If you want to get more out of your AppleTV, Boxee is the way to go. Dave Mathews from Boxee— no, not "Dave Matthews"— shows you how to get the HTPC program installed on your Apple TV. If you have an Apple TV and want to run XBMC or Boxee, in order to watch your own XVID, DIV ...more
Want to make an old floppy disk useful again? Turn it into a USB drive. It's easy. So easy, in fact, that this free video tutorial from CNET can present a complete overview of the process in just over three minutes and a half. For detailed instructions, and to get started modi ...more
Defrag your PC regularly to keep it running smoothly. You can use the free software download, MyDefrag, to keep your hard drive clean and happy. This tutorial walks you through downloading, installing and running the program on your Windows based PC (laptop or desktop computer).
Looking to upgrade? This brief how-to will guide you through the process of disassembling a Microsoft Xbox 360 hard disk drive quickly and efficiently without damaging any of the components, the first necessary step of any successful repair. This tutorial will also be of use t ...more
Want to access your Linux partition on your hard drive using Windows 7? With a little program called Vmware Player. So, check out this video tutorial to see how to see all of your Linux files on Windows 7 from your hard drive. Step 1: Install Ubuntu on a Vmware Player Step 2 ...more
Learn how to fix or recover a corrupt windows registry following the steps outlined in this video tutorial. To begin, take the hard drive out of the computer with the corrupted registry and connect to another computer. To find the files you need to replace go to Start and My C ...more
Disconnect all wires from XBox. Hold power button for 2 minutes to clear electric charges from XBox. Remove hard drives by pulling hard drive button and just straight up. Remove faceplate in XBox by gripping on the sides. Remove the bottom and top panels. Separate them. You'll ...more
For anyone who has accidentally deleted a file, follow the steps in this tutorial to learn how to recover the file on Ubuntu. Learn what commands to type to run a search that will allow you to undelete a deleted file. This tutorial shows you letter by letter what command to ty ...more
Sneekylinux will show you how you can install small Linux on your computer. You can install Linux on you you computer and this helps your DSL run faster. Find out what programs to open to get the Linux install. You will be installing the Linux on to your hard drive so it can b ...more
Have sensitive data that you want to make sure you securely delete? Or maybe you're getting an external drive ready to recycle or to give to a colleague. In this video tutorial, you'll find instructions for securely emptying your trash and also securely delete the contents of ...more
Ever wanted to take apart your Western Digital "My Book" enclosure? If you also happen to think that the drive inside that enclosure runs too hot, this brief how-to video will also guide you through the process of placing the drive in another enclosure with a fan and an eSATA ...more
Need more space on your computer? The Lab Rats ,Andy Walker and Sean Carruthers, walk you through the process of installing a second hard drive.
If you're curious about how things work, or need to open up your Xbox 360 hard drive, be sure to check out this video. This video will also show you how to reassemble your hard drive after disassembling it. Keep in mind that opening up the Xbox 360 hard drive will break the wa ...more
This guide works 100% for Vista & Windows 7, unlike most of the guides out there. The method is very simple and hassle free. Needless to say, your motherboard should support USB Boot feature to make use of the bootable USB drive. Follow the steps below to create bootable Wind ...more
This is a video teaching how to use the Wiiflow USB loader with an external hard drive. This will allow you to store Nintendo Wii games in an external Desktop hard drive. The narrator shows you his consoles and his hard drives while loading the cover on his Wiiflow. The Wiiflo ...more
Already an impressive gaming machine, the Xbox 360 can be modified to play a wider variety of games. This instructional video demonstrates how to flash your Xbox 360 to play downloadable games from the Internet. This method only works on the Hitachi v0078fk drive and will void ...more
Whenever a new hard drive is purchased for a computer, it needs to be formatted to work with that computer. Formatting a hard drive on a Macintosh computer is a fairly easy process. Instructions: 1. Open the system drive, usually titled "Macintosh HD." Open Applications, then ...more
Here, in a silent video (that means no sound), you'll see the steps to creating your own laser from some wire and your old DVD drive from your computer. You can always tear apart a good computer too, but that's just stupid.
First of all you shall need a program called "Disk Inventory X". You can download this program from the link Once you have downloaded you have to install this program. Now launch "Disk Inventory X". This shall take some time to load because it processes you ...more
This video by Technology Helper teaches you how to carry out the often difficult task of taking apart an XBox 360. First the face plate is removed using a small screwdriver and then further parts are removed by pushing small prongs on the inside of the XBox using a screwdriver ...more
Is your computer overheating? Find out how to cool things down with a custom made laptop HDD pad cooler. Cool your laptop's hard drive or graphic cards. Click through to watch this video on tricklife.com
Welcome back, my aspiring hackers and those who want to catch my aspiring hackers! As most of you know, this series on digital forensics is inspired by the motivation to keep all of you all out of custody. The more you know about the techniques used by law enforcement and for ...more
You might know the feeling: the sinking stomach that informs you something terrible has happened. You click on your trash bin. Nothing is there. Your hard drive has been wiped clean. There's nothing worse than realizing everything on your computer is gone. You scold yourself ...more
Hello, everyone! Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice t ...more
It's sad to say, but the chances of a new system launching without any hitches or glitches is just not realistic. If you're one of the lucky few that has gotten their hands on the new PlayStation 4, or if you are waiting in line right now to get one, the first thing you're goi ...more
You can beef up the security on your Mac all you want, but all the firewalls and antivirus apps in the world mean nothing when that can of soda tips over on your Macbook, destroying your laptop and all its data forever. You may have some of your data backed up to a cloud serv ...more
In the Windows 8 Enterprise edition, you can use the Windows to Go feature to travel with Windows 8 OS, personal files, documents, settings and many more. All you need is an external hard drive or USB drive of 32 GB space or more and USB 3.0 support or more for fast Windows 8 ...more
It's not uncommon for hackers to attempt to move laterally between devices in proximity of a compromised device to maintain a prolonged presence in the network. Malware utilizing USB flash sticks to self-replicate and compromise air-gapped machines isn't a new concept. In bot ...more
At this point in our series on creating a customized hacking container, you should be able to use Docker to save and retrieve customized instances of Ubuntu from your own machine. Make sure to revisit part one and part two if you need a refresher. Previously: How to Create a ...more
I dabble in video editing, and when working on even the shortest of motion graphics clips, the exported files take up quite a bit of space. For all of you heavy Mac users out there, I'm sure you know my pain. After a short period of time, our computers tend to slow down due t ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more
Hi there, Elites Welcome to my 6th post, This tutorial will explain how to hack windows, using a program (No-IP) and windows's inbuilt Task Scheduler. Meanings... Task Scheduler: It is a program, inbuilt in windows, which allows us to create some tasks and execute them at s ...more
This guide will explain how to configure a USB Flash Drive / Memory Stick so that you can run a keylogger within just a few seconds of plugging it in any computer. It is important to note that in some countries, including the U.S., covertly intercepting electronic information ...more
I was on our new #nullbyte IRC channel when someone told me how tedious it is to install an OSX Virtual Machine on Virtual Box (I think it was wawa). We all know Linux rocks (gets acknowledgement from the crowd), but there are morons out there, multiplying at a never before se ...more
If you read the reviews on Google's Pixel C, you'll notice one big complaint about the tablet/laptop—most reviewers feel that Android simply isn't ready to be used as a desktop OS. The developers at Jide felt the same way, so they set out to make a custom version of Android wi ...more
The day has finally come, and after quite a bit of hype and buildup, Windows 10 is now officially available. The update itself is on a staged rollout, which means it will be slowly becoming available to users over the coming weeks and months, so don't panic if you haven't alre ...more
Welcome back, my tenderfoot hackers! In continuing my series on digital forensics using Kali, I want to introduce you to two complementary tools, both built right into Kali Linux. These are Brian Carrier's tools Autopsy and Sleuth Kit. Carrier is one of the leading authoriti ...more
It's finally out. After months of testing, iOS 13 is available to install on your iPhone, which means over 200+ new features you can use right now. The update, released on Sept. 19, can be installed over the air or from a restore image using iTunes in macOS Mojave and older or ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
With great power comes great responsibility, and when it comes to modding Android, nothing is more powerful than TWRP custom recovery. As easy as it is to replace your phone's entire OS with a custom ROM, when things go awry, you can also be left with no operating system at al ...more
As I've said before, slowing down is not an option for me. At one point, I realized that there were plenty of files on my Mac that I didn't need any more, but too many to delete individually. In other cases, your Mac can be experiencing some major malfunctions: constant crashi ...more
Surprising? No. Exciting? Absolutely. After a grand introduction by at the Apple event on September 10, 2019, the iPhone 11 is finally here. We may have known nearly everything about this new iOS device ahead of time, thanks to the usual surge of reliable leaks and rumors. Th ...more
Copying files from a computer to your Android device has always been pretty straightforward—just connect the two devices with a USB cable, open your desktop file explorer, then move the files over. But what if you didn't need any wires at all? A new app from developer AppCube ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
The infamous Red Ring of Death plagued the Xbox 360 for years, leading people like me over to the PlayStation 3 console. Now it looks like Sony and its new PlayStation 4 are running into the same problems as Microsoft did. Instead of red, it's blue, and that light could mean ...more
Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more
In this Windows 8 Tutorial you will learn how to disable automatic maintenance. Their are really two situations I can think of when you would want to disable automatic maintenance in Windows 8. The first being if your Windows 8 computer came with a Solid State Disk then you wi ...more
Windows 10 is due to be released on July 29th, and the majority of existing Windows users should be eligible to upgrade to the newer version for free. But there's been a lot of confusion about which older versions of Windows will be eligible for the free update, and some unce ...more
If you bought an iPhone or iPad equipped with USB-C but didn't max out the local storage, there are some great external storage solutions beyond iCloud and other cloud storage services. And now that the iPhone lineup comes with USB-C ports, you have better-performing external ...more
The greatest pain in owning a high-powered gaming PC is the simple fact that you can't play it all the time. Sometimes you have work or school, and other times, you may just want to go mobile. When something like this impedes your ability to play PC games, you may end up settl ...more
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block ac ...more
This Tutorial video will show you how to automate hard drive organization or defragmentation with ultradefrag software. UltraDefrag, PC utility software defrags your pc and speed up PC performance. So please watch the video and follow the steps to do it yourself. Video: .
Yesterday, I wanted to remove BackTrack from my system and install Kali, and at the same time didn't want to damage my Windows 7 or my hard drive. I searched a lot of articles, but almost all of them wanted me to have a backup Windows 7 CD, which I don't possess. So, I decide ...more
The macOS 10.14 security update tried to make parts of the operating system difficult for hackers to access. Let's take a closer look at how its new feature works and what we can do to spoof the origin of an application attempting to access protected data. Apple introduced so ...more
One of the best features of Android is the fact that it's open-source, giving developers the ability to use it on pretty much any device they can think of, like on a Windows PC using Andy. That's what drove the creators behind the Android-x86 project to port over the mobile OS ...more
If you've spotted an unintended Ethernet connection and wondered what you could do with all of the information coursing through those wires, there's an easy way to hack into it and find out. Let's say there's a router that we need to know the password for, and we have physica ...more
Apple has finally given us a decent file manager in iOS 11. The new "Files" app replaces the not-very-old iCloud Drive app that appeared in iOS 9, but you can still access your iCloud Drive files in the new Files app, as well as files from third-party cloud services. A nice im ...more
This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more
If you read my previous post, "How to Hack into a Mac Without the Password", you know that it is very easy to break into someone's Mac if you have physical access to the computer. Now the question that lies is, how do we protect ourselves from this happening to us? Well, here ...more