Prerequisite

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

How To : Unroot Your Galaxy S5 or Other Android Device

Geohot's Towelroot exploit made rooting the Galaxy S5 so easy that it was almost unreasonable not to try it out—even for the first-timers out there. This, of course, meant that folks who didn't truly need root for their usage went ahead and got Superuser privileges anyway. Ma ...more

How To : Create Beautiful Houses in Minecraft, Part 2

Part 2 Welcome back! In my last post I talked about the exterior aspects and techniques of building a great looking house, and now we shall focus on the interiors. Interiors There are a few important prerequisites to look at before starting the interiors of a house: The ge ...more

How To : Get Samsung's Multi-Window Mode on Your Nexus 5

Multitasking has traditionally been one of Android's strengths. As the first mobile operating system to introduce true multi-process management, it even took things a step further after version 4.0 by dedicating a button to your recently-used apps. With the release of Windows ...more

How To : Hack WPA/WPA2-Enterprise Part 1

WPA Enterprise is widely used in large corporations as it offers individual and centralized control through a server that authenticate the users (RADIUS server). In this tutorial I will show you how to break the barrier and obtain the user credentials. How It Works? Let's ha ...more

How To : Fix the Yellow Tint on Your Nexus 5's Display

The Nexus 5 has a known issue with its display. Affecting all models from the first manufacturing run and most models thereafter, this display issue is easiest to notice on something with a white background. A yellowish tint, most noticeable when compared to other devices, see ...more

How To : Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more

How To : Boost Headphones Volume on Your Galaxy S6 Edge

The Galaxy S6 Edge comes with a very nice pair of earbuds, which might possibly be the best set I've ever owned. They're quite comfortable, and they provide clear and robust sound, but they could still use just a little boost in volume. If you've found that your Galaxy S6 Edg ...more

  • Hot
  • Latest