Hot Gadget Hacks How-Tos

How To: Zap and revive old NiCad batteries with a mig welder

Nicad batteries often die in such a way that they won't take a charge and have zero voltage. This usually means they're shorted out by crystal dendrite growth. Here's a method of bringing them back to life by zapping those shorted crystal dendrites away with too much current and/or voltage. We'll use a welder as a power source. You could also use a car battery, a DC powersupply, or almost anything with some voltage. Charged-up capacitors are popular for this because you can get a very fast pu...

How To: Make a 200mw burning laser

Don't use a perfectly good DVD burner to get your laser that will pop balloons, light matches, and burn stuff. Just buy a laser diode at mfgcn.com and also a laser housing, and you won't be tearing a computer DVD player apart. This is the easy way to make a 200mW burning DVD laser. Use a Mini Maglite and some rechargeable batteries so you don't burn out the laser.

How To: Make a laundry detergent lamp

A nifty step-by-step guide to making your very own laundry detergent lamp. Upcycle that recyclable detergent bottle and gain a swell lighting fixture for your home! This involves some basic circuitry and wiring of a cheap lamp fixture. You use the laundry detergent bottle as the base of the lamp. It's a bit arts & crafts project and a bit conservation! Help our mother nature with this nifty at-home craft decoration project!

How To: Import Excel to a MySQL database with cPanel

This data management tutorial shows you how to take a Microsoft Excel Spreadsheet and import it into a MySQL Database using CSV files and PHPMyAdmin in cPanel. Being able to move data from Excel to MySQL is an important part of database content management, so if you use cPanel to manage your databases, you'll want to watch and learn how to import Excel spreadsheets into your MysQL databases.

How To: Upload Moodle to your server via Webmin

Interested in teaching an online course using your own server but can't quite figure out how to install everything you'll need? This video demonstrates how to install Moodle, the free, open source course management utility, to your server via the Webmin interface. For step-by-step instructions, take a look.

How To: Hack a WiFi USB Adapter for Better Reception

This video tutorial demonstrates a simple hack for improving the WiFi reception of a USB adapter. To replicate this hack yourself, you'll need the following materials: (1) a WiFi USB adapter, (2) a USB extension cable, (3) a metal strainer, and (4) a pair of scissors. For detailed, step-by-step instructions on improving your WiFi adapter's signal levels, watch this how-to video.

How To: Build a laser motion sensor mouse trap

Mice, cute as they may be, are an unwelcome visitor in many a home. This video tutorial provides step by step instructions on how to hack a wireless electronic laser mouse trap from an automatic garage door opener and a computer mouse. Find out where those little pests are going. Watch this video tutorial and learn how to build a laser motion detector mouse trap.

How To: Make a clock projector

Time flies. Particularly when it's projected. The magical box in this how-to uses light and mirrors to project the image of a working clock face on any wall. To build your own working clock projector, you'll need the following materials: a mirror, a jeweler's loupe, a clock and a flashlight. For detailed, step-by-step instructions on the assembly process, and to get started on this Daliesque hack yourself, take a look!

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Hack MD5 passwords

This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionary word and if that does not work, every possible letter/number/symbol combination. The programs used to crack the passwords are Cain and MDCrack-NG.

How To: Avoid phishing attempts

See what phishing (attempts to steal your online information with fraudulent email and webpages) is all about and read the tips on how to avoid becoming the next victim. In this example a HSBC bank phishing attempt is displayed.

How To: Type capital letters on your iPhone

If you can customize your ringtones, you should know how to use capital letters! It’s so simple and easy, and in this video you will learn how to capitalize important names and proper nouns. Watch these two quick steps to successfully capitalize letters on your iPhone. Grammar never looked so good. Type capital letters on your iPhone.

How To: Take apart an Etch a Sketch

Before I built the mechanics for my laser cutter I was planning on using the etch a sketch since the pulleys where already there. I accidentally cut the wires while taking it apart, so I made it from scratch (much bigger too). But I figured I'd post this in case you want a small laser cutter and need to learn how to take apart an etch a sketch. It was a bit tricky. The tought part was trying to take off the case. What you need to do is to pry the red off of the black, not the other way around.

How To: Eavesdrop on a Bluetooth headset

Few Bluetooth users realize that Bluetooth headsets can be hacked or otherwise exploited to a remote attacker the ability to record and inject audio through the headset while the device is not in an active call. SANS Institute author and senior instructor Joshua Wright demonstrates, and explains, the security vulnerability in this how-to. For more information, including step-by-step instructions on how you can replicate this hack yourself, take a look.