One of the first things you'll have to do when repairing and opening up your MacBook Pro 17" Unibody is taking off the bottom case. This is where you'll access all of your guts. See how to remove the bottom case on a MacBook Pro 17" Unibody laptop. PowerBook Medic is the ulti ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
Accidents will happen. This brief how-to will guide you through the process of removing your 15" MacBook Pro's top case (which contains both the keyboard and trackpad) quickly and efficiently without damaging any of the components, the first necessary step of any successful re ...more
In this video we learn how to open an Xbox 360 case. You will need some screwdrivers out first. Then, pull out from the USB port so the cover comes out from the console. After this, turn the console over and push a driver inside the tabs to remove the bottom vent from it. Afte ...more
Accidents will happen. This brief how-to will guide you through the process of removing your 13" MacBook's top case both quickly and efficiently without damaging any of the components, the first necessary step of any successful repair. This tutorial will also be of use to thos ...more
This video teaches the secrets of opening an XBox 360 without a case tool in simple steps. First remove the hard drive and then remove the face plate from the bottom. Now insert the pin through the holes on the sides and push it out where the side pieces are locked in. Now rem ...more
This is a working solution for those using an external monitor on their MacBook Pro's running Yosemite. The previous terminal commands for Mavericks no longer works on Yosemite, so this how to do it. More info on the solution can be found here: (all credit goes to rwg) http: ...more
Apple's latest updates to its operating systems add another security feature to its Find My service, so you have an even better chance at locating your lost iPhone, iPad, or Mac should it ever happen. As long as you have the option enabled, you can leverage other Apple users' ...more
Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the d ...more
With just one line of Ruby code embedded into a fake PDF, a hacker can remotely control any Mac computer from anywhere in the world. Creating the command is the easy part, but getting the target to open the code is where a hacker will need to get creative. Ruby is just one wa ...more
So, you've just got yourself an Apple iPad, but it already needs fixed, or you want to check the innards out for yourself, you're going to have to know how to open that sucker up. This video tutorial will show you how to do just that. Learn the whole teardown procedure for th ...more
It's not uncommon for hackers to attempt to move laterally between devices in proximity of a compromised device to maintain a prolonged presence in the network. Malware utilizing USB flash sticks to self-replicate and compromise air-gapped machines isn't a new concept. In bot ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swi ...more
The dock has been a staple of Mac OS X since its creation and not much has been needed to improve its functionality, but when you add theming to the mix, you can run into some issues. At times, I have my Mac set up with a particular theme that doesn't need a dock taking up pr ...more
It's been done for ages, but for most of us, "regift" entered our vocabulary after the 98th episode of Seinfeld—"The Label Maker." In this episode, Elaine calls Dr. Whatley (played by Bryan Cranston) a "regifter" after he gives Jerry a label maker—the same label maker that Ela ...more
Apple's AirPods are convenient because you can easily switch which Apple device is connected to your AirPods with just a few taps. But unless you're using Shortcuts to make the connection, you aren't using the fastest method possible. For the uninitiated, Shortcuts is a power ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because browser-stored passwords are hacker gold mines. With a USB Rubber Ducky and physi ...more
If you're an AirPods owner, you know the sound — that decrescendo of little beeps and boops means imminent "death" for your wireless earbuds. Other than that infamous chime, however, it's not overly clear how to check your AirPods, AirPods Pro, or AirPods Max power levels. Tha ...more
While hackers have taken advantage of numerous vulnerabilities in Adobe's products to deliver payloads to Windows users via PDF files, a malicious PDF file can also wreak havoc on a Mac that's using the default Preview app. So think twice before double-clicking a PDF open on y ...more
Most users don't realize how much valuable data is in their network traffic. With a few simple tools, an attacker can quickly pick out cookies, passwords, and DNS queries from a macOS device as it covertly streams the victim's network traffic to the attacker's system. Here, we ...more
These days, if you're having friends over, they'll probably ask to log into your Wi-Fi network before asking for a drink. But if you've forgotten your password, it can be quite hard to find, since most devices obscure the characters with asterisks. But it honestly doesn't tak ...more
It's easy to back up and restore your iOS devices using iCloud, but there are a few downsides to encrypted iCloud backups. For one, Apple holds the key to decrypt all the data. Plus, you're limited to only 5 GB of data for free before you have to upgrade your storage to 50 GB, ...more
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered ...more
By now, you've probably already installed 10.10 Yosemite, the newest version of Mac OS X, on your computer. While you most certainly noticed the visual changes, you might have missed some of the really cool additions. We've spent the last few days getting to know it, and let ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
Being seen clearly is an essential part of any video call you're on, but being heard is equally important. Lousy audio from your side can ruin the experience for others on the call if they can't understand you or hear the sounds they need or want to hear. To improve your audio ...more
One of Android's most glaring weaknesses is its lack of an iMessage equivalent. That is, of course, until now. There's one app that will allow Android users to experience iMessage on their non-Apple phone, complete with end-to-end encryption, message effects, and group messagi ...more
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more
Whenever something goes wrong with your iPhone, or whenever you want to downgrade from an iOS beta back to the regular iOS release, you can restore your iPhone to your last saved state. Restoring to an iCloud backup is great but won't work in all situations. Plus, if you saved ...more
It finally happened! In a world of "go big or go home," Magic Leap has finally done something other than tease us with vague promises and rendered video concepts. Although, other than actually showing us what the developer's kit will look like, it seems little more than a slig ...more
Apple said goodbye to iTunes with the release of macOS Catalina, breaking up music, videos, and podcasts into their own respective apps, Music, TV, and Podcasts. But without iTunes, what app's in charge of interfacing with your iPhone? That would be Finder, and you use it to s ...more
It's somewhat funny that the HTC ThunderBolt smartphone would be released around the same time as Apple's new Thunderbolt technology. Mainly because HTC's smartphone isn't exactly something I would compare to a flash of lightning, which averages around 60,000 miles per second. ...more
Eating fire is a guaranteed method of not only impressing an entire room, but also instantly settling any questions as to whether or not you're a complete and total stone cold BAD ASS. When you can casually whip this trick out in a bar, you're not only going to get your drinks ...more
Learn how to open up an Apple iPad case. All you will need is a flat tool to pry open the casing and you have access to the inside. Don't act too hasty, this video will demomonstrate exactly how to open an Apple iPad casing.
There are a lot of reasons to want to open a XBox 360 console case. You might want to fix it because it's broken. You might to flash the disc drive, or you might want to cut cut a hole the shape of a big X in the side of it. Whatever the case, you're going to need to open the ...more
This video shows how to softmod your slim, PS2. You'll need to crack open your case and be comfortable with the insides of your machine. Take your time and follow the instrutions to soft mod your Sony slim PS2 and enjoy the expanded goodness. This will let you unlock your PS2 ...more
In this video the man describes of the circuit bending of Yamaha pss 140 synthesizer. This is a good model it's a FM synthesizers. It got many songs , many cool rhythms,nice trumpets and it is working real nice.Here he states that it is important for power supply or else we do ...more
This video shows how to thread your bobbin on a side threading sewing machine. We start off by making sure that the needle is in the most upright position. The upper thread guide when moved to the most top of its travel, the needle is in the most upright position.Then you take ...more
This video demonstrates the installation of memory in a 13” Macbook Pro (mid 2009 model). It’s easy to perform and takes about 10min time. You’ll require a #00 Philips screwdriver (available in the Newer Technology 11- piece tool kit). Take care to work in an anti-static work ...more
Adding gumpaste roses to your cake or cupcake can either be the hardest or simplest skill in cake decorating, depending on the complexity of the rose. In the case of this open rose, creating a flower is simple yet adds a very professional touch to whatever you're making. If y ...more
In this video, we learn how to fix and iPod touch LCD screen that is too dim/won't light up. First, open up the back case of the device and take out the battery. Make sure not to disconnect the battery that is attached to the battery. After this, take a tool, which you can pur ...more
Videomaker Associate Editor Tom Skowronski explains how four basic steps can be used to improve the lighting effects for a video and give it a more professional look. - There are four basic steps to improve the quality of the video 1) Camera Controls: Three basic camera contr ...more
This video is about how to make a CD cover. First, open up the image that you have. Then, you need an action script. Click on the action's palette and pick which CD cover you want to do. Then you click step one which will run a template for you to set everything up and place y ...more
So you're bored with you Nintendo DS Lite. There hasn't been a lot of software support lately, the 3DSi is so far away and the normal DSi not worth the upgrade... how to add some zest to your portable gaming life? Why not put a new case on it? This video will show you how to t ...more
A lot of people have larger hoods on their upper eyelids. If this is the case for you, you may be frustrated by never being able to see your liner or shadow when your eyes are wide open. Check out this tutorial for a lesson on how to create visible eyeliner on heavy eyelids. T ...more
The new MacBook Air from Apple may be one of the thinnest notebooks on the market, but don't let its size full you— it's a fortress, an impenetrable laptop designed to discourage user modifications, just like the Apple iPad. So, if you were thinking about upgrading your RAM, ...more
In this how to video, you will learn how open an iPod classic. Notice that the sides of the interior of the bottom case have tabs. There are metal locking clips at the bottom of these. The plastic clips on the front cover engage these to lock the cover into place. This means y ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
Need to fix your Power Mac? Disassembling the Power Mac could be tricky, but not now. See how to remove the side case and fan from the G5 Power Mac desktop computer. PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials ...more
A below elbow arm amputee shows how to open bottles one handed, without a prosthetic device. This technique is also great for people with arthritis pain, cerebral palsy, weak joints, stroke, and people who want to be ready for the worst-case-scenario that they suddenly have on ...more
The geniuses at Other Word Computing (OWC) show you how to install new memory cards in your 17" Macbook Pro pre-unibody, only by using a screwdriver and a little elbow grease. The only thing to keep in mind is that your laptop must be an older model, created prior to February ...more
This achievement is only available on the Case Zero DLC for Dead Rising 2, which is just for Xbox 360 (from the Xbox Live Marketplace). In order to become a "Locksmith" you need to find and open the four locked doors in the game. Geoff and Jack from Achievement Hunters show yo ...more
With this quick Blender 2.5 video tip, you'll see how to stave off frustration in the case of a crash or lost work by using Blender's autosave feature to recover your work. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application or a ...more
In this tutorial, you will see how to apply a texture, in this case a subtle gradient, to the world background in Blender. Textures can vastly improve the presentation of your model. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics applic ...more
Bobby pins have been integral tools in a girl's makeup case since the 1920s, when bobby pins were used to secore the fashionable hair bobs of the Jazz Age. They've also recently been used by young boys and hackers to pick open locks. And now you can add one more fun use to the ...more
I was looking around on this site and this article caught my eye. It was about hiding text in ADS or Alternate Data Streams. While this is nothing new in the tech world, it seems that more and more people are looking at ADS for one reason or another. Years ago, I created a si ...more