Kick Ass Game Review Part 1: Background & Voice Talent There are three parties involved in bringing you The Kick Ass Game: - Wha Entertainment (Publisher) - Marv Entertainment (Role unknown) - Frozen Codebase (Indie Developer) Wha Entertainment is owned by Howard Horowitz. H ...more
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for? And what about your movies? W ...more
Here are various tricks which are possible with "scratch holography." To make one of these holograms, all you really need is a plastic CD case and a couple of thumb tacks pushed through a stick.
A single paper clip can go a long way. Having just one of these ubiquitous office supplies can make you a smartphone mount, replace your broken zipper tab, scratch your lottery ticket, and eject the CD from your stuck DVD drive. Multiple paper clips chained together can make ...more
Sometimes the simplest things yield the most fun results. This clever trick creates long, condom-esque plastic bubbles. This How-To is very simple: Grab the plastic disk that comes with your blank CD or DVD spindle or scratch the aluminum off a real disc. Heat an area of it w ...more
Fact: the banana is the perfect food. It is a potassium packed snack, CD scratch remover and a prank device. Now, we've got yet one more 'a-ppealing' (get it?) reason to love the banana. Throw out the shoe polish. Here is the solution to dirty shoes! Polishing your shoes wit ...more
A good prank requires decent effort, creativity, and impeccable timing. If you're in the office, there are plenty of hilarious pranks to play on coworkers, and for your family and friends, there's everything from toothpaste-filled Oreos, to solid milk, to impossible-to-solve ...more
Enjoy the deliciousness of a peanut butter sandwich without the artificial chemicals that comes in store-bought jars. To make your own peanut butter at home, all you need are pre-roasted peanuts, peanut oil, and a little bit of salt and sugar. Roast the peanuts in the oven fo ...more
OnePlus phones are easy to root, but that also means they're easy to brick if you get trigger happy with your superuser privileges. If you find yourself in this situation, you'll quickly realize the OnePlus firmware download page doesn't provide files you can flash in Fastboot ...more
Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your sys ...more
What would you say if I told you it was entirely possible—even desirable—to cook anything from a simple dinner to a great loaf of bread without using measuring cups, spoons, or a scale? "Lies," I can hear you say, "Cheap internet lies!" But it's true. Experienced cooks are a ...more
The USB Rubber Ducky is a famous attack tool that looks like a USB flash drive but acts like a keyboard when plugged into any unlocked device. The Ducky Script language used to control it is simple and powerful, and it works with Arduino and can run on boards like the ultra-ch ...more
To please those of us who love to mod and root our Androids, OnePlus has made both the OnePlus 5 and 5T relatively easy to customize — so much so that the 5T topped our list for the best phones for rooting. Unfortunately, unlocking the bootloader and using root to modify the f ...more
RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git is currently the most widely used version control system (VCS) in the world, ...more
So, you rooted your Pixel 2 or 2 XL and everything seems to be working quite well. However, a month passes, and you get a notification to install the monthly security update. Like clockwork, Google has been pushing out OTA security patches every single month for a while, but t ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
The new iPhone 12 Pro Max is equipped with MagSafe, the iPhone 12 lineup's most talked-about feature. While Apple previously used MagSafe for its magnetic charging connectors on older MacBook models, it's given new life to it on the iPhone, and in a much better way. But can it ...more
You've protected your Ubuntu system from physical attacks, annoyed network hackers, and sandboxed potentially malicious applications. Great! Now, the next logical steps to locking down your OS include thoroughly auditing Ubuntu for weak points, using antivirus software that re ...more
Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about security on an application level. If a malicious file is opened on your system, will an attacker be able to access every file on the c ...more