Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to map netwo ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to packet sn ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to turn any ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to organize ...more
Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implem ...more
This audio editing software tutorial will show you how to create, setup, and use instrument tracks in Logic Pro. First, Connor Smith shows you how to pick instruments from the library browser in Logic Pro. Then, learn two different ways to create instruments in the Mixer windo ...more
The most successful video game packaged with almost all Windows PC's is probably Minesweeper, so it was just a matter of time before someone figured out how to beat the system and detect all of those mines without getting blown to smithereens. This video shows you the trick to ...more
You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
Today's article serves as a general guide to keeping Windows 7 and Vista clean. The goal is to clean up your messy computer and have it running at maximum performance in no time. The question at hand is—what is your computer's performance like? Not great? Do you think it coul ...more
It may not be your number one spot for finding cool apps for your Android device, but the Amazon Appstore for Android is running a new promotion this week called "Geek Week," where eight of the most popular productivity and utility apps are now on sale for 48 percent off or mo ...more
Computer crashes, fried hard drives, red rings of death, delinquent memory cards... nothing is worse than dysfunctional technology. In just a minute, your favorite and most used device has become the biggest headache of your life, frustrating you to the brink of madness. But w ...more
Computer viruses are terrifying. They are undetectable, dangerous, and operate constantly right under your nose. For the average computer user, there are only a few repair options. You could buy expensive antivirus software that causes more problems than it fixes, you can wipe ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Hello and welcome to yet another InfoSecurity World tutorial. This post is based on the Windows 7 'GodMode' panel. Windows 7 comes with many hacks, cheats and tweaks. This bonus lesson will teach you how to create Windows 7 GodMode. GodMode works a lot like the Windows Contro ...more
With a lot of Null Byters playing around with Linux because of its excessive use in the hacking world, some of you are bound to run into some trouble with the installation at some point or another. If you make a mistake, or you're intimidated by the wonky-looking installation ...more
Ever since kernel 2.6.xx in Linux, a lot of the internet kernel modules for wireless interfaces ended up becoming broken when trying to use monitor mode. What happens commonly (to myself included) is a forced channel that your card sits on. No good! For users of airodump and t ...more
As many of you may have noticed, nearly every Google product (i.e. Gmail, Google search, etc.) has gone through a bit of a makeover since the release of Google+. Big blocky buttons and enormous font sizes are apparently the thing of the future, and with a cool JavaScript hack, ...more
JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that intera ...more
Linux can have the most beautiful interface in the world, because it is simply what you make of it. You can change every little detail with relative ease because that's what Linux is all about: Freedom and OpenSource. I posted pictures of my desktop on the corkboard a few wee ...more
Nemo PDF to Word is a powerful but free tool to help us to convert PDF to Word with a few simple clicks. Even beginners who don't have much computer knowledge can easily manage it. How to Convert PDF to Word for free?. Install the tool. Download the free Nemo PDF to Word from ...more
Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by ama ...more
This tutorial is for Ubuntu 10.04 users who want to tether their iPhone 4 (software version 4.2.1). No jailbreak needed! You have two options - you can tether through USB, or tether through Bluetooth. Tethering through USB Add PPA repository to your synaptic repositories. T ...more
As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more
According to PlayStation Network @ Home, a new app may allow hackers to ban or unban anyone they please from PSN. As evidence, the blog offers the following words taken from a now-defunct thread in the PSX Scene web forum: Hot off the press, and on the heels of Sony trying t ...more
Let’s say you have a MOOG keyboard you want to send into Logic. To set this up, there’s a few things to do in Logic. Make a new project in Logic, create an audio track. Open the environment (apple+8) In the environment, click NEW/INSTRUMENT In the track inspector on the left ...more
From Lifehacker's Tips Box, four short-cuts to life's small problems, urawaza-style: No Iron? If you're out an iron and you happen to have a hair straightener hanging around, it will do the trick (quite nicely). Also, works well as a dually useful traveling item, ladies. Warn ...more
Programs aren't perfect. Either are operating systems. And when one or the other (possibly both) aren't working as expected, your program may freeze up and become unresponsive. If this happens to you in Windows frequently, you need to know how to force quit the application, so ...more
You can install Remotejoy on Windows vista/7 64-Bit. First turn on your computer and press the F8 button during the startup and disable the driver signature enforcement in advance boot option. Now download the Remotejoy and plug-in your PSP into your computer and copy all the ...more
This video tutorial is in the Software category which will show you how to create a website in Dreamweaver and Photoshop. Open Dreamweaver and make sure you have the view on table mode. In the table mode, draw layout table and draw layout cells tools are alive. To define a new ...more
In this Software video tutorial you will learn how to make animated GIFs with Adobe Fireworks CS4/CS3. It is easier than Photoshop and Flash. You can create a picture or you can drag and drop a picture. To drag and drop a picture, find out the dimensions of the picture. In the ...more
1. Open Web Browser and go to WWW.Google.com and type crucial memory mechanic and press enter. 2. Click the first result found on the search page( i.e., lolo memory mechanic) 3. In the new diverted website (Crucial.com), click on Download lolo memory Mechanic and click the S ...more
This is a how-to –video on using hydra 5.4 to crack FTP passwords. This video is intended for educational purpose only. It reveals the basics of hacking a FTP server using dictionary search technique. Here are the steps involved. 1) Download the software hydra 5.4 form the ...more
In this how-to video, you will learn how to remove the Windows genuine advantage notification from your operating system. First, open my computer and go to the windows folder. Look for the system32 folder and open it. Search for WGAtray.exe. Select both wgatray.exe and wgalogi ...more
This video tutorial from Foreclosureresearch presents how to burn video files to a playable DVD using DVD Flick application.First you need to download and install free software called DVD Flick.You can find it at DVD Flick.Once it's installed, run the program. First thing to d ...more
This tutorial describes the procedure to download Facebook videos with Mozilla Firefox. This procedure works only on the web browser "Mozilla Firefox". Firefox can be downloaded from this link and installed. How to download Facebook videos :1. Go to this link.2. Scroll down t ...more
This tutorial describes how to backup the PST file of Outlook. All the information, like emails, contacts, calendar events, etc., that outlook manages are stored in a file with extension .pst and hence called PST file. If you want to backup all your contacts, events, emails fr ...more
This video tutorial from noxad presents how to backup and burn games for Nintendo Wii game console.To setup game transfer from computer to your console you'll need any type of SD memory card. In this tutorial it's Lexor 1 GB SD card.Insert SD card into your computer card reade ...more
In this Software video tutorial you will learn how to change the font color in Word 2007. The default font color in Word 2007 is black. But, you can change the color of the font to just about any color that you want. Click on the ‘home’ tab of the ribbon on top of the page and ...more
In this how-to video, you will learn how to create a dual-booting system with Ubuntu and Windows. First, go to the Ubuntu website and download the latest Desktop Edition of Ubuntu. Once it is finished, burn the download to a CD. Once this is completed, place the CD in the driv ...more
Some times when you upgrade your Microsoft Excel software to Excel 2007 your old macros may stop working. Some times this may be due to the settings and by enabling the macros you can get your old macros to work. Macros are turn off by default in Excel 2007. You can turn this ...more
Matthew demonstrates how to improve the performance of your computer without using new software. To improve your system performance by 15% to 20%, first open up your start menu. Right click on the computer option. Choose the properties option from the right click menu. In the ...more
This video demonstrates how to use Skype to make calls. The best thing about it is that it is free. You only need a computer, a microphone and a web camera. To use Skype, you first have to download the Skype software. This can be done through the website of Skype. Then install ...more
To hack into Google images follow the following steps. You will first need to open a new internet browser window and go to Google, then load their images website. Next type into the search bar your image query and press search. Once you have gotten your search results paste th ...more
This video describes how to use the Chroma Key Effect in a few easy steps. First of all obtain a video recording that has a uniform background e.g. all blue or all green or all red. In this case, the background color is green. Now obtain the video recording that you would lik ...more
In this beginners video, the instructor shows how to use Word 2007 by opening, closing, and saving documents. When you open the Microsoft Word software with out any documents, the window looks gray indicating the same. There is an office button present in the top left corner o ...more
Stan shows an easy way to see and clean the files that are hogging hard drive space in the computer using a free software called "windirtstat". Now enter the following address in the web browser "windirtstat.info" and scroll down the page until you get the downloading and inst ...more
This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key logg ...more
This video tutorial is all about recovering the deleted files in Windows Vista. If you are using the Windows Vista and you have unknowingly deleted a file and emptied the recycle bin, then you can recover it. This can be done by using the Shadow Explorer. Shadow Explorer is a ...more
Ever hear of SmillaEnlarger? It's a small graphical tool (based on QT) to resize, especially magnify bitmaps in high quality. Check out this video tutorial on how to back up and restore data easily on Ubuntu Linux. Hundreds of different solutions exist to reduce the resolutio ...more
Make your own custom characters for Icy Tower! It's as easy as drawing stick figures, believe it or not. Only stickman don't look as cool, unless of course it's a stickman that you want to use as your Icy Tower character. This wintery video tutorial teaches you how to make cu ...more
Are your fish starving? If they are, you need to do something about it, and quick. Well, there's no quicker solution to feeding your fish than hacking Happy Aquarium with Cheat Engine. Watch this video tutorial to learn how to hack unlimited food in Happy Aquarium (10/29/09). ...more
Don't jeopardize your memories. Learn how to preserve your old home movies by digitizing your VHS tapes. You Will Need * A capture card * A computer with movie-making software * A VCR * RCA cables * An external hard drive Step 1: Purchase an external or internal capture card ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install the MediaInfo GUI on Ubuntu Linux. This is a MUST and a real HANDY tool for all those video transcoders out the ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to extract W ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to track a U ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to build a m ...more
This 3D software tutorial shows you how to use the delete mesh modifier when modeling in 3ds Max. Delete Mesh provides parametric deletion based on the current sub-object selection level in the stack. The possible choices are faces, vertices, edges, and objects. Apply the Dele ...more
This Rhino 3D software tutorial will take you through the process of creating a plan drawing of Mies Van Der Rohe’s Barcelona Pavilion. The tutorial teaches you the fundamentals of creating plan drawings in Rhino and issues of doing 3D work for the plan drawings. PART 1: will ...more
Christian Cantrell, Adobe's Air Product Manager and Evangelist, has released a video to demo websites that take advantage of the motion sensors in a mobile phone, tablet, or laptop via JavaScript. Now, let's take a look through the code and break down the core pieces that you' ...more