Keep a Window Open

How To : Keep Your MacBook Awake with the Display Closed

It's pretty logical for your MacBook to sleep when you close its lid, but under certain circumstances, you may not necessarily want this feature to kick in. Personally, I'd prefer my MacBook's lid to be closed while relaxing and listening to music. Also, I don't like having t ...more

Exploiting XSS with BeEF : Part 3

Now that we have control over a victim's browser, we need to use some attacks to maintain the connection, or even better: upload a shell. Creating a Persistent Connection Now that the victim's browser is hooked, we need to quickly set up a persistence method to keep the conn ...more

How To : Transfer music files between computers in iTunes 9

How to use Home Sharing in iTunes 9 to transfer music files to another computer. First make sure both computers have iTunes version 9 installed. To check this go to the iTunes 9 menu next to file in upper left and select the about item. On windows machines this will be in the ...more

How To : Boost the service signal to your cell phone

Cell phones companies are constantly claiming to have the best service in town; but more often than not your service will be patchy. Check out this tutorial for information on how to boost your phone's signal and get the best reception. You Will Need * A fully charged cell pho ...more

How To : Resize and attach photos to email in Windows XP

This video tutorial from easycomputercoach shows how to easily attach pictures to email addresses. In Windows XP you can send pictures resizing them in the process, in case you have large file sizes. First, locate and select pictures you want to send. You can do it by clicki ...more

How To : Do the "swim in the sky" glitch in Mercenaries 2

Glitches are everywhere in the video game world, and you can call them what you want... glitches, cheats, cheat codes, hints, secrets or tips. In order to find a glitch, you have to keep your eyes open or follow a recommendation from a gaming friend. Either way, to catch a sec ...more

How To : Make a drum loop with MIDI on Pro Tools

This video shows a quick and easy way to create a drum loop using "MIDI MERGE". A stereo instrument track with expand 2 is used here. First, select a track, expand 2, and select session drums (you can take any other track) for the patch and also create a "click track" which wi ...more

How To : Do the "out of map" glitch in Hitman: Blood Money

Glitches are everywhere in the video game world, and you can call them what you want... glitches, cheats, cheat codes, hints, secrets or tips. In order to find a glitch, you have to keep your eyes open or follow a recommendation from a gaming friend. Either way, to catch a sec ...more

How To : Do the "under cliff" glitch in Unreal Tournament 3

Glitches are everywhere in the video game world, and you can call them what you want... glitches, cheats, cheat codes, hints, secrets or tips. In order to find a glitch, you have to keep your eyes open or follow a recommendation from a gaming friend. Either way, to catch a sec ...more

How To : Deter burglars

Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more

How To : Resize a basic image in Adobe Photoshop CS5

1. First of all you need to have a folder containing stock of various photos downloaded from the internet. The width of these images is ‘780’ and you need to resize them to ‘550’. 2. Drag all these images into Photoshop. The tutor advises you can save a copy of the or ...more

How To : Set up an artist's studio

Renting is only half the battle – setting up an artist’s studio demands patience and preparation. Learn how to set up an artist's studio with this how to video. You Will Need * Fans for ventilation * Art supplies * A stool * A desk * Lights * A portable stereo * White paint * ...more

How To : Use a PS3 controller on XP, Vista and 7 (32 Bit)

This how-to video is about how to make PS3 controller work on the computer that have either Windows XP, or Vista or 7 as their operating system. Installation of PS3 controller is very for playing emulators with it, or online games like "duty four" or any PC games using PS3 co ...more

How To : Change the Snow Leopard login screen

Change the Snow Leopard login screen with this video tutorial. Download and install the application Ravissant, an app that lets you customize the login screen in every aspect. Have a background image ready and an Apple logo image, if you want. Modified Apple logos can be found ...more

How To : Hack unlimited food in Happy Aquarium (10/29/09)

Are your fish starving? If they are, you need to do something about it, and quick. Well, there's no quicker solution to feeding your fish than hacking Happy Aquarium with Cheat Engine. Watch this video tutorial to learn how to hack unlimited food in Happy Aquarium (10/29/09). ...more

How To : Secure your home from the inside

Do you live in a dangerous neighborhood? Even if your area isn't known to be dangerous, it could still be a target of home burglaries. Don't let the thieves have the upper hand. Make sure the only thing they're stealing is grass. To properly secure your home from external thre ...more

How To : Install Magisk on Your Pixel or Pixel XL

Google's Pixel phones claimed the top spot in our ranking of the best phones for rooting, but they do have one drawback from a modder's perspective: Because of their A/B partition layout for seamless updates, the devices don't have official support for Magisk. Thankfully, thou ...more

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

How To : Spy on Traffic from a Smartphone with Wireshark

So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more

How To : Root Your Pixel 3a with Magisk

The Pixel 3a came out of nowhere and flexed its muscles to show the industry that you can have a great phone without a hefty price tag. Since Pixel smartphones are first-party devices straight from Google, you can be sure you'll have root access one way or another. For right n ...more

How To : Install TWRP Recovery on the Essential PH-1

For modders, there are few tools more important than TWRP. TeamWin's custom recovery makes flashing mods like Magisk, Xposed, and custom ROMs incredibly easy, and it lets you root your phone at the press of a button. On top of that, it can make complete backups of your phone i ...more

News : Samsung Makes Multitasking Easier on the Galaxy S9

Multitasking on a smartphone has never been better, but it still has some ways to go to compete with a desktop experience. Samsung hopes to change that with a new multitasking view on the Galaxy S9, which allows the user to open notifications in a new, smaller window on top of ...more

The Hacks of Mr. Robot : How to Send Ultra-Secure Emails

Welcome back, my nascent hackers! Although my favorite TV show, Mr. Robot, had completed its first season already, I have not completed demonstrating the hacks that Elliot used in the show. (By the way, I can't wait for season 2!) In several episodes, Elliot was seen sending ...more

How To : Tactical Nmap for Beginner Network Reconnaissance

When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. Th ...more

HoloLens Dev 101 : The Unity Editor Basics

With any continuously active software, it can start to become fairly complex after a few years of updates. New features and revisions both get layered into a thick mesh of menu systems and controls that even pro users can get bewildered by. If you are new to a certain applicat ...more

How To : Hack Android Using Kali (Remotely)

Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this) Step 1: Fire-Up Kali: Open a terminal, and make a Troja ...more

How To : Permanently Delete Text Messages on Your iPhone

Deleting text messages on your iPhone may seem like a pretty simple task, but it's those really simple tasks that usually end up causing headaches later on. Data can stick around, even if you asked it not to, so there's always a slight chance that embarrassing and incriminatin ...more

How To : Take Control of Sonos IoT Devices with Python

Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more

  • Hot
  • Latest