Hot Posts
How To: Lock and Hide Apps on Your iPhone or iPad — The Official Way
You can lock practically any app on your iPhone or iPad behind biometric or passcode protection. And we're not talking about using any funky workarounds, either. There's now an official Apple way to protect sensitive apps and their data. It even safeguards your personal information, keeping it out of sight across the system. You can even hide apps, making it harder for others to know they're there.
Android Basics: How to See What Kind of Processor You Have (ARM, ARM64, or x86)
Starting with the release of Android Lollipop, the process of installing the Xposed Framework got a bit more complicated. Not only are there separate installers for each Android version, but now, you also need to know exactly what type of processor is in your device to make sure you're downloading the right files. In fact, CPU architecture is becoming a factor in more and more scenarios these days, including certain sideloaded app updates and, of course, custom ROMs.
How To: Add Unsupported Cards and Passes to Apple Wallet for Quick, Easy Access on Your iPhone
Apple's Wallet app lets you store boarding passes, concert tickets, gym memberships, vaccination cards, movie stubs, rewards cards, insurance info, student IDs, and more in one place on your iPhone, and you just double-click the Home or Side button to access them. Unfortunately, many cards and passes are not officially supported — but that doesn't mean you can't add them.
How To: You're Using Lidar on Your iPhone and iPad — And You Don't Even Know It
Lidar, a technology first used by meteorologists and aerospace engineers and then adopted in self-driving vehicles, has slowly crept into consumer electronics over the last five years. If you have a Pro model iPhone or iPad, there's a good chance it has a lidar sensor, and you're likely using it whether you know it or not.
How To: The Best Investigatory Projects in Science: 16 Fun & Easy Ideas to Kickstart Your Project
Most of us have conducted an investigatory science project without even knowing it, or at least without knowing that's what it was called. Most science experiments performed, from elementary to high school students and all the way up to professional scientists, are investigatory projects.
How To: Your iPhone's Status Bar Can Actually Be Customized — Here's How
You see the status bar nearly everywhere on your iPhone, and it almost always looks the same. But you can use a few tricks to spice things up a bit — without jailbreaking your iPhone.
How To: 100+ Secret Dialer Codes for OnePlus Phones
There's actually more to the dialer screen on your OnePlus than meets the eye. Besides its obvious purpose of calling people, there's a vast array of secret codes that you can input to troubleshoot your device, in addition to revealing important information, making anonymous phone calls, and so much more.
How To: Make the USB Connection on Your Android Phone Default to File Transfer Mode
Back in the earlier days of Android, you were able to connect your phone to a computer, and it would mount automatically. This meant once the USB connection was made, your internal storage would pop up on the computer and you could go about your business. But recent versions of Android changed that to help increase security.
How To: Your Lock Screen Just Got 13 Times Cooler with iOS 18 and iPadOS 18
Apple's most significant software updates for iPhone and iPad in 2024 have massive changes for apps like Calculator, Messages, and Notes, but iOS 18 and iPadOS 18 also have exciting new features for your Lock Screen.
How To: Uninstall Bloatware Without Root or a PC Using Android's New 'Wireless Debugging' Feature
Bloatware is a problem on Android, and it's not just a Samsung thing. Removing apps that have the Uninstall or Disable button grayed out in Settings has always involved sending ADB commands to your phone from a computer, which itself was always such a pain to set up. Thankfully, that has finally changed.
How To: Activate Your Samsung Galaxy's Vault to Keep Your Apps, Files, and History Safe from Prying Eyes and Hackers
One UI has an exciting privacy feature that lets you lock apps, photos, videos, and files on your Galaxy device behind Samsung's defense-grade Knox security platform. Only you can unlock it using a pattern, PIN, or passcode, or with biometrics like fingerprint and iris locks. It's like having a safe built right into your smartphone, and it couldn't be easier to set up.
How To: AirPods Are Getting Even Better Thanks to iOS 18
If you're an AirPods user, things are a lot better with iOS 18 and iPadOS 18. If you're not, it may finally be time to grab yourself a set of AirPods, especially if you're into privacy and gaming.
How To: Set Up Wireless Debugging on Android 11 to Send ADB Commands Without a USB Cable
From booting into Fastboot mode with a single command to installing mods without root access, there's no shortage of reasons to use ADB. The catch, though, you had to be tied to a computer with a USB connection. However, a new feature in Android 11 finally allows you to run ADB commands over Wi-Fi instead of being tethered.
How To: Boot Your Galaxy S20 into Recovery Mode or Download Mode
Recovery mode and download mode are useful for modding and they can come in handy in a pinch. Booting into recovery mode to do a factory reset or wipe cache fan save your Galaxy S20 from a soft brick, and entering download mode lets you install firmware with utilities like Odin and Smart Switch.
How To: Make a Hyperbolic Paraboloid Using Skewers
In Monday's post, we created a sliceform model of a hyperbolic paraboloid. In today's post, we will create a similar model using skewers. The hyperbolic paraboloid is a ruled surface, which means that you can create it using only straight lines even though it is curved. In fact, the hyperbolic paraboloid is doubly ruled and is one of only three curved surfaces than can be created using two distinct lines passing through each point. The others are the hyperboloid and the flat plane.
Spice Rack Explosives: How to Make Gunpowder with Salt & Sugar
The best chemistry experiments are those you can perform with items already laying around your house. With only some sugar, salt substitute and an instant cold pack, you can make your very own gunpowder! Being able to make homemade gunpowder without a trip to the store can be a lifesaver, no matter if it's just for testing out a Civil War-era musket, blowing up stubborn tree stumps, or preparing for battle when imperialists overrun your country.
How To: Steam Food Without a Steamer Basket
I'm not a big fan of single-use tools, especially ones that don't get used particularly often. And I'm especially not a big fan of seldom used single-use tools that take up a large amount of space.
How To: Create a favicon in Dreamweaver
This is a handy tutorial about creating the favicon. A favicon is an icon which appears on the tab, in the address bar and in the favorite menu of browsers. To make a favicon:
How To: Fold a Magic Rose Cube—A Flower in a Box Origami Puzzle
To play off Gertrude Stein's famous quote, a rose is a rose is a magic paper cube. And with this paper folder's guide, you'll learn how to make your very own magic rose cube from paper using the Japanese art of origami. This design by Valerie Vann, and folded by YouTuber German Fernandez, is great for Valentine's Day or any other day where a paper puzzle rose is needed. Just be prepared... it's a not just a puzzle origami rose, it's a puzzle folding it.
How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attacks, but Xerosploit can automate high-level functions that would normally take more configuration work in Bettercap.
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
To hack a Wi-Fi network, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purchasing will work for Wi-Fi hacking.
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application'...
How To: Enable 'Flip to Shhh' on Your Google Pixel & Quickly Turn on Do Not Disturb Mode
The Pixel's "Flip to Shhh" feature may not be groundbreaking, but it is useful. Third-party apps are copying it for other phones because it's so convenient. But it's not enabled by default and it's fairly hidden in the settings. So to take full advantage of your Pixel's feature set, you should learn how to use Flip to Shhh.
How To: Take clear and informative minutes at a business meeting
Taking minutes is the single most important thing you can do at a meeting to record what happened at a business meeting- ideas discussed, new directions for certain departments, etc. But taking minutes isn't as easy as scribbling down notes like you did in 5th grade. Check out this video to learn how to take clear and informative minutes.
How To: Deseed a Pomegranate with Your Bare Hands (& No Mess)
I love pomegranates. I don't even mind the mind-numbing task of picking out the arils (which is what those ruby-colored seed-like things in the pomegranate are called). However, I'm always on the lookout for new, easy ways to peel it that don't make my kitchen look like a crime scene.
How To: Exploit Shellshock on a Web Server Using Metasploit
One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.
How To: Ditch Google's WebView & Switch Android's System Browser to Bromite
Apps don't need to come bundled with an entire browser just to be able to display web pages — instead, they can call on the system WebView browser to render content for them. Android's default WebView renderer is Google software, which isn't quite as privacy-forward as some other options.
How To: Tie a Great Hangman's Noose (Or Hangman's Knot)
The hangman's noose is infamous for its use in hanging prisoners during executions. It was supposedly invented in Britain but eventually spread throughout the world, going beyond the prisons and even into our own homes. But the hangman's knot isn't all doom and gloom. There are plenty of practical (and non-lethal) applications for the hangman's knot, like a fishing or boating knot. Everyone should know this roped knot; this tutorial will show you the knot-tying process. Just remember, to be a...
News: Argo AI's First Driverless Car Is Spied in Pittsburgh
Argo AI is coming late to the party, but has begun testing a fleet of driverless cars in hopes of developing robo-taxi services to eventually compete against those that Waymo, Uber, Cruise Automation, and others plan to offer.
How To: Always Use Dark Mode or Light Mode for Any App on Your iPhone
Some apps look great with Dark Mode, and some do not. So when you have system-wide Dark Mode enabled on your iPhone and are using an app that only looks good in Light Mode, you'd normally have to turn the dark appearance off manually, then switch it back on when you leave. But there's a workaround that can automate the process for you.
How To: Crack SSH Private Key Passwords with John the Ripper
Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.
How To: Seamlessly Transfer a FaceTime Call to Your iPhone, iPad, or Mac Without Disconnecting It
One advantage to using Apple's ecosystem is Continuity, which allows you to move files, media, and tasks seamlessly between all your Apple devices. It even lets you use one device to help with actions on another, like unlocking your Mac with your Apple Watch or using your iPad as a second display. Now, things are even better with Continuity with Handoff's new FaceTime functionality.
How To: Best External USB-C Storage Options for iPhone and iPad
If you bought an iPhone or iPad equipped with USB-C but didn't max out the local storage, there are some great external storage solutions beyond iCloud and other cloud storage services. And now that the iPhone lineup comes with USB-C ports, you have better-performing external drives available to you than anything you could ever get for a Lightning-based model.
How To: Printable iPhone 11, 11 Pro & 11 Pro Max Cutouts — See Which Size Is Right for You
Whether you're ordering a new 2019 iPhone model online or just want to know how they look in your hand before buying in person, use these printable cutouts to see which one looks and feels best.
How To: Why Your Lost AirPods Say 'Offline' or 'No Location Found' in the Find My App
If you lose your AirPods, AirPods Pro, or AirPods Max, you can turn to Find My to locate them. But sometimes, things don't go according to plan, and many things can go wrong. For example:
How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name
Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.
How To: Set a Custom Contact Poster on Your iPhone Others Will See When You Call Them
A new feature in Apple's latest big iPhone software update lets you personalize how you appear on other people's incoming call screens and even customize individual contacts on your own incoming call screen if they don't have a preferred style to show you.
How To: Use ">" (greater than) and "<" (less than) symbols
In this video the author explains how to identify the less than (<) and greater than (>) symbols and when to use them. She explains to us to relate the numbers to animals stating that the smaller numbers are smaller animals and bigger numbers are bigger animals. Now she tells us to imagine that smaller animals are eaten up by the larger animals. So she shows a smaller number comes on the left side of '<' sign and bigger number comes on the right side of '<' sign stating that the bigger number...
How To: Unlock Apple's 'Dark Mode' in iOS 11, 12 & 13 for iPhone
Apple gave us the ability to invert colors on the screen a very long time ago. Then they gave us grayscale mode in iOS 8, Night Shift in iOS 9, and the red screen filter in iOS 10. While the long-awaited "Dark Mode" finally appeared in iOS 13, iOS 11 and iOS 12 both have a decent placeholder for it you can use on your iPhone.
How To: Choose the right skateboard for you
As early as the 1930s, kids were attaching roller skates to two-by-fours and calling them skateboards, but oh, how times have changed. This video shows you how to choose the perfect skateboard for you.