Gadget Hacks How-Tos

How To: Do some basic soldering for electronic equipment

Need a little help soldering? If you can't quite figure out how to solder for your electronics and wires, maybe it's time you took a soldering 101 class. Well, no need to pay any expensive tuition, just watch this video tutorial to see how to do some basic soldering for electronic equipment or whatever you need it for. It's as simple as getting some solder and a soldering gun. The rest comes naturally, believe me. This explanation is more that enough to get your started in the world of solder.

How To: Make a cheap iPod wall charger

If you would like an iPod wall charger, but don't want to spend all of that money at Apple, just watch this video tutorial to see how to make a cheap iPod wall charger with just an old cell phone charger and a USB extension. There's no need to spend a bunch of money, just use the junk that's lying around your home. Electrical tape always comes in handy too, so remember that. Scissors, too.

How To: Jailbreak an iPhone with PwnageTool 2.0.1

This video tutorial will show you how to use the Dev Team PwnageTool 2.0.1 to Jailbreak and unlock the orignal iPhone with 2.0 software update. This is also how to jail break the iPhone 3G on Mac and Windows. It can't get any easier than watching this easy to follow video. Jailbreaking is easy... and worth it.

How To: Illuminate a regular computer keyboard

Light up your keyboard with this illuminating tutorial from Make Magazine's Kipkay. To get started on this hack, which should take roughly a half an hour and cost no more than $5, you'll need the following: (1) a regular computer keyboard (most any model will do), (2) a screwdriver, (3) a drill, (4) telephone wire, (5) heat shrink tubing, and (6) two 5 mm high-brightness, white LEDs. For comprehensive, step-by-step instructions on building your own light-up keyboard, simply watch this hacker'...

How To: Jailbreak 2.0.2 the iPhone or iPod Touch

Check out this video tutorial to see how to jailbreak 2.0.2 the iPhone or iPod Touch. We all know about Jailbreaking, so get your Apple iPhone or iPod Touch in sync with the rest of the world... hack it. Nobody like a party pooper, so jailbreak it just like everyone else. Seriously, don't miss out on this awesome experience.

How To: Strip insulated copper wire for electronics

This video tutorial explains how to strip insulated wire the right way. You'll learn how to adjust your wire strippers to make the process easier. Some people don't even use wire strippers, they use a knife or maybe even their teeth, but this causes nicks in the copper. To get the insulation off with ease and without gouges in the copper wire, use the proper sized wire strippers and adjust them right to fit the gauge of your wire. It's as simple as that. You don't need to go to vocational sch...

How To: Make LED and basic sink tube lightsabers

Have you become a Jedi in your Star Wars delusional mind? If so, break out of the the asylum with a Jedi lightsaber. Oh, but you don't have a lightsaber yet, okay. Well, this video tutorial will show you how to make a very inexpensive LED light saber with the most basic parts you could find. Novastar will shares his Jedi wisdom on LED light sabers, so pay attention, or you could never get out of that loony bin.

How To: Stream webcam live video on a WebStarts website

WebStarts.com is a free website creation and hosting interface with a powerful drag-and-drop design interface. In this video tutorial, you'll learn how to add streaming video to your WebStarts website. For more information, and to get streaming live video from your own WebStarts site, watch this web design video tutorial.

How To: Sign up for Blogger account

logger is a free blog publishing tool from Google for easily sharing your thoughts with the world. Blogger makes it simple to post text, photos and video onto your personal or team blog. This video tutorial will walk you through the Blogger signup process. For more information, and to get started creating your own blog, watch this video guide.

How To: Secure your website with AccessDiver

AccessDiver is a website security scanner. It incorporates a set of powerful features that will help you to find and organize vulnerabilities and weaknesses in your own site. This video tutorial presents a guide to its use. For more information, as well as to get started using AccessDiver for yourself, watch this video tutorial.

How To: Use the LastPass Password Manager

LastPass is a free password manager and form filler that makes your web browsing easier and more secure. This video tutorial presents a basic introduction, demonstrating the basics of using the LastPass Password Manager. Learn how to use LastPass with this how-to.

How To: Download pictures from Orkut

Downloading pictures from Orkut, Google's social networking site, is simple and can be accomplished in five steps. First, log into Orkut. Second, open the image you want to save. Third, drag the image to your web browsers address bar. Fourth, right click and select Save Picture As. Voilà. There's nothing to it. Save pictures from Orkut with this video tutorial.

How To: Hack with Hacme Shipping

Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...

How To: Make a website a search engine sponge

With the advent of Web 2.0 sites and tools, building your own small business marketing website has never been easier. This video SEO tutorial demonstrates a WordPress plugin called SEO Friendly Images. Once installed, all the images on your blog are automatically optimized to be gulped up by search engines. For more, and to get started using SEO Friendly Images for yourself, watch this helpful video guide.

How To: Organize a Web site for Google search

This video tutorial explains how to structure your web site the right way using content silos. But what's a content solo, you ask? Watch this video SEO tutorial to find out. Make structural improvements to your website such that Google has an easier time isolating your keywords with this how-to.

How To: Hack with NetBus 1.7

NetBus—Swedish for NetPrank—is a Trojan horse application that will allow you to remotely control any Windows system that runs it (provided that system is not running anti-virus software). For more information, and to get started using the NetBus hacking tool for yourself, watch this video guide.

How To: Fancify your MySpace profile with div overlays

CSS div layers permit you to abandon the traditional MySpace layout by covering it up with a blank slate. Then you can create virtually anything you want to. You can add images, tables, Flash documents—most anything you can think of. For more information, and to get started using CSS div layers on your own MySpace profile, watch this helpful video guide.

How To: Hack VOIP sessions with Cain

Jared of the TechCentric crew gives you the lowdown on the basics of keeping your VoIP conversations secure and, on the other side of things, how to use the Cain VoIP sniffing application. For detailed instructions on keeping your VoIP conversations private, watch this hacking how-to.

How To: Protect your site from hacker attacks with Google

They are after you from all over the globe. Looking for ways to exploit you. Ways to hurt you. Not political terrorists, but rather "info terrorists." Each month thousands of websites get hacked into and have hidden links inserted into the pages by people wanting their spam sites to rank highly in the search engines.

How To: Keep email private with MixMaster

Email is one of the least private and least secure forms of communication, although few people realize this. MixMaster is one way to allow secure, anonymous communication even over the very public medium of email. This tutorial will get you started with MixMaster quickly and easily.

How To: Hack web browsers with BeEF

This video tutorial talks about browser exploitation. Particularly, it talks about tools, like BeEF, that can be used to hack known vulnerabilities within browsers and some cool frameworks that you can use to check the security of your own browser. To get started hacking your own browser, watch this how-to.

How To: Use the ActiveX Opt-In feature in Internet Explorer 7

Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Microsoft Internet Explorer 7 has several new features that make using the web easier and safer than ev...

How To: Use the protected browsing mode in Internet Explorer 7

Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Microsoft Internet Explorer 7 has several new features that make using the web easier and safer than ev...

How To: Use the Internet Explorer 7 phishing filter

Check out this video tutorial to learn more about the Phishing Filter on Internet Explorer 7. Web browsers such as Microsoft's Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Inter...

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

How To: Utilize Scrum in Axosoft OnTime 2008

OnTime is such a flexible tool and it can be used in a variety of ways, with completely different methodologies. One of the methodologies that works well with OnTime is Scrum. This week we walk through a quick demonstration of setting up a new OnTime database for use with a Scrum methodology.

How To: Use the history and audit trails in Axosoft OnTime

This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite focuses on how you can see the history of your defects, features, tasks, and incidents, as well as project wiki pages. For more information, as well as to get started using the history and audit trails features in Axosoft OnTime 2008, take a look.

How To: Use the import and export features in OnTime 2008

Importing and exporting are pretty easy in OnTime, but there are always questions that come up regarding the process. This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite will help new users understand the basics of importing and exporting items across the OnTime 2008 system. Take a look (and be sure to stay tuned for parts two and three).

How To: Use Remote Server in Axosoft OnTime

Remote Server is a very handy tool for users wishing to utilize OnTime Windows and OnTime VS.Net without having direct access to SQL Server. This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite covers Remote Server in detail and how to set it up. Take a look.

How To: Use the User Dashboard in Axosoft OnTime 2008

The User Dashboard in OnTime is a great way to look at items across types and edit them. See how to view and search through data regardless of its type (Defect, Feature, Task, Incident) by taking advantage of the User Dashboard. For detailed instructions on using the dashboard, watch this installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite.

How To: Use color coding in Axosoft OnTime 2008

One great feature of OnTime 8.1 is the ability to add color schemes to the main grids of OnTime Windows and OnTime Web. This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite covers how to activate this functionality to allow color changes for items based on their Priority, Status, Severity, and Workflow.

How To: Use the Customer Portal feature in Axosoft OnTime 2008

OnTime 2008 Customer Portal enables you to invite customers and 3rd parties into the development conversation. Through controlled access they can submit bugs, feature requests and request help by intitiating their own support tickets. This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite will show you the power of Customer Portal.