Hot Posts

How To: Lock and Hide Apps on Your iPhone or iPad — The Official Way

You can lock practically any app on your iPhone or iPad behind biometric or passcode protection. And we're not talking about using any funky workarounds, either. There's now an official Apple way to protect sensitive apps and their data. It even safeguards your personal information, keeping it out of sight across the system. You can even hide apps, making it harder for others to know they're there.

Android Basics: How to See What Kind of Processor You Have (ARM, ARM64, or x86)

Starting with the release of Android Lollipop, the process of installing the Xposed Framework got a bit more complicated. Not only are there separate installers for each Android version, but now, you also need to know exactly what type of processor is in your device to make sure you're downloading the right files. In fact, CPU architecture is becoming a factor in more and more scenarios these days, including certain sideloaded app updates and, of course, custom ROMs.

How To: Add Unsupported Cards and Passes to Apple Wallet for Quick, Easy Access on Your iPhone

Apple's Wallet app lets you store boarding passes, concert tickets, gym memberships, vaccination cards, movie stubs, rewards cards, insurance info, student IDs, and more in one place on your iPhone, and you just double-click the Home or Side button to access them. Unfortunately, many cards and passes are not officially supported — but that doesn't mean you can't add them.

How To: You're Using Lidar on Your iPhone and iPad — And You Don't Even Know It

Lidar, a technology first used by meteorologists and aerospace engineers and then adopted in self-driving vehicles, has slowly crept into consumer electronics over the last five years. If you have a Pro model iPhone or iPad, there's a good chance it has a lidar sensor, and you're likely using it whether you know it or not.

How To: Uninstall Bloatware Without Root or a PC Using Android's New 'Wireless Debugging' Feature

Bloatware is a problem on Android, and it's not just a Samsung thing. Removing apps that have the Uninstall or Disable button grayed out in Settings has always involved sending ADB commands to your phone from a computer, which itself was always such a pain to set up. Thankfully, that has finally changed.

How To: Activate Your Samsung Galaxy's Vault to Keep Your Apps, Files, and History Safe from Prying Eyes and Hackers

One UI has an exciting privacy feature that lets you lock apps, photos, videos, and files on your Galaxy device behind Samsung's defense-grade Knox security platform. Only you can unlock it using a pattern, PIN, or passcode, or with biometrics like fingerprint and iris locks. It's like having a safe built right into your smartphone, and it couldn't be easier to set up.

How To: Set Up Wireless Debugging on Android 11 to Send ADB Commands Without a USB Cable

From booting into Fastboot mode with a single command to installing mods without root access, there's no shortage of reasons to use ADB. The catch, though, you had to be tied to a computer with a USB connection. However, a new feature in Android 11 finally allows you to run ADB commands over Wi-Fi instead of being tethered.

How To: Make a Hyperbolic Paraboloid Using Skewers

In Monday's post, we created a sliceform model of a hyperbolic paraboloid. In today's post, we will create a similar model using skewers. The hyperbolic paraboloid is a ruled surface, which means that you can create it using only straight lines even though it is curved. In fact, the hyperbolic paraboloid is doubly ruled and is one of only three curved surfaces than can be created using two distinct lines passing through each point. The others are the hyperboloid and the flat plane.

Spice Rack Explosives: How to Make Gunpowder with Salt & Sugar

The best chemistry experiments are those you can perform with items already laying around your house. With only some sugar, salt substitute and an instant cold pack, you can make your very own gunpowder! Being able to make homemade gunpowder without a trip to the store can be a lifesaver, no matter if it's just for testing out a Civil War-era musket, blowing up stubborn tree stumps, or preparing for battle when imperialists overrun your country.

How To: Fold a Magic Rose Cube—A Flower in a Box Origami Puzzle

To play off Gertrude Stein's famous quote, a rose is a rose is a magic paper cube. And with this paper folder's guide, you'll learn how to make your very own magic rose cube from paper using the Japanese art of origami. This design by Valerie Vann, and folded by YouTuber German Fernandez, is great for Valentine's Day or any other day where a paper puzzle rose is needed. Just be prepared... it's a not just a puzzle origami rose, it's a puzzle folding it.

How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attacks, but Xerosploit can automate high-level functions that would normally take more configuration work in Bettercap.

How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration

If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application'...

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.

How To: Tie a Great Hangman's Noose (Or Hangman's Knot)

The hangman's noose is infamous for its use in hanging prisoners during executions. It was supposedly invented in Britain but eventually spread throughout the world, going beyond the prisons and even into our own homes. But the hangman's knot isn't all doom and gloom. There are plenty of practical (and non-lethal) applications for the hangman's knot, like a fishing or boating knot. Everyone should know this roped knot; this tutorial will show you the knot-tying process. Just remember, to be a...

How To: Always Use Dark Mode or Light Mode for Any App on Your iPhone

Some apps look great with Dark Mode, and some do not. So when you have system-wide Dark Mode enabled on your iPhone and are using an app that only looks good in Light Mode, you'd normally have to turn the dark appearance off manually, then switch it back on when you leave. But there's a workaround that can automate the process for you.

How To: Crack SSH Private Key Passwords with John the Ripper

Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.

How To: Seamlessly Transfer a FaceTime Call to Your iPhone, iPad, or Mac Without Disconnecting It

One advantage to using Apple's ecosystem is Continuity, which allows you to move files, media, and tasks seamlessly between all your Apple devices. It even lets you use one device to help with actions on another, like unlocking your Mac with your Apple Watch or using your iPad as a second display. Now, things are even better with Continuity with Handoff's new FaceTime functionality.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: Use ">" (greater than) and "<" (less than) symbols

In this video the author explains how to identify the less than (<) and greater than (>) symbols and when to use them. She explains to us to relate the numbers to animals stating that the smaller numbers are smaller animals and bigger numbers are bigger animals. Now she tells us to imagine that smaller animals are eaten up by the larger animals. So she shows a smaller number comes on the left side of '<' sign and bigger number comes on the right side of '<' sign stating that the bigger number...

How To: Unlock Apple's 'Dark Mode' in iOS 11, 12 & 13 for iPhone

Apple gave us the ability to invert colors on the screen a very long time ago. Then they gave us grayscale mode in iOS 8, Night Shift in iOS 9, and the red screen filter in iOS 10. While the long-awaited "Dark Mode" finally appeared in iOS 13, iOS 11 and iOS 12 both have a decent placeholder for it you can use on your iPhone.