Mac

How To : Hack Mac OS X Lion Passwords

This Null Byte is a doozey. On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely, to request to have the root user's password changed without knowing the password to the ...more

How To : Root the Nexus 6 Using Windows, Mac, or Linux

Google's latest Nexus device is big, bold, and beautiful—and now it's got root. Thanks to some quick work by legendary Android developer Chainfire, the Nexus 6 already had a clear-cut root method before most stores even had it in stock. CF Auto Root is a wonderful tool that h ...more

How To : Convert PDF Files to Text in Mac OS X

Automator is a built-in Mac utility found in Mac 10.4+ and can be used to convert a PDF file to text format. Video: . Below is the process of converting a PDF file to text format. Launch Finder -> Applications -> and double-click on the Automator application to open. Choose t ...more

How To : 8 Menu Bar Apps Every Mac Power User Needs

The menu bar is a great place to perform quick searches, track battery life, and switch Wi-Fi networks on your Mac, but it can do way more than that if you let it. I've rounded up some menu apps below that not only have features that will boost your productivity, but are light ...more

How To : Use Wiki Server in Mac OS X

Whether it's a small business or a work group inside a large corporation, all members need access to the same materials in order to work effectively. Mac OS X server makes it easy for groups to collaborate and communicate through their own Wiki-powered Internet website. To lea ...more

Mac for Hackers : How to Create an Encrypted Disk Image

Before we dive any further into getting your Mac ready for hacking, I wanted to continue on with the concept of encryption. In the last part, we talked about full disk encryption on your Mac, but now I want to quickly cover the encryption of disk images before we dive into man ...more

How To : Steal macOS Files with the USB Rubber Ducky

If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more

How To : Dump a MacOS User's Chrome Passwords with EvilOSX

Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in ...more

How To : Create a MAC tan & burgundy eye makeup look

Lauren, AKA QueenofBlendingMUA has joined the ranks with the other YouTube makeup gurus. Lauren is a makeup artist with a large collection of eye makeup video tutorials. Her eye makeup look span from everyday makeup to creative, more expressive party looks. Check out this make ...more

How To : Change Your Mac Icons

This how-to article is about changing you Mac icons. It goes into detail on how to make your dock icons a different image, like your favorite sports team or just a cool looking image. Video: . Step 1: Choose an Image Choose an image you would like to use. When searching the i ...more

Cheat Sheet : Keyboard Shortcuts for Both Mac & Windows

If you already have your basic keyboard shortcuts under control—we're talking classics here, Control-C (copy for PC) or Command-C (copy for Mac)—it's time to load up your memory bank. There are endless shortcuts available (truly endless—since you can customize them yourself), ...more

How To : Make a harmless virus for Mac OS X

Admit, you're curious. You want to know just what does it take to make a virus for the Mac OS X operating system. Check out this video to learn how to write a harmless virus for computers running Mac OS X.

How To : Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot ...more

How To : Download, copy and burn Xbox 360 games on a Mac

With so many new games coming out all the time, it is financially impossible to keep up with them all. With this easy to follow guide you can learn to download and burn Xbox 360 games to play on your modern game console. From the convenience of your Mac computer, the narrator ...more

How To : Customize the Login Window Background on Your Mac

Macs, like pretty much all Apple products, are notorious for not having a highly customizable UI. They do this to keep a consistent look and feel across all of their devices, but I've grown bored of it over the years. To help liven things up, Bhavin121 found a way to change t ...more

How To : Get iSerial Reader for Mac

In this Software video tutorial you will learn how to get iSerial Reader for Mac. With this program you can get the serial numbers to use for various programs. Almost all programs are listed. There is nothing complicated about this. Download the iSerial reader from Serial Box. ...more

  • Hot
  • Latest