Have a lock on your bike or shed but you have lost the key? Watch this hacking how-to video and learn the art of picking a lock using a common kitchen utensil. Yes all you need to crack open a lock is a fork for your kitchen drawer. Follow along and see how easy it is to pick ...more
After teasing the feature in Android 10, Google finally added proper native screen recording to Android 11. But when you start a capture, you'll see a small red indicator in your status bar as long as recording is ongoing, which can really distract from your video. Thankfully, ...more
The Pixel 5 is a great value proposition in this era of $1,500 phones. With its reasonable price tag, fully open-sourced software, and unlockable bootloader, it's also an ideal phone for rooting. The process of rooting the Pixel 5 is a tried and true method: Unlock the bootlo ...more
In this how to video, you will learn how to open a locked zippered luggage bag. This is very useful if you plan a trip and forget the key to the lock of your luggage bag. All you need is a normal pen. Remove the lid of the pen. Apply pressure in between the zipper. Once you ge ...more
In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorit ...more
Video chatting has become an important factor in the overall smartphone experience. Even just a few years ago, 37% of teens were making video calls on a regular basis, and that number has surely grown. 85% of households with infants have used video chat apps to call relatives ...more
If you're experiencing issues with an app or custom ROM and would like to report your problem to the developer, there's no better way to do it than by capturing a logcat. Android keeps track of all the commands that have been executed by various apps and services, which means ...more
Any dope can play “Heart and Soul.” Now you can be one of them. Use your pointer finger to hit the 2nd F key up from the middle C briskly three times, then hit it once more before moving down to play keys E, then D, then F three times, briskly. Then F once more, before bouncin ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
How to make sparks without matches or a lighter If you camp a lot there is a good trick for making sparks without matches or a lighter. The biggest key to making a fire is to be able to do it when stuff is damp and wet. Lighting a fire in damp circumstances can be hard. You ca ...more
Whether it's for health reasons or just to look better, many of us want to get in shape. It's a long process that starts with nutrition, and dieting is never easy. Fortunately, there are some great food-tracking apps that will make it a lot easier to become a healthier version ...more
I think part of the reason why I don’t eat more vegetables or fruits is because there's always a process—a simple one, but a process nonetheless. Having to wash my fruits and veggies is just flat out annoying. I just want to eat them, not take a shower with them. In addition ...more
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself ...more
Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can ...more
David Blaine has made millions off his magic tricks and mind-bending illusions, so why shouldn't we get in on the action, too? Well, your Samsung Galaxy S3 can do all kinds of things, but magic isn't one of them...yet. Thanks to Android developer Badea Bogdan of Binary Buildi ...more
Nearly two years ago, Peter Chou, CEO of HTC, confirmed that the company would no longer be locking bootloaders. Whether or not they've actually lived up to this claim is debatable. Any phone bought from a wireless carrier comes locked. Only the new HTC One Developer Edition s ...more
UPDATE NOVEMBER 2015: The root process has changed for the Nexus Player now that the device is running Android 6.0 Marhsmallow. I've updated this article with detailed instructions on the new root process, but the video below still depicts the old process for Android Lollipop ...more
If you've got a Samsung Galaxy S3 or Galaxy Note 2, you probably either love or hate the Social Tag feature. Using facial recognition, much like Facebook does, it scans your photos and lets you tag a name to a face. If your device recognizes the face by itself, it will automat ...more
While Windows 10 is still a few weeks away from a public release, that doesn't mean you can't enjoy its brand new features right now. Anyone with an Insider Preview account can install Windows 10 on their computer. And that doesn't just go for those that own a Windows PC—Mac u ...more
Expressing yourself during chats is much easier these days thanks to the steady rise of emoji. Now, products like emoji Minis for Gboard are taking the craft to an interesting yet familiar new level. With emoji Minis, you can automatically create stickers based off your own fa ...more
The fine folks at ITS Tactical made this detailed tutorial on how to make a two-piece lock pick set out of only a few paper clips and using only a multi-tool in the construction. The host begins by demonstrating how to construct the pick, then how to use it on a real lock. It ...more
If you loved The Da Vinci Code by Dan Brown, then listen up— there's been a new discovery found hidden within Leonardo da Vinci's most famous painting— the Mona Lisa. An Italian researcher named Silvano Vinceti sparked a new controversy over the world's most famous painting w ...more
A low-key iPhone feature that's been around since iOS 10 can make the iMessages you send to family and friends more exciting overall. One particular element is, if you'll forgive my decades-old slang, "da bomb" for emoji. And no, I'm not talking about text bombs, i.e., automa ...more
Tired of your Samsung Galaxy S3 being a square? Make it more well-rounded by ditching those 90-degree corners on your screen for new adjustable round corners instead. It may be a minor tweak to your device, but the psychological effects of a more circular screen may help you f ...more
Perhaps you've thought about rooting your OnePlus 5, but thought again when you heard SafetyNet would prevent you from using apps like Google Pay, Pokémon GO, or Netflix. Those are valid struggles when you root using traditional methods. There are no such worries when using Ma ...more
Windows 10 is due to be released on July 29th, and the majority of existing Windows users should be eligible to upgrade to the newer version for free. But there's been a lot of confusion about which older versions of Windows will be eligible for the free update, and some unce ...more
Welcome back, my novice hackers! In a recent tutorial, I showed how the SNMP protocol can be a gold mine of information for reconnaissance on a potential target. If you haven't already, I strongly suggest that you read it before progressing here, as little of this will make m ...more
Can't play your DVD movies on your brand new Windows 8 system? That's because Microsoft decided to omit Windows Media Center from Windows 8 this time, instead making it available as an extra download—and it's not free anymore. At least, it won't be next year. What does that m ...more
Safari has always done a great job at letting you browse the web, but it has never so much as offered a way to download files locally. Other apps have stepped in to help fill the gap, but they never felt as integrated into the iPhone as a native downloads manager would. They a ...more
The octopus is famous for its bulbous head, enormous eyes, and four pairs of long arms. The stuff of legends and nightmares, octopi have been featured in stories, artwork, and meals galore. But how do you eat this distinctive looking, bilaterally symmetrical sea creature? Her ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
This video tutorial belongs to the Electronics category which is going to show you how to reset the Blackberry Bold 9000 / 9700 with three methods. In the first method you hold down the Alt key, the Caps lock key and hit Delete. Your Blackberry will start resetting. This proce ...more
The first thing you'll always have to do before getting your customization game on with most phones is to unlock the bootloader. Doing so opens the true potential of the device, allowing you to root, install TWRP, Magisk, custom ROMs, and other mods. No matter your wants or ne ...more
With protests springing up across America, there's a chance you may have your first interaction with law enforcement. Many demonstrators will have their phones in-hand to film the action, which, sadly, could prompt an officer to demand the device and any self-incriminating dat ...more
Since I recently had this problem and fixed it, I might as well share the solution. This is actually REALLY simple to fix but will impact your cards' performance. This tutorial is only tested on Radeon HD 5xxx series. Other cards may vary. It would be appreciated if you would ...more
It's often the smallest details that determine your overall experience with a smartphone. Unlocking your device with a PIN is an example — and iPhones have had a leg up over Android thanks to their automatic unlocking. Thankfully, this era has finally come to an end with the a ...more
One of the more low-key functions to arrive with the Note 10 was the ability to easily record your screen system-wide. Thankfully, this long-awaited feature will finally make its way to popular Galaxy devices like the S10 and Note 9 thanks to One UI 2. In the past, screen rec ...more
Whether if it's to play games or watch Netflix or YouTube, children love using our smartphones and tablets. As an uncle of many, I don't mind my nieces and nephews using my gear, but I do mind them opening apps they have no business being in, like my photo gallery or messaging ...more
Welcome back, my budding hackers! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to find vulnerabilities or flaws in the target system, which are what we exploit when we hack. We have looked at several ways to do that including var ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
The Nexus 5 is the current Google flagship packed with the latest and greatest of all things Android, but what if you never made the leap from your Nexus 4 smartphone? Though the N4 is a year old, it's no slouch, and it's still a Nexus. It was among one of the first devices t ...more
You probably already know by now that a custom Android ROM can change your user experience and give you what feels like a new OS on your device, and there's no shortage of them out there to try out. A great perk of being a Nexus 5 owner is that devs tend to commit resources t ...more
Sending and receiving files between Android devices has no shortage of options—Bluetooth, email, MMS, and Wi-Fi are just a few of the more popular ones that we use. While the choices for this functionality are plenty, problems can arise with connectivity issues and file size ...more
Boxing a table doesn't mean getting into the ring, but it does require a certain degree of skill to successfully complete. Boxing the tablecloth is a great technique for any occasion or party, and every caterer should know these moves. First, drape the cloth over the table. N ...more
Thanks to its intuitive interface that makes sending and receiving money a breeze, Venmo has become the go-to app for millions in the US. In fact, you've probably heard the term "Venmo you" being tossed around between friends. But before you take the plunge and sign up, it's a ...more
Welcome back, my greenhorn hackers! This tutorial will be the fourtenth in the Linux for hackers series and will focus on the MySQL database. Although this is not strictly a Linux tutorial, MySQL is the database of choice on most Linux distributions. In addition, it is the mo ...more
Tofu has been a staple food in Asia for over 2,000 years, but due to the health craze of recent years, it's enjoyed a surge of popularity in the Western world. Derived from the milk of soy beans and typically coagulated by calcium or magnesium salts, tofu can be found in consi ...more
Super Mario Run has been one of the most insidiously addicting iOS games to come out in recent years for iPhone. And now, as of March 22, Android users can get in on the fun, too. You can install Super Mario Run from either the iOS App Store (requires iOS 8 or higher) or Goog ...more
What's the latest dance trend sweeping TikTok? The Shuffle Dance. If you just watch people doing the Shuffle Dance, especially the really good ones, you might think it's a bit complicated. In reality, it's really not that hard. It's just a handful of steps. For the uninitiate ...more
Near Field Communication, or NFC for short, is a feature that allows our smartphones to wirelessly communicate with other devices over a short distance while using almost no power at all. Think of it like a slimmed-down version of Wi-Fi or Bluetooth that can send a small burst ...more
Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacki ...more
While viewing notifications, I have a nasty habit of accidentally hitting Clear and getting rid of them all before I actually have a chance to read them. There is an easy way to view the notification history on Android, but if you turn off or reboot your Samsung Galaxy S4, the ...more
Update, November 12, 2014: Android 5.0 Lollipop is officially out now. If you haven't gotten the OTA yet, check out our new guide on installing the official Lollipop builds on any Nexus for download links and instructions, for Mac or Windows. Google I/O 2014, the annual devel ...more
Kale is the new baby spinach: it's taken over salads everywhere, and for good reason. This nutrient-dense vegetable is a member of the brassica family, which also includes cabbage, broccoli, and watercress. Recent studies show that people who eat more brassicas tend to have le ...more
So you finally decided to make the switch from iOS to Android, huh? Well first off: welcome to the world of tomorrow. And secondly: good call, mate. In all seriousness, switching between mobile ecosystems can be quite the hassle. Even after you've grown accustomed to the new ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Our previous workshop on building an automatic boat dock went really well. A lot of Minecrafters showed up and everyone got right to work on their own versi ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
The iPhone X is Apple at its most classic — they take away a key feature that seems odd at first, but usually, the change pans out in the end. So is the case for the long-lived Home button, whose last appearance may be on the iPhone 8 and 8 Plus. That begs the question — how d ...more
One day, your car may break down and you won't be able to afford to hire a mechanic, so what do you do... you look on the web for some how-to vehicle repair videos and become your own car mechanic, that's what. You don't need any advanced training to perform repairs and simple ...more
When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Crea ...more