Hot Computers & Programming How-Tos
How To: Install memory in a Compaq Presario laptop
Learn how to upgrade your RAM memory for a typical laptop or notebook computer. In this example, we show you how to install memory in a Compaq Presario laptop. Upgrading your laptop memory is easy to do and an inexpensive way to improve the performance of your laptop.
How To: Install memory in an eMachines Desktop
Learn how to add memory (RAM) to a typical desktop computer. In this example, we show you how to install memory in a eMachines Desktop. Upgrading your desktop computer memory is easy to do and an inexpensive way to improve the performance of your desktop.
How To: Install memory in a laptop
Learn how to a install memory upgrade in your laptop computer. Simple to do instructions when upgrading your notebook with new RAM. This video tutorial is from EDGE Tech Corp.
How To: Improve wireless networking on Verizon's FiOS Router
Learn how to improve wireless networking on Verizon's FiOS Router. You'll see some easy tips on how to improve wireless networking with the MI424WR Verizon FiOS Router, by Actiontec.
How To: Change a wireless network name Verizon's FiOS Router
Learn how to change your wireless network name on Verizon's FiOS Router. You'll see the easy steps on how to change your wireless network name and / or password for your MI424WR Verizon FiOS Router, manufactured by Actiontec Electronics, Inc.
How To: Find a username and password on a Verizon FiOS Router
Learn how to determine username and password on a Verizon FiOS Router. You'll see the easy steps on how to find out or reset the user name and password of your Verizon FiOS Router by Actiontec.
How To: Setup basic port forwarding for a Verizon FiOS Router
This video explains how to set up port forwarding on the Verizon MI424WR router. See how to setup basic port forwarding for a Verizon FiOS Router.
How To: Configure advanced port forwarding on a MI424WR Router
This video will explain how to set up advanced port forwarding on the Verizon MI424WR router. See how to configure advanced port forwarding on a MI424WR Router.
How To: Setup the Verizon FiOS Router for multiplayer gaming
Learn how to setup the Verizon FiOS Router for multiplayer gaming. Most games and gaming consoles only require that UPnP (Universal Plug-n-Play) be turned on. The MI424WR Verizon FiOS Router that is manufactured by Actiontec ships with UPnP ON, as the default.
How To: Refill an ink cartridge
If you use your inkjet printer regularly, you’ve probably discovered that the cost of replacing the cartridges can quickly exceed that the printer itself. Refill the cartridges yourself to save some money.
How To: Convert MKV to M4V video format
This is a shot how to tutorial on how to convert those HD mkv files you download from the web to a m4v file format. This way you will be able to play those files natively in HD on your Microsoft XBOX 360 and AppleTV.
How To: Install your 2Wire Gateway for High-Speed Internet
Learn a little bit about technology with help from EMBARQ. Watch this how-to video tutorial on installing your 2Wire Gateway for EMBARQ High-Speed Internet. This will cover exactly how to install your EMBARQ 2Wire Gateway modem for Internet. This is the complete process step-by-step from box to connected online.
How To: Install your EMBARQ Modem for High-Speed Internet
Learn a little bit about technology with help from EMBARQ. Watch this how-to video tutorial on installing your EMBARQ 660 Modem. This will cover exactly how to install your EMBARQ Modem for EMBARQ High Speed Internet service. This is the complete process step-by-step from box to connected online.
How To: Connect to your 2Wire Gateway via wireless Internet
Learn a little bit about technology with help from EMBARQ. Watch this how-to video tutorial on configuring and connecting to your 2Wire Gateway via DSL wireless Internet instead of through an Ethernet cable. make sure to follow this whole process to get your High-Speed Internet up and running on your computer.
How To: Install DSL 2Wire Gateway filters on home phones
Learn a little bit about technology with help from EMBARQ. Watch this how-to video tutorial on installing DSL 2Wire Gateway filters on home phones. Make sure to repeat the install process for the Gateway filters for each telephone in your house that uses the same phone number as your High-Speed Internet.
How To: Enable the Vista Aero theme in Windows Server 2008
People are very opinionated about what version of Microsoft they like. Some people love the easy-to-use nature of classic Windows 2000 and stick with that, whereas others love the upgraded, super sleek Windows Vista version which has its faults but at least looks amazing.
How To: Install custom Windows 7 theme on to XP
Want to know how to get the Windows 7 theme for Windows XP. Customize your OS with this quick tutorial. Make your desktop look like the brand new Windows 7 by installing some themes onto your old XP.
How To: Protect your computer from snoops
Keep private info from prying eyes and earn some peace of mind when you safeguard your PC or Mac against nosy intruders. You will need several great passwords, virtual desktop software, snoopware blockers, a screen filter, a mirror, a healthy sense of paranoia, WPA encryption, and an understanding IT specialist.
How To: Fix a wet laptop
How were you supposed to know your computer can't swim? Isn't it called a laptop? You will need paper towels or lint-free cloth, cotton swabs, a towel, lots of luck, and professional help. Warning: liquids and electricity don't mix. Please make sure your hardware and all points of electrical contact are completely dry before plugging them in.
How To: Set your mouse cursor to leave a trail on screen
See how you can make your mouse cursor leave a trail behind it. First, go to "Start" and then "Control Panel". Then go to "Printers" and "Other Hardware" and then "Mouse". A new window should pop up and you should go click on the "Pointer Options" and then select the length of the trail you want your cursor to leave behind. It's easy to set your mouse cursor to leave a trail on your computer screen.
How To: Build your very own computer
See how to build your very own computer! Just watch this video tutorial, in 22 parts, on how to make a homemade computer from scratch! This is a very detailed how-to on creating your own computer tower.
How To: Clean Your Laptop Keyboard Completely
Is your keyboard on your laptop getting a bit sticky? Have years of sweaty fingers and bits of lunch found there way down between the keys? Is there moss growing out of there? Panic no more.
How To: Build a home theater PC computer
The Real HT Info Podcast assembles a computer that has all the cooling and noise considerations to make an admirable HTPC. If you've ever wanted to build your own computer, this is a good place to start.
How To: Customize general system info in Windows XP
Need to know how to customize your general system information? It's handy if you build or fix your own systems and want a way to brand them, or just to personalize your system. This is a great tutorial on customizing operating systems in XP by informationleak.net hacker Halla.
How To: Using dynamic DNS with no-ip.com
This covers using no-ip.com to set a dynamic domain name after you set up your own server. This makes the IP dynamic rather than static. It updates the domain name with your IP address so you don't have to. This is an informationleak.net video from Halla.
How To: Build an Android application for mobile devices
This video tutorial is about Android, and no it's not a robotic creature, it's a software platform and operating system form mobile phones and PDAs. The Android system is based on Linux and was developed by Google and the Open Handset Alliance. Code is managed in the Java language, but can be written in C also, although C is not officially supported. A lot of the new cell phone and other mobile devices will be running off of Android, so know how to use it.
How To: Hack an Oracle database
In this installment from the Unorthodox Hacking series of Internet security tutorials, you'll learn how to get a shell on an Oracle database. To see how to pop a shell from within Oracle or even perform a port scan from the database itself, watch this hacking how-to.
How To: Hack a Microsoft SQL Server
In this installment from the Unorthodox Hacking series of Internet security tutorials, you'll learn how to get a shell on a Microsoft SQL Server (or SQL Server Express.) See how easy it is to obtain a shell in a Microsoft SQL database with this how-to.
How To: Bypass RealVNC authentication
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any deskto...
How To: Hack a Virtual Host, or vhost, with PHP
This hacker's guide demonstrates a quick PHP script which may allow you to crawl through the operating system on your hosting provider. demonstrate the power of PHP on a Virtual Host, or vhost, if PHP is not correctly secured by your web hosting provider. For more information on this hack, watch this helpful video guide.
How To: Exploit Microsoft Windows in new and unusual ways
In this installment from the Unorthodox Hacking series of computer security videos, you will explore a few of the areas in Windows that most Sysadmins don’t even know exist. See how to become Local System through the Task Scheduler and abuse long filenames. Take a look at some of the features within Windows—registry—that many system administrators don't know exist with this hacking how-to.
How To: Hack Windows shares
In this installment from the Unorthodox Hacking series of computer security tutorials, you'll learn a number of methods for hacking Windows shares as well as means of mitigating those hacks. For detailed instructions on Windows shares, and what you can do with them, watch this helpful video guide.
How To: Crack a computer running a telnet daemon with Brutus
Brutus, first made available in 1998, is one of the fastest, most flexible remote brute-force password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000. In this video tutorial, you'll learn how to use Brutus to crack a Linux box a running telnet daemon. For more information, and to get started hacking with Brutus yourself, watch this video tutorial.
How To: Mod a 12-volt power adapter onto your PC case
In this case modding video tutorial, you'll learn how to install a cigarette lighter-style 12-volt accessory outlet into a PC case. Charge your cell phone and other accessories directly from your case with the hack outlined in this video. For detailed, step-by-step instructions, take a look!
How To: Completely erase a computer hard drive to remove all private data
Data thieves don't have to be programming wizards to get their hands on your personal information. They often find hard drives that contain financial and other sensitive data at flea markets, charity shops, the city dump—even on eBay. In this video tutorial, PC World explains how to completely erase sensitive data from old drives before recycling or discarding them. Wipe your old hard drives with this how-to.
How To: Use the Hacker Defender rootkit or HackDef
Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means, like launching a remote port scan agai...
How To: See who is connected to a computer with netstat
Want to see whether your PC is being accessed by hackers? Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.
How To: Detect hackers with netstat
Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.
How To: Hack with GNU Netcat
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
How To: Port scan with Nmap
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they a...