If you have an older Samsung Galaxy Y smartphone, one thing you should be doing is using an microSD or microSDHC memory card to help improve your Android's processing speed and make it easier to transfer large or small files easily. These cards are also compatible with certain ...more
If you want to expand your storage capacity in your new Samsung Galaxy Tab, it's easy thanks to the microSD slot on the side. Installing your microSD memory card is as easy as removing the slot's cover, inserting the microSD card in, pushing to make sure it locks, and recoveri ...more
Is your SD memory card getting a little too full? Is it not working? Try reformatting it. It's the first and sometimes last step to troubleshooting card problems. So, if your SD card has become too cluttered, this guide will restore it to a like-new condition with a simple for ...more
In this clip, learn how to take your Nook e-reader apart and insert a new Micro SD card into the back. By inserting a new SD card you can change the reader's storage capacity, add new files and do a bunch of other things. If you are daring enough to remove the back of your e-r ...more
In the tech world, it's all too common to slap a fake label and packaging on a lower quality product, especially SD cards. If you've ever bought an SD card on the cheap from a slightly-less-than-reputable source (or even a reputable source, in some cases), how do you know if i ...more
If you need to replace or remove the battery, sim card, or SD card from your new Droid Bionic by Motorola, take a look at this walkthrough on how to remove the back of the case and gain access to all three pieces of the Android smartphone. Yes, you heard right. The Verizon Wir ...more
Did you know that your Nintendo DSi can play music from SD cards? Well it can, and since the flow of new games for it has slowed to a trickle that's a good thing. This video will show you how you can load AAC format music files onto an SD card, then load and play them on your ...more
In this video tutorial, viewers learn how to repair the write protect on an SD card. An SD card is a non-volatile memory card format that is used in portable devices. If the write protect on a SD card is broken, the user cannot record any files onto the card. To fix this, view ...more
Formatting an SD card to FAT32 format, the format that the Nintendo Wii can read, is the very first step that you need to take to hack you Wii. There's a lot of other reasons to do it as well, so even if you don't have a Wii you're trying to hack but want a FAT32 formatted SD ...more
This is how to upload pictures to Facebook from an SD card. On Facebook, navigate to the 'picture upload area'; if you can not find this, you can find it by going to: http://www.facebook.com/photos/?ref=sbCreate an album by choosing a name for it, and you can also add a descri ...more
While you can hook up your Craft Robo to a computer, you might sometimes want a little extra mobility. You can load your designs onto an SD card and cut out your favorite shapes directly from the card. No cords needed!
In this video tutorial, we learn how to free up internal flash space by moving apps to your phone's SD card. Whether you own a Google Android smartphone or are merely curious to see how they work, you're sure to enjoy this brief how-to. For detailed, step-by-step instructions, ...more
Apple has announced that Mac OS X Lion will only be available as a download from the App Store. But what if you don't have high speed internet? You'll want to watch this video to learn how install Mac OS X Lion on an SD card.
SD cards are pretty simple in concept, but there are lots of different sizes, types, and speeds to choose from. Watch this video for tips on choosing the right SD memory card for your camera, computer, Wii, or other electronics.
Many Android games use large, storage-heavy OBB files to store supplemental data. Generally, games with high-end graphics download these extra files when you install them from the Google Play Store. Most OBB files take up more than a gigabyte of space on your internal storage ...more
One draw that Samsung's Galaxy S line has had over the Google Nexus 4 and 5 and the HTC One (though the M8 appears to be following suit) is expandable storage. Pop a microSD card into the slot and you have extra storage for music, photos, and even apps themselves in some cases ...more
With great power comes great responsibility, and when it comes to modding Android, nothing is more powerful than TWRP custom recovery. As easy as it is to replace your phone's entire OS with a custom ROM, when things go awry, you can also be left with no operating system at al ...more
Do you lose your SD memory card when you need it the most? This video will teach you how to turn your problem into a fun arts and crafts project! The video teaches you how to create a fashionable sleeve to store your SD memory card. Not only does it look great, it will create ...more
Adding a SIM card to your Samsung Galaxy Tab is easy! If you have this new Android tablet and are looking to see how to install the SIM card, this video will clearly show you how it's done. Simply remove the slot's cover, insert the SIM card, making sure it's secure and snug, ...more
Learn how to insert a SIM card in an iPhone along with the other great features that come with it in this free computers and modern electronics video clip. This is important if you're trying to unlock it for other carriers or international plans. The SIM card also hold all of ...more
Learn how to insert the SIM card and battery. It's an easy process. And this clip will teach you everything you need to know. For all of the details, including complete, step-by-step instructions, watch this brief, official N97 owner's guide from the folks at Nokia!
Want to insert a SIM card into your Nokia N97 mini? It couldn't be easier. This clip will teach you everything you need to know. For all of the details, including complete, step-by-step instructions, watch this brief, official N97 Mini owner's guide from the folks at Nokia!
This video tutorial from noxad presents how to backup and burn games for Nintendo Wii game console.To setup game transfer from computer to your console you'll need any type of SD memory card. In this tutorial it's Lexor 1 GB SD card.Insert SD card into your computer card reade ...more
First open up the Google and search there for Romulation. Now click on first link it will take you to the website. Now type the game you want in search box like ice age 3. Platform must be DS. Now check the comments before downloading and if you satisfied then download it. No ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
In this video, we learn how to install the homebrew channel to your Wii. You will need: the Zelda twilight princess game, SD card, homebrew installer, and Wiibrew hack. First, go to Wiibrew and find where it says Twilight Hack underneath "homebrew". Go directly to download and ...more
Hacking the Wii is a fun, easy, and rewarding process for any of the more geekily-inclined. This two-minute video will walk you through the whole process except for the first bit where you copy the files here to an SD card and insert it into your Wii. This video will get you t ...more
When you want to post a breathtaking landscape or picture-perfect portrait that you just took with your DSLR camera to Instagram, Facebook, or some other social platform, there's an easy way to do so — even if you don't have a computer handy, which is typical when you're out a ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
This is a setup video tutorial for your LG Secret KF750 mobile phone brought to you by The Human Manual. This video will guide you through the process of installing your SIM card into the cell phone, to inserting the SD memory card to powering up and using.
In five short years, three generations of ultra-low-cost Raspberry Pi devices have challenged the boundaries of what a person can do with a $35 computer — especially with Kali Linux. With each Pi more powerful and cheaper than the last, the addition of the Pi Zero in 2015 too ...more
Take a look at this instructional video and learn how to load virtual console games onto your Nintendo Wii. You'll need the Twilight Hack and an SD card for this process. The Twilight hack allows you to run unofficial software through the SD (Secure Digital) card inserted into ...more
Sometimes it's necessary to format your memory card in your mobile phone or digital camera, just like you need to format a hard drive, because of virus problems or slower speeds. This video will show you the steps to formatting (or reformatting) the SD memory card for a cell p ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
Most of you probably heard about Rasberry Pi and if you haven't; what is wrong with you? But nothing less a Rasberry Pi is a computer a very small computer. Despite these size limitations, the Rasberry Pi is to not be underestimated. Not only can it do anything like a normal l ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecur ...more
Remember the Power Pwn, the clever little hacking tool disguised as a power strip? It's great in theory, but with a $1,295 price tag, it definitely doesn't fit into most people's budgets. But what if you could make your own for a fraction of the cost? That's exactly what the ...more
Virtual private networks, or VPNs, are popular for helping you stay anonymous online by changing your IP address, encrypting traffic, and hiding your location. However, common IoT devices, media players, and smart TVs are hard to connect to a VPN, but we have a solution: Turn ...more
Remember these? Sadly, I don't, but I'm sure someone out there does. Anyone? This monstrosity, called the Macintosh Plus, was introduced in 1986 for the low-low price of $2,599. Wait...what? Almost three grand for that bulky baby?!? With a whopping 1MB of RAM standard?!? Whoa ...more
Aircraft equipped with ADS-B are constantly shouting their location into the radio void, along with other useful unauthenticated and unencrypted data. In this guide, we will make an ADS-B receiver using a Raspberry Pi with a software-defined radio (SDR) dongle, which we can us ...more
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
Mobile carriers have been the bane of my existence for as long as I've had a phone. First, they take away unlimited data, and then when you try and switch carriers, they hold your phone hostage for a up to a week before unlocking it from their network. There are services out ...more
A PirateBox creates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disaster. Using a Raspberry Pi, we will make a wireless offline server that hosts f ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen and keyboard. With the help of an old-school connecting standard, though, you can log into your Pi from any computer using a si ...more
In 2019, the Raspberry Pi 4 was released with specs including either 1 GB, 2 GB, or 4 GB of memory, a Broadcom BCM2711B0 quad-core A72 SoC, a USB Type-C power supply, and dual Micro-HDMI outputs. Performance and hardware changes aside, the Pi 4 Model B runs Kali Linux just as ...more
Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary fl ...more
If you want to get started sniffing Wi-Fi networks, you usually need to start with a wireless network adapter. But thanks to a Wi-Fi sniffing library written in Arduino and the ultra-cheap ESP8266 chip, you might not need one. For less than $10 in electronics, you can build a ...more
The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized ...more
It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orie ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
If you've spent enough time in an arcade like me, you're probably well acquainted with the dreaded "ran out of quarters syndrome." Just when you're about to beat the last boss in Marvel vs. Capcom, or make it to the next level in Donkey Kong, you're all out of quarters to cont ...more
We might not be able to hang out with friends in-person during a mandatory lockdown or self-quarantine, but we sure can in "Animal Crossing: New Horizons." Snapping pictures with the new NookPhone feels almost as personal as taking selfies in real life, so, naturally, we want ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
Smartphones are vital travel companions. While you're on the go, they connect you with loved ones back home, help you find tickets and passes for tourist attractions, and make it easy to find your way through foreign roads — but even the most powerful smartphone could use help ...more
There are some essentials you need to know when shooting with the Red One camera, here we go over start/stop, SD card, AV connector board, back focus, and installing PL lens. Thanks to Indie Rentals - http://indierentals.com/
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more