Now that we have our payload hosted on our VPS, as well as Metasploit installed, we can begin developing the webpage which will trick our "John Smith" target into opening our malicious file. Once he has, we can take over his computer. This part is more involved, but the first ...more
When you don't feel like talking, let your iPhone do all the work. Yes, your iPhone can speak for you, and it works over phone calls and FaceTime calls. It will even work its magic over your iPhone's speaker for in-person conversations. While Apple created this feature to sup ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
There is no default option on iOS 16 or iOS 17 to lock your apps behind Face ID, Touch ID, or passcode authentication. However, a clever, easy-to-implement workaround will protect your sensitive apps from nosy friends and family temporarily using or looking at something on you ...more
Your iPhone comes packed with a long list of excellent text tones to choose from. Bamboo anyone? Of course, for some of us, stock sounds from 2013 don't cut it anymore. We want customizability, something that's found more on Android than iOS. However, you can add your very own ...more
Returning your device to stock, whether it is because you need to sell it or just want to receive OTAs again, is not always a simple process. Since HTC has released countless variations of both the M7 and M8 HTC One, it can be a pain in the ass finding the right files and tool ...more
You're a busy, on-the-go professional, so you deserve an email client that keeps up with you. "Mail" on iPhone wasn't always the best option, but thanks to iOS 13, it feels like a completely different app. That said, there are plenty of alternatives that offer a different expe ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
A few years ago I went hog-wild trying to achieve a zero-waste lifestyle. I didn't succeed, but the experiment taught me that we throw away things we could—and should—be using more. In ye olde days of our forefathers, people generally used every part of the animal in cooking. ...more
Foodies and big-time chefs like Thomas Keller go crazy for fleur de sel. This finishing salt appears in fancy eateries and cookbooks the world over, and in the early 2000s, it was not uncommon to see diners in a high-end restaurant sprinkle a pinch of fleur de sel on their pla ...more
On April 26, 2019, Sinemia posted a note on its website stating it has ceased all operations in the United States. It's not known if it continues to work in other countries or if US users will be getting any refunds, particularly, for annual subscribers. Over the previous mon ...more
One feature in iOS you're likely underutilizing is 3D Touch, a highly useful, unique tool for iPhones ever since it first appeared on the iPhone 6S. Apple's pressure-sensitive interactivity gives iOS an extra layer of functionality, which can be clearly seen across the entiret ...more
When the topic of Pokémon Go comes up, the typical response is, "Do people still play it?" The answer is a resounding yes! While the game doesn't command the zeitgeist as it did at launch, it has sustained a community of players who have stuck with it over the years. Pokémon ...more
Unless you have unlimited cellular data, you probably connect your iPhone to every Wi-Fi network you come across. It could be a local coffee shop, public library, or just a friend's place. Wherever it is, you'll need to ask for the access point's password if it's a secured net ...more
Never being contacted for a job you're interested in interviewing for is a terrible feeling. It might make you feel inadequate as if your qualifications aren't up to par, but the problem might be that your resume isn't even getting read in the first place. Most recruiters and ...more
Apple's iCloud is a fantastic way to ensure that all of your photos, messages, notes, and other important data are backed up and appear on all of your connected devices. However, you may have information like reminders attached to accounts other than iCloud, which won't appear ...more
While Google Play Music fans mourn its demise, its replacement, YouTube Music, is gaining some neat features that its predecessor never had. On the heels of the AI-powered Suggestions for building playlists, YouTube Music users can now recruit friends to contribute to playlis ...more
Your iPhone just went missing, and now you're panicking. You need it for work, to get around, to contact your friends and family, and pretty much everything else in your life. So, what are the chances you might get it back? The odds may be stacked against you unless it's just ...more
Who here binges TV on a regular basis? I know I do. Never before have we had so many options for watching our favorite shows, especially when you consider how easy it is to stream from anywhere on a mobile device. But sometimes, all that choice gets a little overwhelming. What ...more
There is much to be learned about Apple Music and the revamped Music application introduced in iOS 8.4. Throwing their hat into an already competitive field with other companies like Spotify, Tidal, or Rdio, this is a bold move on Apple's part. So, before you consider signing ...more
The Apple ecosystem might be strong, but so is the pull from devices outside Cupertino's walls. If you've ever felt curious about what life could be like with a Samsung Galaxy smartphone, be that an S21 or a Note20, you don't need to make the switch to know. In fact, you can g ...more
With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardri ...more
So far, iOS 13's major point updates have all been pretty exciting for iPhone. We've seen iOS 13.1, 13.2, and 13.3 come and go, offering more than 60 new features and changes combined to that very first version of iOS 13. While iOS 13.3.1 was a minor update, its successor, iOS ...more
As a developer, before you can make augmented-reality robots that move around in the real world, controlled by a user's finger, you first need to learn how to harness the basics of designing AR software for a touchscreen interface. In recent years, the vernacular for referrin ...more
Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In ...more
In our first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hea ...more
Apple's iMessage is one of the main reasons to use an iPhone, and there's a lot you can do in chats without being overly complicated. But there's one issue that continues to drive people nuts, and that's the blue typing bubble indicator with the moving ellipsis (•••). Can you ...more
While the iPhone world's attention might be fixated on Apple's upcoming iOS 14 and all of its new features, it's still in beta. What's not in beta anymore? Apple's latest iOS 13 update — iOS 13.6 — which dropped on July 15. The new firmware may just be Apple's final iOS 13 po ...more
Privacy and security go hand in hand, especially for smartphones. When it comes to privacy, you decide what personal information about yourself is out there to discover. Security, on the other hand, is all about enforcing those privacy decisions. Sometimes privacy and securit ...more
Whether you subscribe to Apple TV+ or not, the TV app on your iPhone is a great place to watch movies and TV shows. On the surface, it looks like a pretty straightforward app, but hidden features are lurking in the shadows that can enhance how you use it. First, there are the ...more
I remember a time when I had to rent a VHS from the local video rental store. It wasn't all that bad, with the only real annoyances being the trip to and fro, having to rewind the movie and the possible malfunction of my VHS player, which liked to eat tape from time to time. ...more
The worst can always happen. Even if you think you're absolutely prepared, you can somehow find yourself stranded in the middle of nowhere by yourself. It can happen. Without a map, without a compass, without a cell phone... without food and water. There are plenty of dange ...more
In today's world of social media, there's really only two powerhouses—Facebook and Twitter. And those of you with Twitter accounts know the power of a Tweet. Getting more followers means reaching more people, but the vast majority of Tweeters are following only a handful of Tw ...more
Summary Revising body paragraphs requires you to know the mission of your thesis. Body paragraphs are the center of your essays. Without them, you would just have introduction and conclusion paragraphs, nothing else to support your purpose for writing. I use the word "mission ...more
If you were paying attention to the Rio Ad in the 4th quarter of the 2011 Super Bowl between the Green Bay Packers and the Pittsburgh Steelers, you might have noticed the secret Angry Birds code behind the monkey on the wooden fence. It read "13-12" and pictured a Red Angry B ...more
This article is a guide for making Chainmail Armor from start (simple wire) to finish (a finished chainmail shirt). We will be using the European 4 in 1 weave, as this is the most common weave. This is the weave that you usually see in movies. There are several sections to thi ...more
You're lost. You're cold, thirsty— you're hungry. What if you're not much of a hunter? Maybe you're a gatherer. So, then you'll eat plants. But what if you eat something poisonous? What if you're allergic to it? Okay, so not many people will find themselves in a situati ...more
Don't know the combination to your lock securing all of your important gym socks? Maybe you just want to impress all of your friends by hacking a combo lock? Whatever the reason, this instructional hacking video will show you how to open a lock with a soda can shim the easy wa ...more
Learn how to force the Windows 7 taskbar to display a preview for each and every one of your Mozilla Firefox tabs upon mouse-over. This home-computing how-to from the people at Tekzilla will show you a quick and easy about:config Firefox hack that will permit you to do just th ...more
In this episode of Hak5, Darren shows us a USB key, dubbed the USB Hacksaw, that instantly and silently installs on target Windows 2000 or higher computers with guest or higher privileges which will monitor USB ports for flash drives and automatically download their contents f ...more
This video tutorial will teach you a simple hack that will allow you to hide a secret message in any digital picture. Who knew a picture could actually be worth a thousand words? Real words, embedded within! For detailed, step-by-step instructions on recreating this hack yours ...more
Time flies. Particularly when it's projected. The magical box in this how-to uses light and mirrors to project the image of a working clock face on any wall. To build your own working clock projector, you'll need the following materials: a mirror, a jeweler's loupe, a clock an ...more
Few Bluetooth users realize that Bluetooth headsets can be hacked or otherwise exploited to a remote attacker the ability to record and inject audio through the headset while the device is not in an active call. SANS Institute author and senior instructor Joshua Wright demonst ...more
Want to stop wasting energy charging your USB devices? Transform some cheap solar-powered garden lights into your very own solar USB charger. For step-by-step instructions on replicating this hack yourself, watch this video tutorial. Just watch to see how to build your own sol ...more
Unless your name is Jessica Alba, you probably weren't born with a pack of abs that resembles a cheese grater. But whether you're skinny as a rail or have recently let yourself go (to McDonald's a few too many times) and are concealing a nice pair of man boobs, you can perfect ...more
Hack a pair of sunglasses to secretly record audio and video and spend less than $40 in the process with this how-to video. To replicate this hack for yourself, you will need a spy camera and black solar shield sunglasses. For detailed, step-by-step instructions on building yo ...more
XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection betwe ...more
This video will show you just exactly how you can go about tattooing yourself at home. There's not a lot that is cooler than a home made tattoo.
In this tutorial, we learn how to get Games on Demand on Xbox LIVE (Xbox 101). You will find all the newest games as well as classics and downloading is easy. It's the same process as downloading the demos. Just head to the marketplace and select from the title choice. You hav ...more
These days, when people say "gaming", you think of Xbox 360 and PlayStation 3. Even the Wii. How could you not, with games like Black Ops, Gran Turismo 5 and Wii Sports in every retail store known to man? But if you're the type of gamer who sits in front of the computer screen ...more
How to hack Pet Society! Pet Society cheats, tricks, hacks. Watch this video tutorial to learn how to hack poo and coins on Pet Society (09/10/09). See how to get unlimited poo: normal, gold, or rainbow! You can sell them for lots of money! What you need: -Flash Player 9 -Ch ...more
If you're having a problem with your vacuum's clutch and need it replace, don't go pay someone for their service, do it yourself. Not only will you be saving yourself an arm and a leg, but you'll be able to understand how your machine works and what to do next time it breaks. ...more
OK, you've played through GTA IV many times and you're looking for a new kick. Check out this video and see what sweet mods you can apply to take this awesome PS3 game to a whole new level. From weapons, to vehicles, colors, characters, physics and more, these mods will let yo ...more
We all make mistakes and in this tutorial, learn what to do if you decide to go back and change a word after you've already typed it. Fixing a word with Swype - the fastest way of text messaging - is super easy and won't slow you down at all. So, if you've typed that rambling, ...more
So You're New to Counter Strike Source? So you're new to Counter Strike Source and you want to improve your gameplay? Great. You've come to the right place. The first step to improving your game is to admit that you are a NEWB or NEWBIE. Do not confuse this with NOOB. A "new ...more
Go beyond the broomstick and pointy hat! Use the Cinema Secrets special effects prosthetics and makeup collection to make yourself look like a warty, scary witch. This is a perfect way to make an impact with a traditional Halloween costume.
Find out how to use a six volt lantern battery to really save you money. This is no con, or prank, or joke that involves 32 AA batteries; this is the real deal. Just watch this money saving video tutorial to see how to hack a six volt battery. You can easily replace a few of t ...more
The cold time of Christmas is upon us, and Icy Town is a winter-ific game you can play… and hack. With Cheat Engine and a little patience, you can hack and unlock floors in the game easily. This wintery video tutorial teaches you how to hack Icy Tower floors with Cheat Engine ...more
This seven-part video tutorial will take you through the steps necessary to dissecting a sheep brain so we can learn and compare it to a human brain. You'll learn about the different kinds of memory in the brain, and that's not all. So, for this science anatomy of the brain di ...more
Have you forgotten your iPhone or iPod touch password, and find yourself locked out? Way to go! In this video tutorial, learn how to get around the iPhone passcode, and start enjoying your device again. This will let you unlock someones password on an ipod or iphone touch.