Dept.: Void Your Warranty

Investigators: Casey and Van Neistat

Personal tech: iPod

Cost: $50 to $100

Time: ~2 hours

It wasn’t just the fact that his iPod’s battery was nearly dead after 18 months that got Casey Neistat so mad. The filmmaker had worked with enough electronics to know that lithium-ion batteries (like the iPod’s) could only be recharged 300 to 500 times before their run time declined. It’s a given: Batteries die, you replace them. What irked Neistat was that the iPod’s battery seemed to be inaccessible, sealed up tight in that gleaming silver and white case. But figuring Apple must have a solution, he went to the company’s Manhattan retail store — where the staff told him there was nothing Apple could do: his iPod’s one-year warranty had expired. But they would be happy to sell him a new model to replace it.

Not believing a smart company like Apple could have designed in an irreplaceable battery, Neistat says he called AppleCare customer support. The company line was repeated: No way to replace it, why don’t you just buy a new iPod? Still not convinced Apple was declaring the iPod disposable, Neistat mailed his broken baby straight to the Man in Black, Apple CEO Steve Jobs. The employee who called back “on Mr. Jobs’ behalf” apologized, then told him the same thing.

That’s when Neistat lost it, and decided to vent his anger publicly.

Instead of buying a new iPod, he and his brother Van bought spray paint and made a stencil. Video camera in hand, they canvassed downtown Manhattan, tagging dozens of Apple ad posters with their message: “iPod’s unreplaceable battery lasts only 18 months.” Then the brothers edited the stunt into a 2-minute movie called iPod’s Dirty Secret and posted it on the Web. By the next day, they had over 50,000 hits. Around the same time, Apple introduced a $100 iPod battery-replacement program, which the company says was in development long before the Neistats made a stink. But Casey’s story was everywhere: blogs, news sites, even The Washington Post.

Eventually, Casey tried fixing the problem with a $50 DIY battery replacement kit from, but his iPod didn’t survive the operation. (He thinks he killed the hard drive as he tried to pry the old battery loose.) A few weeks later, PopSci gave him another third-party battery, this time from ($60), and another iPod from a staffer with
the same problem. That one survived and went back to its owner. And Casey ended up spending $400 on a new one.

1. Replacing the battery

Using a small flat tool, begin prying open the case. Then wedge the tool inside and use another to undo the case clips.

2. With the case off,

use the same tool to gently pry the battery (left) from the hard drive.

3. Gently pull

the power cable to disconnect the battery from the iPod. Do not remove the rubber pad on the hard drive.

4. Now plug in

the new battery, place it over the original glue spots on the hard drive and snap the case back on, bottom-first.

5. With the iPod reassembled,

plug it in and charge the new battery for 3 hours to find out if you have a resurrected ‘Pod or a real pretty paper weight.

Things to know if your battery begins to die:

The AppleCare Protection Plan for the iPod extends your
warranty by one year and costs $60. If the battery (or anything else) fails in that period, Apple will fix your iPod for free.

Apple does not return your iPod when it replaces the battery; it sends a refurbished model instead. For $68, will install a third-party battery and give you your iPod back.

While new Apple batteries have a claimed run time of 8 hours, Neistat’s third-party replacement lasted only 6 to 7 hours.

New iPods are harder to crack open than earlier models. No word yet on how hard it is to bust open an iPod Mini. (Update: the Mini has been cracked. Read about it here.)

More ‘Pod Tricks

Not all hacks void your warranty, but according to Apple, cracking the case and modifying the internal software are off-limits. That said, in the words of one AppleCare technician, “how much you disclose about how it broke is up to you.” Translation: Even the gutsiest hacks will only get you in trouble if a) you screw up and b) you admit to it.


Hardwire your car. Eliminate cable clutter with an in-dash mount that allows you to power your iPod from your vehicle’s battery and play your tunes through the stereo without an adaptor. Hard, first- and second-gen iPods

Charge on the go. You could drop $70 on the external Belkin Backup Battery Pack or you could build your own with two AAs, two 9-volts and the box from a deck of cards or an Altoids tin. Intermediate, first- and second-gen iPods


Colorize the screen. The tough part of this hack is cracking open your case. The easy part is slipping a piece of colored acetate behind the screen. Hard, all iPods

Colorize the ‘Pod. Tired of bland white conformity? Send your iPod to the folks at ColorWare PC, and for less than $50, they’ll give it a shiny, seamless coat in your choice of 22 colors. For $19 more, they’ll do up your dock to match. Easy, all iPods


Cheat the breakout game. This level editor lets you change the number of blocks or the size of the paddle. Intermediate, first-gen iPods

Port Linux to your iPod. Sure, songs sound worse, and none of the other functions work, but hey, at least the little penguin appears on the start-up screen! Read more about this ambitious and ongoing open-source effort. Hard, all iPods


Pulse Barryvox Avalanche Transceiver

Climbing Mt. Everest? The accelerometer in this rescue beacon detects the subtle movements that indicate you’re still breathing, and the device radios your health status and location to rescuers. $400;

Korkers Guide Wading Boot

Interchangeable soles offer the best grip for your terrain, whether it’s rubber lugs for streamside hikes or felt for slippery boulders. Just snap one of six soles (two included) onto tongue-and-groove locks on the shoe’s underside. A lacing system borrowed from snowboard boots lets you dial in a snug fit.** $160;**

Q: How Can I Tame My Overflowing Inbox?

Start by checking your e-mail less often-say, once an hour-and by always processing, but not necessarily responding to, new mail right away. Focus on taking action on your e-mails, rather than just rereading or filing. Quickly scan your messages for appointments, anything you might need to reference again, and requested actions, and immediately make notes in your calendar and to-do list. For e-mails requiring only a quick response, send your reply as soon as the message arrives, and keep it short. If the recipients need more information, they´ll tell you; just move it off your plate. If you get many similar requests, use an application like QuickTemplates for Windows ($24; or MailTemplate for Mac ($15; to knock out boilerplate responses. Finally, simplify your e-mail filing system as much as you can stand. Put anything requiring a near-term reply in a folder labeled â€To Respond†and the rest in one called â€Archive.†Rely on your program´s search tool to find what you need. To move messages fast, set up keyboard commands with apps like SpeedFiler ($20; for Windows or, for Mac, Mail Act-On (free; A: Merlin Mann is the creator of the productivity-tips site

Q: How Do I Hang My Flat-Screen TV?

Maybe you don´t. Ask yourself if you trust your handyman skills enough to wager your new $2,000 LCD on them. Not sure? Hire a pro. It will cost $150 or more, but that satisfaction you get from a DIY job fades quickly when the set is in pieces on the floor. If you do decide to proceed on your own, check your TV for the words â€VESA compatible,†which means it´s designed to work with standard mounting hardware. I stick with two bracket brands: OmniMount ( for sets smaller than 37 inches, and Peerless ( for anything bigger; prices start at around $60. Spring for one with tilt to reduce glare. When deciding where the TV will go, know what you´re getting into-literally. Find a spot on an interior wall, out of direct sunlight, with at least one stud to anchor an LCD, or two for a plasma. Use a stud finder to check for obstructions in the wall. That´s important, because the secret to a clean, â€floating†installation is to run your audio and video cables behind the wall and pull them out down by the floor, nearer your receiver. Include an extra set of cables so that you can add components later without taking down the TV. Mount the wall bracket with heavy-duty anchor bolts (don´t forget to use a level). Get help hanging the set, no matter how small it is. Close the safety tabs around the rails, and you´re done. Except, of course, for explaining to your friends how you made it look so good. A: Bryan Greenway is a professional installer and editor of

Q: Can Viruses Attack My Cellphone?

If it´s a smartphone, you bet. In 2004, virus writers released Cabir, the first proof-of-concept virus that could infect smartphones through an open Bluetooth connection. So far, Cabir and the 175 other smartphone viruses in the wild haven´t done enough damage to warrant headlines. But it´s only a matter of time before there´s enough financial up-side for criminal hackers to begin seriously attacking smartphones. And then, watch out. No smartphone? You´re still not safe. A scam now common in Europe involves sending text-message spam that pretends to be a missed-call notice. Return the call, and you´re unwittingly charged several dollars, just as if you´d called a 1-900 number. A similar threat uses malicious code embedded in an innocent downloadable game. Once loaded, it secretly sends multiple text messages to costly premium numbers. Here´s how to protect yourself:

Q: Is the Music Industry Still Suing People?

You bet. Since September 2003, the major record companies, including EMI and Warner Bros., have been suing adults and children alike for sharing music through software like Kazaa, Morpheus and LimeWire. The industry recently stopped disclosing national figures, but as of last spring it had announced lawsuits against more than 18,000 people, and representatives confirm that the legal campaign continues. What happens to those who are sued? The record companies generally offer to settle for around $5,000, so most cases never make it to court. So far, the lawsuits have targeted only people uploading files (that is, making files available to other users), although many file-sharing programs do this by default. To stay off the industry´s radar, disable â€sharing†in your program or just remove offending files-anything copyrighted-from â€shared†folders. Be extra careful with BitTorrent software, which automatically uploads files as they´re downloaded. If you do get a notice, consult an attorney who specializes in copyright law as soon as you can to discuss your legal options. A: Fred von Lohmann is a senior staff attorney with the Electronic Frontier Foundation (, a nonprofit cyber-liberties organization based in San Francisco.

Q: What Music Format is Best?

Unless you´re an audiophile with $500 headphones plugged into your iPod, you probably won´t hear a lick of difference among the alphabet soup of formats. Even when listening on your home stereo system, the more important choice is between lossy versus lossless compression. Lossless compression preserves all of a song´s audio information, so the compressed file sounds just like the original- and stays fairly large, around 10 megabytes per minute. Windows Media Player, iTunes and RealPlayer all give you the option of ripping CDs to a lossless format, such as WMA; FLAC and Monkey´s Audio (APE) are common open-source lossless formats. Lossy compression creates much smaller files (about one megabyte per minute) by removing the parts of the sound you´re least likely to miss. MP3 is the most widely supported lossy format, but newer codecs such as AAC and Ogg Vorbis provide better sound than MP3 at similar file sizes. Note that you can´t go from lossy back to lossless-those crystalline highs and gut-shaking lows are gone forever. Most online music stores lock you into one lossy format that has copy protection encoded into it, limiting the number of computers or type of portable player or software the song will play on-potentially annoying in 5 or 10 years when your equipment changes and your entire Def Leppard collection is suddenly worthless. The best way to future-proof: Own, don´t rent. Buy used CDs on Amazon or eBay and rip them to a lossless format. Alternatively, rip to MP3 at a high bit rate (320 kbps), and store those discs in your Mom´s attic. A: Jonathan Coulton is PopSci´s podcaster and contributing troubadour as well as a professional musician and software engineer. Give him a listen at and

Q: How Can I Make a Personalized E-mail Address?

Snagging an address like was cool back when e-mail was still a novelty, but nowadays you might want something more professional. For an e-mail address that uses your name (or anything else you want), you first have to own the domain name (.com). There are dozens of registrars online that you can use to register a domain; one of the best values is, which offers free e-mail hosting as part of its $9 annual fee. Once your domain is active, log on to GoDaddy and choose the â€account management†option to activate e-mail hosting and to set up your new address. The easiest thing to do is create a â€catchall†address so that any messages people sent to would be automatically forwarded to your existing Gmail or Yahoo account. (You can even set those accounts to send messages that appear to be from your new personalized address.) This allows you to give out different e-mail addresses for different situations. For example, tell only friends about the â€john@†address, and use a â€junk@†address when you need to register at a Web site. Then set up filters to file messages accordingly. You can even reuse chunkylover53 if you like-after all, it´s your domain now. A: Merlin Mann is the editor of the productivity-tips blog

Q: How Can I Surf the Web Anonymously?

You don´t have to be a conspiracy theorist or a criminal to be uncomfortable with the fact that your online movements are frequently tracked and recorded. Maybe you don´t want commercial Web sites using your browsing habits to inform their marketing, or perhaps you want to post an opinion to an online forum without worrying that it could be traced back to you. Most tools that help you surf anonymously do it by rerouting the data coming out of your computer, called traffic, so that it appears to be coming from somewhere else. Anonymous Surfing ($30; does this by shuttling all your traffic through its own servers. A free tool called Tor ( uses a network of hundreds of servers, called nodes, and reroutes your traffic through several of them. To the sites you visit it will appear that you´re coming from the last node in the circuit. This also protects your traffic in transit. If an online snoop is watching your data, all he´ll see is that you´re moving between two nodes. He won´t know where you´re coming from or where you´re going. Tor will slightly slow your browsing, and both services will prevent sites such as Amazon and Yahoo from remembering who you are and keeping you signed in each time you return-but then again, that´s the point of anonymity isn´t it? A: Annalee Newitz is a tech writer and former policy analyst with the Electronic Frontier Foundation, a nonprofit think tank dedicated to technology issues.

Q: How (and Why) Should I Encrypt My Data?

With files constantly on the move through USB drives, online storage sites and multiple e-mail accounts, your financial records, password list and secret barbecue-sauce recipe are more susceptible than ever to being stolen or simply lost. But that doesn´t mean your personal info has to be spilled to the world. Several free tools make it easy to scramble your files so that even if someone cracked them open, they would look like gibberish. Free Windows software fSekrit ( locks down text documents and saves them as .exe files. That means you don´t need fSekrit to open them again, which makes it a good choice for e-mailing files to someone else. And at 40 kilobytes, it´s easy to keep on a small USB hard drive. For saving multiple files, TrueCrypt (free;; Windows) creates an encrypted virtual hard drive on your desktop. Save as much as you want in it, then â€dismount†it. The drive can´t be remounted without your password. Mac users have a similar function built in. Open Disk Utility and create a new disk image with the encryption style of your choice (all are equally effective). A final reminder: Even encrypted, your data is only as safe as your password. Choose one that´s long and hard to guess, and change it often. A: Gina Trapani shares productivity tricks, time-saving Web sites and useful software every day as editor of the blog

Q: Can I Use My Own Songs as Ringtones?

There are a couple ways to swap that horrible default chirping noise for something more pleasant without shelling out $3 a tone to your carrier. The easiest way is to use the Web service Mobile 17 ( Sign up for a free account, enter your phone model and provider, and upload your MP3 or M4A file. Choose the point in the song at which you want the ring to start and how long a clip you´d like. In a few minutes, Mobile 17 will send a file in the proper format to your phone by e-mail or text message (you can then save the attachment as a ringtone). If you crave more control, clip and convert a song yourself using free sound-editing software such as Audacity (, and move it to the phone by data cable, Bluetooth or e-mail. Check your phone´s user guide to make sure it supports custom ringtones. If not, consult the phone-hacking site HowardForums ( to see if others have found an unofficial workaround; they usually have. A word of caution: There´s debate over whether using a copyrighted song-even one you own-as your ringtone is fair use (and therefore legal). But there´s been no definitive court ruling either way, so let Britney ring at your own discretion. A: Gina Trapani is editor of the blog Her ringtone is from the Jackson Five.

Q: Why Do Batteries Explode?

Earlier this winter my Solitude Noise Canceling headset did something ironic: It emitted a piercing pop. When I opened the battery cover, I found a disfigured AAA Duracell seeping gray foam. So I sent the battery and headset to Duracell to find out what happened. Apparently, it didn´t explode; it â€vented.†All batteries sold in the U.S. contain plastic safety vents designed to release any uncommon buildup of hydrogen gas, a by-product of the chemical reaction that generates electrical charge inside the battery. A scientist at Duracell says that batteries rarely explode but that when they do, it´s usually because they lack these vents and are probably counterfeit. (Knockoffs also drain more quickly, so don´t buy your batteries from shady sources.) But the battery I used was genuine. So what caused the hydrogen buildup? Apparently, forgetfulness-I´d left the headset on, discharging the battery beyond Duracell´s recommended low-voltage threshold of 0.7 volt. As an alkaline battery drains, it becomes less alkaline, creating excess hydrogen gas until the pressure triggers the safety vent. The result is a loud release of gray battery ooze: caustic potassium hydroxide. A: Nicole Dyer is the Headlines editor at Popular Science. This is her first battery incident.


Our geeks may be, well, pretty geeky, but that doesn’t mean you might not have anything to add to their sage wisdom. If you’ve got a better way to solve any of these problems, tell us all about it on the How 2.0 Blog.

Q: Can I Download Streaming Videos Off the Web?

Most of the movies on sites such as YouTube and Google Video are the sort of flicks you´re happy to watch once and forget about. But occasionally, there´s that hilarious gem you just have to keep for repeated viewing. What´s limiting about these sites, however, is that the movies play only in your browser. This makes the videos widely accessible-no special media player needed-but it also means you´ll need another tool to download and save them to your computer. My current favorite is KeepVid. Visit, paste in the Web address of the page with the video you want to save, and KeepVid will find the file and give you a link to download it. If it´s a YouTube file, you´ll need to add the extension .flv when you save it. You´ll also need an app to play .flv files, such as FLV Player (free; Is it legal? Depends on the video. Most home movies are in the clear, but downloading an episode of South Park could violate copyright, since it was probably posted without the owner´s permission. So far, people have been sued only for redistributing files, not downloading them, but to be safe, don´t assume that everything out there is ripe for the saving. A: Jake Ludington runs MediaBlab (, a blog of tech tutorials.

Q: Can I Plug In My Prius?

The short answer: Why bother? The shorter answer: Why not? Toyota says the Prius is neat because you don´t have to plug it in-it charges itself when running on gas. But what if you could plug it in? If you could fully charge a set of supplementary batteries overnight from household current and do the next day´s errands purely on volts? (The gas engine will stay off under 35 mph if you have enough battery life and you´re gentle on the throttle.) CalCars, a California eco-car consortium that has converted a handful of Priuses to plug-in models, is about to issue a free do-it-yourself instruction dossier with photos, a video and a shopping list of all the components you need. The hardware will cost you about $3,000, a third of it for a trunkload of lead-acid electric-bike batteries (so Costco runs are out). It´s not a weekend project, but anyone comfortable working with high voltages can do it. The mod won´t void your car´s warranty entirely, but don´t expect the dealer to help if you screw it up. So for the price of a perfectly good used Corolla (plus the Prius´s $22,000 price tag), you have a plug-in hybrid that can take a trip of less than 10 miles on electricity alone. But you can still go as far as your gas engine will take you-averaging as much as 100 mpg, according to CalCars. Is it worth the bother? That´s up to you. A: Stephan Wilkinson is the contributing auto editor at Popular Science.

Q: How Can I Guard Against Spyware?

If your Windows computer runs unusually slowly, shows extra pop-ups, or crashes often, it might be infected with spyware-programs that commandeer your machine to collect information for advertising, market research or outright theft. Think spyware is old news? A recent study shows that 89 percent of consumer PCs are infected, the highest level since 2004 (Macs are mostly immune). Normally, you can clean your computer with programs like Microsoft Windows Defender (free;, but it´s easier to avoid getting infected at all. Before installing a program (especially screensavers, toolbars and peer-to-peer programs such as KaZaA), try to discern how the company behind it earns money. It could be profiting by quietly bundling spyware. Ironically, some of the sites you should be most wary of are ones with logos promising they´re safe. Plenty of good sites have these seals too, but don´t rely on badges to protect you from scammers. Also, do a search to see if others have had problems with the product. If it fails any of these tests, skip it-you´ll be glad you did. A: Ben Edelman is a doctoral student at Harvard University, where he researches spyware, Internet advertising and online fraud.

Q: Can I Wipe My Name Off the Web?

Not Really. There are so many aspects of your life that leave your name scattered around the Web, it would be a full-time job trying to track down every mention. But you can get back some anonymity. Start by entering your full name and any nicknames into major search engines (like Google and Technorati) and photo sites (like Flickr). Then group the results into two categories: sites where you supplied your name, photo or data, and those where you didn´t. For either, try to contact the owner of the site or the person responsible for its content and ask them to take it down. When it´s a document or photo you created that´s somehow migrated out of your control, try citing copyright law, which prevents others from posting your content without your permission. Many sites list a procedure for removing this type of material. One way to keep a low profile from the start is to use a free tool like, which creates generic usernames, passwords and other information you can use to register on Web sites. A: Lauren Gelman is the associate director of Stanford Law School´s Center for Internet and Society