The PlayStation 3 is a sweet gaming system, and even though Blu-ray discs didn't really live up to all the hype and there is still no HBO GO app available, I love my PS3. One of the coolest things about it is that you can customize it to look however you want. One of the most ...more
This video shows you how to make a fake "virus" that shuts down the computer of your victim when they open it. This video also shows you how to email or AIM this prank virus to a friend. If you need clear-cut instructions on performing this computer prank, then this is the vi ...more
If you've ever needed to prove you have remote access to a device, or simply want a way to convince someone their computer is haunted, SSH can be used to make a device begin to show signs of being possessed. Spooky Action at a Distance If you need to prove you've got remote ...more
If you buy an Android phone from any of the big US carriers, it will come with several extra apps in addition to any apps the manufacturer preinstalled. It's all in the name of profit, of course. Some of these apps are from companies that paid the carriers to distribute their ...more
NFC, or near-field communications, is a hardware feature that has been built into most Android phones for the last four years. It's essentially a low-power data connection that can be used to initiate a quick command by bringing your device within range of a compatible receive ...more
Want to be able to hack into a computer remotely? This method takes a little extra time and cunning to set up, since you will need to first install the ShowMyPc program on your target computer. Once you have installed this program, however, you will be able to go to the websit ...more
Gary Rosenzweig from MacMost looks at how you can sync your iPod or iPhone to multiple computers using manual settings.
In this video, we learn how to take apart a computer's keyboard & clean it. First, turn the keyboard upside down and remove the screws from the side with a screwdriver. After this, flip it back over and remove the keys from the top. Put the keys into a bowl of soap and water a ...more
Hangouts and WhatsApp might be the preferred messaging apps for Android, but it's only a matter of time before Facebook Messenger surpasses them. Messenger already dominates iOS devices, and thanks to its ubiquitous platform, messages are easily synced across all of your devi ...more
Since most devices these days are mobile and wireless, a lot of people have a bunch of old hardware from a decade or two ago sitting around unused, just wasting away in dusty boxes. Look familiar? If you have an old mouse (or several) lying around, you can turn it into a wire ...more
Have a PC but hate Windows? Maybe you've just heard a ton about the new Mountain Lion OS X and want to see if it lives up to expectations. Either way, you can install Mountain Lion on your Intel-based PC in a few easy steps. All you need is a copy of the OS X and an 8 GB USB f ...more
Want to watch movies from your computer on a TV? What about just using your television as another monitor? Find out how to connect you TV to your computer and convert it into a monitor.
In an attempt to remain a mobile-exclusive app, Instagram doesn't let users upload photos or videos from their computer. On the Instagram web app, you can pretty much only like and comment on items in your feed, but what about all of those photos on your computer that scream # ...more
Got a dirty desktop computer or laptop screen? Mix together a solution of equal parts white vinegar and purified water and place solution in a spray bottle. Spray a clean cotton rag with the solution and gently wipe the screen for simple, streak-free cleaning. For a quick clea ...more
With Geohot's Towelroot allowing us to root our Nexus devices in under a minute without ever leaving Android, many of you are probably enjoying all of the Gadget Hacks that root access has unlocked. But some tweaks, such as interface themes and Custom ROMs, come in the form o ...more
No matter your reason, if you want to hide what's on your computer screen from prying eyes, there are plenty of ways to do it. You can get a privacy filter, install a panic button for your browser, or just develop super fast reflexes. But all it takes is the right angle or a t ...more
Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, ev ...more
The USB Rubber Ducky is a well-known hacking device in the cybersecurity industry, but it needs to be preprogrammed before it can be used. That means it's not easy to issue commands to a target computer since you can't interact with it from afar after plugging it in. And if yo ...more
Digimon World 3, also known sometimes as Digimon World 2003 is a role-playing game created for PlayStation. Learn how to play DIgimon 3 on your computer, playing the role of Junior inside the world of Digimon Online. In this video, learn how to get this beloved video game on y ...more
The first thing I do when I get a new phone is ditch the USB cable. At least, when it comes to data transfer. My brand new HTC One came with a USB cord that feels sturdy, but like any other cable, it will eventually fall apart from overuse. It will probably still charge just f ...more
Comic books are a great way to express yourself and you no longer need a pencil and paper to draw these books. In this three episode tutorial, learn how to use computer programs to draw professional style comics and share them online. This method of comic drawing is the new in ...more
I regularly use iTunes on my home laptop and my work desktop forty-five traffic minutes away. I'm ashamed to admit it, but until recently, I'd been saving my iTunes library on a USB and transferring it back and forth, over and over again, between the two computers. Well, this ...more
More and more car parts are controlled by computers, and the results are not always what we hope they will be. They often break for what seems like no reason and are expensive to fix. In this video you'll learn how you can fix a broken air conditioning control system on your c ...more
It's easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down to prevent such use. School, work, or library PCs can be secured with a BIOS password, which is often an easily recovered default ...more
This is a great tutorial on how to use Backtrack 2 to crack a local computer for access. You can either completely change the password or you can wipe it and restore the password so nobody knows you were there Part 1 of 3 - How to Crack local passwords for access to a computer ...more
With all of the advancements in the smartphone world, we can virtually use them for anything. You can use your smartphone as a mobile hotspot, an Xbox controller, a car locator, and a security camera. Heck, you can even turn it into a Swiss Army knife. And now you can even use ...more
Need some help figuring out how to use the Downloads folder on an Apple compute running Mac OS X? It's easy! So easy, in fact, that this home-computing how-to from the folks at MacMost can present a complete overview of the process in just over five minutes. For more informati ...more
Do you have the perfect spot in your house or office that you want to put your desk and you just can't find one that fits? Well, maybe it's time to build your own! In this video series Jon Olson will show you how to build a custom oak computer desk, right down to the sliding k ...more
An iPad can serve as a second screen for a Mac via Sidecar, available since iPadOS 13, but Apple isn't the only manufacturer to support such a feature. Samsung has had a similar tool since One UI 3.1 that lets you turn certain Samsung Galaxy tablets into second displays for yo ...more
This video shows how to hack the computer password for Vista. We can change the computer password without knowing the actual password. First go to Start menu. Type in the Search "cmd". Then right click on that folder and run as administrator. Then we get a pop up. Type in thei ...more
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
This video tutorial demonstrates a mouse-hacking simple prank sure to annoy any friend or colleague. To replicate this hack, you'll need a mouse and a musical key chain. The steps are roughly as follows: First, open up the mouse. Looking inside, find and remove the scroll whee ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
Use a torrent to download your favorite TV shows to your PC or Mac computer. You can also set up RSS feeds to get the newest episodes.
One of the biggest downsides to rooting is that it can be a pain to update every month with each new security patch. With other phones, you might have had to fully unroot the device, maybe flash a stock recovery, or potentially even flash all the factory images to get a new up ...more
Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB d ...more
In this video, learn how to send & receive text messages from your computer (Mac or PC) using your email. Is instructed in this video, you will need to find your cell phone service provider, which can be found by copy & pasting the following link: http://en.wikipedia.org/wiki ...more
Like insurance, it's always better to have a computer mouse and not need it than to need it and not have it. Honestly, I don't want to carry around a clunky mouse with my laptop, so I don't. I do something else, something more convenient. I use my Nexus 7. If you want to give ...more
The public leaks of NSA tools and information have led to the release of previously secret zero-day exploits such as EternalBlue, which was used in the notorious WannaCry ransomware attack. Despite multiple patches being released, many users have failed to update their systems ...more
There are many music programs beyond Audacity which you can download for free, and which will allow you to mix and edit your own music. This tutorial shows you where to get these programs, like ROC, Myna, FreeSound and FlashKit, and how to use them for your own projects.
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this shou ...more
This is one of the easiest and best computer pranks ever invented. It's simple to do, and works great. This prank causes all of the icons on the desktop to be unclickable, as well as the start bar. 1. At your desktop, close all windows if any are open, and press Print Screen/ ...more
You can actually build a burning red laster by assembling a few spare parts taken from old computers! This tutorial shows you what you'll need to look out for, and then how to build it. You'll probably need a diode, but that's likely the only thing to purchase!
Do you have to send someone a really long text message? Did you know that you can do so from your computer? Watch this video to find out how easy it is to send an SMS message to nearly any cell phone.
There is something reassuring about the calm competence of Tinkernut. This video will show you how to shut down your computer from anywhere, using a texting capable cell phone, Microsoft Outlook and a free account from kwiry.com. Remotely shut down a Windows PC with a cell ph ...more
Multiple methods can be used to update OnePlus phones, but if you're rooted with TWRP installed, you might want to try this one out for yourself. The update method outlined in this guide works like a charm while maintaining your root status after an OTA update. One of the best ...more
Computer viruses are terrifying. They are undetectable, dangerous, and operate constantly right under your nose. For the average computer user, there are only a few repair options. You could buy expensive antivirus software that causes more problems than it fixes, you can wipe ...more
This video demonstrates how to triple boot a computer, which includes Windows XP, Ubuntu, and Backtrack 2 all on one machine. Part 1 of 2 - How to Triple boot three operating systems on one computer. Part 2 of 2 - How to Triple boot three operating systems on one computer.
We're not always near our phone, so Pushbullet made it easy to get your phone's notifications straight to your computer, like calls and text messages. But with their latest update, you can also sync alerts with other Android devices using their new cross-device mirroring featu ...more
Bring harmony to your digital world by getting your iPhone and your computer to work together. Watch this video to get the scoop on RemoteMouse from Cydia, a hack that will turn your iPhone into a remote control for your computer.
In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice hacking. In this tutorial, we will put it all together, and learn how to actually hack our practice VM. This will provide some insight into the methodolo ...more
Roughly four years ago, Adobe decided to abandon development of the mobile version of their popular Flash Player browser plugin. Their excuse at the time was that this move would enable them to focus more on HTML5 development for mobile devices and allow them to put more effor ...more
If left unattended, a hacker with a USB Rubber Ducky and physical access to the computer can infiltrate even the most secure computer. Such attacks often go undetected without the use of a tool like USBRip, which can provide you with assurance that your device hasn't been comp ...more
Google recently announced the beta release of a developer tool called ARC Welder for Chrome, which allows developers to run and test their Android apps on any computer with the Chrome browser installed. Outside of developers, ARC Welder can be run by everyday users to bring A ...more
Ever need to text someone, but don't want to use up your texting limits? Or you want to text someone, but your phone doesn't have texting capabilities? As long as you're near a computer, this video has you covered. This easy to follow video takes you step by step through the ...more
Pretty much my only gripe with computer-side messaging clients like Mighty Text is that they don't allow you to send and receive messages shared through WhatsApp, the popular third-party messaging application, which was purchased earlier this year for $19 billion by Facebook. ...more
Welcome back, my neophyte hackers! In today's hack, we're going to have a bit of Halloween fun. Have you ever had a boss who made you miserable with his micro-management and nagging? Maybe you thought he unfairly fired your friend/colleague? Well, now here's your chance to ge ...more
In this video tutorial, viewers learn how to upload pictures from their cell phone to their computer. Begin by connecting the DCU60 USB cable to the cell phone and connect it to your computer/laptop. Then insert the software CD into the computer. Install the software, dependin ...more
While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and ...more
Every Apple computer running Mac OS X comes with a handy application called Terminal… MacBooks, MacBook Pros, Mac Pros, iMacs, etc. They all have Apple Terminal, and it can be found in your Utilities folder in Applications. Which means you can use it. Terminal is an emulator ...more