A tutorial on how to "break in" to your Windows machine after you have lost the password. This works in Windows NT, 2000, and XP machines without an encrypted file system. I then show you how to wipe a hard disk to assure no one can gain access to your data once the drive is s ...more
Google's hard at work beefing up their new Google+ social network, and while they continue to improve new features like Circles and Hangouts, they haven't lost track of their other online features already widely in use. If you're already a part of the Google+ project (currentl ...more
How did we get to the age of smartphones, ereaders, laptops, and crazy touchscreen displays? Gizmodo covers Steve Wozniak's recent presentation of nine key gadgets that have deeply influenced the tech God's work. A few highlights below; click through for the full survey. Stibi ...more
Sometimes a single driver can vastly improve traffic. Drive like a trucker: keep a large space ahead of your car. This can erase the patterns of stop-and-go driving (wipe out the Traffic Waves.) It can also break up the clogged merge-zones at certain highway exit ramps. Also ...more
First create a new 800x600 document and fill it with black color. Then create a new Layer and add a white circle with the hard edge Brushtool Select the 'Eraser tool' and use the same brush (a bit smaller) to erase the inside of that circle. Rightclick an layer 1 and go to the ...more
Tim Carter demonstrates how to install a finish nail using a hammer and nail set. Tim also shows how to do it the fast way with a powered nail gun! Many household projects involve hammer and nails. If you are not careful in driving in the finishing nails in wood trim, you can ...more
By Cal Ripken Jr. Let the players play and the coaches coach ! Perhaps you played a particular sport at a high level and hope to pass that knowledge on to your children. By all means do it. But remember, there is a time and a place for everything. Your kids are tuned into ...more
This 3D software tutorial shows you how to use images to affect models in 3D Studio Max. Using the displacement modifier in 3ds Max we are able to use either image data or procedural texture maps to drive geometry in a design model. Modeling with images is a great way to model ...more
Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a dece ...more
Flash drives are great handy devices used for so many different reasons, but one being the ability to take your files wherever you want. These miniature versions of computer hard drives are so convenient to use and easy enough to carry. This tutorial will show you exactly how ...more
BitLocker. What is it? And what can it do for you? Well, it's a handy new feature built-in to Windows 7, and it can help protect all of your data from loss, theft, or hackers. It's the easiest way to make sure your documents and files are safe from the devil's hands. Improved ...more
This video is describing how to retouch a photograph by using Photoshop CS4. The first step is to get a photo that you would like to edit, preferably of a person's face. Then make a new layer that duplicates the background, go to Gaussian blur, then go to hard light for your l ...more
If your hard drive in your Microsoft Zune MP3 Player is acting up, maybe it's time you had it replaced. Don't waste money taking it to a repair shop though, learn how to do it yourself. This video tutorial will show you how to dismantle your Microsoft Zune digital music playe ...more
In this video the instructor shows how to restore lost data. When you delete your files you can restore them from the recycle bin. But if a hard drive is formatted all the data is lost and you can not even recover it from recycle bin. In such cases you will need to use data re ...more
This video by Technology Helper teaches you how to carry out the often difficult task of taking apart an XBox 360. First the face plate is removed using a small screwdriver and then further parts are removed by pushing small prongs on the inside of the XBox using a screwdriver ...more
Sometimes data is lost on your hard drive by accidental deletion from recycle bin, or due to reformat or other reasons. In this video the instructor shows how to recover data even after a reformat. Contrary to popular belief that data is completely lost after a permanent delet ...more
In this tutorial, we learn how to create a new Windows partition with GParted software. First, insert your boot CD into your computer, then turn your computer off and it will automatically boot. Next, hit enter to select the first option, then wait for the scan to complete. Wh ...more
Changing your iPhone ringtone can be a pain, even in iTunes. Other ways to change your ringtone include downloading software that takes up hard drive space and clogs your applications folder. There is another way, and it's a website called Audiko. It's a website for free ringt ...more
Do you want to change the login wallpaper on your Mac OS X? It is as simple as replacing an image in the file system. First, open the File Explorer. Select your hard drive from the Devices tab. Click on the System folder. Click on the Library folder Find the CoreServices fold ...more
In this series of computer hardware videos, our professional computer consultant and technology expert will demonstrate how to format a hard drive. Part 1 of 8 - How to Format a computer. Format a computer - Part 2 of 8. Click through to watch this video on expertvillage.com F ...more
A computer’s safe mode is useful when fixing problems or saving work after, say, your hard drive malfunctions. Safe mode can easily be accessed as your computer starts up and is a useful tool to have in your belt. Maintaining your computer sometimes requires you to boot up in ...more
One of the most frustrating events in life is a computer freeze. When your Mac freezes don’t freak-out. Stay calm there are things you can do. And, hey, if you can’t do them, there is a professional out the happy to help you out...for a price. Hypnotized by the spinning beach ...more
Learn how to reverse video in VirtualDub. Start by going to windirstat.info, scroll down until you see the downloading and installing section and click winderstat1.1.2 Setup. The link directs you to SourceForge where it asks you to save the file, click yes. double click the sa ...more
In this series of videos you'll learn how to use Apple iPhoto software to edit and organize your digital photos. Expert Matt Nichols shows you how to import images from a digital camera, hard drive, and Apple's Photo Booth software. He also shows you how to use the source navi ...more
The Ubuntu CD does not contain much in terms of software applications. So how can we incorporate other programs that would be made available after booting from a live CD? There is a program called Remastersys. This program creates an .ISO image of the Linux system installed ...more
In this Software video tutorial you will learn how to use Daemon Tools Lite to mount an image or ISO file. This is a software that takes ISO files and puts them on a fake hard DVD drive. This is really very easy and simple to do and takes practically no time. Go to start > all ...more
In this video tutorial, viewers learn how to recover lost data using R-Studio. Begin by running R-Studio. Locate the drive that you want to recover. Right click it and select scan. The scan can take up to 45 minutes depending on the size of the drive. Once its finished, there ...more
Just installed a new hard disk on your PC, but Windows was unable to detect it? Download Ubuntu A new hard disk requires that you create a partition table before you can do a format. Download the Ubuntu Desktop CD 10.04LTS 32bit x86 for Intel users. Tips The Live CD won't ...more
The Brownie Brownie Tips 1000 boxes of brownie mix [1000$] 100 bottles of corn oil [500$] 100 Frosting [500$] Bake Bake all brownie boxes with 1 and 1/2 what it says to add oil. Oil and Box Throw all Brownie into Card board Box and pack together. Frosting Brownie Toget ...more
At one point in the '90s, about fifty percent of the CDs produced worldwide had an AOL logo. About fifty percent of the CDs in my home still have that AOL promise of 500 free hours on them. Though they never got me to join their internet service, I did get a lifetime supply of ...more
Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of har ...more
Old Hard Drive + MP3 player = Music This equation just doesn't make sense. If you're an iPod addict, the HD element is redundant! Well, take a second look at what constitutes a speaker and what a hard drive is made of. They are more alike than you'd think. Rip apart a junked ...more
In this Windows 8 Tutorial I will show you how to use the defragment tool to analyze and if necessary optimize your hard drive to make your computer run more efficiently. By default if you are on Windows 8 your computer should be set to a re-occurring schedule for defragmentin ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
The day has finally come, and after quite a bit of hype and buildup, Windows 10 is now officially available. The update itself is on a staged rollout, which means it will be slowly becoming available to users over the coming weeks and months, so don't panic if you haven't alre ...more
Welcome back, my aspiring hackers! In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I have mentioned the way that Linux designates hard drives when making an imag ...more
You can beef up the security on your Mac all you want, but all the firewalls and antivirus apps in the world mean nothing when that can of soda tips over on your Macbook, destroying your laptop and all its data forever. You may have some of your data backed up to a cloud serv ...more
Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more
The infamous Red Ring of Death plagued the Xbox 360 for years, leading people like me over to the PlayStation 3 console. Now it looks like Sony and its new PlayStation 4 are running into the same problems as Microsoft did. Instead of red, it's blue, and that light could mean ...more
Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virt ...more
At the most recent Apple event, the company announced its new Fusion Drive, a hybrid hard drive designed to increase performance and speed by combining traditional and flash storage. It's composed of a small solid-state disk and a larger spinning hard disk drive, and files and ...more
For those of you who've already gotten Beta Preview or Developer Preview access to Mac OS X 10.10 Yosemite, I highly recommend installing it on a separate partition on your hard drive. There have been many reported bugs and even blank gray screens that prevent access to the s ...more
Don't think because your MacBook is using FileVault disk encryption your device is secure or immune to hackers. Here's how to find out if that FileVault password is strong enough to withstand an attack from a motivated attacker. FileVault, created by Apple in 2003, is a hard ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers beca ...more
This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more
Welcome back, my budding hackers! One of the most basic skills the forensic investigator must master is the acquisition of data in a forensically sound manner. If data is not captured in a forensically sound manner, it may not be admissible in court. In my Kali Forensics seri ...more
You might know the feeling: the sinking stomach that informs you something terrible has happened. You click on your trash bin. Nothing is there. Your hard drive has been wiped clean. There's nothing worse than realizing everything on your computer is gone. You scold yourself ...more
A groundbreaking new Android feature called seamless updates was announced at Google I/O 2016. No longer would we have to wait for updates to download and install — instead, they'd be applied silently in the background, and the new Android version would be waiting on us the ne ...more
One of the best features of Android is the fact that it's open-source, giving developers the ability to use it on pretty much any device they can think of, like on a Windows PC using Andy. That's what drove the creators behind the Android-x86 project to port over the mobile OS ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
In the Windows 8 Enterprise edition, you can use the Windows to Go feature to travel with Windows 8 OS, personal files, documents, settings and many more. All you need is an external hard drive or USB drive of 32 GB space or more and USB 3.0 support or more for fast Windows 8 ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
When most people think of "gaming computers," they're probably thinking of Windows-based PCs. They offer a huge variety of devices with better equipped software and hardware for a cheaper price, and there are more available games than there are for OS X-based systems. But tha ...more
Kali Linux is probably the most well-known hacking distribution among penetration testers. However, there are alternative distros which offer versatility and advanced package management systems that are absolutely worth considering. One such distribution is Pentoo, a Gentoo-b ...more
After my hard drive crashed recently, I lost everything. Old college essays, half-written stories, short films, and most importantly, all of the photos that I had saved from the past five years... all gone. Since I didn't back up my hard drive (stupid mistake #1), or upload p ...more
Since the new Mac OS X 10.11 El Capitan is brand new, I recommend installing it on a separate partition on your hard drive. This will keep your current Yosemite system safe from harm, and will let you easily switch back to it should El Capitan become unusable for any reason. ...more
While the PlayStation and Xbox models may rule the current world of gaming, there are still those who love to keep it old school. The grittiness, toughness and nostalgia that is laced throughout old gaming consoles appeals to many people. Every time I play Donkey Kong 64 (with ...more
Welcome back, my tenderfoot hackers! In continuing my series on digital forensics using Kali, I want to introduce you to two complementary tools, both built right into Kali Linux. These are Brian Carrier's tools Autopsy and Sleuth Kit. Carrier is one of the leading authoriti ...more