Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast.
How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.
Mike Biggly shows us how to set up our home internet and networks. Part 1 of 20 - How to Set up your home internet and network.
In this video, we learn how to pull a compilation of computer pranks on a friend. The first trip is a mouse prank where you will open up the control panel and find the mouse settings. From here, you can switch the buttons from left to right and change the speeds of the mouse. Next, you can do network pranks by running cmd.exe as administrator. Then, go and see who is on the network and type in "msg /server:(ip address) and message". You can also do a ghost typing prank, which you will create ...
First click the explore button, this will open a fold in which you will click homegroup and the second computer in the network. By clicking on that you will see what is in the homegroup. For example clicking on the video icon shows you all the videos available. If you right click on the video you can choose to watch it, open it, send it to different places, drag it onto your computer or copy and paste it into another directory.
Ever wonder what those bars and lines on the LCD screen on your digital camera do? In this great tutorial, Ethan Wilding demonstrates how to read one of the most useful features on your camera: the histogram.
Today we learn how to brine pork and poultry with the Food Network. You only need to have salt and water to make your brine for your pork. First you need to grind up your salt into a fine powder, which will make dissolving easier. Now dissolve your salt into your water. Complete submersion is very important when soaking your meat. If you're soaking a turkey or a goose use a cooler for full submersion. Let it soak for ten hours. Now your cuts of meat will be more juicy and tasty.
The video is about how to change the IP address. MAC address is the unique identifier a site of the most network adapters. MAC address is used to determine what IP address the computer will have and one way to change the IP address is by changing the MAC address. The method is only applicable for the windows systems and for the MAC systems you need to look at the link provided. In Windows in the start menu, type cmd in the run/search box, which will launch the command window. Type ipconfig/al...
Facebook is one of the most popular social networking sites out there, so make sure you are being safe! Susan Kline shows you in her Facebook Essential Training series how to Restrict certain aspects of your profile. Login to Facebook and view your Privacy Settings. From there you can pick your About Me, Personal information, Wall Post, Photos and more and restrict showing it to people. You can pick everyone, certain friend lists, Networks, and even individualize it down to one person.
Do you long for a Polynesian vacation? Do you wanna go back to your little grass shack in Hawaii? Well, if you can't afford that, you can at least have a stylish "staycation" at home with your own homemade tike bar. You'll learn to build one in this Decor It Yourself video tutorial.
Save the trees! Have a few extra wire hangers hanging around? Make your own retro Christmas tree for your next holiday season out of old hangers, wiring, and shiny tinsel. With help from ThreadBanger's Decor It Yourself, your new Christmas tree will be done in no time, standing tall and eco-proud!
Have you ever heard of wet felting? Well, it's the oldest form of textile making and relatively easy to work, thanks to this tutorial by ThreadBanger. Learn how to create a classic-looking beret for this winter season. No sewing required!
ThreadBanger give us a great recipe to make a unisex bomber hat using just a flannel shirt, white faux fur, a measuring tape, the bomber hat pattern, a sewing machine, and two and a half hours of your creative time. Add pom-poms at the ears to give it extra flavor! Super cool look for both dudes and ladies.
This week Corinne shows us how-to make a classic back to school accessory that can be worn by both the guys and gals. This quick and easy tie is sharp, and will start the school year off right. Just follow along with the steps in this how-to video and you'll be on an honor roll.
The Great Zenovka and her lovely assistant show us how-to make a cowl neck halter top. Just get an old t-shirt, follow along with this how-to video, and you're ready to go in style.
To kick off T-shirt Madness week, Threadbanger forum member ArtCrazed shows us how-to make an adorable purse out of two old tees! Follow along with the steps in this how-to video and learn how to refurbish some old clothes into something new!
This week Megan Nicolay returns to show us how-to make a sexy halter with a plunging neckline from her new book, Beyond Fashion. So get out the old tees and get to cuttin'.
You wanted more summer lessons, you got em. This week learn how to take an old mens shirt and turn it into a rockin new rockabilly swim suit. Just follow along with the steps in this video and take your new stylish suit to the beach.
Weddings, and wedding dress especially, can be very expensive. This how-to sewing video shows how to customize and personalize an affordable option. This week, Rob and Corinne answer a viewer question and show us how-to make a $10 wedding dress out of tee-shirts.
In honor of Rob and Corinne's trip to Makerfaire, we visit Zoh Morrigan of Morrigan NYC for a lesson on how-to make spats. Steampunkin it up!
In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the Internet came to be, we can get into the really fun stuff—what the Internet looks like now! Well, that's not quite the network design I was talking about, but it does show what the Internet looked like back in 2007 befo...
If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!
This is a video tutorial in the Video Games category where you are going to learn how to how to connect to Xbox Live without buying a wireless adapter for the Xbox 360. By using only an Ethernet cable and computer you can get onto Xbox live. On your computer go to start > network > network & sharing center > manage network connections. When you have 2 connections; one to wireless and one to local area connection, select both and right click and click on bridge connections. Your computer now r...
In this clip, you'll learn how to find and connect to WiFi networks on a desktop or laptop computer running the MS Windows Vista operating system. For more information, including a complete demonstration of the process and detailed, step-by-step instructions, watch this home-computing how-to.
Not only can your T-Mobile G1 phone get Internet access by itself, you can also use it as a router or modem for your home wifi network. All you need is to download a single app from the market, install it, and you're ready to set up your home wifi network!
Go to Cydia and add a new source http://Cydia.xselize.com. Now search there for supreme preferences and install it.
This tutorial gives a start to finish explanation of how to make an Internet Wi-Fi router with Windows Vista. With real time computer screen video and narrative, it is easy to follow along at home.
Google G1 users, want to switch your phone network? In this video, learn how to unlock the Google G1 HTC Dream Phone. All you need to complete this tutorial is your phone and a SIM network unlock pin code.
Just because you are using Linux, doesn't mean you have to be cut off from file sharing with those using a regular Windows PC. In this tutorial, learn how to share files between Ubuntu and Windows using a Samba local network. Samba is simple to use and can be obtained through your Synaptic package manager.
The video shows you how to connect the Nintendo Wii to an available wireless network. First, you have to turn the Wii on. When the menu screen appears, you then click on the "Wii button" in the bottom-left corner. Next, go to "Wii Settings". On the following screen, you have to use the blue arrow on the right to go to the second page of options and select "Internet". Go to "Connection Settings" and click on an "Open Connection". From here, go to "Select Wireless Connection" and then "Search f...
Take one end of the Ethernet cable and plug it in the back of the XBox, the other end of the cable you have to plug on your computer. On your computer go to Start and then go to My Network Places, now select View Network Connections. Right-click the Wireless Network Connection, and go to Properties. Select Advanced tab on top of the window and make sure the two boxes are checked, press OK to continue. Now turn on your XBox and go to Test XBox Live. Wait until the test ends and then you will b...
This video tutorial from tarunkumarsinghal shows how to change Mac address on Windows XP. Click Start menu and then Control Panel. Make sure control panel window is in classic view mode. If not, change it to classic from the left pane.
5G is undoubtedly the future of mobile networks, and there's a good chance your next phone will have it. But just like with 4G, as carriers race to get the best 5G coverage, the ones running behind are abusing marketing terms to make themselves seem further ahead than they actually are.
When learning Wi-Fi hacking, picking a compatible Wi-Fi network adapter is the first step to learning to crack Wi-Fi passwords.
Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your system. To prevent that, Sniffglue sandboxes packet sniffing to provide an extra layer of security.
Public Wi-Fi networks that have a captive portal sign-in screen can sometimes be broken on Android. This seems to happen randomly and on some devices more than others. You'll get the "Sign into Wi-Fi network" notification, but it just doesn't work. If that's happening to you, you'll be glad to know an app can help fix the issue.
Giving up your Wi-Fi password can be giving up more control than you think. Because of the way Chromecast and other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we can hijack a Chromecast to play nearly any kind of media with a single command in terminal.
The new iPhone XS and XS Max have more issues than just their hefty price tags. Customers have only had the phones for a handful of days, but some are already complaining of cellular and Wi-Fi connectivity issues on both models. If your experience is the same on your XS or XS Max, there are steps you can take to get your iPhone reliably back online.
The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.
As Android bug bounty hunters and penetration testers, we need a properly configured environment to work in when testing exploits and looking for vulnerabilities. This could mean a virtual Android operating system or a dedicated network for capturing requests and performing man-in-the-middle attacks.