Connect My Android to Internet?

How To : Networking Basics for the Aspiring Hacker

Hi there, nullbytes! I've been recently using NullByte as my only source of learning (almost) and it has proven to be really good to me. I've compiled some of the articles about networking, and ordered them in a way that made sense to me, and I thought about sharing the list ...more

How To : Root Your Brand Spanking New Samsung Galaxy S4

If you pre-ordered your Samsung Galaxy S4, it might very well be possible that you're reading this on your brand spanking new Android device. As is commonplace with the release of popular smartphones, rooting instructions are usually released simultaneously. I mean, what's the ...more

How To : Unlock and Root the Verizon Droid DNA by HTC

Last week, HTC released their new Droid DNA smartphone in hopes of gaining more traction in a smartphone world currently dominated by Apple and Samsung with their popular iPhone and Samsung Galaxy lines. The new Droid DNA boasts a 5-inch 1080p display—the highest resolution fo ...more

How To : Get Faster Download Speeds on Your Steam Games

Steam is an online platform that lets you download and play over 2,000 video games, from first-person shooters to RPGs, as well as a pretty long list of indie games. You can play on your PC, Mac, mobile device, or even your television, and it has a community of over 40 million ...more

Gift Guide : Must-Have Phone Accessories for Movie Lovers

There's never been a better time for streaming videos on your phone. With so many options available (including a potential mobile-only Netflix tier) and so many new smartphones having large screens, there's a good chance you know someone who mainly use their phone for videos. ...more

How To : Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more

News : The Smartphones of Austin's Underground Musicians

Smartphone technology has become as ubiquitous as automobiles. In Austin, Texas, a city that is widely known as the "Live Music Capital of the World," smartphones have been embraced by the music community not just as a way to document and promote, but to create music. A rock ...more

How To : Unlock the Bootloader on Your OnePlus 6T

Before you can dive into customizing your OnePlus 6T, you must take the initial step of unlocking the bootloader to gain the ability to install TWRP, Magisk, custom ROMs, and other mods. A bootloader is a program that starts up on a device that states what operating system it ...more

NR30 : The Mobile AR Leaders of 2018

This time last year, we got our first taste of what mobile app developers could do in augmented reality with Apple's ARKit. Most people had never heard of Animojis. Google's AR platform was still Tango. Snapchat introduced its World Lens AR experiences. Most mobile AR experien ...more

How To : Unlock the Bootloader on Your Pixel 2 or Pixel 2 XL

Root, TWRP, Xposed, Magisk, custom ROMs — before you can have any of these, the first thing you should do is unlock your bootloader. Thankfully, the Pixel 2 and Pixel 2 XL are some of the most modder-friendly phones out there, so you only need to send a single fastboot command ...more

How To : Create a Wireless Spy Camera Using a Raspberry Pi

Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more

News : 91 Cool New iOS 11 Features You Didn't Know About

Apple's iOS 11 is finally here, and while they showed off several of the new features it brings to your iPhone, iPad, and iPod touch back at WWDC 2017, they've only just touched the surface of what iOS 11 has to offer. There are a lot of cool new (and sometimes secret) feature ...more

How To : Brute-Force WPA/WPA2 via GPU

Most of you lot would be aware what WPA/WPA2 is so I won't bang on about the encryption or protocols a great deal. In short WPA and WPA2 both have a maximum of 256bit encrypted with a maximum of 64 characters in the password. The encryption is really only 64bit but x 4 because ...more

SPLOIT : How to Make a Python Port Scanner

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my first tutorial and in this tutorial we are basically going to create a port scanner in python ( I guess without external librarie ...more

How To : Sort Contacts by Last Name on Your Google Pixel

Most of us have had a cloud-connected address book for years now. The result of this is an ever-growing contact list that will continue to get harder to navigate and manage. With the increased size of our contact lists, it becomes more important to sort contacts in a way that ...more

How To : Send Higher Resolution Images on Slack for Mobile

By default, Slack optimizes the images you upload and send to other users in your workspace. Although optimization lowers the resolution of the image, it does send quicker, which is better if your internet service is poor. However, you may want to send the highest-resolution i ...more

How To : Get Twitter's Emojis on Any Android Phone

The art of emoji — the next level beyond the simple text-based emoticons we used once upon a time in the not so distant past. We rely upon emojis so much in our always-connected world of today simply because they help portray emotion into our typed out words. They've not been ...more

  • Hot
  • Latest