When it comes to modding an Android device, a custom kernel can take you farther than almost anything else. Most offer the ability to overclock your processor for performance gains, change your CPU governor, or even under-volt to increase battery life, among other features. O ...more
Welcome back, my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on all of us—all of the time. Don't get me wrong, I don't condone ...more
One of Android's biggest strengths is its ability to interact with other operating systems. When you plug your phone into your Windows PC, you instantly see all of the files it holds—and all it takes is a simple syncing app to do the same with Mac. To top that off, apps like P ...more
The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
It's finally out. After months of testing, iOS 13 is available to install on your iPhone, which means over 200+ new features you can use right now. The update, released on Sept. 19, can be installed over the air or from a restore image using iTunes in macOS Mojave and older or ...more
Google just released the first version of the next major Android update. Early Android 11 builds will only available as developer previews, so you can't just sign up for the beta program and install the update as an OTA for the first couple months. That said, it's still pretty ...more
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mit ...more
Stuff you need You're gonna need some Dry Ice, a geek/nerd friend or anyone in general who's a complete and utter idiot when it comes to computers, a laptop (prefferably a brand new one), several accomplices and a high-resolution screen shot of this: (It can be any of the di ...more
In order to block websites on your computer, you will need the address for the website that you want to block. Gather that information first. Then, click on Start. Then, go to Run. Next, type in the following: c://windows/system32/drivers/etc. Click OK. Find the folder that s ...more
Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the comput ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
As a technology writer, phone screenshots can pile up on your computer in no time. Testing out different apps, showing buggy software, and doing step-by-steps can lead to a plethora of mobile screenshots piling up on your computer's desktop. The problem with my screenshots is ...more
Introduction I am currently starting to learn the Python programming language, programming languages make up all the programs that we use, that is enough for it to fascinate me if it isn't for you then maybe start reading this and you will quickly see how powerful it is. This ...more
OnePlus phones are easy to root, but that also means they're easy to brick if you get trigger happy with your superuser privileges. If you find yourself in this situation, you'll quickly realize the OnePlus firmware download page doesn't provide files you can flash in Fastboot ...more
Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more
No more carrying around heavy laptops and thousands of Linux Live CDs and USBs to always be ready for pentesting on the fly! I hope you had a good Christmas and happy new year! Update1: Added the section "weaponizing your Android" where I talk about apps and fundamental Kali ...more
Google's much anticipated eBook Store has finally opened. As of today, the digital bookselling enterprise is awaiting your needs, with over 3 million eBooks to read directly on the web or on other platforms, like Android, iPhone, iPad, Sony and Nook devices. And the best part ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. UPDATE: Minecraft 1.9.6 has been leaked! It's time for another pre-release folks! This time it's 1.9 Version 5, and it's better than ever. Confirmed changes include: Melons drop ...more
You've finally got an invite into Google+. Now what? At first glance, things can be a bit overwhelming. We've got some great tips to help you get started. 1. Fill your Circles The circles feature is the core of how Google+ lets you manage your online relationships with your ...more
Almost every phone comes with biometric security of some sort these days, but the same can't be said of Windows computers. While fingerprint scanners are becoming increasingly common with laptops and desktops, they're nowhere near ubiquitous. Thankfully, your phone's scanner c ...more
It used to be easy to hack tethering—root your device and install a third-party or modded tethering app. But snuck in amongst the changes in Android 4.3, a new data-monitoring service of sorts made its debut. There used to be a time when your data connection was yours. You pai ...more
Kodi, formerly known as XBMC, is one of the most versatile media players available. With it, you can play virtually any internet and media file in a large variety of formats, and it can be used on practically every single operating system out there, including iOS 10. Kodi, an ...more
The '90s were a great decade to be alive. Before the internet became a high-availability service, we were untethered from the bombardment of media present in today's culture. Children ran through the streets with levels of physical exertion beyond what's required to capture fi ...more
For many, the stock version of Android is often considered the epitome of what the operating system should look and feel like by default. It's clean and clear of unwanted extra apps that come pre-installed with the system, provides a fluid and fast user experience, and runs on ...more
The misconception that macOS is more secure than the Windows operating system is far from the truth. With just one small command, a hacker can completely take over a MacBook and control it remotely. The sheer volume of Windows computers currently in operation around the world ...more
Keystroke injection attacks are popular because they exploit the trust computers have in human interface devices (HIDs). One of the most popular and easily accessible keystroke injection tools is the USB Rubber Ducky from Hack5, which has a huge range of uses beyond simple HID ...more
If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more
Apple's goal with iOS 12 is to smooth out the problems with its famously flawed predecessor. Of course, change isn't for everyone, and by iOS 11.4.1, Apple had a pretty stable thing going. If you're not digging all the bugs and new features included in iOS 12, here's how to do ...more
Deleted bank statements and private photos are still within an attacker's grasp, so don't think that emptying your recycling bin is enough to keep your files from coming back to life. It's possible for a hacker to recover compromising files and images from a backdoored compute ...more
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform a variety of exploits. It's accomplished by forwarding requests from Kali through a backdoored Windows computer to the router gateway with ...more
The USB Rubber Ducky is a well-known hacking device in the cybersecurity industry, but it needs to be preprogrammed before it can be used. That means it's not easy to issue commands to a target computer since you can't interact with it from afar after plugging it in. And if yo ...more
This video tutorial belongs to the Computers & Programming category which is going to show you how to use Wordle to create word clouds. Go to Wordle and click on the 'create your own' link. In the first box, type in your text, and in the second box enter the URL of any blog, b ...more
In this Computers & Programming video tutorial you will learn how to make a favicon for your site in Photoshop CS3. A favicon is a little symbol that shows up on url bars and also on browser tabs. Open a new project in Photoshop by pressing ctrl+N. Select height and width to 6 ...more
In this tutorial, we learn how to create flashcards with Keynote to use on an iPod touch. First, go into Keynote and choose the flashcard with the plain white background. To format this, click 'masters' on the toolbar. Now, choose "title-center" and make the first slide the qu ...more
Have you ever browsed the web, watched a video, then wanted to download it? Well, there's a fabulous program that does just that, simply and easily. It's called VideoCacheView by NirSoft. The program basically extracts the FLV video directly from your browser's temporary folde ...more
While we're waiting for Google to sort out the mess over suspended Google+ accounts, it's a good reminder that you have the option to download much of your Google+ data with Google Takeout. Google Takeout, created by an internal Google engineering team marketed as the Data Lib ...more
Check with your ISP about alternatives to the Internet. The speed of your Internet connection is the most important variable in your download speed. If you have dial-up Internet access, consider upgrading to a Digital Subscriber Line (DSL) or cable connection. Even if you alre ...more
If you can't watch video on YouTube. com or play online games, maybe you need to update your Flash Player and enable JavaScript. You should watch this video if you want to know how to do these. The Adobe Flash Player is the standard player used to display images, videos and fl ...more
Stan shows an easy way to see and clean the files that are hogging hard drive space in the computer using a free software called "windirtstat". Now enter the following address in the web browser "windirtstat.info" and scroll down the page until you get the downloading and inst ...more
It is a great video tutorial about how to create a keynote presentation to run on a windows platform. After opening the keynote presentation, click on file menu and open up the export window. This window shows different file formats and types. By using this we can export a qui ...more
In this beginners video, the instructor shows how to use Word 2007 by opening, closing, and saving documents. When you open the Microsoft Word software with out any documents, the window looks gray indicating the same. There is an office button present in the top left corner o ...more
You want to transfer your cassettes to digital music but don’t have a clue where to start. With these tips and the right equipment, your old music will sound brand new. You Will Need * A cable with two RCA plugs at one end and 1/8-inch stereo plug at other * A cassette deck * ...more
Select the image whatever you want from anywhere. For example, choose Google search and type high res yoda and select IMAGES choose the picture and save in your computer. Enter into rasterbator software. From the dialog box select the language what you know. Select the image u ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to backup an ...more
In this video, we learn how to install the homebrew channel to your Wii. You will need: the Zelda twilight princess game, SD card, homebrew installer, and Wiibrew hack. First, go to Wiibrew and find where it says Twilight Hack underneath "homebrew". Go directly to download and ...more
How To Stop The Weirdness Lag, Pauses Etc...In FaceBook/ Zynga Games Via Flash! How-To Topics » Facebook, games, facebook games, online games, zynga Written By zZz standp-how-to-vidzzz.wonderhowto.com TRUE CATEGORY: ONLINE/ FACEBOOK/ ZYNGA GAMES/ FLASHPLAYER HELP *ZY ...more
If you've rooted your Motorola Droid chances are that you are enjoying the results, but are concerned about the consequences if you phone updates or in any way become incapacitated since your phone manufacturer will not be pleased with what you've done to the phone. One way to ...more
In this video from PCRescueRepair we learn how to record streaming audio from any website using audacity. To get audacity just go to google, type in audacity, click on the link for audacity, and download audacity to install this on your computer. Also you need the LAME mp3 enc ...more
If you want to make a DVD on a Mac using 'Burn' you should first you need to open your web browser and go to the Burn application website. Here, you should click on the download link and download the program. Now, open up the burn application. You can work with just the Audio, ...more
This video presents how to connect to your iPod Touch or iPhone using SSH (Secure Shell) without using Wi-Fi connection. 1 Step. Presuming you have Internet connection in your iPhone, click Cydia. Wait for it to load. Type "OpenSSH" without quotes into the search engine. When ...more
To convert your MP3s to ringtones using iTunes follow the instructions below. First download and install iTunes and then agree to the terms of use and open the program. Then, click "File" and then "Add to Library." Locate the MP3 file you want to convert and open it in iTunes. ...more
Everybody is going digital these days, so everybody has a reason for software like HandBrake. You can save your entire DVD collection on your computer in digital files, and you can convert videos into different formats. Check out this video tutorial on how to rip DVDs and conv ...more
Need some extra space on your computer? Grab those folders and zip 'em! Watch this tutorial and learn how to consolidate your folders into a single zip file, saving you space and keeping you organized. You Will Need • A computer • Zip utility Step 1: Right-click On a Window ...more
In this video, we learn how to use uTorrent to download files. First, go onto the uTorrent website and search for what you want to download and in what category you want. After you hit the search button, you will be presented with different things you can download. Click on on ...more
If you have any Google applications, like Gmail or Google Calendar, that you want to sync to your new Android enabled mobile phone, it's a simple task to complete. There's nothing hard about it, but if you think you need help, Best Buy has answers. The Best Buy Mobile team exp ...more
On the same day that Google launched their new social network, Google +, a team of Google engineers calling themselves the Data Liberation Front announced their first service on Tuesday—Google Takeout, a product that allows users to easily move their data in and out of Google ...more
This video tutorial from ozz3141 presents how to copy your DVD library to a Mac computer. To start, insert DVD you want to copy. It will mount on Desktop and DVD player will open. Close DVD player. Click File-New Finder window. From left pane select applications. Scroll down ...more
This session is about page view sharing. Click collaborate, send collaborate live. It works with Acrobat. It opens a live chat session. Log in with Adobe ID. You can invite others to collaborate. Click to select name, attach a file and send an email. File can be saved on Acrob ...more
This video is a tutorial for Windows computer users in order to write very simple java programs very quickly. The first thing that you do is open a brand new text edit window. Then you should write in html code your java program, by using html you will need to include all of y ...more
Find a PDF You need a PDF file on your computer to convert, so keep the file path in mind. Visit aXmag Go the aXmag website to submit a PDF. Choose the PDF Click the "Browse" button to choose your PDF file you want to convert. Once chosen, fill out your email address in t ...more