Hack Computer Mouse

Community Byte : Hack Our IRC Bot to Issue Commands

Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved thi ...more

How To : Pull a Quick Computer Prank!

Here's a quick, simple prank to pull on anyone in under 2 minutes. It works especially great for someone who has tons of icons on their desktop! It makes the computer look the same, but nothing on the desktop works! Here's how it goes... You're target leaves their desk for a ...more

How To : Secure Your Computer with Norton DNS

There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more

How To : Things to Do on WonderHowTo (11/16 - 11/22)

WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Hacking, crafting, mining & more… just another ...more

News : Amazing 3D video capture using Kinect

Screw gaming, let's get to the serious stuff! Here's an amazing video of a Kinect hack that lets one see what its camera sees - in 3D. Instead of 2D images of motion capture, we get the full spatial view. Think of the "bullet time" effect in The Matrix (freeze, rotate, conti ...more

How To : Unlock and play Zork in Call of Duty: Black Ops

Earn the secret "Eaten by a Grue" achievement in the single-player campaign mode of Call of Duty: Black Ops with this gamer's guide! In order to unlock this achievement, you will need to break free from your chair and play Zork on the nearby computer terminal. Call of Duty 7 ...more

How To : Quickly change your user name in Facebook

This is a video tutorial in the Computers & Programming category where you are going to learn how to quickly change your user name in Facebook. Click on start and then click on all programs. Go to accessories and click on system tools. Now select character map. Write whatever ...more

How To : Find & ping your IP address

This is a video tutorial in the Computers & Programming category where you are going to learn how to find and ping your IP address. Go to start > run and type in "cmd" to get the DOS window. Here type in "ipconfig" and hit enter. If you are online, your IP address will be disp ...more

How To : Save drive space using Firefox with Tekzilla

In this tutorial, we learn how to save drive space using Firefox. If you want to change the cache folder location, whether it's for security or just because, it's very simple. First, type in "about:config" into your internet browser. A new page will appear, right click your mo ...more

How To : Create a magic memory stick for PSP

Making the magic memory stick is one of the vital first steps involved in hacking a PSP. This video will walk you through the on-computer part of the process, creating the magic memory stick itself. The steps are very easy to follow, and should have you playing all of the home ...more

News : Why Not? Computer With Built-in BBQ Grill

I've seen lots of cool case mods, but this FIFA 10 PC case mod with an integrated working BBQ grill pretty much blows all the others right out of the water. Via Bornrich, "Featuring Intel Core 2 Duo, motherboard socket 775, an ASUS ATI 4870 Grafkkarte with 1024MB RAM, a 4GB ...more

How To : Change the default Windows Remote Desktop port

In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more

News : Easy! Cell Phone Camera Macro Mod (5X Zoom)

Hack N Mod offers an incredibly simple cell phone camera mod that delivers striking results. All you need is a lens from an old DVD player and you can magnify your zoom by five times. "You’ll find the lens directly under the disk tray. If you’ve just upgraded to Blu-Ray, now ...more

How To : Switch applications in Mac OS X

The University of South Florida screencast teaches you how to switch applications in Mac OS X. The application switcher gives you a quick way to switch through the running programs on your computer. To do this, simply press Command + Tab. You can keep pressing Tab to switch to ...more

How To : Control your Mac with a Wiimote

VvCompHelpvV teaches you how to use a Nintendo Wii-mote to control your Mac computer. You need three things: a Mac with bluetooth, a Wii-mote and the program DarwiinRemote. You start the program and configure it so that it recognizes the Wii-mote Go to DarwiinRemote Settings, ...more

How To : Burn games for a hacked Xbox 360

Do you own a hacked XBox 360? Do you want to burn some games for it? Well, in this video, the viewers will first be taught how to download games using peer-to-peer software, such as uTorrent. Then, with a combination of software, such as IMGBurn and abgx360, the viewers will l ...more

How To : Recover deleted email in Outlook, Eudora

Computer forensics expert Steve Burgess gives a highly informative tutorial on how to recover deleted emails in Outlook and Eudora. The most critical factor affecting the recoverability of deleted web-based emails, according to Steve, is whether the PST file, which stores all ...more

How To : Steal a computer password with a camera

Hacking into computer systems to steal passwords could be a bit complicated for the average everyday joe, but for all of your tech illiterate folks out there, there's any easy way to get that password, and all it takes is a camera. Check out this con video tutorial to learn h ...more

How To : Hack security cameras using search engines

Notice: This is probably not new to many people. This *IS* new for some people however, and meant for them! Post interesting cameras you find. Website at http://householdhacker.com Today we'll show you how to look through various security cameras using search engines. For t ...more

How To : Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and manag ...more

How To : Hack SSL passwords with ARP poisoning

Are you serious about becoming a bonafide hacker? Then you simply must learn how to hack SSL passwords using ARP poisoning. ARP poisoning, also known as ARP spoofing, involves attacking an ethernet wireless network by looking at the data frames on a LAN (local area network). R ...more

How To : Cheat on the Minesweeper game

The most successful video game packaged with almost all Windows PC's is probably Minesweeper, so it was just a matter of time before someone figured out how to beat the system and detect all of those mines without getting blown to smithereens. This video shows you the trick to ...more

How To : Play a crazy keyboard prank on your friends

Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand th ...more

How To : Bypass WebSense at school and work

Isn't it annoying when you want to check your Facebook or MySpace but you are at school and hit a big giant Websense blocker? Well, if you are stuck in a library or somewhere else where there are filters on your surf-ability, check out this tutorial for a useful hack. In this ...more

How To : Things to Do on WonderHowTo (01/11 - 01/17)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more

How To : Things to Do on WonderHowTo (03/14 - 03/20)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Things to Do on WonderHowTo (02/29 - 03/06)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

How To : Bypass a Local Network Proxy for Free Internet

Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more

How To : Electron Spirographs with a Cathode Ray Tube

In this article, I'll be showing you how to make a cool visual representation of sound using an old cathode ray tube (CRT) television, a stereo, and a sound source. You'll also need a pair of wire cutters, and a few screwdrivers. To properly understand this project, it's a goo ...more

How To : Create Windows 7 GodMode

Hello and welcome to yet another InfoSecurity World tutorial. This post is based on the Windows 7 'GodMode' panel. Windows 7 comes with many hacks, cheats and tweaks. This bonus lesson will teach you how to create Windows 7 GodMode. GodMode works a lot like the Windows Contro ...more

How To : Clean Your Computer

I love my laptop. It goes wherever I go. Unfortunately, that means that it also gets pretty grubby after a while. The screen gets dusty. The frame gets smudgy. The spaces between the keys fill up with crumbs of questionable origins. And my desktop? That thing is a dust bunny m ...more

News : Scientists Grow World's First DIY Eyeball

DIY is a far-reaching term—though culturally it tends to refer to hacks, mods, crafts and constructions, its meaning can also extend to the ongoing trials and tribulations of the evolution of mankind: astonishing developments in technology, desperate acts of self-preservation ...more

HowTo : Stay Safe Using Public WiFi

For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide t ...more

News : Encrypting Passwords With an Old-School Tabula Recta

Have an old-school tabula recta lying around? No? Then just print out the chart below. Nothing ensures better password security than this centuries-old cipher technique. Here's how it works, via Wikipedia: "Using a tabula recta, each alphabet is shifted one letter to the left ...more

How To : Install ChickHEN R2 5.03 on a PSP 3000

When Sony released the new versions of the PSP Slim and 3000 in 2009, it thought that it had solved the PSP's rampant hacking problem. They hadn't. This video will show you how to load the popular exploit / CFW installer ChickHEN R2 onto a slim or 3000 PSP, leaving it ready an ...more

News : Don't cheat!

Cheating ruins everything. Cheating makes game play unfair for others who may be truly competitive and strategic. Cheating makes others disrespect and un-friend you. There can be unforeseen consequences, like getting viruses, trojans or your account hacked from downloading a c ...more

How To : Take a screenshot in Mac OS 10.5

This is a Computers & Programming video tutorial where you will learn how to take screenshots on Mac OS 10. 5. Andrew Grant says there are several ways of doing this. The easiest way is to hold down the Command and Shift key and press 3. You will get a screenshot of the entire ...more

How To : Easily SSH into your iPhone/iPod Touch

iPodTouchedMaster shows how one can easily SSH into their iPod Touch with all firmware! To SSH is the ability to hack into your iPod Touch's file system. First, your iPod Touch must be jailbroken. Next, you'll have to open Cydia. Click "Featured Packages" or search for the ter ...more

  • Hot
  • Latest