When working on the dashboard of any vehicle, make sure you disable the vehicle's airbag system first. Your service manual should tell you how to do that. In this video, the heater core is plugged up in a 2001 Ford Taurus, which means it needs to be taken out. The book states ...more
In this video tutorial, viewers learn how to remove an X-Box 360 faceplate. Users will need a screwdriver for this process. Begin by laying the system down to ensure that the console will be balanced, and not fall when removing the faceplate. Then loosen the bottom of the plat ...more
The Internet is full of crooks just waiting and waiting for the chance to steal your information. One way that people are getting into your system these days is with fake or rogue applications. These viruses sneak themselves onto your PC either through hacked websites or when ...more
This is a directional video of how to increase the speed of a Windows Vista PC. The first step is to uninstall programs that you do not use. Then you want to go into MSCONFIG and remove unnecessary start up entries. You can also configure the performance options of your comput ...more
Patti Moreno, the Garden Girl, shows how to install a drip irrigation system in a container garden for growing herbs and vegetables. Container plants also need more fertilizer. First, at the spigot, connect a manifold/timer with a fertilizer dispenser and a filter to remove pa ...more
Are you a ... Windows Developer? Interested in ... testing the vulnerabilities inherent in your own operating system? If so, you're in luck. This video tutorial demonstrates a simple hack that will allow you to remove the Windows Genuine Advantage Validation software. For step ...more
Technology: The Less You Know the Better? I'm sure everyone is now aware of GPS technologies and tracking techniques these days, with the release of numerous documents (even lawsuits) on big name companies like Apple, Microsoft, and Google. Yes, 2011 was a good year for eye-o ...more
The following two videos show in detail how to proceed in changing the timing belt and water pump in a Peugeot 206 with 1.4 L engine. The timing belt has to be changed every 90,000 km or 5 years, whichever comes first. In most cases, it's a good idea to change the water pump d ...more
First of all whenever there is low rainfall and higher heat then there are problems.You shall notice that there are brown colored needles which dry up and then drop of. Sometimes they start at the tip and then move towards the branch. This shows drought and you need to soak in ...more
Is there a rock in your yard that's bothering you? This video will show you how to get rid of it. First you dig around the rock to figure out where you want to drill your holes. Then you drill holes into the sides of the rock. It’s important to clean the dust out of the holes ...more
For Windows laptops and PCs it's easy to install Linux. However for Macs, it's a different story. There are people installing Ubuntu on Macbooks and so far I've noticed that they are using 9.10. I've remastered my own Ubuntu 10.04 complete with playing flash videos and other a ...more
You can help keep your laptop cool by fixing a malfunctioning laptop fan. With a screwdriver and some compressed air you can clear away any obstructions. Think about where you are setting down your laptop as soft surfaces can block air intake. If your laptop is overheating or ...more
This short guide will show you how to remove those pesky security alerts in Windows 7. Go to Action Center You can do this by searching for it in the Windows Search bar or by going to Control Panel > System and Security > Action Center. Remove it Underneath the Maintenance ...more
Water is an important resource and it needs preservation. Older toilets suck up way more water than necessary, causing both high water bills and pain for the environment. Follow this tutorial, and learn how turn your old toilet into a newer low-flow model. You Will Need • ½-g ...more
In this video you will learn how to change out the hard drive to get even more storage capacity from your Sony Playstation 3. The PS3 takes any 2.5 serial ATA hard drive, which is your basic laptop computer hard drive. To switch this out begin by looking at the base of your PS ...more
Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the comput ...more
Are you tired of counting your hair while waiting for your computer or laptop to respond? Then, these easy steps are perfectly fit for you, especially if you're a Windows 7 user. It's time to speed up, my friend! Performance Over Appearance Modification Let's start with opt ...more
I recently upgraded from Ubuntu 9.10 to 10.04 and now my boot screen is a bit messy. Since I'm not using the latest GRUB boot kernel (Linux 2.6.32-28-generic), I might as well delete it. For more documentation, visit Ubuntu Forums. Here's how you go about deleting the GRUB bo ...more
You can get a spa like experience in your own home. Follow these tips to treat yourself to a well deserved facial at home. Create your environment Bring out some nice white fluffy towels and a robe. Candles and soft music add a nice spa touch. Cleanse First, cleanse your sk ...more
Skin care products need to be properly applied to do their best work and be effective. Here we show you the techniques to applying skin care products properly. Serum Applying a serum or essence: Begin with a serum and put three drops into the palm of your hand and warm. Apply ...more
In this series of video clips you’ll learn how to install a keyless entry deadbolt security system in your home. Expert locksmith J. Daniel Nell takes you through the entire process step-by-step, showing you what tools you’ll need to complete the job, how to remove your old de ...more
Welcome back, my tenderfoot hackers! In some of my past articles, I've shown numerous ways of embedding a listener/rootkit on a remote system, including buffer overflows of the operating system, getting the victim to click on a link to our malicious website, and sending a mal ...more
Despite years of user complaints, OEMs are still preinstalling third-party apps on brand new devices. Even in 2019, you'll still find plenty of phones with Facebook preinstalled. What's worse, it's installed as a system app, so it can't normally be uninstalled without root acc ...more
I have the AT&T version of the Galaxy S5, so every time I start my phone I get the pleasure of hearing AT&T's lovely jingle. Actually, that's sarcasm—I absolutely abhor this sound. I haven't had the chance to play around with a Sprint, T-Mobile, or Verizon variants of this pho ...more
Welcome back, my tenderfoot hackers! So many of you responded positively to my post about using the keylogger, as well as my post regarding turning on the webcam, that I decided that you might enjoy another similar hack. In this article, we will enable the audio recording cap ...more
I've noticed that a few people using the crypto-currency, Bitcoin are having issues importing private keys to their Bitcoin wallet. This is easy to do and doesn't require anything other than your Bitcoin client/daemon (as of ver0.6.0 ) and the command line. Step 1: Setting Up ...more
Five Phases of Hacking:- The five phases of Hacking are as follow: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks The Five Phases of Hacking Reconnaissance:- This is the primary phase where the Hacker tries to collect as much information as possib ...more
Greetings my fellow aspiring hackers, Its been a long time and I have to confess I would not be around for long as I am not free yet. I just have some few hours to spare and decided to help out. I learnt OccupyTheWeb won't be around to help out anymore which is like a slap in ...more
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look ...more
Widgets are great ... if you actually use them. A quick swipe right on the lock screen will reveal the Today view and its widgets, and it's very easy to accidentally open. Plus, others can see your widgets without any authentication. You could manually remove every widget, but ...more
Google's new Pixel and Pixel XL flagships are some very powerful smartphones, but as with any high-tech gadget, they're only as capable as the user allows them to be. So if you're a proud new Pixel owner, it's time to bone up on a few new features to help get the most out of y ...more
After recently being in the news for collecting PII (personally identifiable information) for analytics and after-sales support, OnePlus has another security problem. An individual going by the name Elliot Alderson discovered an app in OnePlus devices that can enable root acce ...more
Okay, so you finally got around to rooting your Android device—now what? Well, to get the most out of your Superuser status, you'll need to find some good root apps, which will allow you to easily add features, reduce battery drain, remove ads, and much more. Don't Miss: Andr ...more
Dutch filmmaker Anthony Van der Meer published his 2015 thesis short from Willem de Kooning Academy in South Holland online in December 2016. It's a brilliant piece of work that managed to be touching, alarming, and informative at the same time. His documentary, which already ...more
Welcome back, my budding hackers! Previous to this tutorial, we've focused mostly on hacking the target system. If we're successful in owning the target system, we'll then want to make certain that the system administrator doesn't know we were there, and that he or she cannot ...more
When you get a new phone, the last thing you want to deal with is a ton of preinstalled programs staring back at you. They not only clutter your home screen with apps you'll probably never use, but they're also wasting space on your internal storage and potentially draining ba ...more
Since Android is an open source operating system, that means anyone with a little know-how can download, view, and even alter its underlying code base. Manufacturers do it all the time, which is how we end up with skins like TouchWiz and Sense. But when Android's awesome third ...more
When Google announced its new Android TV platform, one of the features they advertised was a home screen that automatically reorganized your apps based on how frequently you used them. Unfortunately, this feature either didn't make the cut, or is still under development, since ...more
Roughly four years ago, Adobe decided to abandon development of the mobile version of their popular Flash Player browser plugin. Their excuse at the time was that this move would enable them to focus more on HTML5 development for mobile devices and allow them to put more effor ...more
Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more
What you probably don't know is when you remove a file on your system, it is actually still saved, and not entirely removed. Let me tell you how to get rid of it completely. Overview: When you delete a file it is not removed entirely from your drive and can be recovered. No ...more
OnePlus is known for making a quality products with their line of smartphones, but as with most, they have their own specific customizations that you can't get anywhere else. Font types, boot animations, sounds, and proprietary apps — they are all unique to each different skin ...more
Whether you're a secret spy or just a regular person with a few secrets, you may want to keep certain information on your smartphone private, and it's totally possible on Android to do so. Previously, we showed off an app called Smart Hide Calculator that lets you hide apps/p ...more
Hi! Let me get started on this subject as it is a very "touchy" subject. We all want to "hack" these days, and that's logical. Te be real honest here, i was inspired once by the words someone from the Null byte community said. In the (near) future, wars will be ended by comput ...more
Welcome back, my budding hackers! I've written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these techniques i ...more
Okay, so you rooted your Android phone .... now what? There are a few ducks you need to get into a row, like backing up your stock boot image, getting SafetyNet sorted, and improving security with biometrics. But there are also awesome root mods waiting for you — just don't ge ...more
App updates bring new functionality, but they can also break old features or introduce changes no one wants. Unfortunately, if you're holding onto an older app version because you don't want to accept the update, it becomes a lot harder to keep the rest of your apps updated. ...more
Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scann ...more
I don't know of a pain greater than of the one felt after cracking the screen of your phone. After I managed to crack my screen, rendered unusable, I immediately began to panic as to how I was going to recover all of the photos, videos, and documents stored on my device. After ...more
Hey there I'm Lyfe Riley and I am here to show you how to make a really simple super food shake thats not only good for you, but can taste great!. Drinking this everyday will give you more energy, increase your metabolism, remove toxins from the body, and boost your immune sys ...more
An average user's smartphone tinkering doesn't go much further than taking their phones out of the box, signing into their account, and installing apps. But some of us want more functionality and customizability than the basic experience provided by Android and iOS. Thankfull ...more
For some Android users, this guide is sacrilege — but for others, iOS is just an attractive operating system that can be admired without feeling like you've betrayed your own phone. If you're one of those Galaxy Note 9 owners that have peeked across the aisle and desired an in ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
The Google Play Store exists so you can download as many apps as your heart desires (and as your memory can hold). Sure, you may only use them once, but it's your choice—and isn't that what life is really about? With that said, the Samsung Galaxy Note 2 already comes with a to ...more
Android's Quick Settings menu is quite handy—just swipe down with two fingers from the top of your screen and you're ready to toggle several different system settings on or off. It got even better with Android 6.0 Marshmallow, since you can even use the hidden System UI Tuner ...more
If left unattended, a hacker with a USB Rubber Ducky and physical access to the computer can infiltrate even the most secure computer. Such attacks often go undetected without the use of a tool like USBRip, which can provide you with assurance that your device hasn't been comp ...more
Containers are isolated software instances representing applications, servers, and even operating systems—complete with all of their dependencies, libraries configuration files, etc.—and they're taking over the corporate world. The ephemeral, portable nature of containers help ...more
I'm not admitting to anything, but let's be honest, most of us download content on the Web from time to time. With copyright holders laying down the law more and more often, it can't hurt to do so with caution. And even if you aren't downloading copyrighted material, you still ...more
Water makes up about 60% of your body weight. Whether you like it plain, flavored, bubbly, or in beverages or food, we all need water daily to avoid dehydration and stay healthy. For communities in need of clean drinking water, new research using bacteria may offer a simplifie ...more
With every new Android update, hidden features are lurking under the surface. Google hides these options to prevent unnecessary tinkering by average users, leaving them in place for power users to discover. These secrets range from silly to really useful, with the latter openi ...more