So you finally decided to make the switch from iOS to Android, huh? Well first off: welcome to the world of tomorrow. And secondly: good call, mate. In all seriousness, switching between mobile ecosystems can be quite the hassle. Even after you've grown accustomed to the new ...more
It seems like whenever someone sees my phone, they ask me two questions right off the bat; "What phone is that?" and "How did you get your Android to look like that?" The first one is pretty straight-forward, but the second one not-so-much. I've spent countless hours searchin ...more
The biggest hurdle to rooting is that it usually requires a computer. Things get complicated when you're trying to use a desktop operating system to exploit a mobile OS, and the connection isn't always reliable. But with the help of Magisk, you can now use one Android phone to ...more
As I've explained before, black app backgrounds save you a bit of battery life on your Samsung Galaxy S5. This is because the AMOLED display on your S5 does not have to power pixels or a backlight for portions of the screen that are black. Developer Kdio knows this, and that' ...more
Switching phones has never been easier. Google backs up most of your app data on the cloud, which can then be restored onto your new phone. Sadly, Signal doesn't use this feature since it could compromise your security. Instead, Signal stores encrypted backups locally, requiri ...more
TWRP is the premiere custom recovery for Android because of how many devices it supports and how simple it is to use. But installing it in the first place hasn't always been the easiest thing to do — until now. With the help of a Magisk module, you can finally use one Android ...more
Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more
Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal. The terminal is a key component of any pentester's setup. We're going to be spending a lot of time wo ...more
Russian cyber disinformation campaigns have many missions, but one of particular interest is using technology to monitor, influence, and disrupt online communications surrounding culturally sensitive topics or protests. The ability to watch these events, and even filter positi ...more
The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company ...more
In order to increase the security and harden the integrity of an email account and its content, you'll want to use PGP on your Windows, macOS, or Linux computer. This is usually the first thing security analysts do to protect communications with encryption, and everyone else s ...more
Rooting usually means sacrifice. With most root methods, you lose access to apps like Netflix and Android Pay when SafetyNet gets tripped. More importantly, you lose the ability to accept OTA updates, forcing you to manually flash new Android versions. But there's a way around ...more
Instead of using a single APK, YouTube Vanced recently started being distributed as a bundle that requires a third-party app to install. Some fans found this too difficult, so the Vanced developers decide to make the process easier. The team behind YouTube Vanced created a ne ...more
Despite its rocky start, the Essential PH-1 has a lot going for it. Not only does it get consistent security patches and system updates hours after the Pixels, but like the Google-developed lineup, it's also great for rooting. Not only is your warranty not void with rooting, b ...more
Apple released the new Mac OS X 10.10 Yosemite in the Mac App Store for everyone to download and install for free on October 16th, 2014, but downloading a 5+ GB file for each of your computers will take some serious time. The best thing to do is download it once and create a b ...more
Because of Android's new SafetyNet system, certain apps can now block rooted users or prevent you from accessing them altogether — but at least for now, there are still ways around these restrictions. You can pass most of SafetyNet's checks with Magisk and systemless root, bu ...more
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is setting up a package manager that can install and update open-source hacking t ...more
This year, Google released two Nexus phones to glowing reviews, and as we've grown to expect, the Android community wasted no time in coming up with a root method for both. In fact, legendary root developer Chainfire even devised an entirely new "systemless" method for rooting ...more
For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting ...more
Since iOS 13, your iPhone's come equipped with a fonts manager that lets you install custom fonts for use in Apple apps and supported third-party apps. To add fonts, you need to use a font provider app that'll load them on your device and register them system-wide, and one of ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
When making a convincing mixed reality experience, audio consideration is a must. Great audio can transport the HoloLens wearer to another place or time, help navigate 3D interfaces, or blur the lines of what is real and what is a hologram. Using a location-based trigger (hots ...more
Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more
If you need to share something online but don't want your personal information attached to the file, use an anonymous file hosting site. By uploading files anonymously, you keep your IP address safe and won't need to create any kind of account that could provide further loggin ...more
There have been concerns with how much personal information Google tracks and all the things they know about us. Of course, that's what makes Google services so useful, they can use that information to cater to each of us individually. So yes, it serves a purpose, but it's not ...more
It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for ...more
Everyone should know that assigning complex passwords to sensitive digital accounts is the best practice for protecting yourself against hacking. Those who adhere to password creation best practices also know that keeping up with passwords for every account is nigh impossible, ...more
Smartphones and other Wi-Fi enabled devices send radio signals called probe frames to locate nearby wireless networks, which makes them easy to track by listening for their unique MAC address. To show how this kind of tracking works, we can program a NodeMCU in Arduino to snif ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
One could argue that, at least for the moment, software development is more important to the augmented reality experience than hardware. Since a viable augmented reality headset has yet to emerge for the broader, mainstream consumer market, currently, the same devices that mak ...more
Well before Magisk was in our lives, the Xposed framework was where all the mods and magic happened. Magisk was built on a similar concept with the ability to customize your system via modules. We can thank Xposed for where we are today in terms of root-related mods, but it's ...more
ADB and Fastboot are powerful tools that have always required a computer. But with the right setup, you can now send commands to a phone using another phone. The ADB and Fastboot Magisk module, by osm0sis and Surge1223, will turn your phone into an ADB terminal using root acc ...more
Three new wallpapers showed up in iOS 14.0, each with dark and light versions, while iOS 14.2 added eight more. Each iPhone also has live wallpapers catered specifically for it. However, none of Apple's wallpapers are dynamic. That means they won't change automatically based o ...more
Last week Amazon set their sights on the mobile app market, launching their Appstore for Android. This week they're attacking Android devices once again, but that's not all—they're getting into the online storage biz. On Monday, they launched Amazon Cloud Drive and Amazon Clo ...more
On its quest for online domination, Amazon.com continues to expand past its basic web marketplace to fulfill the needs of everyone and anyone with a little cash to spend. First, they battled the likes of Barnes & Noble and Borders Books with their online Kindle eBook shop. Ne ...more
This coming Friday, November 11th, 2011 is Veterans Day and everybody's celebrating! But only veterans and active military personnel can get the great deals being offered at restaurants and retail outlets across the country. If you need help locating some of those deals, below ...more
Clip Art from Microsoft Office allows you to insert stock photos into you PowerPoint, Word, Excel and Entourage documents easily. You can gain access to the Office Clip Art site easily in any of the mentioned applications. The Microsoft Office for Mac team shows you just how t ...more
Adobe Flash CS4 is a powerful, but intimidating program for creating awesome, dynamic websites. This video tutorial demonstrates how to make a slideshow in the newest version of Flash and the Slideshow Pro plugin, which is readily available for free download. These step-by-ste ...more
So you want to make your own video game using Flash CS4 and Actionscript 3. We applaud your chutzpah. This video will walk you through what should probably be your first steps: importing a sprite character, making them move around in response to keyboard inputs, and making the ...more
iTunes is one of the best music programs out there. You will need this program to use an iPod or download anything from the iTunes Music Store. If you have a Windows based PC, you can still use Mac's iTunes program - and best of all it is a free download! In this tutorial, pro ...more
Virtual DJ is an epic piece of software that allows you to become a disc jockey, without even having to get up from your chair. In this video tutorial, learn how to use the basic functionality of this great application. Download a free trial of Virtual DJ and start mixing.
Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episode ...more
Looking for instructions on how to do USB tethering with a Samsung Vibrant smartphone? You're in luck. This free video tutorial will see that you need everything you need to know. (Note, however, that this hack will require you to download the free Samsung Kies application.) F ...more
To get started using your iPod, you'll first want to put some of your music on it. You'll use iTunes to manage your music and video. If you don't already have the latest version installed on your computer, you can download it for free.
While you can always view traffic information by visiting Google Maps, wouldn't it be better to be able to see what the traffic is like in your area all the time, simply by glancing at your desktop? The free Traffic Info for Windows Gadget software makes that dream a reality ...more
One of the new areas that you can access in Dwarf Fortress 2010 is Hell itself. This video will show you how to get there and what to do when you do. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challengi ...more
This video will show you how to build and use hospitals to take care of your dwarves in Dwarf Fortress 2010. It also discusses what happens when you abandon and then reclaim your fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is ...more
In this video, you'll learn about the basics of using your military to defend your fortress, in this case against a dinosaur attack, in Dwarf Fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challen ...more
This Dwarf Fortress 2010 video will show you how to design a basic, effective fort, and also explain how channeling and farming work. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challenging, and rewardin ...more
The release of Dwarf Fortress 2010 introduced many great changes to Dwarf Fortress, and this video will bring you up to speed on them. It also covers the beginning of a game, including preparing your dwarves, choosing a fortress site, and getting into caves. Slaves of Arnok I ...more
This video will give you an overview of a successful endgame fortress from Dwarf Fortress, giving you tips on achieving a similarly successful fortress throughout. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidat ...more
In this video you will see the results of the creator's preivous attempts to use a cave-in to trap demons in their peculiar chamber, then learn how the Justice and Economy systems work in Dwarf Fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more comm ...more
The best way to deal with demons in Dwarf Fortress in to seal them in their peculiar chamber by creating a cave-in above it. This video will show you how to do just that. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most in ...more
This video will show you how to make and use siege weapons and disarm enemies in Dwarf Fortress. It also includes an arena battle at the end for kicks. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challen ...more
THis video will show you how to use the immensely useful magma forges to make items without using fuel, and also how to use roads, sculpture gardens, and ponds to improve your fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one ...more
Magma is valuable but dangerous stuff in Dwarf Fortress, and this video will teach you still more about how to handle it. It also covers how to build bridges, floodgates, and levers that will link up and create effective dwarven infrastructure. Slaves of Arnok II: Dwarf Fortr ...more
Water and magma can both destroy even a sturdy dwarf fortress very quickly. This video is all about liquid safety, teaching you how to channel water and magma using u-tubes and other tools without flooding your fortress and killing your dwarves. Slaves of Arnok II: Dwarf Fort ...more
This video starts with a new Dwarf Fortress fortress, and will show you how to deal with underground rivers and magma pipes. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challenging, and rewarding PC game ...more
At this point in the game, Dwarf Fortress is starting to get serious. This video will show you how to defend against a goblin ambush and deal with graveyards and coffins, the resting places of your dead dwarves. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is m ...more
In this video you'll learn how to make a wide variety of leather items, including bags, waterskins, backpacks, and quivers, as well as dig wells for your dwarves drinking water in Dwarf Fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly kno ...more