Performing Stunts With The Helix X4 Stunt Quadcopter

RC Helicopters are cool, but I’ve always thought quad-copters are even cooler. The use of four rotors makes them fast, stable, and easier to manipulate mid-air. Still, I never got around to buying one. Then the Air Hogs Helix X4 Stunt showed up in the mail. As one of Wal-Mart’s Top 20 Chosen by Kids, I was excited to dive right in.

Air Hogs Elite Helix X4

Usability and Control

With 4 ducted fans and gyro stabilization, the Helix X4 was really easy to get (and keep) in the air, even for a first-timer like myself. I’ve had a few RC helicopters and this was a lot more fun. While a helicopter requires constant attention in the air, the X4 was a little more self-sustaining and as a result, I crashed it far fewer times. The controls are easy to use and understand though not immediately intuitive. By this, I mean that you should always read the manual first. The thing that caught me off guard was how it isn’t ready to fly until it’s really ready. The X4 indicates via its lights when it is stable for launch and then you can get to the fun. The benefit is that it will always have a clean lift-off.

Features and Stunts

Other than the launch procedure, the lights on the front of this quad-copter will also flash orange if the battery is getting low and red when it’s time to land and re-charge. This is a step up from other quad-copters that just drop out of the sky when the batteries are done. Below is a list of other features of the Helix X4:

  • 2.4GHz radio control
  • Gyro stabilization
  • 4-ducted fans
  • 4-channel control
  • Incredibly crash-resistant materials
  • Superior durability
  • Charges from remote or using USB cable (included)
  • Did I mention stunts

Durability and Design

Let’s talk about the durability for a second. I’m super extra nervous-guy careful about my electronics, especially the ones that fly. The problem is, once it’s in the air, there’s not a lot you can do when it crashes. I’ve crashed my share of flying gadgets and much of my X4 flight time was in a cramped office, so I crashed this one even more. The difference this time is that the fans are protected by ducts as an extension of the quad-copter’s body.

The design, to me, is secondary, but also wasn’t lacking. There’s really not a lot of room to make one quad-copter look substantially better than others in it’s class, but the right colors and a little aerodynamics make all the difference.

The controller had a good weight to it and felt right in my hands. It also had features I liked such as the smooth stick control and right-hand placement of the stunt button and control as well as the handle, which was a nice touch. Unfortunately, the few fake controls that are built onto the controller but don’t do anything seemed out of place and the batteries didn’t seem to stay put very securely – although neither impeded performance in any way.

Helix X4 Stunt Video

With anything as fun as this, I try to include a little video with the review, so here you go!


With the suggested price of $79.99, the Helix X4 Stunt is might be a little more spendy than some of the lesser quad-copters, but it has the features to back it up. If you have limited skills and want to wow friends with some stunts, wrap your hands around one of these and you’ll be set.

How To Screencast On Your iPhone

Yesterday, I posted about how to jailbreak your iPhone running firmware 3.1.3 in 60 seconds. After jailbreaking, I tried playing with ScreenSplitr and saw other apps that let you see your iPhone screen on your computer. The problem is that most require you to be tethered to a computer or have both your iPhone and the computer on a wifi network. I found something much easier for creating videos of your iPhone screen.

After jailbreaking, I installed Backgrounder on my iPhone. It lets you run things in the background, which the iPhone still doesn’t do (until 4.0). What I found was that some video recording programs will still record in the background and others will not. Of those that will, a couple will record everything displayed on your screen. Below is a video I made showing regular video, then my screen, then back to regular video. The whole thing was recorded using a iVideoRecorder ($0.99 in the app store) and Backgrounder. It was not edited at all and was uploaded to YouTube right from the phone.

As you can see, it was pretty simple to share my iPhone screen activity with you without the need for a computer. This is great if you want to, for example, show people how to take and edit iPhone photos on the beach or how well a navigation program works with a live demonstration. Give it a try and let me know what you think.

How to Hack a Person

Most people are a familiar with the term “hacking“. In general, it refers to gaining unauthorized access to a computer. One definition from is “to gain access to a computer illegally”. To me, hacking refers to gaining unauthorized access to information. I’m not going to explain how to hack a computer. Instead, I’m going to talk about how to hack a person, or, how to gain information from a person that they would not otherwise provide. This is also widely known as “social engineering“.


Get to know your mark
A mark is simply the victim of your information theft. While you may have valid, legal, motives for sneaking around normal channels, I’ll refer to the target as your “mark” because I’m lazy.

Social engineering often involves pretending to be someone you are not. Many times, you may need to pretend to be a client, for example, in order to get their password from their domain registrar or internet service provider. You may have other, more sinister, motives for gathering sensitive data, too. Either way, you will need to be prepared with answers to key questions, appropriate reactions, etc. Research all the information you can about whatever you are trying to get access to as well as the person you are claiming to be (where applicable). For example, if you were to call a large ISP, attempting to get the password to your mark’s email account, you would want to know his or her full name, email address, and birth date at a minimum. Other helpful things to know are names of the girl/boyfriend, spouse, child, pet, etc., hobbies, bands or stars the person likes, and anything else very personal. More often than not, one of these things is the answer to your mark’s “hint” question, that question they ask you before divulging your password when you’ve forgotten it. Sometimes, that one word is all you need.

Some alarming facts
Around 2-4% of all people have a password of “password” or a pin/security code of “1234”. Many of the rest have passwords that can be found in a dictionary file (a file full of dictionary words used for guessing a password randomly). If your mark is 16 and her boyfriend is named Mark (but she calls him “markypoo” all over her MySpace page), you might be able to skip all the dirty work by just trying “mark”, “markypoo”, “ilovemark”, or “ilovemarkypoo” as her password. Just about every demographic seems to fall under the rule that you can usually guess a password within about 20 tries if you get to know the owner of the account. Some more clues that can help are birth dates, nicknames, sports teams, and movie/tv charaters. Know your mark (above) and the rest is pretty easy.

Get to know your source
When I say “source”, I mean the source of your information. This could be anything from an automated web form to a phone support representative, to a front desk employee at a hotel. The type of information you are looking for should dictate what your source is and is should be fairly obvious to you. Pretend, for a second, that you’re looking for that email password from above. Logic dictates that your source is going to the your mark’s ISP. Become a customer, client, or user. Sign up for an email account of your own and make note of the security questions. Test the password entry form and see if it has a minimum/maximum amount of characters or has any other requirements. Does the site suggest a username for you like Yahoo! does (eg: JohnDoe2008)? Any information you can glean through creative and thoughtful experimentation can be instrumental in your success.

Confidence is key
You’ve probably heard that before, but in another context. It’s a popular phrase when talking about sales or success in business. Confidence can drive your job interview home, it can get you sales, and it can even get you a date, but it can also be the key ingredient when trying to con a source out of information. If you act nervous in your efforts, it will likely get noticed and make your source suspicious. Speak clearly, act casual, and act like you’re supposed to get the information you’re asking for. Many times, you can even act as if you were waiting for a third party (whose name you now forget) to call you back with that information. Begin a support call by saying “I somehow got disconnected. I called in because I forgot my password and I forget who I spoke to, but he asked me the security questions and then the call dropped.” If you gently suggest to your source that another person in the company trusted your authority to access a password and was about to give it to you, this will sometimes lower their guard just enough to squeak by.

Confident does not mean sloppy
Sometimes you are acting in the best interest of someone who knows what you’re doing, but what if you’re just trying to snoop through someone’s email or you want to throw a surprise party for someone and just need to grab their contact list from their gmail account? If you don’t want anyone to know what you’re doing, you had better not leave a trail behind you. Getting caught can be embarrassing and get you into trouble with your mark. Worse, if you’re doing what I think you shouldn’t be, you could get jail time. That said, here’s some things to think about before you begin:

  • – Don’t use your real name… anywhere
  • – If using the phone, block your number
  • – If using the web, go through a proxy (from a library)
  • – If using email, get a throwaway email account and check via web mail (from the library)
  • – Know the legality of what you’re planning
  • – Try not to break the law if possible

The more careful you are, the less you have to worry about, and the more confident you can be when faced with the human interaction.

Get more than information
People-hacking works for more than just snooping on your ex-girlfriend’s email (stop obsessing and get over her). You can also work out discounts and deals by knowing how to deal with a particular source. Here’s an easy experiment you can do: Call a fast food joint on a weekday afternoon (right during the busy lunch time) and explain that your order was messed up. Your complaint should be believable, but bad enough that your meal was practically not edible to you. Say they put ketchup on your burger after you asked for no ketchup. Know ahead of time what you ordered (a popular combo meal will probably have been ordered in the last hour by someone at the drive-thru, making it more plausible). Almost every time, they will write down your first name (which can be any name you want to give them). The next day, show up and explain that you were told you would get a complimentary meal for the one they messed up. Give them the name you gave over the phone, order the same meal, and enjoy eating for free. I can’t publicly condone doing this, so if you happen to try it for the purpose of experimentation, even the score by donating $6 to charity or something.

There are many morally valid and many morally corrupt reasons for needing to obtain information, goods, or services via unconventional means like social engineering. Whatever your reason, identify what you want, plan it out, and go get it.