Password

How To : Add NES games to your iPod Touch with CUTEFTP

There has been an update with the NES emulator, so you have to put the ROMs in the /var/mobile/Media/ROMs/NES folder, and not the /var/root/Media/ROMs/NES folder. Another Note: you must install BSD Subsystem and OpenSSH through Installer in your iPod before configuring your i ...more

How To : Change home screen icons on an iPod or iPhone

In this how to video, you will learn how to change the home screen icons on an iPhone or iPod Touch. First, go to the website to download the icons you want. Once these are downloaded, download and install WinSCP. Open this program and select edit. Find your IP and wi-fi addre ...more

How To : Disable secure virtual memory in Mac OS X

This video will show you how to disable secure virtual memory in Mac OS X. From the top left of your screen click on the apple icon. Click on system preferences from the pull down menu. Click on the security icon. Click on the image of the closed lock from the bottom left of ...more

How To : Root the Motorola Droid X smartphone with ADB

Yes, the Droid X from Motorola can be rooted, and yes, you can do it at home. Just make sure you follow the directions precisely. If you succeed, you'll have a completely rooted smartphone. eFuse doesn't matter. If you want to expand your options on Verizon Wireless's Droid X, ...more

How To : Create Folders in Your Gmail Account

Folders help you to organize your mail in your Gmail account. In this tutorial, we are going to learn how to create these folders. Video: . Step-by-Step Procedure Open your favorite browser. Go to gmail.com. Log in with your user name and password. Click on the "gear icon" on ...more

How To : enter a coupon code

Many people must be asking, how do you enter a coupon code on Wizard101? This is a follow-up of the "Promo Code: 1000 Gold Coins" post. So here's how you do it: Go to Wizard101.com The first thing you'll have to do is go to the site. From here, you can access all your accoun ...more

How To : Delete a Yahoo account permanently

If you ever want to delete your Yahoo Account for any reason, the option to do so is not easily available on the site.In fact, many people do not even know that such a feature exists. However, this video shows the necessary steps required to do so. Of course, you need to know ...more

How To : Advanced System Attacks - Total Guide

Good day people, today we will examine some basic, for some people well-known attacks, also we will take a look at some advanced attacks. At the beginning I must stress that this article is not technical - in other words if you wanna hands-on exercise, this is not article for ...more

How To : Control iPhone/iPod Touch from a computer

In this video from iPT2gGeec we learn how to control an iPhone from your computer. You need a jailbroken iPhone to do this and use a program called Veency. Open Cydia. Search for Veency. Install it. That is all you need to do with your iPhone. Now to get it to work on your co ...more

How To : Set Up Wippien VPN in Windows XP

This video tutorial from ruralgeek shows how to set up and use Wippien VPN on Windows XP. First, download Wippien client from here: www.wippien.com. Once it's downloaded, install the application. Be sure that option Put Wippien to XP firewall extensions is checked. Uncheck a ...more

How To : Watch Apple TV+ on Any Android Phone or Tablet

With the prestige appeal of its original programming and relatively low subscription price, Apple TV+ is one of the more appealing streaming options out there — and you don't need an Apple device to subscribe and watch movies, TV shows, sports, and other Apple TV+ content. Th ...more

How To : Create a MySQL Server BruteForce Tool with Python

Hello aspiring hackers, It's been a while since I wrote a tutorial, so I figured I might just share one of the tools that I have created to help the community grow. Scenario Let's say, that we have done all the recon(both passive and active) and we have scanned the web serve ...more

How To : Set up a Yahoo email account on your iPod Touch

This video demonstrates the technique to setup a Yahoo email on an iPod Touch. You start going into settings and then clicking account. On the next screen you will click "Other" and then click on "Pop". At this point you enter your name and email address that you use for your ...more

News : The Biometric Authentication Conundrum

Computer system authentication is critical to keeping systems safe from unwanted users, intruders, and abusers. Basically, authentication is the process of the potential user proving they are an authorized user. As most of you know, authentication into secure computer systems ...more

How To : Set up Bluetooth on your Motorola Droid

This video shows you how to easily set up Bluetooth on your Motorola Droid phone and use it with a Bluetooth headset. The first thing you have to do is go to Settings and then go to Wireless and Networks. In the pop up menu, you have to go to Bluetooth settings and check the f ...more

How To : Unlink your Google and YouTube user accounts

In order to unlink your Google account and your YouTube account, you will need to go to Google. Click on My Product. Then, click on Edit. Next, click on "Close the account and delete and all services linked to the account". Check the box that says YouTube. Scroll down to the p ...more

ASUS ROG Phone II : The Gaming Phone for Everyone

Since the Razer Phone's announcement in 2017, we've seen a new subgroup of phones emerge. Gaming phones are now a thing, leading to companies like ASUS creating phones that are thoroughly optimized for the mobile gaming experience. And with their second iteration, they perfect ...more

How To : Configure a Wi-Fi connection on an iPad

If you're trying to learn how to use Wi-Fi on your iPad, take a look at this tutorial on connecting your iPad to a wireless network so that you can access the internet. You'll need to use the settings and know the name of the wireless connection you want to use. Make sure you ...more

How To : Install a Custom Kernel on the Essential PH-1

When you unlock the bootloader on your Essential PH-1, you open your device to a host of new possible tweaks. One popular modification is a custom kernel, which can not only speed up your phone, but give you new features that wouldn't be possible otherwise. The kernel control ...more

How To : SSH into an iPod Touch 1G/2G

This video shows the method to SSH into iPod Touch 1G or 2G. You need an iPod touch 1G/2G with Firmware 2.2.1 or previous (Windows), a Windows based computer and a jailbroken iPod Touch which has Wi-Fi connectivity. Open Cydia, go to search and type OpenSSH and install it. Go ...more

How To : Manage standard user & admin accounts in Windows 7

ClearTechInfo live up to their by offering clear and concise information on how to manage user account settings in the new OS from Microsoft, Windows 7. Begin by pressing the start button and going into the control panel. In here look for 'user accounts and family safety', ope ...more

How To : Import Private Keys to Bitcoin Wallet (Windows)

I've noticed that a few people using the crypto-currency, Bitcoin are having issues importing private keys to their Bitcoin wallet. This is easy to do and doesn't require anything other than your Bitcoin client/daemon (as of ver0.6.0 ) and the command line. Step 1: Setting Up ...more

News : Kon Boot for Bypassing Windows Logon Screen

Hi Guys, I just decided to throw this out here for anyone who might not be familiar with the utility or would like to do some reading on it. Kon boot is a small utility that modifies the kernel while booting, and allows you to bypass the Windows Logon screen by entering any p ...more

How To : Fix the "hal.dll is missing or corrupt" error

If you've received the "hal.dll is missing or corrupt" error message from your Windows machine, then you're in luck! This video will show you how to correct that problem with the Recovery Console tool that comes with the Windows 2000 and XP CDs. Using the Windows Recovery Cons ...more

How To : Facebook Credentials Revisited

Hey everyone, this guide will show the process of stealing your victims Facebook credentials. This is a followup to my previous post. To successfully trick our victim into giving up their password, we will need the following: A way to insert ourselves between the victim and ...more

How To : Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more

  • Hot
  • Latest