This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a frien ...more
You've been there. Those precarious few seconds between dropping your expensive smartphone right on its face and reaching down to survey the damage. Or maybe you got thrown in a pool while your device was in your pocket, or you dropped that sucker right into the toilet bowl. H ...more
Put the egg in a corner and your victim won't be able to smash it with the flat part of the frying pan, making it an unbreakable egg. This is a sensational trick, so see the full reveal of this bar trick. Fun Party Tricks provides tons of great howto videos for cool party tri ...more
Bet you can smash your finger with a can and have it not break? You can with this physics-based trick.
It's increasingly difficult to keep any secrets at bay, and that has become especially true for Apple's upcoming iPhone 6. For months, we've had leak after leak as to the new device's size and shape. Now, renowned tech reviewer MKBHD is showing the new iPhone's Sapphire displ ...more
Watch to learn how to perform a magic trick by squeezing an "unbreakable egg."
Your smartphone stays with you everywhere you go, so it's only a matter of time before you spill coffee all over it or drop it on the ground. For some of you, it has already happened, perhaps even multiple times. That's why we thought it was important to find out which flagshi ...more
Acetone-based nail polish remover is great for removing nail polish, and it's also great for some DIY uses around the home. From eliminating scratches to fixing the consistency of correction fluid, its uses are varied but all effective. With nail polish remover, you can also c ...more
Copy and paste keyboard shortcuts are beautiful gifts from the gods, and any website that blocks such an offering can burn in hell. But really, Cmd+C and Cmd+V (Ctrl+C and Ctrl+V for Windows folks) are second nature to most of us, so it's very frustrating when sites like PayPa ...more
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user c ...more
Look, tests are no fun, and doing poorly on them is rarely an option. Whether you're studious or a slacker, everyone needs a little boost now and again. While students have found ways to cheat as long as tests have existed, the invention of smartphones has greatly enhanced the ...more
If you have some photos, videos, and documents that you want to keep completely hidden and encrypted on your Android device, Andrognito is the app you need. We showcased this app in the past, but since then, CODEX has rebuilt it from the ground up with new and improved feature ...more
Welcome back, my greenhorn hackers! Although we have focused primarily on technical hacks here, social engineering can sometimes be especially effective. This one requires a bit of technical skill, but not too much. In addition, it's limited by how specific a target you can c ...more
Any internet user will need to download files eventually, and most simply have faith that what they are downloading is trustworthy. This doesn't give much clarity into the contents of the file, but if the file's author published the original checksum, comparing it to the SHA-2 ...more
There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're conc ...more
It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography. In this article, I will ...more
If there's one strength of Apple's that iOS and Android fans can agree on, it's the company's dedication to user privacy. With each new iteration of iOS, Apple builds upon these foundations, enhancing and increasing each iPhone's ability to protect its user's data. In iOS 12, ...more
Passwords are everywhere. We use them to unlock phones, computers, websites, encrypted disks, encrypted files... the list just goes on and on. Savvy users will already have a password manager of some sort that can generate a very strong password on a per site basis. However, t ...more
In the wake of the NSA controversy and its subsequent fallout, many dashed towards finding means of secure communication—using private internet browsing and encrypted text messaging applications—out of fear of being spied on. While the NSA's incredibly sophisticated surveilla ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more
This video will surely perplex math teachers everywhere who have always made it an unbreakable rule that all rectangles are squares and that not all squares are rectangles, but neither squares nor rectangles are hexagons. You'll learn how to make a perfect hexagon from a squa ...more
Installing clean, reliable, inflation-proof solar power is easier than ever thanks to the invention of thin-film photovoltaic (PV) laminates that can be bonded directly onto metal roofing panels. Unlike crystalline PV material, there's no need for obtrusive racks and heavy, ex ...more
Attention all Redditors: Between June 14 and June 18, Reddit experienced a data breach. The popular website claims it discovered the breach on June 19 and has since made the necessary moves to contain and eliminate the threat. Unfortunately, there isn't much they can do about ...more
To help keep sleepy binge-watchers from sleep-"watching," Netflix asks if you're still watching after a semi-short period of time. This means that it could be anywhere from 1 to 5 episodes that you slept through, which is better than 2 seasons, I guess—but it doesn't make it a ...more
This video is demonstrating the technique of jala neti by Steve. It is a purification exercise. You will use the unbreakable neti pot in the bathroom to do jala neti. This pot's nozzle properly fit in the nose and the plastic body of the pot can be easily hold. For 200 ml of n ...more
In this sports video tutorial you will learn how to play golf with Goofy. Contrary to many beliefs, playing golf is not a waste of time. Out in the open green, happily the golfer chooses his club. A modern golfer comes with balanced and matched clubs. A tee is used to support ...more