Code 9

How To : Get Google's Call Screen Feature on Your OnePlus

Spam calls are one of the most annoying things to happen in the world of smartphones for more than one reason. Not only are they bothersome, but they can also be dangerous to people who don't know any better. Google has come up with a crafty solution known as "Call Screen" to ...more

How To : Update Your Rooted Phone

One of the issues with rooting your device is the inability to update your phone via OTA. Any security patches or software updates pushed out by the OEM are lost because your bootloader is unlocked. However, you still can update your device, it just a take a bit more effort. ...more

How To : Make Anonymous Calls from Your iPhone

When you don't want somebody you're calling to know the real phone number associated with your iPhone, whether it's for privacy reasons, to avoid being called back, or to prevent being ignored, there are multiple things you can do to block it on their caller ID. Some of the b ...more

How To : Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more

News : Zappar Pitches Baseball AR Mini-Game for Wise Snacks

Wise Snacks wants baseball fans to reach for potato chips instead of peanuts and Cracker Jacks, and it's calling augmented reality out of the bullpen to close the deal. The snack maker has partnered with two Major League Baseball teams, the Atlanta Braves and the New York Met ...more

How To : Create a MySQL Server BruteForce Tool with Python

Hello aspiring hackers, It's been a while since I wrote a tutorial, so I figured I might just share one of the tools that I have created to help the community grow. Scenario Let's say, that we have done all the recon(both passive and active) and we have scanned the web serve ...more

How To : Security-Oriented C Tutorial 0x17 - Structs

What's up, peeps? In this quick tutorial, we will be looking at structs, a special kind of data type. What Is a Struct? A structure, or just struct, is a user-defined data type where we are able to group multiple variables together to form a convenient package. Why would we ...more

How To : Remove Body Hair Permanently

After 2 months of trial, I'm finally here to tell you a secret that WORKS!! A permanent hair removal secret from Burma - for natural hair removal permanently! Video: . While we keeping looking everywhere for solutions to ,Permanent Hair Removal At Home for natural hair removal ...more

News : Free Alternatives to Pushbullet Pro Features

As one of the most powerful Android apps for connecting your phone or tablet to your other devices in various ways, Pushbullet had always been a fan—and Gadget Hacks—favorite. However, ever since late last year, many of the app's popular and once-free features now require a c ...more

How To : Get SwiftKey's All-Black Ninja Themes for Free

Ask around anywhere that Android users gather online, and you'll find that SwiftKey is almost unilaterally the most highly-recommended keyboard for our favorite mobile operating system. It's no surprise either—SwiftKey's combination of insanely accurate word predictions and ra ...more

How To : Your Personal Program [ NOTEPAD++] Written in PHP

Hello friends, I'm new in world of web developing. so, i decided to code my own program to save and read my personal notes and which is also secure, so i dont need to worry :) if you have any suggestions please fell free to tell :) 1 Login UI first we need to login 2 MAIN Pro ...more

SPLOIT : How to Make an SSH Brute-Forcer in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more

Hack Like a Pro : How to Hack Facebook (Same-Origin Policy)

Welcome back, my budding hackers! This is the initial post of a new series on how to hack Facebook. It's important to note here that each hack I'll be covering is very specific. I have said it before, but I feel I need to repeat it again: there is NO SILVER BULLET that works ...more

Hack Like a Pro : How to Hack the Shellshock Vulnerability

Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of ...more

News : How to Speed Up Your Computer Before Upgrading RAM

Thousands of history files, cookies, other unwanted files stored in your system as logs and other formats. To manually check each one is difficult. New computers are too fast by processor behavior, after some times of working it comes to slow performance. After browsing it is ...more

News : Thermistors | How HOT Is Your Robot?

Thermistors are used in almost every single device. If you are planning to build a grand new project, let us explain why and how you should use a thermistor ! Video: . URL to download the code: www.mikepieters.com/codes/thermistor.ino

News : The Streaming BPM Detector

In this episode we're using the Tibbo EM1000 to create our own web-serving-BPM-sensor! Video: . For the code: http://www.mikepieters.com/codes/BPMv1.zip The pin overview: http://docs.tibbo.com/phm/index.html?ic1000.htm Thanks to AudioMicro for the music!

  • Hot
  • Latest