Like many other smartphones, the HTC One has a few capacitive keys on the bottom of the device, but that's the problem. It only has a few keys, meaning two, which are the Back and Home keys. Other devices, like the Samsung Galaxy S4 and Note 2, also only have two capacitive k ...more
The USB Rubber Ducky is a famous attack tool that looks like a USB flash drive but acts like a keyboard when plugged into any unlocked device. The Ducky Script language used to control it is simple and powerful, and it works with Arduino and can run on boards like the ultra-ch ...more
Remember what life was like before your iPhone? Before there were palm-sized smartphones with seemingly endless features, there were phones like Motorola's RAZR that peaked with its embedded camera. Before that, there were simple flip phones with texting capabilities, bulky tw ...more
If you have some photos, videos, and documents that you want to keep completely hidden and encrypted on your Android device, Andrognito is the app you need. We showcased this app in the past, but since then, CODEX has rebuilt it from the ground up with new and improved feature ...more
Kali Linux is established as the go-to operating system for penetration testing, but in its default configuration, it's less than ideal for regular desktop use. While in many scenarios, a live boot or virtual environment can resolve these issues, in some situations, a full ins ...more
As per Alex's request, I am posting about generating word-lists in Python. However, this is my FIRST attempt with Python, so please provide me with critiques and any and all comments. I really want to know what you think as there was a little bump here and there seeing as I a ...more
The first public beta of Android O, (most likely to be called "Android 8.0 Oreo") was released on May 17, bringing tons of new features and goodies for Android enthusiasts with supported devices. However, not all of Android O's features were available to try out right off the ...more
Sony's latest flagship, the Xperia Z3, comes with some pretty high-end hardware, but what really draws me to it are the aesthetics of its ROM, Xperia UI. Even though my HTC One M8 can still go toe-to-toe with the Z3 in a performance matchup, there is something about Sony's UI ...more
In this Arts & Crafts video tutorial you will learn how to make a 3D origami swan from 484 paper triangles. For this you will have to cut up 16 sheets of paper in to small rectangles. One rectangle is 1/32 of an A4 sheet. Take a small rectangle, fold it in half lengthwise and ...more
Today, I'm going show you how to back up all of your apps and their data using Android Debug Bridge (ADB)—an essential function for all softModders. These commands will be especially useful when you are updating your version of Android, since they don't require a third-party p ...more
|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
This is how to hack a computer for educational purposes. First you need its IP address, radmin viewer 3.3 or later, and an open port scanner. Okay so first you need the IP and scan the IP address of the computer. Now find what open port it has. Ok then open up radmin viewer an ...more
The concept and structure of Christmas hasn't changed much since its inception. In its infancy, Christians recruited Roman pagans by associating Christmas with the Saturnalia, an ancient Roman festival in honor of the deity Saturn (also held in December). The pagans had long w ...more
If you need to remove vocals from a song in Pro Tools first you need to open Pro Tools and load the song. First, you need to split this track so go to Track and click split to mono. Now, mute this first track. Next, you want to remove the stereo by panning each the bottom to 0 ...more
As much as it pained me to lose lock screen widget functionality, I just can't bare changing out the sleek-looking lock screen that's standard on the OnePlus One. The latest OTA introduced a new transparent theme, and while that's a welcomed improvement, I need more options! ...more
As the first phones to be made by Google, the new Pixel and Pixel XL have several slick customizations that you won't find on any other Android device. There's tons of functional stuff like the new Google Assistant and a much-improved camera app, but also a few aesthetic tweak ...more
When it comes to Android automation apps, Tasker has never had much competition. But considering how difficult it can be for a novice user to get the hang of things, and factoring in Tasker's drab and complicated interface, there's definitely room for another developer to step ...more
Welcome back, my amateur hackers! Over the course of the next year, we will be developing our own zero-day exploits. In my first article in this series, I introduced you to buffer overflows, which are the source of some of the most lethal exploits, particularly the "remote co ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
Alwaysnforever559 teaches viewers how they can make their own color acrylic for nails! First, you will need a container, a clear powder (Acrylic) and an eyeshadow color that you will like for your nails. Pour in the acrylic clear powder in the container and pour the same amoun ...more
Samsung's version of Android Pie has landed on Galaxy handsets like the Note 9, S9, and S8, though we've known what to expect thanks to leaked beta versions of the software a few months back. The newly dubbed One UI has plenty of new features and improvements, but some of the ...more
When working on the dashboard of any vehicle, make sure you disable the vehicle's airbag system first. Your service manual should tell you how to do that. In this video, the heater core is plugged up in a 2001 Ford Taurus, which means it needs to be taken out. The book states ...more
Minecraft has been out nearly two years now. Hard to believe, isn't it? Fans of the game have been spoiled with a lot of new content over that span from its creator Notch, as well as its modders. A couple months ago, Notch tortured the Minecraft community by tweeting some scre ...more
Welcome back, my nascent hackers! Although my favorite TV show, Mr. Robot, had completed its first season already, I have not completed demonstrating the hacks that Elliot used in the show. (By the way, I can't wait for season 2!) In several episodes, Elliot was seen sending ...more
Though more well known for their OLED displays and advanced cameras, Galaxy phones like the S8, Note 10 & 10+ and S10 series are a force to be reckoned with when it comes to audio. In fact, flagships from the S9 on up feature AKG-tuned stereo speakers, along with a slew of sof ...more
Smartphones and other Wi-Fi enabled devices send radio signals called probe frames to locate nearby wireless networks, which makes them easy to track by listening for their unique MAC address. To show how this kind of tracking works, we can program a NodeMCU in Arduino to snif ...more
Definition Declare is a card game played by 3 or more people. If 4 people are playing the game, then one pack of 52 cards (without the jokers) is sufficient. For 4 to 8 people, two packs of cards are required, without jokers. Aim & Objective To have the minimum number of po ...more
Samsung's not one to make drastic changes to what already works. They've continued on with the IP68 rating under IEC 60529 first given to the Galaxy S8 all the way to the the Galaxy Note 10. If you're a little confused as to what this rating means, don't worry, it's actually p ...more
If you turned on your HTC One for the first time and wondered what that weird icon that looks like an N is, it indicates that NFC is on. It seems strange to me that HTC wanted to waste Status bar space on an NFC indicator, but sometimes we just have to deal with it. However, i ...more
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open ...more
The closest I've ever been to first class was when I was a young kid running up and down the aisles on a long international flight. I remember being in awe of how big the seats were and how much food was available. Ever since that moment, I've made it my life goal to earn enou ...more
Many operators use elevators to control access to particular floors, whether it be the penthouse at a hotel or a server room in an office building. However, the law requires them all to have a fire service mode, which gives emergency access to restricted floors, and a hacker c ...more
Cleaning the clutter off of your desktop every so often is a great idea. Unfortunately, that doesn't mean that you're actually going to do it. Whatever the reason, you may not have time to get everything organized, but luckily there is a way to temporarily "clean" your desktop ...more
These 2 videos demonstrates how to tie your Converse high tops in fun, stylish ways. For the first video, take a pair of shoes and take out the strings. Thread one string through first whole going INSIDE. Take the other side of the same string and do it on the other side. Ma ...more
Despite having the UltraPixel branding, the M7's camera can leave you feeling a little let down. The picture quality is clear and the low-light shots are decent, but when looking at the same shots taken on a friend's iPhone, you may feel a little inadequate. You could always ...more
A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website d ...more
This is the very first article in my series on setting up a Mac for hacking. In this series, I will be operating under the assumption that you have a clean install of macOS (previously OS X). If you aren't starting with a clean installation, there may be a few differences, but ...more
In this tutorial, we learn how to whiten teeth in one minute using household items. You will need: a lemon, baking powder, and a cup to do this. First, pour baking powder into a cup and then squeeze the juice of a lemon into the cup. After this, mix the two together until you ...more
Every summer my husband and I plant a tomato plant. We do this to enjoy the plump red tomatoes right off of the vine. This summer we have had a problem, which is that SOMETHING IS EATING OUR TOMATOES AND IT IS NOT US! The Beginning Let me start from the beginning. Purchase ...more
So the new iPhones have arrived. Like last year, Apple released three iPhones in three different sizes that vary in price and specs. There's the base model iPhone 11, and then there are the real deal, premium models, the iPhone 11 Pro and Pro Max. The iPhone 11 Pro and 11 Pro ...more
I have a theory that chocolate chip cookies are the gateway drug to cooking. The recipe is easy, no special equipment is required, and at the end, you get warm, fresh-from-the-oven cookies that are simply irresistible. It's how I got hooked on baking and cooking, and anecdotal ...more
Snapchat is an app built on sending quick-to-disappear pictures to your friends and family. Sure, this is the primary function of the app, but sometimes users want longer-lasting Memories while interacting with Snapchat. While My Story allows snaps to stick around for 24 hours ...more
Welcome back, my hacker novitiates! In previous guides, we have used one of the most powerful hacking platforms on the planet, Metasploit, to perform numerous hacks. They ranged from exploiting Windows XP and Windows 7/8 vulnerabilities, to installing a keylogger and turning ...more
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is setting up a package manager that can install and update open-source hacking t ...more
Samsung's Android Pie update — known as One UI — is bringing major changes to the Galaxy S8, Galaxy S9, and Galaxy Note 9. The main interface has received a visual overhaul, and this is no more evident than it is with notifications. The biggest changes are with the notificati ...more
There are tons of good reasons that you might want to use Android on your desktop. Perhaps your favorite game is only available on Android, or maybe you use a messaging service that doesn't have a Windows companion app. Whatever the reason, if you've ever found yourself wishi ...more
Being in a band, I exposed myself to years of extremely high volumes, so I can't hear as well as I once did. I'm not concerned about going deaf or anything, but I tend to have the volume raised to the max, beyond the "high volume" warning, whenever listening to music on my One ...more
The newer HTC One is arguably the best smartphone yet in terms of hardware, but its software moves considerably farther away from the stock Android experience. Even more so from HTC's own Sense. The biggest change from Sense 4+ to the newest Sense 5 is Blinkfeed, a scrollable ...more
The HTC One has been officially released in Taiwan! The new wallpapers preloaded on the phone have been ripped and put up for download. Grab them for your phone now! Click on the images below to get the bigger versions. Pick and choose which ones you want to download from the ...more
Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal. The terminal is a key component of any pentester's setup. We're going to be spending a lot of time wo ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
Android is constantly being refined, and the tools used to root and install custom recoveries are no exception. Earlier methods to root and install custom recoveries were very long and complicated. Any misstep along the way and you can end up with a bricked tablet. That's the ...more
In this video from carahamelie03 we learn how to wear your Converse with skinny jeans. First make sure your Converse are laced the right way. The laces should go up and through the holes downward toward the shoe. Unlace the first two holes on both shoes. Wear socks that go dec ...more
Snapchat offers a rich experience for anyone looking to communicate with pictures in addition to (or instead of) words. There are many ways to share your snaps, from Memories to My Story. You can even draw all over your snaps, creating a unique experience that hinges on your o ...more
Make sure you use FLASH Player 9 First: Deinstall Flash Player 10 -- http://kb2.adobe.com/cps/141/tn_14157.html Second: Install Flash Player 9 -- http://kb2.adobe.com/cps/142/tn_14266.html How to hack Coins & Gourmet points in Restaurant City? Step 1: Let all your employees be ...more
This recipe will be a bit time consuming and may seem a bit lengthy—it can take up to an hour to complete depending how big of a batch you are making—but the end result is fantastic. That being said, here are the few things you will need. 3 or more large potatoes (any variety ...more
I know it's a very first-world problem, but I really can't stand it. Email was invented to speed up communications between people across the world, even just across the office, yet when I'm on my super awesome iPhone running iOS 7, I have to go back and forth between my galler ...more
Call of Duty may be one of the best video game franchises ever, but I doubt you'll see very many people dressed up as COD characters this Halloween. As awesome as the games are, there just aren't any memorable characters when it comes to looks—besides one. Simon Riley, otherw ...more
Let's face it, not every logophile is addicted to Scrabble. Without the use of a timer, Scrabble can be a pretty slow game. Even in clubs and tournaments where the standard time limit is 25 minutes per person for a two-player game. Now, take away time restrictions and add two ...more
In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, ...more