Designed

How To : Scroll Better on Android Using These Gestures

Smartphones are designed to be used in portrait mode primarily, so smartphone apps are created with that layout in mind. This means that practically every app on your phone is vertically oriented, which, in turn, means that we have to scroll up and down quite a bit. So develo ...more

How To : Turn Your Nexus 4 into a Nexus 5

The Nexus 5 is the current Google flagship packed with the latest and greatest of all things Android, but what if you never made the leap from your Nexus 4 smartphone? Though the N4 is a year old, it's no slouch, and it's still a Nexus. It was among one of the first devices t ...more

How To : Theme WhatsApp with Android L's Material Design

Android's new Material Design language is truly a thing of beauty. Slated to make a full debut alongside the upcoming Android "L" release, the vision and simplicity of this UX design recently won Gold Prize at the annual User Experience Awards. Many developers have already st ...more

How To : Get All the New iPad Pro Wallpapers on Your iPhone

Apple unveiled the iPhone X-like redesign of its iPad Pro line Tuesday, Oct. 30. Among the many new changes to the company's famous tablet was a glimpse at its new wallpapers. These images, while clearly intended to take advantage of the new iPad's striking screen ratio, are c ...more

How To : Get Started with Kali Linux in 2020

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some ...more

How To : Fold an origami dragon

This video demonstrates how to fold the origami model "Eastern Dragon" that Joseph Wu designed. Paper size used in the video: initially: 13cm by 65cm finished model: 18cm by 18cm Part 1 of 4 - How to Fold an origami dragon. Part 2 of 4 - How to Fold an origami dragon. Part ...more

How To : Check Your iPhone's Battery Health in iOS 11

Before, the only way to really tell how your iPhone's lithium-ion battery was performing was to use tools such as Geekbench and Battery Life, but now Apple has included some quick battery health checks right into iOS 11. This feature is only available starting in iOS 11.3, so ...more

How To : 26 Big iPhone Features and Improvements on iOS 16.1

It hasn't been long since Apple released iOS 16.0 with over 350 new features, but iOS 16.1 just came out with even more cool updates for your iPhone. While some of the recent upgrades were expected, others are somewhat surprising — and there's even one that you may not even th ...more

How To : Apply "mehndi" designs with henna

Learn how you can practice the ancient Indian art of "mehndi," or henna tattoos, with this how to video. This step by step tutorial teaches you how to mix the paste, apply it to your skin, and remove it properly.

How To : The Ultimate Guide to Using Instagram Stickers

Something that always brings a tear to my eye is uninspired Instagram stories. When you have a bunch of like-minded friends, you end up with like-minded stories. While it may seem difficult to stand out, stickers were designed so that you can differentiate yourself from other ...more

How To : Easily Generate Hundreds of Phishing Domains

A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more

News : 13 I-do-mean Hellacious Potato Gun how-to Articles

Here are the13 best articles on How to Build a Potato Gun. http://www.scribd.com/doc/15796837/To-Make-A-Spudgun-An-instructionally-informative-document-by-Enoctis Here was my process:  I chose among combustion based guns.  No pneumatics.  As a curator of the video site, Won ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

Hack Like a Pro : Abusing DNS for Reconnaissance

Welcome back, my tenderfoot hackers! As you know, DNS, or Domain Name System, is critical to the operation of the Internet. It provides us with the ability to type in domain names such as www.wonderhowto.com rather than the IP address. This simple service saves us from having ...more

How To : Create an SSH Tunnel Server and Client in Linux

SSH is what is referred to as the Secure SHell protocol. SSH allows you to do a plethora of great things over a network, all while being heavily encrypted. You can make a remote accessible shell on your home computer that gives you access to all your files at home, and you can ...more

How To : Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more

Hacking macOS : How to Create an Undetectable Payload

Encrypting payloads and encoding stagers are more effective against macOS than one might think. It's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of this project was to locate a known and easily detectable macOS payload, then ...more

News : 10 Uses for the Front-Facing iPhone Camera

If you're a lucky owner of the iPhone 4, you know that the upgrade to its camera app includes a front-facing camera feature which acts like a video cam on your computer. Apple, of course, intends the front-facing feature to be mainly used for the FaceTime application which ena ...more

How To : 5 Reasons You Need a Pizza Stone in Your Kitchen

It goes without saying that a pizza stone is one of the keys to making a perfect pizza. The science behind pizza stones is relatively simple: the stone conducts and holds heat, which keeps the oven temperature steady even when a cold ingredient (such as an uncooked pizza) is i ...more

Hacking macOS : How to Hide Payloads Inside Photo Metadata

Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network firewalls as well as vigilant sysadmins. In this attack scenario, a malicious c ...more

SPLOIT : How to Make an SSH Brute-Forcer in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more

  • Hot
  • Latest