It can be hard to get all of your friends, family, coworkers, and acquaintances to jump on board with the more-secure email system ProtonMail, but that doesn't mean you can't still send them encrypted emails. Best of all, they won't even have to install any other apps or exten ...more
If you're ever paranoid about locking yourself out of your house, the worst thing you can do is to hide your spare key in an obvious spot, like under the doormat, under a planter, or anywhere near the front door. One of the most fool-proof ways to hide your keys is to give a ...more
A landmark bill finally went into action this week that will allow American cellular customers to unlock their smartphones for free. The process of unlocking may vary between mobile service providers, but you can rest assured that you are now entitled, by law, to carrier-unloc ...more
Google's got a hit on its hands with this one. Android 5.0—AKA "Lollipop"—will be making its official debut next month, but a new preview build has given us a glimpse into the future, which looks brighter than ever. New accents, beautiful animations, and a lighter overall col ...more
Okay, so you're rooted and need to return your Nexus 5 to its stock firmware. Whether it's because you need to send your phone in to the manufacturer to fix a defect or you just want to use the device's over-the-air updating feature, unrooting and returning your Nexus 5 back t ...more
Whether you have the original Nexus 7, or the 2013 Nexus 7 tablet, rooting it will give you access to tomorrow's features, today. Sure, without root there's lots you can use it for. It's helped me get out of bed, became my own personal bartender, and a lot more. But with a r ...more
Windows 8 comes with a bunch of new features, and none may be cooler than the new Picture Password option. If you're tired of the old lock screen and login options, or don't want to remember any more passwords, than you'll like this great new addition to Windows. By using a p ...more
Ahhh yes. Pwnage! Unlock that new Apple iPhone 3G. Finally. No more locked firmware. Open the iPhone 3G. Now you're free. Our favorite jailbroken activity is to tether it to a computer as a wireless modem. Download the app here:http://thebigboss.org/repofiles/nonrepo Jailbr ...more
I'm a new parent and I just moved into a new home. The first thing I wanted to do was ensure my toddler's safety in his new digs. That meant buying a bunch of baby-proofing products from Amazon, realizing most were junk, then buying some more until I found solutions for all my ...more
If you've ever wanted to turn your favorite GIF into a live wallpaper for your iPhone or even just make it a 3D Touch-friendly Live Photo that you can share, there's a super simple way to do so. Using the Giphy app for iOS, you can convert any GIF found on Giphy's website int ...more
If you are among those lucky ones who got a chance to pickup the Yu Yureka from Amazon and looking for a detailed guide on how to root your yureka, then I doubt that there is any better place than this. You might have visited some XDA threads for the same but those are general ...more
Eye contact is key in conversations, job interviews, and honesty, and it can help you access others' thoughts and spot heavy drinkers. Locking eyes with someone can even help you fall in love, whether you know them or not. The powerful connection that occurs when you lock eye ...more
Apple's iOS 16.3 update for iPhone had impressive new features, but iOS 16.4 might impress you even more. The latest iPhone update was released on Monday, March 27 — a day earlier than Apple Music Classical, Apple's new classical music streaming service — has at least 30 more ...more
With the holidays right around the corner, it's easy to miss a big software update on your iPhone, and by that, I mean iOS 15.2, which was pushed out Monday, Dec. 13. There's a surprising amount of new features and changes in the updated firmware, and there are a few big ones ...more
While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and ...more
Have you ever been locked out of your iPhone? Maybe you forgot your passcode. Or perhaps someone with access changed the passcode as a prank. Your iPhone's display could have even been damaged and unresponsive. Whatever the reason, there's an easy way to get back access to you ...more
Your iPhone's search bar has so many great uses. For example, you can quickly find apps on your device, browse different Safari results to find the site that's right for your question, and even search across different iOS apps like Messages, Mail, Notes, and Photos. With iOS 1 ...more
Apple released the second developer beta for iOS 14.5 on Tuesday, Feb. 16. The update comes 15 days after Apple seeded developers the first 14.5 beta, which included a slew of new features such as default music app support, compatibility with PS5 and Xbox Series X controllers, ...more
Every Galaxy S20 sold in the US — even the S20+ and S20 Ultra — simply can't be rooted. With the bootloader permanently locked, you miss out on the world of rooting and the customization it opens up, but modifications are still possible. Thanks to some Samsung-developed apps ...more
It seems like each day our phones become more integrated into our lives. School, work, shopping — so many tasks either require a phone or heavily benefit from one. But our phones are a double-edged sword that can easily distract us and harm our mental health as well. This is ...more
Imagine a scenario where you're nowhere near your iPhone, but it's on loud, and you really need to silence it. An alarm may be blaring, notifications could be spitting out sounds left and right, and calls may be ringing. Things can get annoying real quick for whoever's around ...more
Apple's already gone through iOS 13.0, 13.1, 13.2, 13.3, 13.4, and 13.5 betas, and now it's time for iOS 13.6. If you want to try out new features on your iPhone before the masses, install either the developer or public beta. The iOS 13.6 beta first appeared as an iOS 13.5.5 ...more
Although the Essential PH-1 got off to a rocky start, thanks to steady updates, it has slowly become one of the best Android phones to come out in recent years. For $499, the Essential Phone is a cheaper Pixel, receiving updates almost as soon as the Pixel lineup does. What's ...more
Following in the iPhone X's footsteps, the iPhone XS and XS Max, as well as the iPhone XR, have all ditched the iconic Home button last seen on the iPhone 8 and 8 Plus, which is one giant leap toward Jony Ive's ultimate vision of an iPhone that's a clean slab of glass. However ...more
Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the d ...more
Year in and year out, OnePlus flagships top our list of the best phones for rooting. Why? Primarily because rooting does not void your warranty, and OnePlus goes out of their way to make the whole process as easy as possible. If you're new to rooting, it might seem like more ...more
The iPhone vs. Android debate is almost as old as smartphones themselves. While there are a number of reasons to skew towards one operating system or the other, the Samsung Galaxy S9 models have a ton of great features that help set them apart from Apple's iPhones. The coolest ...more
One of the most anticipated new Maps features in iOS 11 for iPhones is live and ready to keep you safe on the road. Right now, Do Not Disturb While Driving is opt-in, but if you missed Apple's on-screen prompt to enable it and want to turn it on, or if you accidentally enabled ...more
With Touch ID on iOS devices, it's a little more difficult to lock yourself out. However, it can still happen if you don't use it, have a busted fingerprint scanner, or use an older device that doesn't have Touch ID, which means you're passcode dependent (unless you have zero ...more
Hello friends. This is actually my first how to. In this tutorial I'll be teaching how to simply copy someone's WhatsApp pictures gallery into your computer, in an automated way. It is just an example of how easy is to steal data from someone's smartphone. I am covering Whats ...more
Android has a single text file named build.prop that determines tons of various system-wide settings on your device. You need root access to edit this file, since it's stored on the system partition—but the various lines of codes it contains are actually fairly easy to interpr ...more
Let's say you're flush with Google Opinion Rewards credits, or you just got a Google Play gift card for your birthday. This is a perfect opportunity to remove ads and unlock new features by upgrading some of your free apps to their paid counterparts, or to finally purchase tha ...more
With the amount of time we spend glued to our smartphones, they could be considered a second job (if only we got paid). I spend a large part of my day scrolling through Reddit, Facebook, Instagram, and countless other apps, and burn through hours and hours without even noticin ...more
As softModders, the first thing we do after updating to the newest version of Android is to root, install a custom recovery, and install a superuser app. By doing this you open up your HTC One to a vast quantity of new apps and tweaks you can use to truly make your phone One o ...more
Video: . You don't have to know how to read piano chords or piano sheet music in order to use this piano tutorial. Connect a piano keyboard or start playing on your computer keyboard right away! Practice one hand at a time, change playback speed, transpose to a different key, ...more
Apple's Siri is well-versed in the spells of the Wizarding World of Harry Potter, but it's not like Android users are Muggles. Google Assistant, Android's virtual concierge, can cast a few spells out of the box, and it can learn the spells it doesn't know quicker than a year o ...more
Pretend you're a phone thief for a moment. You might be a pickpocket or a stickup kid, but you're in possession of other people's phones on a regular basis. Now ask yourself this: what's the first thing you do after you steal a phone? Any real phone thief with half a brain wo ...more
The first thing any Android power user does with their phone is unlocked the Developer options. The hidden menu has many low-level tweaks, such as forcing Dark mode on all apps, speeding up animations, or enabling hidden Quick Setting tiles. And most modifications require noth ...more
For the Pixel 4's face unlock feature to work in the dark, Google had to add a front-facing IR camera. If you download a specific app, you can actually see a live feed from this camera. It's true night vision for your phone, and it's completely free. So grab HedgeCam 2 from t ...more
Pressing the side key on your Galaxy S20 wakes or locks the device, while pressing and holding the button activates Bixby. So "side key" is an apt name — it's not really a power button anymore. That begs the question, how exactly do you restart this thing? Well, here's what h ...more
When your bootloader is unlocked, your phone shows a screen that tells you the bootloader is indeed unlocked and how software integrity can't be verified. But if you're the one who unlocked the bootloader in the first place, all this message does is slow down the bootup proces ...more
In a time where we're more connected than ever, privacy and security have never been more important. Maybe you're not concerned, but I'm sure there's someone in your life who is, and shopping for them can be daunting. However, with these gifts, you can provide them the tools t ...more
If you want to root, it's step one. If you're a tinkerer, it's vital. It's Android's hidden "Developer options" menu, and it's definitely worth taking 30 seconds to unlock. Open the Settings app on your Pixel 4 or 4 XL and scroll down to the bottom. Tap "About phone," then sc ...more
While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatic ...more
You're a busy, on-the-go professional, so you deserve an email client that keeps up with you. "Mail" on iPhone wasn't always the best option, but thanks to iOS 13, it feels like a completely different app. That said, there are plenty of alternatives that offer a different expe ...more
Samsung's Android Pie update — known as One UI — is bringing major changes to the Galaxy S8, Galaxy S9, and Galaxy Note 9. The main interface has received a visual overhaul, and this is no more evident than it is with notifications. The biggest changes are with the notificati ...more
Despite its rocky start, the Essential PH-1 has a lot going for it. Not only does it get consistent security patches and system updates hours after the Pixels, but like the Google-developed lineup, it's also great for rooting. Not only is your warranty not void with rooting, b ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
The Galaxy S9 is truly a sight to behold. With a class-leading display, the best camera ever put into a smartphone, and Samsung's cutting edge design, it might just be the best piece of hardware on the market. Having said that, some of the most useful additions are actually in ...more
While installing the new Android 9.0 Developer Preview is fairly easy if you're using a Windows machine, it's a little trickier if you want to use macOS instead. To help you get the latest Android OS on your Google Pixel phone, we'll break down the whole process so using your ...more
Apple released iOS 11.2 beta 3 on Monday to developers, with only a handful of changes over Beta 2. Still, it's always recommended you upgrade to the newest version of iOS, so if you are running any of the previous 11.2 betas, make sure to update. Beta 3's most significant ch ...more
After numerous scandals like the Equifax data breach and the 2016 US election, cybersecurity has become a significant issue for Americans. Unfortunately, anytime we use our devices, we're open to a cyber attack — especially when we browse the web. However, there are ways that ...more
Typing on a mobile device has come a long way since the days of flip phones. Today, there are awesome keyboard apps like Gboard, which integrates Google search features and makes typing a breeze. But the whole experience still stands to improve if you take some time to learn a ...more
Don't ignore the update sitting in your Settings app; you'd be leaving your iPhone's security vulnerable. Apple released iOS 10.3 yesterday, which, among others things, resolves a security issue in the Safari app. Most importantly, Apple has changed a few things with Safari's ...more
Google's new Pixel and Pixel XL smartphones have a feature that puts their fingerprint scanners to use after you unlock your phone—just swipe down on the scanner from any screen, then you'll see your notifications. It keeps you from having to do hand gymnastics to reach the st ...more
If you left your iPhone sitting unlocked, or have friends and family that like to play pranks, you may be stuck with an overly orange screen out of the blue. Or worse, your screen is normal most of the time, but seems to randomly change its tint in certain parts of the day. I ...more
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead. "Kaspersky Lab has added an additional 14,031 decryption keys to the free repository noransom.kaspersky.com, enabling all those who have fallen victim to CoinVault and Bitcrypto ...more
Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this t ...more
Continuity, introduced back when iOS 8 and Mac OS X 10.10 were released, lets users seamlessly connect all of their Apple devices together. With it came a feature known as Handoff that "hands off" an app or task from one Apple device to another, like starting an email on your ...more
These days, using the power button to lock your Android seems a little old-fashioned. Thanks to third-party apps and mods, you could seamlessly lock your device using a double-tap, a swipe, and even gravity, or you could just throw it in your pocket, all of which help prevent ...more