If you want to know how to monitor another computer screen with Real VNC, you must watch this video. Install Real VNC in your computer and computer that you're going to monitor. Remember the folder where you installed it and check the "Create a VNC Viewer desktop icon" checkbo ...more
This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key logg ...more
Vanae goes over some tips on how to successfully ask a girl out in this video tutorial. The first tip offered in this tutorial is building a connection between yourself and the girl. This means talking and getting to know the girl before asking her out. The next tip is figurin ...more
This video describes how to solder a wire. The first thing you have to remember is that the wires should be cleaned, shiny, and bright. Then trim about 1/2-inch of the insulation of the wires and then make a secure mechanical connection. Next, put some soldering pencil clean a ...more
In a 2010 Toyota 4Runner, you can connect your phone to the car via Bluetooth. To do this, make sure the car is stopped. Then click the info button next to the navigation screen. Press "Phone" and confirm that you want to connect a new phone. Press "Add New". The car's system ...more
Eric Scott demonstrates on how to use a pendulum to connect to the spirit. You can get any pendulum you have or use the custom made light plastic pendulum about five and a half inches long which may help to get your response very quickly. •You will not have your elbow resting ...more
This video tutorial will show you how to setup your YouTube account in order to enable you to play videos automatically in high quality when available. It only takes a few seconds to setup. It is a very simple process that takes us through the settings and options to enable yo ...more
This video shows you the proper way to clean your spark plug to ensure it is working efficiently. A step by step written guide. 1. Firstly done, your safety gear: this includes safety glasses and gloves. 2. Place your spark plug in a vice with the electrode facing up toward ...more
Ever heard of the Blink Card Trick? Well, it's an easy way to impress your friends, without having to know much about card tricks. Learn how to perform this card trick, step by step, in this tutorial. You Will Need: • A deck of cards • Glue Step 1: Fold two cards Fold two ...more
Thanks to Apple's awesome user interface, it is extraordinarily easy to set your default printer. Instead of guessing which printer your document printed to, be certain of where it is every time. Stop chasing that printed document around your home or office and set your Mac t ...more
Make life easier by printing to your nearest PC printer the first time, every time. You Will Need * A printer * A PC * The printer’s model number * The printer’s manufacturer Step 1: Check connection and power Check to see if the printer is properly connected and powered on. ...more
Watch this video tutorial to learn how to play the Google language computer prank on a coworker. Change your colleague's Google settings with this easy prank, and watch their head spin! You Will Need * Your coworker’s unattended and unlocked computer * An internet connection ...more
Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. You w ...more
What does it mean when there is no picture on the television? Check out this video tutorial on how program the Panasonic remote DMR-ES15 (ES25) for other TV's. This Panasonic DMR-ES15 (ES25) DVD Recorder is easy to operate and great to record with. Check and confirm the foll ...more
What does it mean when there is no picture on the television? Check out this video tutorial on how program the Panasonic remote DMR-ES45V (ES35V) for other TV's. This Panasonic DMR-ES45V (ES35V) DVD Recorder is easy to operate and great to record with. Check and confirm the ...more
What does it mean when there is no picture on the television? Check out this video tutorial on how program the Panasonic remote DMR-EH55 for other TV's. This Panasonic DMR-EH55 DVD Recorder is easy to operate and great to record with. Check and confirm the following items li ...more
What does it mean when there is no picture on the television? Check out this video tutorial on how program the Panasonic remote DMR-EH75V for other TV's. This Panasonic DMR-EH75V DVD Recorder is easy to operate and great to record with. Check and confirm the following items ...more
Steps: 1. Turn off water and power to water heater. 2. Use garden hose to drain water from heater's tank. 3. Cut copper pipe just above the corroded connection using a tubing cutter. 4. Use two pipe wrenches to loosen the old union. 5. Remove the old union from the steel pipe ...more
This video shows how to install a vehicle wiring harness, so that you can tow a trailer, on a vehicle that does not have a factory tow package. Most vehicles will have custom T-one connectors available which will simply plug into the vehicles wiring. If your vehicle does not h ...more
Throughout the meticulous and dexterous process of jewelry making, when you get to the end of your bracelet or necklace, there's a feeling of accomplishment and satisfaction. But to seal the deal, you need to crimp. Crimping is a necessary process for the ends of your homemade ...more
The Dropbox utility can automatically sync your computer files with other devices each time you save them. In this tutorial, learn all of the steps you need to sync files with Dropbox. You Will Need • Internet access • Compatible mobile device • Dropbox software Step 1: In ...more
With summer just around the corner make sure you are prepped and ready for all those barbeques by connecting the propane gas tank to your grill. With the hose on tight you’ll be ready for those hotdogs and hamburgers. If you are craving that flame-broiled taste but you are ou ...more
Every new Apple computer ships with an Apple remote, which can activate the Front Row program and let you play music, view photos or watch videos when you are away from your computer. However, Apple remotes will connect to all nearby devices, so people with multiple Macs or iP ...more
Beauty pageants require contestants to take platforms by writing essays introducing their connection to social issues. Write a solid pageant platform statement with a pageant veteran in this free beauty pageant preparation video series. Part 1 of 13 - How to Write a pageant pl ...more
With the release of iOS 15.4, iPadOS 15.4, and macOS 12.3, Apple unleashed a ton of new features. We saw a preview of one of the most anticipated new features way back in June 2021 when it was announced at WWDC, and now it's finally available for everyone with an iPad and Mac. ...more
One fight for augmented reality branding that we thought had been settled has suddenly turned into a full-fledged legal battle—again. The combatants? Unreal Engine maker Epic Games versus the Chinese startup known as Nreal (aka Shenzhen Tairuo, formerly known as Hangzhou Tair ...more
Updating your Galaxy to the latest software version is optional, but you wouldn't know that from the persistent notification and status bar icon that are constantly reminding you to. Thankfully, you're just an app away from hiding these eyesores without the need to update your ...more
No doubt, you've heard a lot about 5G lately. This might have you looking at your current 4G phone and lamenting your inability to connect to the faster network. But is 5G worth buying a new phone over, and should you buy one right now? There are plenty of reasons why 5G is g ...more
The overarching and expanding field of data science and analysis has become virtually inseparable from areas such as programming and development. As the driving force behind web development and marketing, engineering, white-hat hacking, and even finance, large-scale data anal ...more
No matter how you feel about Apple, I think most Samung fans would agree that AirPods have some great features, including the ability to pair and use the earbuds without messing around with Bluetooth settings. But did you know your Samsung Galaxy S20 has this feature as well? ...more
Despite Samsung's long running support for Wi-Fi Direct, most users still struggle to transfer files between their devices. Whereas Apple has AirDrop, Samsung's previous solution wasn't so obvious. With the Galaxy S20 and Galaxy Z Flip, Samsung hopes to correct this with "Quic ...more
Working from home is already challenging. Add the threat of a cyberattack into the mix, and the situation gets even hairier. Hackers know that we're spending more time online, and the number of pandemic-related schemes is growing. While protecting yourself online is always es ...more
For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting ...more
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more
Whether you loved or hated the blockbuster hit Joker for its slapdash violence and unflattering portrayal of mental illness, if you have been online lately, you know you can't afford to miss it. If you are in the former camp, you can now show your appreciation using a new fil ...more
I use my iPhone's personal hotspot all the time. Whether I need a connection on the train, in a coffee shop with no Wi-Fi, or when my friends don't have service, my personal hotspot is a lifesaver. But all that data comes from somewhere, of course, that somewhere being your ce ...more
Audiophiles should know Pandora has an option to increase its sound quality. Change one simple setting and you'll enhance your experience with high fidelity audio. Even if you're not an audiophile, who wouldn't want the best possible sound? Most carrier plans include unlimite ...more
If you've ever used the Find My iPhone and Find My Friends apps in iOS 12 and below, you may be surprised to hear that those apps have joined forces in iOS 13. Now, instead of two separate apps, they're combined into one convenient package. But what does that mean for you and ...more
You may have recently seen a plethora of Instagram users, including celebrities and politicians, sharing a screenshot declaring that the platform will implement a new "rule" where it would own and could use your photos and videos however it wishes. The screenshots are part of ...more
If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Obje ...more
Apple's Gatekeeper security software for macOS (Mac OS X) is vulnerable to remote attacks up to version 10.14.5. An attacker that's anywhere in the world can exploit MacBooks and other Mac computers by sharing a single ZIP file. The vulnerability was discovered by Filippo Cav ...more
The next libSSH or OpenSSH exploit may be just around the corner. Keep your SSH service out of Shodan's database before hackers find new ways to bypass the password protecting the server. Shodan has been called the "hacker's search engine" because it's literally a searchable ...more
Many of our online accounts now come with an added two-factor authentication (2FA) functionality to help keep our data safe. This essentially means no one would be able to access the account until a specific set of requirements were met. It could be a combination of a password ...more
In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffi ...more
Giving up your Wi-Fi password can be giving up more control than you think. Because of the way Chromecast and other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we ...more
Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands. RapidScan does an excellent job of automating the deployment of vulnerabili ...more
Rooting usually means sacrifice. With most root methods, you lose access to apps like Netflix and Android Pay when SafetyNet gets tripped. More importantly, you lose the ability to accept OTA updates, forcing you to manually flash new Android versions. But there's a way around ...more
Despite its rocky start, the Essential PH-1 has a lot going for it. Not only does it get consistent security patches and system updates hours after the Pixels, but like the Google-developed lineup, it's also great for rooting. Not only is your warranty not void with rooting, b ...more
Applicants looking to attend Magic Leap's first annual L.E.A.P. conference next month in Los Angeles have begun receiving their confirmation invitations, and now we have more detail about some of what will happen at the event. In a message sent out by Magic Leap on Friday, th ...more
Looking to inject a little more processing juice into your HoloLens? Unity can fix you up with the Standalone Universal Windows Platform Holographic Emulation. While its name appears to have skipped the marketing department in the decision-making process, the tool enables dev ...more
Between the Cambridge Analytica scandal and the revelation that Facebook logs your calls and text history on Android, many are considering joining the #DeleteFacebook movement. But it can be difficult to leave the site, because so much of its content is only available to activ ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
Now that we have our payload hosted on our VPS, as well as Metasploit installed, we can begin developing the webpage which will trick our "John Smith" target into opening our malicious file. Once he has, we can take over his computer. This part is more involved, but the first ...more
To please those of us who love to mod and root our Androids, OnePlus has made both the OnePlus 5 and 5T relatively easy to customize — so much so that the 5T topped our list for the best phones for rooting. Unfortunately, unlocking the bootloader and using root to modify the f ...more
Lost among the latest laptops, smart assistants, VR headsets, and Motorola-branded gadgets that it brought to CES 2018, Lenovo has also introduced a new pair of augmented reality smartglasses. While Lenovo could be credited with the first true consumer AR headset by way of th ...more
If you or someone you know has younger kids and you're looking for an augmented reality toy, Pai Technology has just the educational option for you. For $199, the toy maker offers Augie, a spherical robot that uses augmented reality to teach children the basics of programming ...more
Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing u ...more
There may be many third-party file managers for Android to choose from, but until now, Google offered no proprietary option. Enter 'Files Go,' which, while initially anticipated for December, is now available for you to try. After the beta version of Google's files manager le ...more
While other devices are moving away from fingerprint scanners (cough, iPhone X), for many, a fingerprint scanner provides the best balance between security and speed. Typically, the rear fingerprint scanner on the LG V30 is quick and accurate, but every so often the phone will ...more
Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in ...more