Hacking Attempts Search Results

News: Make Pandora Battery for a Slim PSP

Do you want to hack your PS3? Are you tired of different videos sending you all over the place to find all of the necessary steps? Look no further. This three-part video offers detailed, step-by-step instructions for hacking your PSP, including making a Pandora's battery, a magic memory stick, and actually loading the custom stuff onto the PSP. Extend the life of your PSP in spite of its lack of software support!

How To: Open any cylindrical bike lock in 30 seconds or less

This hacking how-to video focuses on the art of lock picking in less than half a minute. It will teach you the mechanics of cylindrical lock so that you will be able to take advantage of the lock's poor design without any lockpick skills. Follow along with this hack tutorial to learn how to open any cylindrical bike lock in thirty seconds or less. Open any cylindrical bike lock in 30 seconds or less.

Deal Alert: Unlocked Nextbit Robin $100 Off for a Limited Time

The Nextbit Robin, the world's first cloud-oriented smartphone, is on sale at Amazon for $299 plus tax, a savings of $100. You'll have to act quick though, as the deal only runs through May 10th while supplies last. Nextbit Robin, an unlocked SIM phone, was just updated last week, and now runs Android Marshmallow 6.0.1. It also has a unique storage system, with 100 GB of cloud space, as well as 32 GB of built-in storage. You can snag it in midnight or mint colors. Amazon Prime members will al...

News: HTC to Make This Year's Nexus Devices

HTC is developing the latest Nexus phones for Google, according to a recent tweet from Evan Blass, a well-known phone leaker. Blass reported that the new Nexus phones will run Android N, and are being referred to as the M1 and S1. Android Police backed up Blass's tweet and added that a source told them the new handsets will be named "Marlin" and "Sailfish."

How To: Replace Pentalobe Screws on an iPhone 4 with a Pentalobular Screwdriver

You've all probably heard about Apple's attempts to thwart iPhone 4 users from opening up their own devices, thanks to their sly maneuvers in switching out everyone's screws with those funky pentalobular screws. But one thing Apple will never learn— they will never have complete control. Where there's a will, there's a way. And if someone wants to fix their own iPhone or modify it slightly, they're going to do it, regardless of what screws bind it together.

Hack Ikea: $15 Camera Dolly

Ikea Hacker features a nice Ikea mod: Romain turns the Ivar side unit into a camera dolly. "A few days ago, I found out that the Ivar 'wooden ladder' was perfect to use it as rails for my cinema dolly! I can now make some nice sequence shots with this 18€ accessory from Ikea."

How To: Use the Nmap security tool

This hour-long hacking tutorial looks at the Nmap security scanner. In particular, this Nmap tutorial looks at port scanning concepts, TCP three way handshake, stealth scans, idle scans, bounce scans, version detection, OS detection, NSE/LUA scripting and firewall logs. To get started using Nmap, watch this video tutorial. Use the Nmap security tool.

Arduino Air Force: DIY Robotic Cardboard Quadcopters

You're hellbent on taking over the world, but one race of robotic minions isn't enough for you. With your hexapod robots acting as your ground forces, it's only natural to take to the skies. These cardboard quadcopters are the perfect air force for you. Combined, you are mere steps away from starting your evil takeover. Now you just need some water bots. The cardboard flying quadcopters are built around the MultiWii platform with the twin power of Processing and Arduino, so they are actually ...

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.