Historical Data Search Results

How To: Install a hard drive in a 13" MacBook Pro (2009)

To install a hard drive in a 13" (13 inch) Macbook Pro laptop computer released in 2009 you will make sure to first transfer all data off the drive then discharge any static electricity from your hands making sure your are in a static free work environment. Next you will remove the old hard drive, to do this flip over the laptop and remove the 10 screws around the edge of the device with a #00 Phillips screwdriver starting with the three longer screws on the top right. Next, lift off the bott...

How To: Install a hard drive in a 17" MacBook Pro

In this how-to video, you will learn how to install a hard drive into a 17" Macbook Pro. Make sure you use the proper anti-static precautions before going on with this procedure. You will need a pry tool, a Phillips screwdriver, and a T6 screwdriver. Make sure you transfer your old data into the new drive before installing. Shut down the computer and flip the laptop over. Unscrew the ten screws around the bottom. Now, remove the cover. You will see the hard drive at the lower right. Loosen th...

How To: Install a hard drive in a 15" MacBook Pro (2009)

In this video from MacOSG we learn how to install a hard drive in a 15" Macbook Pro from around 2009. For this you need a #00 Phillips head screwdriver and a T6 Torx screwdriver. Make sure you use proper anti-static precautions with this. Transfer your data to the new drive before installing. To remove the hard drive, flip over your Macbook. Use your Phillips to remove the 10 screws. Remove the 3 at the right which are longer than the other screws. Then remove the left most screw which is the...

How To: Use Houdini voxel fluids

Created by Houdini Product Specialist Stephen Tucker, this crash course series focuses on the concept of fluid dynamics and how they work within Houdini. These videos on Voxel Fluids should help any artist get up in running with the foundation tools available for creating fluid effects in Houdini 9.5. Topics range from how to create a container to how to gain access to fluid attributes for shading, and even passing data from volumes to particles.

How To: Restore files in Windows using Data Recovery Wizard

In this video the instructor shows how to restore lost data. When you delete your files you can restore them from the recycle bin. But if a hard drive is formatted all the data is lost and you can not even recover it from recycle bin. In such cases you will need to use data recovery tools to recover that lost data. In this video the instructor uses the Data Recovery Wizard software to recover the data. Start the Data Recovery Wizard. In that there are three options by which you can recover yo...

How To: Apple Saves Your Siri & Dictation History — Here's the Easy Way to Delete It

Apple has an excellent reputation for its privacy and security policies. That said, it isn't a perfect reputation. Take Siri, for example. The helpful iOS assistant isn't just communicating with you — Apple saves and listens to a history of your Siri interactions. If you don't want Apple storing your Siri history forever, there's something you can do about it.

How To: Keep Law Enforcement Out of Your Android Device

With protests springing up across America, there's a chance you may have your first interaction with law enforcement. Many demonstrators will have their phones in-hand to film the action, which, sadly, could prompt an officer to demand the device and any self-incriminating data it may contain. Before this happens, you should know there are tools at your disposal to protect your data in such situations.

How To: 10 Privacy Settings in iOS 13 That Everyone Should Double-Check

Apple has seemingly always made it a priority to show how much it cares about user security and privacy — enough that it has a page dedicated to it, proclaiming that "privacy is a fundamental human right." It's true that there are few issues more important than user privacy when it comes to technology, and Apple only makes things better in iOS 13.

Android for Hackers: How to Backdoor Windows 10 & Livestream the Desktop (Without RDP)

The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in real time no matter where they are. Hackers are watching and listening, and there are few ways to protect yourself.

How To: Use Cerberus to Take Control of Anyone's Android Phone

If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs at all, such as Cerberus, an anti-theft solution available right on Google Play.

How To: It's Not Just Your Camera & Mic — Here's All the Crazy Ways Your Phone Could Be Used to Spy on You

As you're surely aware, your phone can be used against you. Thanks to our cameras and microphones, a clever hacker can obtain access to your device and invade your privacy. But spying isn't limited to just these two sensors — gyroscopes, proximity sensors, QR codes, and even ads can be used to paint a very clear picture about who you are and what you're currently doing.

How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show you how a hacker would do so and explain why they should be careful to avoid hacking into a honeypot.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: The 5 Best Phones for Video Chat

Video chatting has become an important factor in the overall smartphone experience. Even just a few years ago, 37% of teens were making video calls on a regular basis, and that number has surely grown. 85% of households with infants have used video chat apps to call relatives in other cities, and it's been shown that toddlers can create bonds and learn from visual cues in video calls.

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:

News: 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. However, full credit card data was not lifted, and passwords were cryptographically scrambled.

How To: Flash LiteOn DG-16D2S XBox 360 disc drive firmware

So you've watched this video, done your research, and decided that you want to flash the firmware on your XBox 360 with a LiteOn DG-16D2S rev. 7485 disc drive. Good for you! This video will walk you through the whole process. Be very careful, as messing up in small ways at any point can ruin the results which, when done properly, are really awesome.

How To: Use the SUMPRODUCT function in Microsoft Excel

Are you looking for a way to make your Microsoft Excel formulas more efficient? If so, you're in the right place. With this free video lesson from everyone's favorite digital spreadsheet guru, YouTube's ExcelsFun, the very first installment in his "Excel Formula Efficiency" series, you'll learn about the basics of Excel's SUMPRODUCT function — why some people use double negative and why other use times one.

How To: Use the Ribbon and Backstage view in MS Outlook 2010

After you launch Outlook 2010 in your computer, you will see the Ribbon strip immediately in the main window. The button for writing a new e-mail is separated from a button for creating new items in the calendar, contact list or task manager. An independent Quick Steps section offers functions allowing you to move a message into different folders, to save it into a calendar as a meeting reminder, to quickly forward it to a chosen person or to more people and to forward it with a FYI note. If ...