search results. Now you can click on Index of…/songs and it will take you to the songs index page. From there you can downlo...
Looking to do a little Friendster account hacking? Well, this video will show you how to hack into anyone's Friendster account after getting their password. Friendster was Facebook before Facebook was around, and beleive it or not, people still use it! You'll need a little tool to do the work, which you can find here. After that, follow the steps and get into any Friendster account. Remember, hacking is illegal, so be responsible out there.
This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionary word and if that does not work, every possible letter/number/symbol combination. The programs used to crack the passwords are Cain and MDCrack-NG.
Consider this reason 1,001 why we love the internet: Using Google, you can hack into almost any webcam or security cam, in any part of the world and even control the webcam to move around so you can get your full panoramic shot. Don't believe us? Then check out this video tutorial to learn the steps you need to take.
With a few simple supplies you can create a wifi antenna with 15db gain.
This video teaches how to change/hack administrators Account/Password. Click START and find CMD. Type "net user" without the "". Now type "net user administrator" without the "". Scroll up the screen and find the administrator's name. Now go back down and type "net user administrator *" without the "". Now it will ask you for a new Password. Type a new Password which you won't forget. Now another command prompt will pop up. Just type in exit to come out of the CMD. Don't get caught and do it ...
We all know the real reason why Facebook was created. No matter what Mark Zuckerberg says, or how many commercials about chairs the company makes, it all comes down to one thing—boobies.
You have a webcam, right? Nowadays, who doesn't? But just because you all have webcams doesn't mean you're using them the same way. And a great way to take full advantage of your peripheral or built-in webcam is by turning it into a security camera. This video will show you how to turn it into a security cam by accessing the video feed remotely over the internet. And it's a really simple solution—you just need to sign up for a USTREAM account, which allows you to stream webcam footage live!
Cartoon characters are invading Facebook this weekend, with members quickly switching out their normal profile pictures with that of their favorite animated childhood memory, but why?
Though the Google home page may appear simple, its search tool is anything but. This quick clip from the folks at CNET TV demonstrates a number of the search engine's most obscure and most useful features, all certain to help you to find your desired information more quickly. For specifics, and to get started using these great search hacks yourself, give this guide a look.
This video tutorial gives you a way to access websites that you can not normally access because of a web block or filter. What you need to do is click on the ‘Start’ button and then click on ‘Run’. In the small window, type in ‘cmd.exe’; this then opens a black window. Then type in ‘ping’ and the website; this gives you an address that you type in directly to your web browser, granting you access to a normally blocked website. This comes in very handy when you are in such locations like schoo...
Gmail is a free, advertising-supported email service provided by Google. Users may access Gmail as secure webmail, as well as via POP3 or IMAP4 protocols. Gmail initially started as an invitation-only beta release on April 1, 2004 and it became available to the general public on February 7, 2007, though still in beta status at that time. The service was upgraded from beta status on July 7, 2009, along with the rest of the Google Apps suite.
Are you using the Internet at a school, library, or some other place that blocks or restricts web access? Mom and dad still trying to protect you from online predators, even though you're more than old enough to be one yourself? Learn how to bypass proxy servers that block access to certain websites by watching this how-to video. In this case it's done to access Myspace but this method can be used with any blocked website. Follow along with this video tutorial and never get hindered by restri...
Notice: This is probably not new to many people. This *IS* new for some people however, and meant for them! Post interesting cameras you find.
Want to hack Flash Chat 123? It's easy (as 123)! So easy, in fact, that this video tutorial can provide a complete walkthrough of the process in about eight minutes. For more information, including detailed, step-by-step instructions, take a look.
Facebook makes it easy to show how much you appreciate a funny status, great picture, or cool news article using their iconic "thumbs up" button, but what about those terrible jokes and annoying baby pictures? Where's the "thumbs down" for that crap?
People use search engines for a wide variety of subjects (just look at some of the results that pop up in autofill). The results you get with each different search engine are usually different, but almost all of them display the same number of results per page by default—ten. If you find what you're looking for at the top of the first page, great. But if you have to do a lot of digging, it can be a pain to load so many different pages to find it, especially if your connection is slow.
In this video the instructor shows how to make Google say your name. To do this, first, open up your favorite web browser and go to the website GoogleMyWay. This opens a page where it says that you can design your own Google web page. Now type your name into the first box and click to make it. This generates a URL for you. Copy the URL into the address bar of the browser and open the page. This opens a Google-like website with your name on it. Now, if you like to make this your home page, the...
This video will show you how to send text SMS from Gmail account. Your mobile number has to register with your Gmail account. The receiver could also respond to your SMS. Watch the video and employ the technique.
For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.
In this video tutorial, viewers learn how to use the Peter Answers - Virtual Tarot website. Peter Answers is a fake fortune telling website that is usually used as a prank. Begin by going to the website. In the Petition space, type in a period. A "P" will be displayed. Then type in the answer too the question and press the space bar until it spells "Peter, please answer the following question:". Then type in the question in the bottom space. This video will benefit those viewers who enjoy pla...
In this video tutorial, you'll find a step-by-step guide to how a n00b hacker (like you?) can get usernames and passwords easily through one of the security flaws of the Ethernet ADSL router. More than half of Internet users never change their default password which makes this "hack" easy. Take your time to read the text on the slide. For more, and to get started testing the security of your own Ethernet ADSL router, watch this hacking how-to.
"Facebook is a social utility that connects people with friends and others who work, study and live around them. People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they meet." -- Facebook
Whether you are protecting your children or hiding personal information, there are ways to block unwanted websites from your computer. Follow this tutorial and learn how to accomplish this on a Windows PC easily.
Have you ever heard symmetrical is sexier? Yep, according to scientists, symmetry is inherently more attractive to the Homo Sapien eye. Back in the days of Helen of Troy, Phidias, Plato and other great philosophers all observed the golden ratio, "a sum where the quantities to the larger quantity is equal to the ratio of the larger quantity to the smaller one". Confusing? Let's apply it to the human face only: the features of the human head were measured in calculated, precise proportions to d...
The video shows us how to use a proxy to bypass the Internet Filters. Most of the times in our schools and colleges most of the websites including the social networking ones will be blocked for security reasons and makes us unable to log into those websites. In such cases even the ones from the YouTube, several videos will be blocked. So in this video, we will be shown how to bypass those filters and log into those sites. Firstly go to the website Proxapp and over there you will be asked the ...
SQL injection is a type of code injection that takes advantage of security vulnerability at the database level. It's certainly not the easiest form of hacking, but if you're serious about turning a website upside down then this is the way to do it.
Vince shows viewers hot to access the Chuck Norris trick on Google. First, you need to open your web browser and go to Google. In the Google search bar type in 'Find Chuck Norris' and click 'I'm feeling lucky'. Make sure you do not click enter but the 'I'm feeling lucky' button to the right. You will get a funny message that says 'Google will not search for Chuck Norris because it knows you don't find Chuck Norris, he finds you'! The suggestions should read 'Run before he finds you' and 'Try ...
In this video, we learn how to automatically clear browser cache in Internet Explorer. This will help your internet run faster and it will also help protect your computer from your personal information being store. First, open up Internet Explorer, then click on the tools drop down menu and go to internet options. From here, go to temporary internet files and click on the button that says "automatically", then adjust the disk space to use to what you prefer. After you have changed the setting...
Free stuff is pretty cool. Free internet is even cooler—and free internet that is actually free is the coolest. If you would rather avoid sitting in a Starbucks and having to listen to hipsters discuss the proper length of cropped jeans, then this should be of interest.