This video provides information on how a hacker can find an vulnerability on a remote computer and exploit it to gain remote access. Also, the video shows how a hacker can raise their privileges on the remote machine to administrator. Hack a computer for remote access.
Since I recently had this problem and fixed it, I might as well share the solution. This is actually REALLY simple to fix but will impact your cards' performance.
How To: Remove Empty Folders, Duplicate Files, Broken Shortcuts, and Old Bookmarks from Your Computer
Like a computer, your brain can store and process large amounts of information. It can remember names, solve math problems, and save tips that you might need at a later time.
To pay homage to the 30 year anniversary of Pac-Man, Google turned their home page into a fully playable version of the game. This video shows you a fun way to hack the game to earn a higher score when you play.
In this tutorial, we learn how to password protect any folder on your desktop in Windows. First, right click on your desktop, then go to "new", then "compressed zipped folder" and name it whatever you want. Next, put what you want inside of the folder. After you've done this, open the folder then go to "file" and then "add a password". Pick a password that you will remember and type it into the text box, after you do this, click on "ok". Now your folder will be password protected and you will...
In this how-to video, you will learn how to check your personal computer's RAM, processor speed, and operating system information on Windows XP. First, go to start and select my computer. From here, click view system information to open a new window. A screen will show you the information you need, such as the type of operating system you are running, the size and speed of the processor, and the amount of ram you have. Click okay to exit this window. This will be helpful for doing upgrades or...
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to create fake HD from low quality vids in Avidemux on Ubuntu.
Maybe your kids are using iPhone/iPad too much, as a parent, you want to know what they are having to deal with to help guide them through of that. Here is the tutorial on how you can parental control your kids on iPhone/iPad. You are able to monitor as well as take control of their devices. Kids’ activities on iPhone/iPad like SMS, chats, web browsing will be recorded and you can check them remotely with e-mail without getting access to the devices. OK, here comes the steps: Step 1:
One of the most annoying of the many annoying types of errors on Windows computers is when you computer won't recognize parts that have always been a part of it, like the drives or keyboard. If your computer has stopped recognizing your CD or DVD disc drive, watch this video. As long as the drive is still connected, the steps in this video should allow you to fix the problem and continue using your drive.
If you have owned a lot of hard drives, you probably have experienced the clicking of death that indicates that your hard drive is having serious problems. This video will explain why the click of death happens and show you some processes you can try to fix the problem yourself.
In this video tutorial, viewers learn how to turn off the system firewall without admin privileges. Begin by clicking on the Start menu and open he Run program. Type in "system.msc" and click OK. Scroll down the Services list and look for Windows Firewall. Double-click on it and under the General tab, click on Stop. Then click Apply and OK. This video will benefit those viewers who use a Windows computer and would like to turn off the firewall, even if they are not running the administrator a...
Bucky from The New Boston serves up this Python video tutorial on how to import modules into IDLE in Python. This is the program you use to write all of your Python code down. Fun with importing modules!
Apparently paper towel + Windex is a no-no when it comes to cleaning your computer or television's LCD screen. Apple's official guidelines for proper cleaning are as follows:
Allow for your community to grow and expand by adding in a private messaging system to your website. Even if you're not experienced with PHP or MySQL, this tutorial walks you through the process of setting up the messaging system.
Want to hack a LAN? Well, hacking local area networks is easier than you'd think. And by watching a few short videos, you can become a master hacker, something every techie wants to achieve. And what's the best way to hack a LAN? Ettercap, a password sniffing program.
In this video tutorial, viewers learn how to upgrade their graphic driver. This task is very fast, easy and simple to do. Begin by clicking on the Start menu. Then right-click on My Computer and select Properties. Now click on the Hardware tab and click on Device Manager under Manager. In the Device Manager window, select your graphic driver under Display adapters. Right-click on the driver and select Update Driver. Now follow through the instructions in the window and check for any updates. ...
If you've forgotten the password to one or more of the Windows XP accounts on your computer, take heart: This video tutorial will show you how to bypass, and then change, a Windows XP start-up password. For a detailed run through of this simple Windows log-in hack, watch this video how-to.
With OS X, you can use Automator to automate several functions. This nifty little how-to by macmost shows you how to sort files into sub-folders using Automator. You can use Automator to alter what happens when a file is added to a folder. In this example, new files added to a folder are then sorted into subfolders according to their type. You can add multiple actions to a folder and then determine which order they are used.
As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm sure you want to know how to protect against it. Well, here it is! In this article, you will find out what SQL Injection is, what you can do to protect against it, and additional recommendations that are easy to do and onl...
Need help figuring out how to get rid of a bad service or device driver that's stopping your Microsoft Windows PC from starting up? It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over five minutes. For more information, including detailed, step-by-step instructions, take a look.
This video tutorial belongs to the Computers & Programming category which is going to show you how to reformat your computer step by step. Go to BIOS by restarting your computer. Go to BOOT menu, select CD/DVD ROM and press f10 to save and exit. Now insert your operating system CD, don't let it run, restart your computer again and keep tapping f8. When the set up page is displayed, press 'enter' to set up Windows XP. Select your partition and press D to delete. Then press L to continue deleti...
Learn how to set up an Epson printer wirelessly when you bring your new printer home you will want to start by installing the software that came with the new printer. You can set up your printer to work without wires and it will print from all over the house. There are 3 ways to set up the printer including the Epson way, with cables, and WPS. To determine is you need to use WPS, which is more complex, check your router to see if it has a sticker on it that says Wi-Fi Protected Setup. If that...
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is downright scary. But Pete Warden and Alasdair Allan are making it fun with their iPhone Tracker application, which lets you map out everywhere you've been with your smartphone.
This quick fix is really easy and super useful. Every once in a while we all get a key on our keyboards that starts to act up. Whether the key is unresponsive, tempermental or just plain annoying you can fix it with this easy method.
This five-part series on C# programming covers many things. First, you learn how to save to the Microsoft SQL Server. Then, you'll learn how to retrieve that data. You'll also learn how to navigate the DataSet, edit SQL data, and delete data. If you have Microsoft Visual Studio and SQL Server, give this lesson a try.
In this video the instructor shows how to clone computers across the Local Area Network using BartPE and Selfimage. To do this first we will have an original computer. Now create the image of the hard drive of the computer and share it on the network drive. Now, using that image from the shared folder you can start the clones of other computers by overriding their hard drive using this image of the main hard drive. Using this technique you can clone multiple computers which are the exact dupl...
In this tutorial, we learn how to eject devices from the use of the terminal for Mac. First, go to the terminal of your computer where you will see a notepad sort of page. Next, type in "df" and then press return. You will now see a list displaying processes on your computer. On the bottom will be your public zoning device, which is your USB device. Next, type in "hdiutil eject -force (the code under "mounted on)- volumes-publiczone". This is not case sensitive, but don't forget or add in any...
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install 200+ screensavers on Ubuntu Linux.
This network security tutorial addresses how to create a Meterpreter reverse connecting executable. It can be ported to a U3 device for pentests. For detailed, step-by-step instructions on how to create Meterpreter executable, or .exe, files, watch this hacking how-to.
This video tutorial from shrederjoe shows how to easily extract .rar file's content using WinRar application.
Have you ever gone to websites and seen an entire URL address you have to copy and paste into your browser window? Is the thought of having such an inconvenience on your page making you wish there was a better way? Today is your lucky day because success is going to teach you step by step how to make a HTML hyperlink that user of your website can use to navigate to different portions of your website without the inconvenience of copying and pasting long dragged out links.
If you're new to the Visual Basic IDE, looking to brush up on your VB programming skills, or simply have a burning desire to code a simple calculator, this three-part video lesson is for you.
In this video tutorial, I'll show you how to remove the password from the log in screen on Linux Mint 17.2
Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.
This step-by-step tutorial will show you how to install Mac OS on Windows 7 on Virtual Box. Video: .
Is your SD memory card getting a little too full? Is it not working? Try reformatting it. It's the first and sometimes last step to troubleshooting card problems. So, if your SD card has become too cluttered, this guide will restore it to a like-new condition with a simple format.
If you've ever wiped your computer without having a proper backup of your operating system, or just wanted to cause some havoc online, chances are you've had to rely on Linux to help you out, specifically the Ubuntu distro.
In this video tutorial, viewers learn how to get a Windows 98 theme on Microsoft Windows 7. The Windows 98 themes need to be downloaded from the link in the video description. The Windows 98 themes are: Baseball, Jungle, Mystery and Travel. When opened, the background changes to the theme. The cursor and the icons on the desktop also changes to the theme. There are sound effects when the user maximizes and minimizes a window. This video will benefit those viewers who use a Windows 7 computer ...
In this video, Nub shows us how to delete a user account. First, you will click "start" then "control panel". Then click on "user accounts" and then "manage another account". You must be logged in as the administrator to do this. A new window will pop up once you click on this and you will see all the user accounts on your computer. Click on the user you want to delete and a menu will show up. Click the button that says "delete this account". A message will appear asking if you want to save t...
In this tutorial, we learn how to create a new Windows partition with GParted software. First, insert your boot CD into your computer, then turn your computer off and it will automatically boot. Next, hit enter to select the first option, then wait for the scan to complete. When done, select your type of keyboard, then hit enter. After this, select your language and then continue to wait for the boot to continue. Once loaded, you will see the main partition. To split this, select it and click...