See how to make a portable spy scope cell phone camera with KipKay and MAKE Magazine! Find out how to use a cellphone camera for espionage that captures long-distance secret activities! Kipkay loves his spy gadgets! This portable cell phone camera spy scope is the perfect way ...more
Now that most computers have internal webcams in them, what are you going to do with that external webcam eating up precious desktop space? Kipkay shows you the perfect hack— the "Super SpyScope". The first thing you'll need to do is disassemble the webcam. Remove the main bo ...more
If you've done major work on your engine recently, you may find yourself with error code P1345, which means your timing is off. In this video you'll learn how to use a lab scope to both diagnose and fix a distributor timing problem.
One reason your vehicle may be misfiring is from a spark plug problem. To help you out, this video, aimed at mechanics, will help you diagnose the problem by using a lab scope and inductive pickup to test a coil on a spark plug. This could be done for virtually any vehicle. If ...more
You've had a hard day at work and need to get out of the house, have a few drinks, but you don't want to go just anywhere—you want the right crowd and the right bar. For those nights, barhopping just isn't the answer, it's SceneTap. It's a new free mobile application coming s ...more
The lab scope is one of the most versatile diagnostic tools that you can have in your car shop. If you've been thinking about buying one or are looking for new ways to use it, watch this video to learn how to use a lab scope to test a fuel pump circuit.
The lab scope is one of the most powerful diagnostic and repair tools for the modern mechanic. In this video you'll learn how adjust coil ramping with a lab scope and use the scope to determine if your have good or bad engine coils. Part 1 of 2 - How to Use a lab scope for coi ...more
Want to learn how to do quick scoping in BO? It's easy: use the variable scope and zoom in to the second or third level of magnification. Voilà. No more two-second delay when shooting. For a complete walkthrough of how to quick scope, watch this gamer's guide. Call of Duty 7 ...more
In this video, you'll use Scope and create a simple calculator while learning a little about private, public and protected properties in OOP programming. If you're looking to bone up your PHP coding skills you'll want to check this video out.
Customer service just got a lot more interesting. Construction equipment manufacturer Caterpillar just announced official availability of what they're calling the CAT LIVESHARE solution to customer support, which builds augmented reality capabilities into the platform. They'v ...more
Scope AR has decided to take its live remote assistance enterprise application, Remote AR, further into the mobile augmented reality realm by harnessing the powers of Google's recently released ARCore. While previously supporting devices like the HoloLens, ODG R7, as well as ...more
Enterprise augmented reality software maker Scope AR is bringing the powers of its two productivity apps together like the Wonder Twins into the form of a single app. Announced at the Augmented World Expo (AWE) in Santa Clara on Thursday, the merged app brings together Remote ...more
Today in Santa Clara, California, at the Augmented World Expo, Scope AR revealed a major new update that will add markerless tracking for their remote assistance application, Remote AR, on standard devices. This update, powered by real-time image tracking solution Wikitude, p ...more
What's up readers? We have ever so slightly touched upon this concept of scope with variables but still don't really know what it means. In this tutorial we will learn the behaviors of variables existing in our programs and within functions. What Is a Variable Scope? A scope ...more
Ahead of the highly-anticipated iPhone unveiling and iOS 11 launch, augmented reality developer Scope AR has confirmed that the iOS version of Remote AR, their live support video calling app, will support iOS 11 and ARKit immediately. Remote AR enables users and remote suppor ...more
In this video, we learn how to check your engine health with a PICO scope. First, you will want to attach your computer to the PICO scope that is connected to your vehicle's "brain". After this, you will run through the different sections of the car to see how each of the diff ...more
If you like to learn filmmaking techniques from internet videos fast, then you've found the holy grail right here. This video will teach you how to do four different effects, including text motion tracked to your shots, motion tracking, make a prop sniper scope, and how to dun ...more
While the tech industries giants and eager startups chase the dream of widespread consumer augmented reality, enterprise AR is living the dream today. Now, riding on the strength of present-day return on investment over future potential, enterprise AR platform maker Scope AR ...more
While Magic Leap turned heads at the Game Developers Conference with AR experiences at the Unity and Unreal Engine booths, news broke that the company was the winning bidder for ODG's patents. Speaking of GDC, Epic Games used its pulpit at the conference to announce a new fun ...more
With a fresh infusion of $9.7 Million in funding on its ledger, enterprise augmented reality company Scope AR has now expanded the functionality of its WorkLink platform. On Wednesday, at the Augmented World Expo (AWE), the company announced that the latest release of WorkLin ...more
It's taken me several weeks to figure out the Meade Coronado SolarMax II 60 Double Stack telescope that I bought to produce a timelapse video of the solar eclipse but I'm pretty happy with the images I can produce now. Here's hoping for clear skies tomorrow! Here's a full unc ...more
In this clip, you'll see how to install the DHCP role on Windows Server 2008 R2 and how to create a scope. It's easy! So easy, that this video tutorial can present a complete, step-by-step overview of the process in about five and a half minutes. For more information, includin ...more
San Francisco-based augmented reality company Scope AR has made building AR instructional content for mobile devices and AR wearables as easy as throwing together a PowerPoint deck, primarily via its WorkLink platform. For its next trick, ScopeAR has packaged its platform int ...more
Rajo begins investigating the illusive mystery of aspect ratios and just why on earth we're STILL finding black bars on our fancy new widescreen TVs.
Windows 10 is the most cloud-oriented version of Windows to date—yet, while this means you get some nifty new features, it also means some of your personal data is being shared with Microsoft's servers. Don't Miss: 45+ Tips & Tricks You Need to Know for Windows 10 In general ...more
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabiliti ...more
It seems like every day now that we see a new headline on a cyber security breach. These headlines usually involve millions of records being stolen from some large financial institution or retailer. What doesn't reach the headlines are the many individual breaches that happen ...more
Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I ...more
When joining a new network, computers use the Address Resolution Protocol to discover the MAC address of other devices on the same network. A hacker can take advantage of ARP messages to silently discover the MAC and IP address of network devices or actively scan the network w ...more
When it comes to augmented reality (AR) on Android, you might be wondering how you can get those cool new games and apps on your unsupported phone. Google has an officially supported device list for its ARCore platform, which usually consists of the more modern devices. You wo ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and ...more
Anyone who has rooted their Android device has likely used a tool called Android Debug Bridge, better known as ADB, at some point during the process. For most, that is their only interaction with the ADB, but to be a true Android power user, you need to really know the tools a ...more
Welcome, my neophyte hackers! The aspiring hacker needs to know a bit of Linux to be successful, and probably most importantly, Linux networking. To fill that knowledge gap, I'm offering this guide on Linux networking basics. I assume that you understand a small amount of net ...more
The new iOS 14 for iPhone arrived Wednesday, Sept. 15, 2020, alongside iPadOS 14, and there are a lot of features to uncover. Improved widgets. Better home screen customization. Exciting Messages improvements. New abilities in Camera and Photos. There's so much here that it'll ...more
There's something extremely satisfying about hunting down your online adversaries and knocking them out with a well-placed shot, which probably explains why shooting games are still one some of the most popular time killers for iOS and Android. Shooting games for mobile come ...more
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added. That's a very interesting new feature because it allows Kali to be easily booted on Mac too, and every EFI-supported device. First three preview lines gone? As alw ...more
With iOS 11, Apple is working hard towards breaking down language barriers to bring people closer together than ever before, as evidenced by Siri's newfound ability to directly translate words and phrases in different languages. In the near future, it's easy to imagine Siri as ...more
Does executing a perfectly timed, no-scoped headshot, followed by a well-choreographed teabagging ever get old? No, no it doesn't, and neither do custom emblems for Call of Duty: Black Ops 2. How else are we going to kill time until Black Ops 3 arrives? I've already covered m ...more
For anyone using open source information to conduct an investigation, a balance between powerful tools and privacy controls are a must. Buscador is a virtual machine packed full of useful OSINT tools and streamlined for online research. This program can easily be set up in Vir ...more
Minecraft is not just a game. It is a creative tool. Over the past year and a half countless epic builds, servers, and community projects have been undertaken. I'm sure some of you have seen the one-to-one scale recreation of the Starship Enterprise from Star Trek or the epic ...more
So you've been playing Call of Duty Mobile for some time but can't seem to get MVP at the end of the battle. Well, since the game is a competition of players and bots, you're in an uphill battle. But you don't have to languish at the bottom. With the help of these tips, you mi ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
Today, we are going to combine what we learned from the Introduction to Cryptography article with our Java programming skills. If you are new to Java, check out Matthew's Learn Java: Part One for a quick beginner's lesson, or check out some of the Java tutorials directly on Or ...more
During a penetration test, one of the most important aspects of engaging a target is information gathering. The more information you have coming into an attack, the more likely the attack is to succeed. In this article, I'll be looking at SpiderFoot, a modular cross-platform O ...more
Automating port scanners, directory crawlers, and reconnaissance tools can be complicated for beginners just getting started with Kali Linux. Sparta solves this problem with an easy-to-use graphical interface designed to simplify a penetration tester's tasks. Sparta, authored ...more
Dating websites allow you to see a person in a very intimate context, framing their successes and accomplishments in life to an important audience. The information contained in these profiles often can't be found elsewhere, offering a unique look into the personal life of the ...more
General Motors acquired Cruise Automation in March 2016 for a reported $1 billion (well, at least $581 million). GM President Dan Ammann made a point of being in the press release photograph with Cruise founders Kyle Vogt and Daniel Kan (see photo below). On January 19, 2017, ...more
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already bu ...more
|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
Thanks to Verizon Wireless, I pay over $220 a month for my phone bill. It's just me on the plan—no family members, and it's not even unlimited data. So, when I receive that data alert message telling me that I've used up 90% of my plan and that I've still got a few more week u ...more
Android 11 is here. Prior to Google dropping the naming scheme, this would have been a dessert with an R name (maybe Rice Krispies Treat or Red Velvet Cake) — but nope, just plain ol' Android 11. And after months of betas and a global pandemic, it finally debuted a little over ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
Turns out, you no longer need third-party flight tracking apps to get information on yours or others' flights—your iPhone and Mac can now give you flight details right from your Mail, Notes, and Messages apps. Apple's flight data detectors were baked into iOS 9 and OS X El Ca ...more
Welcome back, my greenhorn hackers! In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this lesson, I want to introduce you to the basics of TCP/IP, i.e., Transmission Control Protocol (TCP) and Inte ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
Just because your car shows an error code doesn't mean you should pull any parts. This video will show you how to confirm error code P 0340 on a Nissan (Bad Cam Sensor) by using a lab scope to check the cam sensor.
It was only a matter of time before the apps from the new Samsung Galaxy S5 leaked for everyone to download and install, and today we've got one that takes advantage of the IR blaster on your Galaxy Note 3. Of course, I'm talking about the updated WatchON app, Samsung's built ...more
Now that we've learned about keeping all our data safe with encryption, it's time to continue progressing through getting your Mac set up for hacking. Just like most other people, we hackers have a lot of credentials to manage. We're also human, so we have a hard time creatin ...more