In this video the instructor shows how to use the Auto play feature in Windows 7. Auto play is an old feature which was also available in Windows XP and Windows Vista. When you insert any removable media into your computer like a CD, DVD or a USB thumb drive, Windows automatic ...more
This video, created by ClearTechInfo, shows you how to easily install fonts in Windows. The tutorial refers to Windows XP and Windows Vista. First thing you have to do is download a font. Usually, you can find license-based fonts or free fonts on Google or any other searching ...more
Decided you want to leapfrog Vista and upgrade from Microsoft Windows XP directly to Windows 7? It's easy! So easy, in fact, that this free home computing how-to can present a complete (and somewhat talky) overview of the process in about six minutes' time. For specifics, and ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
If you have not used your eRecovery system in a long time and have forgotten the password, have no fear. This video is here to help you retrieve your details and use your program again. In this clip, learn how to recover any lost passwords with Acer's eRecovery Manager for Lin ...more
In this clip, you'll learn how to set up and configure a dual-monitor desktop on a Microsoft Windows Vista or 7 PC. For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started using this trick yourself, take a look.
This video explains how you can watch YouTube movies and videos on your iPod. First of all you need to open your web browser and do a search for Realplayer (in this case Realplayer version 11). Next, click on the link for Realplayer. You will need to download and run the insta ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
Previously, we talked about how to secure Firefox. Today, we will talk about securing a Chromium based Browser. Why? Because Chrome recently beat Firefox in holding more customers. It is obvious that Google Chrome tracks our every move online, so what alternatives is out ther ...more
If you're fond of dual booting your computer, there are two ways to restore the master boot record on vista.
Watching this video will allow you to learn the complete step-by-step process of uninstalling a dual-boot partition of Linux on a Windows Vista machine. The author will first walk you through uninstalling GRUB, the boot manager used while the partition with Linux was still bei ...more
Clearinfo.com helps us how to change the keyboard and mouse settings in windows operating system. The video actually shows us the tutorial in windows vista but this can be applied also in windows xp. First go to Start button then click on control panel and on the Control panel ...more
More Speed without buying expensive hardware. Windows Vista was never the step up in performance that people hoped for after XP. In fact a lot of people preferred the old XP or Linux until windows 7 arrived. Nevertheless there are a few things you can do to make your Vista OS ...more
The "Run" command in Windows XP was a super handy tool for those above-average PC users, those who know all the shortcuts to navigating the system. But Windows Vista automatically removed the "Run" option from the start menu, and replace by "Search" instead. But don't worry, i ...more
This video will show you how to find your own IP address in Windows Vista, which is more difficult and confusing to use than Windows XP was. First, you should go down to the bottom right hand corner and find an icon of two computers, which is your network connection button. Cl ...more
This video describes basics about using Wubi installer for Ubuntu in Windows operating system.Wubi installer is usually used for Ubuntu family distribution installations.You can download Wubi installer from the Internet and then it will install all desired distribution automat ...more
Connecting your new smartphone gadget to your desktop isn't just connecting these products with a USB cord. It is important to sync them to allow the transfer of data from your smartphone to your computer and vice-versa. This is desired if you wish to transfer information incl ...more
This video walks you through how to jailbreak an iPhone 3GS using a Windows operating system. Warning: This tutorial only covers the 3.0 iPhone firmware on the iPhone 3GS. If you are using a different version of the iPhone or a different firmware version, this video is not for ...more
Add speed and power to your computer by adding more memory. You Will Need * Your computer's owner manual * An anti-static wrist band * A screwdriver * The right RAM for your computer WARNING: Working with electricity is dangerous. Be extremely careful and, if you have any dou ...more
Hey, would you like to be as cool as this: You wish! But you could do the next best thing, and that's capturing your earth shattering game play with the Easycap DC60. Originally retailing for forty dollars, you can buy this at Amazon for $8.50. This device will capture video ...more
A Tutorial: Ubuntu Linux is a completely free open-source operating system that has many useful features and abilities, and this guide will show you how to try this new OS without harming your Windows system, and it only takes five minutes to learn! This guide will show you ho ...more
The thenewboston shows you some short tips on how you can speed up your computer. He is using the Windows Vista Operating System for the demonstrating. He says he believes it should also work with Windows XP. The first thing that he says to do is go to your start panel and the ...more
It's easy to restore lost browser bookmarks from a backup copy. Here are step-by-step instructions for Internet Explorer and Firefox. Step 1: Open Wizard Click on Internet Explorer’s “Add to Favorites” button. Select “Import and Export” from the drop-down menu. Step 2: Impor ...more
Hello everyone, I am Brandon Hopkins from TechHut and I am going to be showing you how to install Minecraft Texture Packs on Windows, Linux, and Mac. I will also link you to one of the best Texture Pack I have used and a website where you can download 100+ different texture pa ...more
Do much more with your PSP than just play games. This video will show how to load Windows Vista onto your PSP from your home computer. This will enable you to surf the net from your hand held device. Install Windows XP on a PSP. Click through to watch this video on tricklife.com
This video tutorial will show you how to hack your Windows Admin Password. There is no need to download anything to bypass the Windows Administrator Password. This is a real hack for Windows XP users, a hack for when you lose your Admin Password and need to bypass it to get t ...more
This is a video tutorial in the Software category where you are going to learn how to revert to the Fixedsys font using mIRC. Click on the channel icon and select font. Here you can select the font and the size and then click OK. If you have Windows XP or older version of Wind ...more
How to find out information / details about your computer? To find out the information about your computer, you need to download software from the website PC World. The following are the steps to download the software: •First open the site www.pcworld.com. •Now click on downl ...more
Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, ev ...more
There are many video formats and video players out in this world today; and just the same, there are many video converters that allow you to convert your videos to just about any format imaginable. But as you might have already found out, these converters take hours to convert ...more
Check out this video iPhone tutorial and learn how to enable MMS pciture messaging on your 3G/GS. Windows XP/Vista 32 Bit Tutorial Download this file. Close iTunes and Unplug iPhone. Go to Start Menu and click RUN. Then type in CMD and click ok. After that type in or copy/pas ...more
There are several virtual machine managers present in the market. However, the main functionality of all VMs are the same. Most people like to get free VM managers, so that they can install as many operating systems as they like over the host operating systems. One of these fr ...more
If you play 3D Pinball on your Windows operating system, then you might be happy to know this hack. This pinball game, officially called 3D Pinball for Windows: Space Cadet, was available on Microsoft Plus! 95, and everything up to Windows XP. It was dropped from Vista. By us ...more
You don’t have to be satisfied with the graphics that are on your computer. There are great graphics out there and with a little time and a screwdriver you can install killer graphics on your very own computer. Step 1: Uninstall old software Uninstall the old graphics card’s ...more
This is a quick tutorial on how to create a new administrator account on a Windows computer. Step 1: Open CMD Prompt... On Windows XP, click the Start button, then open up Run..., and type in "cmd" and click OK. On Windows Vista or Windows 7, click Start, search for "cmd" a ...more
Ok first thing first, you need to download the HackPack. In there is necessary things I use in the video. If you are on XP you must install .net frame work. ( the dotnxfx file) vista users don't have too. Link include: http://www.mediafire.com/?mddzxxf12nl http://www.sendspa ...more
Welcome back, my hacker apprentices! Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on. In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are ess ...more
Welcome back, my amateur hackers! Many of you here are new to hacking. If so, I strongly recommend that each of you set up a "laboratory" to practice your hacks. Just like any discipline, you need to practice, practice, and practice some more before you take it out to the rea ...more
By using this trick, you can make your computer to welcomes you in computerized voice.You can make your computer to say: Welcome Username, Hello Dear, etc Make Windows Greet you with a Custom Voice Message at Startup To use this trick, follow the instructions given below:- S ...more
When you share a computer with other people, privacy can be a complicated matter. Even if you trust the other users, there are some things that you don't want anyone else having access to. Sure, you can encrypt everything, but what happens when someone needs to use the compute ...more
If you're one of the people who make up the nearly 24% of Internet users on Internet Explorer, now is a good time to click on 'Check for updates.' Researchers have found yet another Metasploit Zero-Day exploit that leaves IE 7, 8, and 9 vulnerable for Windows users. Brought to ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
A lot of computers come with a ton of pre-installed software from the manufacturer, some of which you need and some of which you could most certainly live without. And over time, you may have downloaded and installed a bunch of programs and apps that you probably can't even re ...more
Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic ana ...more
Last week, we showed you how to bring the classic start menu to Windows 8. Now, we're going to show you how to bring the new Metro start menu to older Windows versions! WinMetro Thanks to IObit's new WinMetro application, you can now bring the Metro UI to older versions of Wi ...more
Hello everyone! I'm glad to post my first tutorial and hope you will appreciate it. I'm a beginner in hacking so I don't have a lot of stuff to teach you, but maybe this tuto would help some of you. And sorry for my limited English... I do my best. In this tutorial I will sh ...more
I know what you're thinking—taking a screenshot is super simple. While that is partly true, taking of a screenshot of the Start Screen in Windows 8 is little bit tricky, unless you're on your Surface. The new Windows 8 works in two different realms; the normal desktop mode th ...more
All of my hacks up to this point have been operating system hacks. In other words, we have exploited a vulnerability usually in an operating system service (SMB, RPC, etc.) that all allow us to install a command shell or other code in the target system. As I have mentioned nu ...more
Windows 95, which introduced the Start menu to the world, recently celebrated its 20th birthday! The feature was an instant hit, becoming a core component of Windows operating systems. Well, it was removed in the mistake that was Windows 8, but you should know by now that the ...more
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side sy ...more
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client. Although the most valuable information to the hacker ...more
Welcome back, my nascent hackers! Earlier, I wrote a guide on finding operating system and application vulnerabilities in Microsoft's own security bulletins/vulnerability database. In this tutorial, I will demonstrate another invaluable resource for finding vulnerabilities an ...more
In my first few articles, we focused on operating system hacks. These hacks have been primarily on older operating systems such as Windows XP, Windows Vista, and Windows Server 2003. Although these operating systems were first released, in some cases, almost 10 years ago, the ...more
Who am I? First let me introduce myself. I am Th3skYf0x, an -well lets call it experienced- hacker and i recently found this site and right after that i found this Null Byte "world" soo i thought... Why not teaching instead of doing nothing with my knowledge. Let me get one ...more
These days, we increasingly have more and more devices in our everyday possession. While a notebook computer, a tablet, and a smartphone may seem like overkill, they do work to make our lives easier and even help reduce clutter in certain ways. A single one of these devices c ...more
Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data. The ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
The Shadow Brokers, a hacker group known for its dump of NSA hacking tools in 2016, has just leaked their remaining set of data which implies that the NSA compromised SWIFT, the global provider of secure financial services, to spy on banks in the Middle East. The hackers have ...more
Welcome back, my fledgling hackers! If you're like most aspiring hackers, at one time or another you've probably spent too much time playing Call of Duty and not enough time preparing for your final exams. So for today, we'll look at how to break into your school's server to ...more