Make a Rose Part Two

How To : Use Your Rooted Phone to Root Another Phone

The biggest hurdle to rooting is that it usually requires a computer. Things get complicated when you're trying to use a desktop operating system to exploit a mobile OS, and the connection isn't always reliable. But with the help of Magisk, you can now use one Android phone to ...more

How To : Evil-Twin (Part 1) - Setting Up the Dhcp Server.

Hello again, ***UPDATE: Adding links to the other Two articles**** I recently started working on creating evil twin ap's, after reading OTW's article. I wanted to find a way to automate this process as much as I could, so I started looking for sample bash scripts and found t ...more

Basics of Ruby : Part 1 (Data Types/Data Storage)

Ruby is a dynamic, general-purpose programming language created by Yukihiro "Matz" Matsumoto in Japan around the mid-90's. It has many uses but with it's flexibility, it makes a great language to write exploits in. In fact, the entire Metasploit Framework is written in Ruby! T ...more

NR30 : The AR Software Development Leaders of 2018

One could argue that, at least for the moment, software development is more important to the augmented reality experience than hardware. Since a viable augmented reality headset has yet to emerge for the broader, mainstream consumer market, currently, the same devices that mak ...more

How To : 10 Clever Ways to Cook Out Without a Grill

Whether it's the start, middle, or end of summer, it's prime-time grilling season. If you find yourself without a grill, however, it may seem as if half your summer plans of swimming by the pool while stuffing hot dogs in your face could be ruined. But have no fear as all is ...more

How To : Use Split View Mode in Mac OS X 10.11 El Capitan

Catching up with Windows 8, Apple has finally included a way in Mac OS X to use two apps side by side in full screen view. In the 10.11 El Capitan update, it's called Split View, and it works fairly well for the most part. It's not quite as intuitive as it should be, but easy ...more

How To : Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a so ...more

How To : Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve ...more

News : T-Mobile Is Giving Away Free Stuff Every Tuesday

T-Mobile is going for broke. The carrier recently announced it will be giving away free stuff to its customers every Tuesday through a new app called T-Mobile Tuesdays for Android and iOS, and that's in addition to one share of stock and free in-flight Wi-Fi. The app will give ...more

How To : Use Your "Wrong Hand" to Relieve Anger

Since picking up your first crayon, chances are you've had a favorite, or dominant, hand. That hand gets you through the day, taking care of everything from writing to eating. If you've ever been forced to rely on your "wrong hand", you know how uncomfortable and unwieldy it f ...more

How To : Close Apps in Apple iOS 6 on iPad

Closing apps in iOS 6 was different that what is now in iOS 7. Shown in the video below is the old clumsy way of closing apps on the old iPads. Video: . Closing the apps prevents from taking up precious memory, resources and battery charge. Simply quit of the screen with the c ...more

How To : Make a Tiny "Small Wrap Up" Braid

Hello! Today I would like to introduce a simple tiny braid - so called the small wrap up. I recommend it to every person who wants to prevent the hair from falling onto the face. It is suitable especially for the people who have long or medium sized hair and very delicate skin ...more

News : The Crash Test Dummy

Simple as the title, someone will particpate as a crash test dummy. The funny part of course the prank is the "particpate" will not know he is a crash test dummy. Its kinda like the prank that was pulled on Ryan Dunn in the addtional footage in the DVD of Jackass Number Two wh ...more

News : Make a Baby (Without the Birds and the Bees Part)

Reborning, the insanely creepy (!!) art of transforming vinyl dolls into strikingly realistic newborns, known as "living dolls" or "unliving dolls". The dolls are used for two purposes: first, simply as a collectors item for doll enthusiasts, and second (this one is a bit sca ...more

How To : Get SwiftKey's All-Black Ninja Themes for Free

Ask around anywhere that Android users gather online, and you'll find that SwiftKey is almost unilaterally the most highly-recommended keyboard for our favorite mobile operating system. It's no surprise either—SwiftKey's combination of insanely accurate word predictions and ra ...more

News : Robot dog prepares for world domination

What is in store for the future? Flying cars? Maybe. Dinner in a pill? Perhaps. How about 4-legged army tank robot dogs? Hell ya! This delights both the Hummer loving He-men and the anti-war pacifists in us. Something that can kick ass and save lives! Perfect. BigDog is a me ...more

News : Microsoft Unveils the HoloLens 2

After years of waiting, Microsoft has finally updated its industry-leading augmented reality device, the HoloLens. During a pre-show event at the Mobile World Congress in Barcelona, Spain, HoloLens inventor Alex Kipman, along with Microsoft CEO Satya Nadella and Julia White, ...more

  • Hot
  • Latest