background preloader

Hack Attack: Turn your $60 router into a $600 router

Hack Attack: Turn your $60 router into a $600 router
Got this to work on the WRT54G v8 (will work on 7 as well, just replace the one file with the corresponding 7 version): First of all, use IE explorer. Firefox didn't work at all on this for me, even after install. Second, go to this page - [www.dd-wrt.com] Read the textfile carefully and follow its instructions. Two edits to the textfile- one, make sure you go to command prompt and type ipconfig /all. After this, switch your laptop/desktop back to receiving your IP address via DHCP rather than the manual configuration you set as per the instructions. Viola! Flagged

http://lifehacker.com/178132/hack-attack-turn-your-60-router-into-a-600-router

Related:  Hacking tutorials sites & toolsGeneral ElectronicsHacking & SecurityDiy & HomeWebsites

How to Hack Someones IP Address 2014 - Come to Hack Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow. NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. How to Hack Someones IP Address?

AutoSpeed - The DIY Seismometer Seismometers measure earth vibrations. You’ve probably seen them on TV after an earthquake – the seismographic record shows the magnitude of the ‘quake and, through the use of three or more seismographs, the epicentre of the ‘quake can be established. The seismometer presented here won’t be finding a place in too many geological laboratories, but it’s cheap and easy to construct, sensitive enough that on a wooden floor it can literally detect a cat walking past. Equipped with a remote probe, it can also be used as a vibration detector of the sort that’s used to assess whether machine bearings are running smoothly. In short it’s a fun, interesting project that costs nearly nothing to make. The Components Use USB / pendrive as a key to lock your computer. - Webretina : Technical blog  Are you tired of people touching your computer and making modifications in it without your notice. Wouldn’t be cool if your computer get locked up when you remove USB from it. So I would be telling you about the software that can help you to do this task quiet easily. So the below trick will tell you about how to use USB / pendrive as a key to lock your computer. My Lock 2.0

$5 Mobile Phone Projector The folks at Photojojo just posted a neat low-tech tutorial on how to make a projector for your mobile phone using a shoebox, a paperclip, and a magnifying glass. MacGyver would be proud. They were able to find the magnifying glass at a dollar store for, well, a dollar (so they called it the $1 projector), but let’s just call it $5 before people get up in arms because they can’t find that screaming deal. Basically, you start by cutting a hole out of one side of the shoebox to match your magnifying glass and taping the glass on the box. Then you make an iPhone holder from a paperclip, flip the screen display on your phone (to account for how images passed through a lens get flipped), position your phone inside the box (playing with placement until you get the clearest image), put the box top back on, turn the room lights down low and the brightness on your phone up high, and revel in your resourcefulness. Doesn’t get more accessible than that!

25 Killer Websites that Make You Cleverer It’s easy to forget that we have access to a virtually limitless resource of information, i.e. the Internet. For a lot of us, this is even true at our fingertips, thanks to the ubiquity of smartphones and an ever-increasing push for online greatness by tech engineers all over the world. As a result, there are countless websites out there that are geared to make you smarter and more brilliant for either a low or no cost. The definitive glossary of hacking terminology We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks. Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not. Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring?

poor man digital read out A mouse and an old pc asPoor Man's Digital Read Out2 axis PMDRO Requirements: DOS with PC A serial 9 pins sub-D mouse connected to com1 A mouse driver loaded on com1 The program encode5.zipThink this is the pascal source mouseencodesource.zip Mangle that old mouse and use it on your Lathe, xy-table etcetera screenshot I have an old Huvema HU450 lathe and there is no nonius on the wide axis So by using a fishing line and place it on the lathe with old mouse&pc i have used a 5mm axis x 3.14 / 200 mouse encoder = a readout off 0.0785mm its not perfect but much better as nothing Notice: On startup you can set the X an Y movement pro puls = resolution Left mouse button resets Xaxis to 0 Right mouse button resets Yaxis to 0

Free solutions to recover your permanent deleted data - Webretina : Technical blog  Sometimes by mistake it happens that you delete your data that is very useful to you. It even happens that you have deleted your data even from recycle bin. But this article will tell you the five free solutions that are available to recover your permanently deleted data . When you delete the data from recycle bin it is not actually deleted but it remains in your hard disk. The operating system is just given a command that that particular space of your hard disk is available for overwriting.

Related:  securityShadowWifi Tips & TricksSoftwareHOW TOHardware & IRLWhen I Have TimeDIYNetworkHacking ArticlesTutorials