Hack Without the Password

How To : Get Rid of Spam in Your Gmail Account

Spam emails are emails that are sent to you without your permission. They can quickly fill up your email account if you don't do anything about it. Each email server deals with spam in a different way. Gmail is good at separating the spam for you so that you can get rid of it ...more

How To : 10 Hacks for Your Next Epic Road Trip

A long summer road trip brings opportunity for adventure, but also increases the chances for minor disasters including backseats that smell like stale French fries, getting lost in unfamiliar roads, and getting unexpectedly carsick. Minimize messiness in your car by turning y ...more

How To : 19 Ways to Reuse Torn Gift Wrap Paper

Though the holiday season is just wrapping up, don't throw away your torn leftover gift wrap paper just yet. Whether for next year's holiday season or for year-round use, leftover gift wrap can be reused for a variety of creative and practical uses. For next year's holiday se ...more

News : Have an NFC-Enable Phone? This Hack Could Hijack It

Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with ...more

News : Slice a bottle in half ... with string

Really? A string? In half? Yes. This is not a hoax. Just old fashioned science. The ingredients necessary are simple: string, acetone and a match. We initially assumed this was a result of the acetone, the magical ingredient in many other fringe hacks of this nature. But th ...more

News : Mod a flashlight into an IR night vision light

Record stealthily, in the dark. This hack is simple and will turn any LED flashlight into an infrared night vision light you can use with any video camera. Infrared light is invisible to the human eye, but it will illuminate any area you are shooting. IR radiation is electrom ...more

How To : Pick an Antenna for Wi-Fi Hacking

When learning Wi-Fi hacking, picking a compatible Wi-Fi network adapter is the first step to learning to crack Wi-Fi passwords. Many compatible adapters have swappable antennas, and there are several different kinds of specialized antennas you can add to a network adapter to ...more

News : 13 Ways a Good Smartwatch Can Enhance Your Workout

Thanks to numerous smartwatch deals this holiday season, many people are receiving their first one. But what exactly can they do? In regards to fitness, quite a lot. With a growing list of sensors and software updates, these small devices can be the very thing you need to ulti ...more

How To : Force-Enable Dark Mode for All Apps in Android 10

Google brought its official dark mode to Android 10 not long ago, but it might take a while for all apps to support the new feature. That doesn't mean you have to wait around for each app developer to add dark mode — just follow this guide to learn how you can force all apps i ...more

How To : Set Up Face Unlock on the Google Pixel 4

The Pixel 4 and 4 XL are the first Android phones released in the US to support secure facial recognition. You no longer have to hate on your Apple's friends because you now have "Face ID" as well. So I assume you want to set it up right away — here's how. The new facial reco ...more

News : Everything You Should Know About the Moto G7

With the best selling phone on Amazon in 2018, Lenovo had big shoes to fill when making the successor of the Moto G6. Fortunately, Lenovo was up to the task. The Moto G7 continues to provide a high performance-to-price ratio, offering a worthwhile upgrade for G6 users while re ...more

News : iOS 12 Dev Beta 2 & Public Beta 1 Hit iPhones

Right on the heels of the iOS 11.4.1 beta 3 release, Apple pushed out iOS 12 beta 2 to registered developers on Tuesday, June 19. Public beta testers received the same version, labeled as iOS 12 public beta 1, six days later on Monday, June 25. Last year, the iOS 11 public bet ...more

How To : Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more

How To : Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed ove ...more

  • Hot
  • Latest