Since the day of the Xbox 360 release, storage space for the device has been overpriced beyond belief. OEM 250GB HDD models still cost $110 USD! A 250GB hard drive should not destroy my wallet, Microsoft. Storage space, especially on HDDs, is cheap. You can buy a removable 2TB ...more
We're nearly done getting our Mac set up for hacking. If you haven't checked out previous tutorials, I'd recommend you do so first before diving right into this one. While macOS is a powerful POSIX-compliant operating system, some of our Linux tools do not work out of the box ...more
At one point in the '90s, about fifty percent of the CDs produced worldwide had an AOL logo. About fifty percent of the CDs in my home still have that AOL promise of 500 free hours on them. Though they never got me to join their internet service, I did get a lifetime supply of ...more
Chief among iOS 14's excellent new features is the overhauled home screen. Now, you can add customizable widgets that live alongside your traditional apps, and both first-party and third-party apps can take advantage of it. Talk about an upgrade. They even work in the Today Vi ...more
Microsoft's first venture into the tablet market, the Surface RT, combines many of the capabilities of a normal Windows 8 laptop into a super compact tablet, whose super-thin touch cover and kickstand can transform it into a functional mini-laptop, small and light enough to go ...more
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data. The ...more
Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more
Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virt ...more
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is down ...more
Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more
If you're a Mac user, it's fair to assume that you may be a little skeptical when it comes to Microsoft products. Microsoft knows this, of course. Which is why the company has decided to offer Mac users a free, one-month trial of the latest version of their popular Office prod ...more
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added. That's a very interesting new feature because it allows Kali to be easily booted on Mac too, and every EFI-supported device. First three preview lines gone? As alw ...more
Want to play Nintendo Wii games from a USB hard disk or thumb drive? If you have a soft- or hard-modded, you can. You'll need to install [WBFS Manager http://wbfsmanager.codeplex.com/Release/ProjectReleases.aspx?ReleaseId=26808] and download a copy of Wii Flowa. For a detailed ...more
For anyone using open source information to conduct an investigation, a balance between powerful tools and privacy controls are a must. Buscador is a virtual machine packed full of useful OSINT tools and streamlined for online research. This program can easily be set up in Vir ...more
Problem with your primary hard drive? This clip provides some helpful advice on how to resolve this common and frustrating problem. It's simple! So simple, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
Kali Linux is the obvious first choice of an operating system for most new hackers, coming bundled with a curated collection of tools organized into easy-to-navigate menus and a live boot option that is very newbie-friendly. But Kali isn't the only distribution targeted at pen ...more
Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some ...more
With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard dr ...more
It's easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down to prevent such use. School, work, or library PCs can be secured with a BIOS password, which is often an easily recovered default ...more
A rainbow table can be thought of like a dictionary, except instead of words and their definitions, it holds combinations of characters on one side and their hashed form on the other. What is a hash and why would you want to know what random combinations of characters are hash ...more
Looking to make use—if not necessarily good use—of your old hard drives? This how-to presents instructions for creating a hard drive speaker system to use in conjunction with an MP3 player. To follow along, you'll need an MP3 player (e.g., the Samsung YP-S3), at least one spar ...more
As Android bug bounty hunters and penetration testers, we need a properly configured environment to work in when testing exploits and looking for vulnerabilities. This could mean a virtual Android operating system or a dedicated network for capturing requests and performing ma ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
A playlist is simply a list of songs which can be played in sequential or shuffled/random order. Many people tailor-make playlists to suit a particular style of music or atmosphere, so being able to share these between people is great. There are a great many places on the Int ...more
Dual booting Ubuntu 10.10 Maverick Meerkat and Windows 7 is fairly easy. If you don't believe me, just read on! Get Windows 7 First thing's first! Ye can't install Windows 7 without an installation disk, can ya? So if your PC did not come with Windows 7 pre-installed, grab a ...more
What if you could have a secret hard drive connected to your computer that only you could activate? You can! Samimy shows you how to hack a remote controlled toy car and make a super secret hard disk drive in your computer, accessed via a secret activation key. This hidden eme ...more
For Windows laptops and PCs it's easy to install Linux. However for Macs, it's a different story. There are people installing Ubuntu on Macbooks and so far I've noticed that they are using 9.10. I've remastered my own Ubuntu 10.04 complete with playing flash videos and other a ...more
RedRabbit is an ethical hacking toolkit built for pen-testing and reconnaissance. It can be used to identify attack vectors, brute-force protected files, extract saved network passwords, and obfuscate code. RedRabbit, which is made specifically for red teams, is the evil twin ...more
You know that really annoying whirring sound your computer makes when it's, well, working? That's due to your hard drive vibrating and creating a small noise while doing so. Luckily, you don't have to put up with a loud hard drive anymore. Take a gander at this computer hardw ...more
If you're marginally inclined towards computers, you've probably been approached at some point by a family member who wants you to "fix" their system during a visit home. With the holidays coming up, these opportunities (or ambushes) are even more likely. Even if nothing is w ...more
For those needing to replace old controller hardware on cutting mills, those into native retro gaming, or for those who want to see what all the fuss was about in the 1980's, or for those who just want a play with old but great technology, this tutorial shows you step-by-step ...more
This is a video tutorial in the Computers & Programming category where you are going to learn how to defrag your computer using CCleaner and disk defrag. First go to CCleaner and download the free program. After that install it and launch the program. Click on "analyze" and it ...more
Apple's just ushered in a new era for widgets on your iPhone. With the iOS 16 update, each of your lock screens can have up to five widgets. While Apple's apps were the first to get lock screen widgets, third-party developers can code their own ones into their apps — and here' ...more
Need help figuring out how troubleshoot a hard disk not found boot-up error on a Windows PC? It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over ten minutes. For more information, inc ...more
Previously, we talked about how to secure Firefox. Today, we will talk about securing a Chromium based Browser. Why? Because Chrome recently beat Firefox in holding more customers. It is obvious that Google Chrome tracks our every move online, so what alternatives is out ther ...more
This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more
Steve Lee Ignacio explains the procedure to be followed to build a Bart PE Professional Rescue CD. He says that the basic requirements for completing this process is a Windows XP Pro or Home CD, a Bart PE builder, a Windows Computer, a program to burn .ISO files and a CD burne ...more
Hi, I am Robel, I am here to let you know about how to hack windows admin password with out Sam files, this requires physical access and any boot operating system...I used Kali 1.8 , if it doesn't work make sure you have shuted it down properlyor use backtrack. I have tested ...more
Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this t ...more
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind. When you delete a file with the remove command (rm <file>), you're no ...more
This video tutorial shows you how to improve the performance of your Windows XP PC by freeing up disk space. This is done by running xp's Disk Clean up utility this deletes all temporary and unwanted files that get collected on your disk. Run this utility and clean up your di ...more
Is your Mac running slow? If yes, then the instructor in this video shows just how to diagnose and fix it. It is not an uncommon problem that a Mac begins to get slow with time. Though there are a million different things that can slow down a computer and it is never easy to p ...more
WARNING VM uses the hard disk as ram. So it repeatedly writes and reads of the hard disk. Since the iPod has flash memory usage of this tweak will lower your device lifespan to 5-7 years. So i recommend this tweak on a old device you want to speed UP!!! Step 1: Skip This Whol ...more
RAID, or Redundant Array of Independent Disks, lets you divide and replicate data among multiple hard disk drives for information storage security. This video tutorial demonstrates how to install Ubuntu in a RAID 0 array. Before starting, you'll need at least 2 hard drives and ...more
This is a illuminated pen holder that I made out of a couple recycled hard drives. The LEDs receive power from the standard USB cable connected to a computer. The stand for the penholder is taken from a clip light, and the penholder itself is made from 3 hard disk drive platte ...more
A Tutorial: Ubuntu Linux is a completely free open-source operating system that has many useful features and abilities, and this guide will show you how to try this new OS without harming your Windows system, and it only takes five minutes to learn! This guide will show you ho ...more
If you want to run multiple windows operating systems at the same time you first need a Windows computer, the installation disk for the operating system you want to run, and Windows Virtual PC 2007. To install this, first type in Virtual PC 2007 to Google, go to the Microsoft ...more
In this tutorial, learn how to fix a missing or corrupt ntoskrnl.exe file on your PC. Cause: 1.Keyboard issue Solution: Swop out with new keyboard 2.Miscellaneous corruption Solution: Safemode last known good configuration. 3.Corrupt boot.ini file. Solution: bootcfg /rebuil ...more
A tutorial on how to "break in" to your Windows machine after you have lost the password. This works in Windows NT, 2000, and XP machines without an encrypted file system. I then show you how to wipe a hard disk to assure no one can gain access to your data once the drive is s ...more
This video shows how you can reformat your hard disk and reinstall Windows XP. WARNING: Do not attempt to do what is shown in this video unless you are comfortable with changing BIOS settings and installing Operating Systems. Also it is recommended that you have a backup of a ...more
Many folks seem to treat their computers as a sort of mysterious alien technology that only the shamans of the IT Department can comprehend. You might have gotten it into your head that you're just not good at computers and will never understand them. On the contrary, getting ...more
Get a Mac Tip for your Mac computer! There's a million things you can do with your Apple computer, and this is just one of them. Watch this video tutorial to learn how to customize your icons on your Mac computer. This technique allows a Mac user to change the folder icons, th ...more
You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downlo ...more
In this video the tutor shows how to format a Windows XP PC by showing a live demonstration. First he shows how to hold down the delete button while computer starts so that you can get into the BIOS settings. Then in the BIOS he shows how to change the primary boot device from ...more
In this how to video, you will learn how to remove your hard drive from an iMac G5. First, open the cover of your iMac. There will be torx screws that have to be removed from the left hand side of the hard drive. Once this is done, you will have to unplug the two cables locate ...more
If you already have movies and photos on your hard disk and want iDVD to automatically create a DVD that includes Apple-designed menus, you can use Magic iDVD.
I have used a laptop HDD in this video. I'm showing how to get the magnet out so you can use it on your paint spray - or were ever you want... this is a strong magnet, so you can use it without problems.
This tutorial shows how to connect and set up a device/instrument (in this tutorial it's an electric guitar) to your Motif XS audio input, how to apply two effects, how to record the audio together with a performance to a song or pattern, and finally how to export the whole so ...more
Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episod ...more