Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot. If you've never heard of Samy, you've at least probably heard of one of his hacks. For instance, the Samy computer worm that hacked MySpace, his compressed air trick ...more
There has been a built-in flashlight on iPhones and iPod touches ever since the release of the Control Center in iOS 7, but it has stayed exactly the same since then. In iOS 10 and higher, you can actually adjust the brightness from the toggle if you have 3D Touch. First, swi ...more
Lenovo is teaming up with Google to debut the first Project Tango smartphone, which uses 3D sensors to map the world around it. The Tango phone will be able to give directions without the need for GPS, and it can augment reality to bring things like dinosaurs and cars into you ...more
Launcher shortcuts, which let you skip directly to a specific function on an app when you open it, first appeared in a recent Android N preview build, and now we're getting a look at how the feature might look in action. There are no apps that currently take advantage of thes ...more
We've known for a while that Facebook had planned to reintegrate SMS and MMS into its Messenger app for Android. Well, it's finally live, and it's pretty great. In order to get SMS and MMS abilities in Messenger, you'll need to being running the latest beta release (75.0.0.11 ...more
Night Shift is arguably the biggest feature found in iOS 9.3, but if your phone is in Low Power Mode, you can't use it. Some users have also reported that Night Shift causes battery drain, so using Low Power mode when you don't have access to a charger could be necessary when ...more
For minor adjustments and color-correction, the Photos app is extremely useful, but its capabilities are limited to just the basics. Now, with Mac OS X El Capitan, Apple is opening the door for third-party extensions, meaning we can utilize additional, unique tools when editin ...more
Apple Watch doesn't include a multitasking feature like its iPhone companion, so there's no way to show active apps or swipe up to force-close one. Watch is an extension of the iPhone, not a replacement, so including a fully-functional multitasking feature seems impractical. ...more
Regardless of the size and metal-type you purchased, storage and space are limited on the Apple Watch, so stuffing it full of apps like you'd do on your iPhone may not be in your best interest. If you went app crazy when you first set up your Apple Watch, don't worry—it's easy ...more
This is finding some of your vulnerability using Lynis. This tool Lynis is used on Unix and Linux type operating systems (sorry windows). So lets get started What Is Lynis and How to Install Lynis is a security checking tool which can help you harden your security defenses. ...more
I love cryptography. It is like a great gigantic puzzle for me to solve. However, it is more important than that. It is also how we keep secrets safe. Not just sorta safe either, but really safe. Until recently, if you wanted to use strong encryption you had to either learn d ...more
A long summer road trip brings opportunity for adventure, but also increases the chances for minor disasters including backseats that smell like stale French fries, getting lost in unfamiliar roads, and getting unexpectedly carsick. Minimize messiness in your car by turning y ...more
Most new stereos come with an auxiliary port built in, but if you drive an older car, you're usually stuck with the radio or CD player, and we all know both of those options suck. So, rather than paying the $95 fee the dealership wanted to charge, or replacing the stereo alto ...more
Want to search through your Samsung Galaxy S III or other Android smartphone using only a web browser? Thanks to XDA-Developers member Metal Droid, you can now access and download anything from your phone through any browser on your computer using DroidXPlorer. With DroidXPlo ...more
The creation of private browsing was brought upon by the backlash against ad tracking and other ways that sites and agencies take away users' privacy online. People were tired of getting spammed with ads for Vitamin C pills simply because they visited WebMD. Private browsing i ...more
A couple of months ago at the Black Hat security conference, hacker Cody Brocious gave the hotel industry a nasty surprise when he figured out how to hack the locks made by Onity that are used in millions of hotels worldwide. The reason his hack is so impressive is because it ...more
The camera system on the iPhone has never been better. Apple's iPhone 11, 11 Pro, and 11 Pro Max sport some of the best shooters on the market. But no level of quality makes up for the fact that shady apps can access your cameras for nefarious reasons. You can take control of ...more
Spreading your reach to new audiences on Instagram takes time and effort. It's not only about taking unique photos and curating an exciting feed. You should choose the time of day wisely, connect with popular brands, and take advantage of hashtags. Unfortunately, hashtags can ...more
Slack's in-app web browser works fine, but it just doesn't offer the functionality and features that a dedicated browser such as Chrome, Firefox or Safari can. Features like the ability to bookmark a page, search for specific text, or request the desktop site are missing. Luck ...more
Slack is meant for business, but it's inevitably used for personal reasons too, or even just to goof off with colleagues. However, you never know who's looking over your shoulder (nosy coworker? boss?), and you could get in trouble for something sent to you. That's why you mig ...more
Adobe is best known for its photo and video editing software, but they also have a number of lesser-known apps that you may be interested in. Adobe Fill & Sign, available on iPhone and Android, is the best way to electronically fill out important documents on your smartphone w ...more
If you're an Apple fan, AirPods are the must-have wireless headphones to own. They know when they're in your ears, will pause music when one is taken out, and when you pair them with your iPhone they'll already work on your Mac, iPad, and iPod touch using the same Apple ID. Ho ...more
With the rapid demise of the 3.5 mm headphone jack, Bluetooth is fast becoming our best option for universal audio. The problem is, with over a decade of it being a standard component, many of us still own a reliable pair of wired headphones that we don't want to gather dust. ...more
The iPhone X ushered in the Swiss Army Knife-like Side button, which can perform numerous functions, such as summoning Siri and opening Apple Pay through click gestures. This has carried over into the iPhone XS, XS Max, and iPhone XR, so if you've upgraded to one of these devi ...more
A massive leak appeared the web today, and it's got some huge security implications for every iPhone on the market. On the plus side, it also has some potential for enabling deep-level modifications and jailbreak tweaks. GitHub user ZioShiba posted the iBoot source code for i ...more
Life is all about spending time together with loved ones, experiencing new places together to enjoy and create memorable moments. Luckily, Google has made it easier for us to rendezvous with friends and family at specific places by letting us broadcast our locations using Goog ...more
Running commands on Linux seems so complicated for the layman that it may as well be a foreign language. But for the die-hard terminal users, or for those who are just curious about the Linux experience, there's a new Android launcher that gives your home screen a command line ...more
Buying a smartphone used is an excellent way to save money, but those savings come with a risk that your seller isn't as forthcoming as they claim. You don't want to end up buying a stolen smartphone because it might not work correctly ... and, you know, it's wrong. Luckily, t ...more
Tom Clancy games, like Rainbow Six and Ghost Recon: Wildlands, are famous for their realistic and immersive gameplay that focuses on covert, low-intensity warfare. Ubisoft now appears to be testing the overcrowded waters of mobile gaming with the release of ShadowBreak, and ha ...more
Netmarble's ChronoBlade, a mobile role-playing game, has made its way to iOS and Android by way of a soft launch that will make it exclusive to users in Canada and Singapore for a couple of months. Its console-quality graphics and extra features will surely make it a hit when ...more
Dynasty Warriors has finally been unleashed on the world of mobile gaming. The latest installment in the popular series is called Dynasty Warriors: Unleashed, and it sends you rampaging through armies using a variety of devastating attacks, all while collecting and upgrading o ...more
If you're an Android user, Google probably has almost your entire digital life stored on its servers. Family pictures are backed up on Google Photos, your e-book library resides with Google Play Books, videos are on YouTube, chat logs in Gmail and Hangouts, starred places and ...more
You're all kale-d out, you've had it up to here with golden milk, and you're on the prowl for the next superfood. Well, get ready for some unicellular goodness: the next superfood is an algae named Spirulina, also known as Blue Majik. (Kudos to the marketing exec that came up ...more
Fish are delicate, flaky, and can be damn tricky to cook; more often than not, you end up with a hard, dry block of flesh that makes your taste buds sad. And the best ways to cook fish that you know of—c'mon, who doesn't love a fried fish—take way too much effort for you to bo ...more
We love a good bowl of punch just as much as the next partygoer. But you don't want to be the one to make his or her way to the bowl after all the ice melts and turns that beautiful beverage into a watery wasteland. Don't Miss: Turn Fruit Juice into Cheap Homemade Booze Luc ...more
Back in iOS 8.4, Apple introduce a new "heart" icon in their Music app, which works in direct correlation with their Apple Music service that was released at the same time. By hearting a song, you're telling Apple that you love that song, and they can make better suggestions f ...more
Google has an intriguing feature called Nearby that lets users share content without being on the same Wi-Fi network, or without even exchanging contact info first. Instead, the function uses an array of standard smartphone features, as well as subsonic sound, to identify othe ...more
Google seems to be growing tired of the way links appear in its Search results page, because they're currently experimenting with a color change (that's already causing lots of controversy). Google changed the color of the links to show up in black instead of the blue that ev ...more
Although there has been much speculation about how much damage could be done if hackers were to take control of a country's SCADA systems, there have been few examples - until a few months ago, with the power outage in Ukraine caused by hackers. How? The attackers used a wid ...more
One of the best qualities about fresh bread (such as sourdough) is a thick, crispy crust—which is easy to create in a commercial oven, but can be tricky for home cooks to replicate. Luckily, the the trick to baking a professional-style crust is a simple one—just bake your loaf ...more
As one of the most popular home screen apps on Android, the Google Now Launcher is used by millions of people across the world. The two main reasons behind this success are its integrated Google Now home page and an elegant, easy-to-use design. But as simple and straightforwa ...more
We've been on a constant hunt for the best way to make almond milk at home, and we think this trick might just be the most genius yet. You see, we've been big almond milk fans for years now. We put it in smoothies, coffee, baked goods, eggs; you name it, we've probably tried ...more
Cake decorating is one of those activities that used to leave my hands sticky and my spirits dampened. No matter what I seemed to do, the final result always ended up looking like a preschool art project. Thankfully, I've discovered a few tips that make the whole mess a bit m ...more
Any other person can make plain pancakes... but only the most awesome of cooks can make stuffed pancakes. Luckily, this isn't a tough technique—in fact, it's so easy that you'll find yourself getting bored of the run-of-the-mill pancakes and dreaming of all the things you can ...more
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future. To further emphasize how important our skill set is, knowledgeable estimates put the potent ...more
Black lights come in all shapes and sizes, and they're useful in a variety of ways. They can help you spot fake currency, urine stains, interesting rocks, and deadly scorpions, and they can even help you view cool fluorescent artwork. Most black lights work using a filter or ...more
Butter is one of the most versatile ingredients in the world: its variety of uses range from brightening a morning piece of toast to finishing a beautiful rib-eye steak with decadent flair. When warm butter is mixed with herbs, spices, and other supplementary ingredients, the ...more
ADB and Fastboot are probably the most essential tools for any Android aficionado. They can do everything from backing up your device to unlocking your bootloader with a few simple steps. This paves the way for many new tweaks and customizations that weren't possible before. T ...more
If you have some photos, videos, and documents that you want to keep completely hidden and encrypted on your Android device, Andrognito is the app you need. We showcased this app in the past, but since then, CODEX has rebuilt it from the ground up with new and improved feature ...more
With all the stress that goes into booking flights and lodging, packing (and not forgetting) everything you'll need, finding pet sitters, and everything else that goes with a trip overseas, there's the added stress of staying connected while abroad. Don't Miss: 11 Tips to Mak ...more
Ad blocking on Android usually requires root access, but a pair of new browsers based on the open source Chromium and Firefox builds are looking to change this. Today, I'll be going over two options for ad-free web browsing without root access. The first is the Chromium-based ...more
On the internet, everything is possible, even if it's not grounded in reality (check no further than anything The Onion publishes). Witty headlines combined with clever photo edits make even the most absurd topic seem like a serious news story. Some of these stories are so con ...more
It happens to even the most avid cereal eaters: sooner or later you open a box, unfurl the crinkled plastic bag, and find that the cereal inside is stale. Maybe you forgot about it, maybe you ate it too slowly, or maybe you just found a new, better cereal and left it behind li ...more
Hello my fellow hackers, Welcome to my republished revision of the ruby programming language, Part 1. Today, we will try to build an ftp cracker in ruby: This is going to be a quick one since OTW has already made one in python and we are gonna look upon that to create a simil ...more
Welcome back, my greenhorn hackers! In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server's memory that may contain authentication credentials, co ...more
"Ahoy-hoy." If telephone titan Alexander Graham Bell had his way, we'd all be answering phones like Mr. Burns. Thankfully, frienemy Thomas Edison had enough sense to realize we weren't always on the briny. He preferred "hello" as our standard telephone greeting, which he is c ...more
SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool c ...more
As fun as Twitter is, it can also quickly turn scary. Anonymous, aggressive, and troll accounts can attack you for your tweets and stalk your every move. While you could make your profile private and block users, there are lesser-known privacy and security features that you ca ...more
It seems like each day our phones become more integrated into our lives. School, work, shopping — so many tasks either require a phone or heavily benefit from one. But our phones are a double-edged sword that can easily distract us and harm our mental health as well. This is ...more
Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target. Thanks to a pair of recon tools coded in Python, it takes just seconds to research how a website or server might be vulnerable. No matter what platform ...more