Sometimes, doing the right thing is way more difficult than it should be, like trying to return a lost smartphone. Despite having the best intentions, it's often hard to track down the rightful owner, especially if the device is armed with a passcode. On the other hand, there are plenty of people who see an unattended iPhone or Samsung Galaxy S3 as a chance for profit. In 2011 alone, the number of lost and stolen cell phones in America was worth over 30 billion dollars. That's right, billion....
One of the many improvements in Android OS 2.1 is a 3D Gallery application. This is a neat feature that comes bundled with the new OS and gives you a cool new way to view your photos. check out some of the features. Learn how to use it with this clip. It's easy! So easy, that this video tutorial can present a complete, step-by-step overview of the process in about three minutes. For more information, including detailed, step-by-step instructions, watch this video guide.
How To: Restore Your Samsung Galaxy S III to Factory Settings (If It's Bricked or You're Locked Out)
Erasing everything off of your phone and starting anew is a pretty drastic step to take for a little glitch. For most people, system restoring is a last resort option, but there are a few reasons to want or need to restore your device to factory settings.
Google's new Project Fi cellular carrier has been making waves across the mobile industry, so we decided to put it to the test against T-Mobile, one of the more established networks. For the actual testing, we slapped a SIM card from each carrier into two identical Pixel XL phones, which offer full compatibility with both networks.
Want to move your MP3 library to your Nokia mobile device? It's an easy process. And this clip will teach you everything you need to know. For all of the details, including complete, step-by-step instructions, watch this brief, official Nokia mobile owner's guide from the folks at Nokia!
Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection. When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobi...
Ever need to text someone, but don't want to use up your texting limits? Or you want to text someone, but your phone doesn't have texting capabilities? As long as you're near a computer, this video has you covered.
If you drop your smartphone in water, take it apart as much as you can and place it in rice. It's been the most recommended method of cell phone rescue since the days of clamshells. In fact, it's usually the only thing recommended when searching for "how to save your wet phone." Turns out, we've been wrong all along.
If you have a smartphone with a good camera, chances are you don't think it's good enough. There's always something that can better with your mobile pics, and for me, that something is closeup shots.
Chinese tech company OPPO has been on the cutting edge of smartphone battery charging since it released its VOOC Flash Charge in 2014. Using VOOC, you can charge your battery from 0-75% in 30 minutes.
On the iPhone, the Reminder app is a great way to keep track of your to-do list. I use it for a bunch of crap I forget, like picking up a must-have item at the store or calling or emailing my friends back.
Line breaks signify not only the ending of one line of thinking, but the beginning of another. We use them to emphasize points, to fragment information, to shift tone, and more. They're important in getting our message across properly, which is why I'm always disappointed when I can't insert a line break into my masterful Instagram caption.
When it comes to smartphone screens, there are two predominant technologies—the traditional LCD panel, and the newer AMOLED display. Most phones still use LCD screens, as the tech is more cost-effective due to its longstanding reign as the primary display type in TVs, smartphones, and tablets.
Learn how to install Aircrack on your iPhone to hack into almost any WiFi network. First download Aircrack from iHackMyi, then follow these steps:
In a flurry of moves today, Microsoft has not only released their suite of Office apps for the iPad, but they also updated their Android and iOS Office Mobile apps to allow for creating and editing documents without requiring an Office 365 account (so long as it's for "home" use). Microsoft Office Mobile for Android & iOS
If you've just brought home a brand new Android smart phone, or you've installed a new ROM, you probably don't want to have to go through the configuration process on the 3G network. You can skip the "Touch the Android to Begin" screen and get straight to the good stuff.
Have you been having trouble sending picture messages on your Android device? It could be that the pictures are exceeding the size limits set by your friends' carrier. To ensure that all your picture MMS get seen, follow the instructions in this video.
Long before Apple and Android became household names, Nokia dominated the mobile industry. The Finland-based company was one of the first to develop smartphones, and their classic N95 with 2G "high-speed" internet connectivity was declared the "best smartphone ever" by some in 2007. Outside of the US, before the iPhone became all the rage, owning a Nokia phone was a status symbol akin to wearing a Rolex or Omega watch.
The passcode, or the four-digit code you enter in order to access an iPhone or iPod touch, was created to ensure security and prevent hacking. But what if you haven't touched your iPhone in a month and you simply don't remember what your passcode is anymore?
If you enter in your password incorrectly too many times, your iPod will lock. If it locks too many times, you may need to unlock it. This tutorial shows you how to reset your iPod to undo the lock so you can keep using your iPod. This will let you unlock someones password on an ipod or iphone touch.
Citizen Engineer is an online video series about open source hardware, electronics, art and hacking by Limor (`Ladyada') Fried of Adafruit Industries & Phillip (`pt') Torrone of MAKE magazine.
If you have a Samsung Galaxy S3 or Galaxy Note 2, you might not have noticed it yet, but there's an annoying little bug that centers around your clipboard. If you tend to do a lot of copy/pasting on your device, you've probably seen it happen—your phone crashes.
Brand loyalty is one of the main factors behind our decision to choose a particular mobile device, but it doesn't have to be the entire equation. Educated consumers know that certain devices simply fit their budget and usage better than others, which means you can't always let a logo dictate what kind of phone or tablet you buy.
If you've used Twitter on your smartphone sometime in the past two weeks, you've probably noticed that tweets from users you don't follow have been popping up on your timeline.
Want to send text messages, but don't want your recipient to know they're from you? You can use a website called AnonText.com, which lets you send anonymized text messages to any cell phone number. Use your computer, or, if you have a smartphone (like an iPhone, Droid HTC Evo), then you can navigate to the website using your phone's browser capabilities.
You know that feeling when your cell phone gets stolen and you figure it is pretty much lost forever. You could've used one of the millions of device managers and trackers, but ya didn't. And the Good Samaritan is not coming to your rescue.
Staying organized with your digital music library can be frustrating, especially when you're downloading songs on different devices. Transferring music files to one central location doesn't have to be hard though, even when you download music on your Android mobile phone. So how do you get that music off the phone? Best Buy has answers. The Best Buy Mobile team explains how simple it is to transfer music files from your Android enabled cell phone to a Mac or PC computer.
Bitcoin, the decentralized cryptocurrency notorious for its status as the currency of the dark web, seems to be shedding its shady past and is now enjoying soaring highs not seen since 2014. The highly volatile online commodity has now reached parity with gold amid speculation of a pending ETF approval from the FTC.
XML is a file type that can cause a lot of compatibility issues when you are working on multiple operating systems. With iPhone being the newest medium people work on, it presents new problems. But don't leave yourself in the dark. This video will show you how to open XML on your iPhone.
Facebook Messenger has another secret game for you to play in both the Android and iOS versions of its app. This time it's a soccer-themed game to tie in with the Copa America and Euro 2016 tournaments currently underway.
Photobombing, the act of covert sabotage on a photographer and unsuspecting subject, can be a terror. This malicious and disingenuous art form has steadily grown since it first received significant coverage in 2009.
This is a quick tutorial on how to reduce the flash for your cell phone camera. If your flash is too bright, your pictures will look washed out. Reduce the flash by using a piece of paper to dim the flash and improve the quality of your photos.
T-Mobile's credit-checking system was recently hacked, and this one is about as bad as it gets. The names of 15 million customers, their date of birth and social security number, as well as driver's license numbers and additional information was illegally accessed, meaning the potential for identity theft here is huge.
If you have a Samsung Galaxy S, Vibrant, Captivate, or I9000 and want to unlock it, this video will show you how to do it. Also, this method will let you do it with one click. You'll need your USB cable to connect to your desktop or laptop to download the necessary script. Enjoy.
There's nothing more embarrassing than a nude photo being viewed by someone other than its intended recipient—just ask any celebrity whose phone or email has been hacked. That's why fake nude photos make such great pranks. You get a good laugh, but your friends can't be too pissed if the photos aren't real.
Whether you haven't touched your iPod or iPhone for the longest time and have simply forgotten your passcode, or you want to have a little fun on your friend's (or frenemy's) iPhone, you have to unlock the gadget, and that means bypassing the passcode.
Last year, in anticipation of the theatrical release of Star Wars: The Force Awakens, Disney updated the official Star Wars app on iOS and Android which added Star Wars-themed emojis that you could use in text messages and on social media. Memorable characters such as Luke Skywalker, Han Solo, Darth Vader, Princess Leia, C-3PO, and R2-D2 are included, all designed with a cute and friendly twist. Not only that, but they also include a handful of character, vehicle, droid, and creature emojis f...
When my girlfriend told be about a Trivia Crack cheat she discovered, I was a little dubious. Then, after witnessing her trick in action and trying it out myself, my faith in the popular trivia game was forever tainted.
It seems like everyone has Caller ID these days, but not everyone wants to give up their privacy. Whether you're calling from a cell phone or a landline, you can dial *67 to block your phone number from appearing on Caller ID, and many phone companies offer a permanent option as added service.
With the Android platform on a large amount of mobile phones today, chances are you have one. Sometimes messaging on the phones can be a little confusing, but there's a simple explanation for texting your friends and family. Best Buy has answers. The Best Buy Mobile team explains how simple it is to send a text message on your Android enabled cell phone.