Get Access to Work Internet

How To : Remotely Install Apps onto Your Android Phone

There's an official way to install apps onto your Android phone using basically any device that has internet access — heck, you can even download new apps from an iPhone and they'll install in seconds on your Android device. If you come across a cool Android app while you're ...more

News : Let's Contribute That Project!

Hi, At the beginning - I am NOT an Author of that github work, but I found it on the Internet. As you see programmers are encouraged to develop it. It's written in python. You can read a lot of great tutorials here about that language, so lets do something creative. I'm also ...more

How To : Stop Apps from Accessing Your Google Account

Many apps and services that are available for Android can only work if they have access to your Google account. While you're setting up one of these apps, you'll see a popup that says something like "This app would like to access your Google account," and the options are "Acce ...more

News : Can We Hack the Hackers?

Welcome back, my rookie hackers! For some time now, I have been contemplating this issue, can we hack back the hackers? As someone who plays on both sides of the cyber security ping pong match, I've wondered whether I can use my hacking skills in self-defense of my clients. A ...more

Oops : Some Security Doors Can Be "Picked" with Canned Air

Security researcher Samy Kamkar, best known for his MySpace Worm, and most recently for his online calculator that can help you crack any Master Lock combination, is at it again. This time he's figured out how to break into security doors that have a motion-sensing egress syst ...more

How To : Search Public Posts on Facebook

The newer Graph Search in Facebook can help you find friends in specific cities, photos of a particular subject, restaurants that your friends liked, and a whole lot more. One thing it can't help you with just yet is searching public posts on Facebook, which you could do in th ...more

How To : The Five Phases of Hacking

Five Phases of Hacking:- The five phases of Hacking are as follow: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks The Five Phases of Hacking Reconnaissance:- This is the primary phase where the Hacker tries to collect as much information as possib ...more

How To : Perform an Attack Over WAN (Internet)

So, you want to perform an exploit on a victim, but you're not on the same network as their machine. In this tutorial, I'll be showing you how to set up a meterpreter reverse_tcp attack to work over the internet. Understanding the Process Here is the connection we wish to es ...more

How To : BeEF+Ettercap:Pwning Marriage

This is the best how-to's website that I've ever seen, and I wanted to join it. It taught me a lot, but, because I'm here to learn too, please correct me if I'm wrong. You probably know that Ettercap is a very powerful tool for man in the middle attacks. You probably know tha ...more

News : Apple's iOS 8 Coming This Fall—Here's What's New

The new iOS 8 was just unveiled, and it looks pretty awesome. Apple showed off some of the enhancements and new features we can expect to receive in the fall at WWDC, and while not the huge facelift we saw with iOS 7, it does showcase what Apple does best—refinement. Continuit ...more

How To : Get the Nextbit Robin's Launcher on Any Android

We recently covered a set of ported apps from the new cloud-based smartphone, the Nextbit Robin. These ported APKs brought two of the Robin's slick new stock apps—Camera and Gallery—to any other device, but the launcher was conspicuously absent. Don't Miss: Get the Nextbit Ro ...more

  • Hot
  • Latest