Welcome back, my greenhorn hackers! Digital forensics and hacking are complementary disciplines. The better you are at digital forensics, the better hacker you are, and the better hacker you are, the better you are digital forensics. Unfortunately, few people in either profes ...more
Learn how to bend circuits, disassemble toy cases, unscrew circuit boards and test a circuit bend in this free video series that will help you understand how and when to utilize this unique way of making music. Part 1 of 65 - How to Circuit bend a toy guitar. Circuit bend a to ...more
For those who thought the action in Pokémon Go was a bit too pedestrian, Father.io wants to recruit you for a multi-player, first-person shooter that unfolds on the streets of your own city. Through a mobile app, available now on the App Store and Google Play, and a pocket-si ...more
In this article, we will explore the basics of radare2, a powerful package that comes with Kali. We are going to write a simple program, and then disassemble it, to see what is really doing in the processor. I will use Kali version 1 and x86 (64 bits) instructions. Not all ar ...more
Welcome back, my nascent hackers! In the conclusion of the Mr. Robot television series, Elliot and fsociety successfully completed their mission of encrypting all of Evil Corp's data with AES-128 encryption and destroying the key. Now that all of the data on Evil Corp's serv ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more