Get Serial

Minecraft : My Uncle, the Serial Killer

Do you ever really know someone? I mean really really? Super really? Sometimes we can talk and be with people normally for years and then bam: five people dead, house on fire, dog missing. All the while people shake their heads and regret that if they had just put the little ...more

How To : Get iSerial Reader for Mac

In this Software video tutorial you will learn how to get iSerial Reader for Mac. With this program you can get the serial numbers to use for various programs. Almost all programs are listed. There is nothing complicated about this. Download the iSerial reader from Serial Box. ...more

How To : Install a serial ATA hard drive in a G5 Power Mac

If your Power Mac is running out of disk space, you might consider installing a second hard drive. In this video tutorial, you'll find instructions for installing a second serial ATA drive into a Power Mac G5 system. For more on the hard drive installation process, watch this ...more

How To : Mix a Serial Killer drink with rum

This is the drink we could see Dexter coming home and mixing up by the sink after a hard day's work at crime scene investigations. Called the Serial killer, it's made from copious amounts of rum. Maria teaches us how to make a Serial Killer mixed drink.

News : 20 Cool New Features in the Galaxy S8 Oreo Update

Samsung has finally rolled out the Android Oreo update for the Galaxy S8 and S8+. If you're just now getting the update, you'll be happy to know that your Galaxy just got upgraded with plenty of cool new features. Like previous updates, Samsung has improved upon its software b ...more

How To : Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer ...more

How To : 7 Hidden iPhone Apps You Didn't Know Existed

Your iPhone has hidden apps that work behind the scenes to filter SMS messages, trust computers, deal with payments, test ads, and perform other actions. You won't find any of them in your App Library, but there are tricks you can employ to unlock and use some of these secret ...more

Know Your Android Tools : What Is ADB & How Do You Use It?

Anyone who has rooted their Android device has likely used a tool called Android Debug Bridge, better known as ADB, at some point during the process. For most, that is their only interaction with the ADB, but to be a true Android power user, you need to really know the tools a ...more

How To : List of Phones with Unlockable Bootloaders

If you want to root your phone, it's a huge plus. If you want to install a custom ROM like LineageOS, it's an absolute must-have. Custom kernels like ElementalX, custom recoveries like TWRP — none of this happens unless you buy a phone with an unlockable bootloader. While we ...more

How To : Get iOS 8 Beta on Your iPhone or iPad Right Now

Apple just unveiled iOS 8 at the Worldwide Developer's Conference, and it has a lot of exciting features to play around with. Unfortunately, it won't be available to the public until this coming fall—but that doesn't mean you can't get it right now. There is a way to get iOS ...more

How To : Identify Genuine Beats by Dre Studio Headphones

How do you know if the Beats By Dre Studio headphones that you are about to buy online are genuine? Always ask the seller to use the youVerify app before you buy. Smarter Selling, Safer Shopping. Video: . Step 1: The Retail Box Check the Color of the Headphones on the Box Mat ...more

Writing a Windows 10 Rootkit : Part 1

So this is my methodology for this project of writing a rootkit. Please leave feedback on what is right/wrong. I tried to simplify concepts the best I could however... One needs an deep understanding of how different types of processors work and how memory protection is imple ...more

How To : All the Reasons You Should Root Your Phone

Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Send SMS Messages with Python

In this article, I'll show you how to send SMS messages with Python. You'll need Python 2.7 or later, urllib and urllib2. The code basically uses an online text messaging service to "POST" html data, as if a person was entering the data themselves. The uses for something like ...more

How To : Securely & Anonymously Spend Money Online

Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more

How To : Set Up a Wi-Fi Spy Camera with an ESP32-CAM

The ESP32-CAM is a convenient little camera module with a lot of built-in power, and you can turn one into an inconspicuous spy camera to hide in any room. There's only one issue: it does omit a USB port. That makes it a little harder to program, but with an ESP32-based board, ...more

Prev Page
  • Hot
  • Latest