Hack Computer Mouse

News : Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more

How To : Use the on-screen keyboard in Mac OS X

In this video tutorial, viewers learn how to use the on-screen keyboard on a Mac OS X computer. To turn on the keyboard viewer, go to Apple and select System Preferences. Under Personal, click on Language & Text. Click on the Input Sources tab and check Keyboard & Character Vi ...more

How To : Flip your computer screen upside down in MS Vista

This video is a quick guide on how to turn your computer screen up side down. If you have Windows Vista, right click on mouse and go to graphics properties. Go to display settings. On the rotation box, choose the desired angle of rotation. Click apply and hit OK to confirm set ...more

How To : Connect a PS3 controller to your computer

In this tutorial, find out how to easily connect a PS 3 controller to your PC. You can controll the mouse, keyboard with just this one controller. It's easy to do and makes it a whole lot better for your hands and for your sanity. The controller can even be configured to play ...more

How To : Bypass RealVNC authentication

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers do ...more

How To : Select different items in Finder in Mac OS

In this video, Gary from MacMost demonstrates how to select items on a Mac computer. He explains that there are different ways of selecting items, both with the mouse and with the keyboard. Click to select a single item, and click an empty space to clear the selection. Hold Co ...more

How To : Remotely sign out of your Gmail account

Accidentally leave your Gmail open on a public computer terminal? Don't fret. You can have Gmail sign out any unwanted sessions with a click of the mouse. This free video tutorial from the folks at CNET TV will show exactly what to do. Protect your Gmail email account and log ...more

Hack prestige in Call of Duty : Modern Warfare 2

In this video tutorial, viewers learn how to hack the prestige mode in the game Call of Duty: Modern Warfare 2. Prestige Mode is an option that a player can choose after they progress to Level 55 (Commander) and gain a little more experience. With this hack, viewers will be ab ...more

How To : Hack your iPhone 3G

In this video, we learn how to hack your iPhone 3G. To do this, you will need: iPhone 3G, Firmware 3.0 or 3.1 file, charger cable, and the Redsn0w program. First, connect your phone to the computer and then start up the Redsn0w program on your computer. Turn the phone off, the ...more

How To : Copy and paste on a computer

Why type everything twice? If you don't know how to copy and paste you are missing out on an incredible time saver. Check out this tutorial and learn how to speed up your work. You Will Need • Computer • Word processing program Step 1: Position cursor Position your cursor n ...more

How To : Hack together the DIY video chat robot

Sparky is a wireless, web-based video-chat robot from the Gomi Style crew. You can learn how to make your own Autonomous Telepresence robot using spare computer parts, some old toys and a bit of custom software (that we provide at gomistyle.com). This robot is operated with a ...more

How To : Hack a baseball bat- the Ryan Howard speed test

A 2.0 baseball bat that contains an accelerometer, a gyroscope and a wireless transmitter synched up to a computer was created to track a baseball batter's swing and test how fast Ryan Howard's swing is. Watch this video tutorial to learn how this baseball bat was assembled.

How To : Connect a Windows Mobile Device to a Computer

Connecting your new smartphone gadget to your desktop isn't just connecting these products with a USB cord. It is important to sync them to allow the transfer of data from your smartphone to your computer and vice-versa. This is desired if you wish to transfer information incl ...more

How To : Change the accessibility options in Windows 7

This video teaches how to change Windows 7 accessibility options. Choose Start, Control panel. This opens the Control Panel window. Choose Ease of Access in the control panel window. This opens Ease of Access window. Inside the Ease of Access window, there are various links th ...more

How To : Record desktops with RecordItNow! on Ubuntu Linux

Record desktops with RecordItNow! on Ubuntu Linux Ever wanted to record your desktop screen? Well, it's entirely possible on Ubuntu Linux. This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to r ...more

How To : Use Note Pad to get by school internet blocks

In this tutorial, we learn how to use the notepad to get by school internet blocks. First, open up Notepad on your computer, then type in "<html>" "<body>", "iframe src=http://www.youtube.com", then "height=100%", then "width =100%". To finishe, type in "<iframe>>/body><html>" ...more

How To : Create an envelope icon in Photoshop

You can draw almost anything in Photoshop. Check out this video for information on how to draw an envelope that you can use as an icon for other programs. This step by step tutorial takes you through the entire process of creating a realistic looking envelope on your computer. ...more

Hack Logs and Linux Commands : What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more

How To : Port scan with Nmap

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service ...more

How To : Turn Your House Lights On & Off Using the Internet

Haven't you ever wanted to live in a futuristic home? I think that homes are headed towards an era where they will be controlled by our computers and smartphones. No longer will you have to find your keys to unlock your door, or wait until you get home to monitor your security ...more

How To : Avoid Computer Fatigue (As Best As You Can)

I don't know what I'd do without my computer. I can't do my job without the internet. I communicate with employers, friends, and family through emails, video chat and Twitter. I schedule meetings and plan deadlines. I bank. I shop. I read the news. I play games. I watch my fav ...more

News : 5 Keyboard Shortcuts Every Windows User Should Know

Take a look around the next time you open up the File menu and slowly scroll through your editing options. Are your coworkers quietly cringing? Your kids running for the other room? Sounds like you need a few good keyboard shortcuts up your sleeve. Memorizing the right combos ...more

How To : Hack a call center telephone system

Tired of touch-tone hell? Get human with our cool phone hacks and cheats with the tips from this how-to video. Become a life hacker - we'll show you how to find phone numbers, cheat the computer and hack the call center system with our hacking tools. Watch this video tutorial ...more

How To : Use basic netbios commands

Tutorial showing the basic netbios commands in Windows to access or hack a remote, unprotected computer. Use basic netbios commands. Click through to watch this video on tricklife.com

How To : Draw Mickey Mouse in MS Paint

Learn how to draw a Mickey mouse on your computer using MS Paint in simple steps. Use the oval tool and draw two medium size circles leaving some space between the other. Now draw a bigger circle by making its top ends meeting the other two circles. Draw two little circle insi ...more

How To : Install an Android OS on your iPhone 2G

Not sure what to do with that old 2G iPhone now that there have been three newer versions since then? Don't toss it or let it collect dust! Jump on the Droid bandwagon and turn your old Apple device into an Android just like the EVO. This hack will require a little fancy compu ...more

How To : Set your mouse cursor to leave a trail on screen

See how you can make your mouse cursor leave a trail behind it. First, go to "Start" and then "Control Panel". Then go to "Printers" and "Other Hardware" and then "Mouse". A new window should pop up and you should go click on the "Pointer Options" and then select the length of ...more

How To : Use Your "Wrong Hand" to Relieve Anger

Since picking up your first crayon, chances are you've had a favorite, or dominant, hand. That hand gets you through the day, taking care of everything from writing to eating. If you've ever been forced to rely on your "wrong hand", you know how uncomfortable and unwieldy it f ...more

How To : Use beEF (Browser Exploitation Framework)

I'm still amazed by all the things some people just don't know. Script-kiddies often refer to Metasploit if someone asks them how to hack a computer because they think there's simply no other way. Well here I am today trying to increase your set of tools and -of course- skills ...more

The Hacks of Mr. Robot : How to Hack Bluetooth

Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more

WANTED : Hackers for Bug Bounties

In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage unit of every country is trying to hire high-quality, experienced hackers as fast as they can to hack their adversaries' compu ...more

How To : ALL-in-ONE HACKING GUIDE

Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more

  • Hot
  • Latest