A laptop keyboard can collect a lot of dust, dirt, and breadcrumbs. In this tutorial, we learn how to clean out your laptop keyboard. Start off by removing the casing from around your laptop, making sure not to unplug any wires. You will need a screwdriver to remove the screw. ...more
Is your keyboard on your laptop getting a bit sticky? Have years of sweaty fingers and bits of lunch found there way down between the keys? Is there moss growing out of there? Panic no more. This video will show you how to clean your laptop's keyboard completely. In order to ...more
I changed my laptop keyboard over to the Dvorak layout and someone asked it if was hard to do so I made a short video to show how its basically done.
Is the spacebar on your keyboard out of whack? This simple video will show you how to re-seat it in less than two minutes. Start by using your fingers (or a small screwdriver or spudger if needed) to gently pry up along the top of the spacebar, working from one direction to an ...more
In this video DavidDaGeek shows how to clean your keyboard by removing your keys, but to be careful when doing this. Put your finger underneath a key and just pull it off. Don't break the piece that holds the key in place though! he starts at the shift key and works to the lef ...more
In this video, we learn how to replace a keyboard on a laptop. First you will want to remove all of the screws from the back of the laptop where the keyboard lies. After this, remove the bezel then take the keyboard out completely. After this, clean out the area where your key ...more
This video tutorial is in the Computers & Programming category which will show you how to change the keyboard on an HP Pavilion laptop. First remove the battery and then remove the 6 screws in the battery cabinet. Now remove another screw as shown in the video. Open up the lap ...more
Six steps to clean a membrane keyboard. IMPORTANT - NOT FOR LAPTOPS or NON-MEMBRANE KEYBOARDS WHAT YOU'LL NEED: lint free cloth cotton swabs can of compressed air or vacuum cleaner flat tip screwdriver pinch of water OR 1 part water - 1 part alcohol (denatured)* #1 Shutdown, ...more
The internet is something most people rely on, so when you buy a used laptop without a wireless card or yours needs to be replaced, it's easier to do it yourself. Having someone else do it can cost more than you think, so here's an easy way if you own a Dell Inspiron E1505. R ...more
I love my laptop. It goes wherever I go. Unfortunately, that means that it also gets pretty grubby after a while. The screen gets dusty. The frame gets smudgy. The spaces between the keys fill up with crumbs of questionable origins. And my desktop? That thing is a dust bunny m ...more
With just two microcontrollers soldered together, you can inject keystrokes into a computer from a smartphone. After building and programming the device, you plug it into a desktop or laptop, access it over a smartphone, and inject keystrokes as you would with a USB Rubber Duc ...more
Check out this video from Make Magazine! Forget the Macbook air, there's a new lightweight portable in town - join our new video Maker (Kip Kay) as he shows you how to turn a modified hardback book in to a PDA powered "laptop" with keyboard. This will make you the cool guy in ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
After years of being a PC technician and Windows System administrator, I had the blind hatred for Apple that I thought I was suppose to have. I swore that I'd never even touch an iPod, let alone buy an Apple product. But I found a new career that drug me out of the Windows ser ...more
Think about how many times a day you touch your keyboard... ready to clean it yet? Check out this Howcast video tutorial on how to clean a computer keyboard. You Will Need * A keyboard disconnected from a desktop computer, or a laptop keyboard * A flathead screwdriver * A bo ...more
Not enough space on your laptop? No problem! Grab a new hard drive from your local office supply store and follow this tutorial to learn how to install it. You Will Need • New hard drive • External hard drive enclosure • USB cable • Hard-drive cloning program • Small Phil ...more
This is a great way to turn your treadmill into a walk station quickly and cost effectively. You only need a few things for this project: a tape measure, four shelf mounting brackets, screws, a drill, and a shelf. Your first step is to assess the length of the shelf you will n ...more
The back row is black wool. The table lamp is a glowstone with trapdoors, sitting on a nether fence. The computer monitor is a painting placed on a stair block. You can remove the stair block and use a pressure plate instead, making it look like a laptop. But then you'll have ...more
In this After Effects tutorial, Creative Cow leader Aharon Rabinowitz shows you how to be an AE road warrior by changing the keyboard shortcuts to account for missing keys on a laptop - such as the Ram Preview key or the Audio Preview key. Learn to customize your shortcuts in ...more
PowerBook Medic is the ultimate resource for Mac computers and electronics repair. They have helpful tutorials on most Apple products including the MacBook, MacBook Pro, PowerBook, iBook, iPhone, iPod, and more, covering topics from disassemblies, to RAM upgrades, to replaceme ...more
If you're interested in upgrading your RAM for the Samsung NC20 netbook, this video shows you how. This simple to follow video gives you a quick and simple way to make changes to your netbook. The only tool that is required is a small screwdriver. 1. Make sure to "ground your ...more
In this video tutorial, viewers learn how to install RAM into an Apple iBook G4 laptop. Begin by turning off the laptop and closing it. Flip the laptop to the backside. Turn the lock and remove the back cover. Flip the laptop over and open it. Press on the keyboard notch (betw ...more
Here is a great LEGO mod for your Laptop, via ETSY. Turn all your keys into LEGO keys.
This helpful tutorial will show you how to take a screenshot on your laptop computer. To take a screenshot on your laptop, follow these steps: 1. Locate the 'FN' key. (Bottom left of your keyboard.) 2. Find the 'sys rq' key. It is also known as the delete button. (Top right of ...more
Did you know that you can zoom in on your Mac laptop just as easily as you can on the iPhone? All you need is your fingers, your mouse and to activate the zoom function on your computer. Check it out! You Will Need * Mac Step 1: Open System Preferences Go to System Preference ...more
On OS X Mac portables, like the MacBook and MacBook Pro, the delete key backspaces, or deletes backwards. If you're accustomed to having the keyboard delete forward, just hit function delete. For more, watch this MacBook video tutorial.
In this video we learn how to disassemble a T-Mobile G1 HTC phone for repair. First you want to make sure to wear an ESD wrist strap and make sure it's secure around your wrist. Then remove the battery from the device. Next unfasten the screws from the back of the housing on t ...more
In this video tutorial, viewers learn how to take a screen-shot on a laptop. Begin by finding the display image that you would like to take a screen-shot of. Then press the End and Insert key on the keyboard to take a screen-shot of the displaying image. Now open the Paint pro ...more
If the letters on your laptop keyboard are faded or dirty, cover them with strips of washi tape. A high-quality, decorative tape made of rice paper based in Japan, washi tape is an extremely versatile craft tape known for its eye-pleasing decorative patterns and low-adhesive q ...more
Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more
You may already know that you can build a functional circuit on a sheet of paper with the graphite from a pencil, but you'd probably never think of using it to fix an electronic device. This same principle can be used to bring back a bricked phone, but can also repair a damage ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
If left unattended, a hacker with a USB Rubber Ducky and physical access to the computer can infiltrate even the most secure computer. Such attacks often go undetected without the use of a tool like USBRip, which can provide you with assurance that your device hasn't been comp ...more
A man-in-the-middle attack places you between your target and the internet, pretending to be a Wi-Fi network while secretly inspecting every packet that flows through the connection. The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwa ...more
Today I'm going to show you 7 easy ways to organize your room. They are really simple and cheap so I hope you find them useful! Video: . USE WHAT YOU ALREADY HAVE The first thing you need to remember is to use what you already have, for example: space! There can be some usef ...more
Working from home is going to be a reality for more people than ever. With Twitter CEO Jack Dorsey announcing that his employees will be working remotely for an extended period of time (and even permanently, in some cases), the workforce is rapidly changing. More companies are ...more
Got a dirty desktop computer or laptop screen? Mix together a solution of equal parts white vinegar and purified water and place solution in a spray bottle. Spray a clean cotton rag with the solution and gently wipe the screen for simple, streak-free cleaning. For a quick clea ...more
The iPhone's ingenious trackpad function offers an intuitive way to place the cursor where it's needed. Not to be outdone, Samsung phones like the Galaxy S20 have a similar feature baked in. If you're running One UI 2, it's even enabled by default. To use the function on One ...more
On average, it takes three seconds to move your hand from the keyboard to the mouse, then click once and move your hand back to the keyboard. While the time wasted my sound trivial, it can add up quickly throughout the day. Seconds can become minutes wasted and can make it di ...more
With the US Department of Homeland Security (DHS) banning laptops and tablets on flights originating from 10 international airports, and the United Kingdom taking similar precautions, international travelers are faced with hours of non-productive — or far less entertaining — f ...more
With Virtual Network Computing, you don't need to carry a spare keyboard, mouse, or monitor to use your headless computer's full graphical user interface (GUI). Instead, you can connect remotely to it through any available computer or smartphone. Virtual Network Computing, be ...more
The 12.9-inch iPad Pro was released in stores on November 11, 2015, and a couple days later I went to an Apple Store and to check it out in person. I had mixed feelings about the tablet, but was intrigued overall—so much so that over the next few weeks, as I found myself heari ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Whether you're in high school or college, you no doubt will have your iPhone in your pocket all day long. To make your iPhone last the whole time and even help you out with your studies, these are the accessories you'll want to get your hands on. You might not think you need ...more
If you use a wireless mouse or keyboard, you could be leaving yourself open to attacks from hackers. Researchers at Bastille had discovered in January 2016 that attackers could make use of a cheap $15 antenna to sneak into your computer through a wireless mouse or keyboard don ...more
One feature in iOS you're likely underutilizing is 3D Touch, a highly useful, unique tool for iPhones ever since it first appeared on the iPhone 6S. Apple's pressure-sensitive interactivity gives iOS an extra layer of functionality, which can be clearly seen across the entiret ...more
As people continue to upgrade their PCs to Microsoft Windows 8, more and more developers are adding content to the Windows Store. While the offerings are not as vast as Google Play or the iTunes App Store, it does have some solid apps for both productive users and those lookin ...more
After the first image leaked of the upcoming successor to the Razer Phone, many were taken aback by its design, specifically how familiar it was. Last year's Razer already stood out with its boxy design and large bezels, and many thought the successor would change this. It did ...more
While the USB Rubber Ducky is well known by hackers as a tool for quick in-person keystroke injection attacks, one of the original uses for it was automation. In this guide, I'll be going the latter, explaining how we can use it to automate Wi-Fi handshake harvesting on the Ra ...more
We've had the pleasure of test driving the ASUS Transformer Book T100T for the last couple of weeks, and for a $400 Windows 8 machine, it's impressive to say the least. Now don't get me wrong, a Surface Pro this is not. But unless you plan on heavily gaming or doing other pro ...more
The Microsoft Surface has been the go-to device for many professional artists since its initial release back in 2012. Since then, the Surface line has continued to offer customers a portable, high-powered machine that's a near perfect value for both casual and professional art ...more
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered ...more
From laptops to tablets, technology is taking over classrooms. Elementary schools offer kids tablets, and college students are bringing laptops into lecture halls, leaving their notebooks behind. Today, many students prefer putting their fingers to a keyboard rather than pen t ...more
You're smashing your keyboard to increase your screen brightness, yet it won't go any higher, but you know you've been able to set it higher before. Angered by this, you get up and move your laptop, only to suddenly notice that the display does in fact get a lot brighter. Now ...more
Oh, Mario. The guy that's been a part of our lives since as long as we can all remember. Well, Adam Ringwood and his friends did something pretty cool with one of Mario's most exciting games at the HackIllinois event in February 2016—they hacked a Chevrolet Volt's steering whe ...more
If you read the reviews on Google's Pixel C, you'll notice one big complaint about the tablet/laptop—most reviewers feel that Android simply isn't ready to be used as a desktop OS. The developers at Jide felt the same way, so they set out to make a custom version of Android wi ...more
While you can do a lot of things on your smartphone that were once only done on a computer, having a laptop is still necessary and critical for many tasks. Often times, the two devices work very well together. We recently covered Google's Chrome Remote Desktop, an app that al ...more
One of the greatest consoles ever to exist in the world of gaming is the PlayStation 3, which even lets you do a million different things unrelated to games. But no matter how big of PS3 fan you are, you have to admit that the internal browser is not the greatest. Far from it. ...more
In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffi ...more
Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the d ...more