In this video DavidDaGeek shows how to clean your keyboard by removing your keys, but to be careful when doing this. Put your finger underneath a key and just pull it off. Don't break the piece that holds the key in place though! he starts at the shift key and works to the lef ...more
I changed my laptop keyboard over to the Dvorak layout and someone asked it if was hard to do so I made a short video to show how its basically done.
Electronic devices seem to have an uncanny ability to make noise at the worst possible times. It's always during an important meeting, a quiet study session at the library, or a biology final that your laptop or smartphone decides to play some obnoxious or embarrassing sound. ...more
Is your keyboard on your laptop getting a bit sticky? Have years of sweaty fingers and bits of lunch found there way down between the keys? Is there moss growing out of there? Panic no more. This video will show you how to clean your laptop's keyboard completely. In order to ...more
Is the spacebar on your keyboard out of whack? This simple video will show you how to re-seat it in less than two minutes. Start by using your fingers (or a small screwdriver or spudger if needed) to gently pry up along the top of the spacebar, working from one direction to an ...more
A laptop keyboard can collect a lot of dust, dirt, and breadcrumbs. In this tutorial, we learn how to clean out your laptop keyboard. Start off by removing the casing from around your laptop, making sure not to unplug any wires. You will need a screwdriver to remove the screw. ...more
The Google Nexus S smartphone is finally here! Well… almost. Nexus S is the first smartphone based on the Gingerbread OS (Android 2.3) and will be available for purchase online and at Best Buy store locations everywhere, come December 16th, with T-Mobile service. Aah… just ...more
Tinkernut demonstrates how to hook up your exercise bike to Google Maps. Using a stationary bike can be good for your health but it can also be boring. You can spice up your exercise regiment by using Google Maps. You will need a USB keypad with arrow keys, a magnetic contact ...more
Given how glued we are to our computers these days, we're surprised we're not replacing PC and laptop keys on a monthly basis from all the wear and tear. If you've got a key/button that has kicked the bucket, it's best to replace it with a new one. Check out this computer har ...more
You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downlo ...more
Newton Virus is the first art virus by Troika. In the beginning were harmless computer viruses. Viruses born out of the wit of early computer adopters, viruses whose sole purpose was to surprise and amuse. A non-destructive form of artificial life. We wanted to revive this g ...more
The internet is something most people rely on, so when you buy a used laptop without a wireless card or yours needs to be replaced, it's easier to do it yourself. Having someone else do it can cost more than you think, so here's an easy way if you own a Dell Inspiron E1505. R ...more
This helpful tutorial will show you how to take a screenshot on your laptop computer. To take a screenshot on your laptop, follow these steps: 1. Locate the 'FN' key. (Bottom left of your keyboard.) 2. Find the 'sys rq' key. It is also known as the delete button. (Top right of ...more
Here is a great LEGO mod for your Laptop, via ETSY. Turn all your keys into LEGO keys.
In this After Effects tutorial, Creative Cow leader Aharon Rabinowitz shows you how to be an AE road warrior by changing the keyboard shortcuts to account for missing keys on a laptop - such as the Ram Preview key or the Audio Preview key. Learn to customize your shortcuts in ...more
Did you know that you can zoom in on your Mac laptop just as easily as you can on the iPhone? All you need is your fingers, your mouse and to activate the zoom function on your computer. Check it out! You Will Need * Mac Step 1: Open System Preferences Go to System Preference ...more
Think about how many times a day you touch your keyboard... ready to clean it yet? Check out this Howcast video tutorial on how to clean a computer keyboard. You Will Need * A keyboard disconnected from a desktop computer, or a laptop keyboard * A flathead screwdriver * A bo ...more
On OS X Mac portables, like the MacBook and MacBook Pro, the delete key backspaces, or deletes backwards. If you're accustomed to having the keyboard delete forward, just hit function delete. For more, watch this MacBook video tutorial.
Six steps to clean a membrane keyboard. IMPORTANT - NOT FOR LAPTOPS or NON-MEMBRANE KEYBOARDS WHAT YOU'LL NEED: lint free cloth cotton swabs can of compressed air or vacuum cleaner flat tip screwdriver pinch of water OR 1 part water - 1 part alcohol (denatured)* #1 Shutdown, ...more
The possibilities are endless for 3D printing. With your very own 3D printer, you can make spare parts, circuit boards, inflatable balloons, duplicate keys, Minecraft cities, and even tiny replicas of your face. From a more artsy standpoint, you can make complex sculptures, li ...more
It's been about five months since Google first unveiled their prototype future computers running Chrome OS, and the time is nearly here for the Chromebooks to be unleashed on the public. But there are a lot of qualms over the release of Chromebooks, with most criticism coming ...more
How did we get to the age of smartphones, ereaders, laptops, and crazy touchscreen displays? Gizmodo covers Steve Wozniak's recent presentation of nine key gadgets that have deeply influenced the tech God's work. A few highlights below; click through for the full survey. Stibi ...more
Glasses-free 3D is devouring the United States, one mobile device at a time. First, gamers experienced autostereoscopic play with the Nintendo 3DS, then smartphone users got the HTC EVO 3D, and now laptops users can enjoy glasses-free 3D technology with Toshiba's upcoming Qosm ...more
I love my laptop. It goes wherever I go. Unfortunately, that means that it also gets pretty grubby after a while. The screen gets dusty. The frame gets smudgy. The spaces between the keys fill up with crumbs of questionable origins. And my desktop? That thing is a dust bunny m ...more
In terms of internet, faster = better. We all want faster internet, but how exactly do you get a fast wireless connection? Believe it or not, the answer is quite simple. Here are 4 things that may be slowing down your connection. Interference from Other Devices Interference ...more
You already know the mechanics of DJing, but you want to be an international celebrity -- or at least drink for free while showing off your music collection. Here's how to spin your hobby into a career. Watch this video to learn how to become a professional club DJ. You Will ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job. There are paid services th ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use y ...more
Laptops are almost a necessity in today's society. It doesn't help that a laptop that can actually increase your work productivity will put at least a $1,500 dent in your wallet. I'm sure you have searched around to try to find factory direct deals, or (shiver) even looked at ...more
In this video tutorial, viewers learn how to take a screen-shot on a laptop. Begin by finding the display image that you would like to take a screen-shot of. Then press the End and Insert key on the keyboard to take a screen-shot of the displaying image. Now open the Paint pro ...more
Speakers have been an integral part of smartphones since the beginning. Razer's concept Project Linda even uses the speakers from the Razer Phone to power the faux laptop's audio system. But what if Google's next Pixel phone didn't even have speakers? What if it didn't need th ...more
The best part about April Fool's Day is that everyone is fair game. Even big tech companies like Google and Twitter get in on the action every year. It encourages even the most uptight, unfunny party-poopers among us to have a little fun driving each other crazy with pranks — ...more
It's pretty logical for your MacBook to sleep when you close its lid, but under certain circumstances, you may not necessarily want this feature to kick in. Personally, I'd prefer my MacBook's lid to be closed while relaxing and listening to music. Also, I don't like having t ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered ...more
You may already know that you can build a functional circuit on a sheet of paper with the graphite from a pencil, but you'd probably never think of using it to fix an electronic device. This same principle can be used to bring back a bricked phone, but can also repair a damage ...more
If you have no desire to get a separate Mac desktop computer, but want to either supersize your laptop's screen for gaming or need to get additional screen real estate while you work, then connecting your MacBook, MacBook Air, or MacBook Pro to an external display is the right ...more
We've had the pleasure of test driving the ASUS Transformer Book T100T for the last couple of weeks, and for a $400 Windows 8 machine, it's impressive to say the least. Now don't get me wrong, a Surface Pro this is not. But unless you plan on heavily gaming or doing other pro ...more
MAC addresses (not to be confused with Macs) are unique identifiers assigned to network devices in order to access the internet. Hotels use these Mac addresses in order to check if a registered patron has agreed to their terms and conditions, how much bandwidth is being consum ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their M ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
Whether you're in high school or college, you no doubt will have your iPhone in your pocket all day long. To make your iPhone last the whole time and even help you out with your studies, these are the accessories you'll want to get your hands on. You might not think you need ...more
Hello, my fellow hackers. My name is cl0ck. I am a senior majoring in Computer Engineering with an emphasis is Security. I have been lurking the site for a while now reading and learning from the great minds that reside here. I, too, have some knowledge that I would like to s ...more
Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more
Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen and keyboard. With the help of an old-school connecting standard, though, you can log into your Pi from any computer using a si ...more
In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encrypti ...more
We are most certainly not machines. We all need some downtime every once in a while to set our sanity scales back in balance, which in turn, makes us more productive workers. This is a premise that several forward-thinking employers fully understand, but these types of compani ...more
lubuntu is a is a lightweight Linux/Ubuntu that makes it suitable to virtual environments, that you run with VirtualBox to add a secondary machine to your computer or laptop. With this program you can run a number of operating systems upon the same platform. But as we are all ...more
Who wouldn't want to know if someone was trying to log onto their personal computer without their permission? Be it your annoying co-worker or your girlfriend, there are many cases where people may try to gain access to your desktop or laptop. Having a strong password is the ...more
Samsung's new Galaxy S8 can turn into a PC with its DeX dock, but while that may sound like the future of mobile computing on the surface, there are definitely a few issues with the entire setup. The Samsung Desktop Experience (DeX) dock was debuted alongside the Galaxy S8 on ...more
If your PC setup includes a mouse and keyboard, you'll be happy to know that most of the touchscreen-first features of Windows 8 have gone by the wayside in Windows 10. Where it once required awkward gestures to access key features, Windows now recognizes when you're using a t ...more
If you are among those lucky ones who got a chance to pickup the Yu Yureka from Amazon and looking for a detailed guide on how to root your yureka, then I doubt that there is any better place than this. You might have visited some XDA threads for the same but those are general ...more
I can definitely say that my MacBook is one of my best friends, but I was still very disappointed when I realized that the only game my laptop came with was chess. For starters, I'm not very good at chess. I haven't even beat the computer once, which really grinds my gears. Bu ...more
Every state has begun reopening in some capacity. While there are important steps for everyone to get back to work and begin socializing, precautions will be in place for some time, especially with an expected second wave coming this fall. The virus is not over. Keeping yours ...more
Another major retailer is putting all its chips in on the relentless rise of selfie culture. Sally Beauty is rolling out kiosks to try-on "some of its best" hair dyes in 500 of its stores throughout the US. The in-store augmented reality-powered kiosks invite you to view your ...more
Apple's latest updates to its operating systems add another security feature to its Find My service, so you have an even better chance at locating your lost iPhone, iPad, or Mac should it ever happen. As long as you have the option enabled, you can leverage other Apple users' ...more
Kali Linux is probably the most well-known hacking distribution among penetration testers. However, there are alternative distros which offer versatility and advanced package management systems that are absolutely worth considering. One such distribution is Pentoo, a Gentoo-b ...more