Alleged Victims Search Results

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 3 (Recovering Deleted Files)

Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers because you need to know that even when you delete files on your computer or on the victim's computer, a forensic investigator can usually recover them.

How To: Make a folder invisible and hide it for a computer prank

The My Computer section of most PC computers is an absolute mess, especially if you're trying to navigate someone else's computer. Why not take advantage of this fact by pulling this awesome prank on one of your data-loving friends? The video above will show you how to make a folder invisible and then hide it on their computer, making the chances of them finding it without knowing that you've pranked them slim to none. Just make sure you're there to watch you victim freak out afterwards! That...

How To: Survive a shark attack

Sharks. The first thing that comes to mind is "Jaws", Steven Spielberg's horrifying shark film that scared generations of young adults from entering the ocean waters. But not all sharks are as violent (and hungry) as "Jaws", so jump in the water and know a few guidelines to stay safe. Escape a shark’s jaws of death with these lifesaving strategies.

How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users

Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal their real trackable MAC address, and it can even let an attacker take over the phone's data connection with no warning.

News: A US Release of Grab's 'Panic Button' Feature Could Mean Safer Rides

Ride-hailing services are everywhere nowadays and with new companies developing all the time, it is one of the most convenient ways for people to get around. Companies like Uber make it easy for passengers to call a car to pick them up and drive them to their desired location. These services have been especially helpful for commuters as well as those who might need a ride home after a night at the bar. However, ride-hailing services require driving with a total stranger, which means the safet...

News: Apple's Really Testing Our Patience with Rumored iPhone 8 Delay

At this point, I'm ready to give Apple CEO Tim Cook a piece of my mind. The hype surrounding the iPhone 8 is crazy, and rumors are circulating constantly. So many different things have been said about its release date that no one can even keep track anymore. If Cook could throw us all a bone and give us a hint, it would quiet the speculation. Unfortunately, it doesn't look like that'll happen anytime soon, but — in the meantime — a new report allegedly has the inside scoop. Recent rumors surr...

News: How Virtual & Mixed Reality Trick Your Brain

Our brains do a magnificent amount of work to process visual stimuli, but they aren't difficult to fool. Optical illusions can trick our minds into believing what we're seeing is real, even if it's not—and virtual and mixed reality technologies take advantage of this little loophole in our brain to help us accept the unreal.

How To: Program Your Own Little RAT (Part 1) Getting the Server Working

I saw many people asking for a Tutorial about writing their own Remote Administration Tool, so I now introduce you in a basic kind of RAT. This program is not for real use, but for learning how you could write this kind of tool. It will be basicly coded and not very refined. I used Python 3, so you have to install it if you want to use this program unchanged. Also this RAT is for Windows and almost all features won't work under Linux.

SEToolkit: Metasploit's Best Friend

If you read my last tutorial on using SEToolkit, you probably know that SEToolkit is an effective way to make malicious actions look legitimate. But, that was only the beginning... the truth is, Metasploit and SEToolkit belong together, and help each other very well.