Beautiful Interface Search Results

How To: Intercept Security Camera Footage Using the New Hak5 Plunder Bug

In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffic like images from a Wi-Fi or IP security camera if we can get physical access to the Ethernet cable carrying the data.

News: iOS 11.3 Makes Multitasking Faster on the iPhone X

Apple released iOS 11.3 beta on Jan. 24 and the public stable release on March 29, and it didn't take us long to find plenty of cool new stuff. Aside from new Animoji, Health Records, and some upcoming changes related to the recent battery fiasco, most of the new features are about polish. One such feature we've found should make iPhone X users a little happier.

News: This Choose-Your-Own-Adventure AR Game Makes the Merge Cube a Compelling Stocking Stuffer

Did you forget to get a Christmas gift for that niece or nephew who you see once a year? If you're lucky, the Walmart near you may have a Merge Cube in stock. When paired with the 57° North game for the Merge Cube, the mysterious-looking cube offers the possibility of extended sessions of virtual adventure in the palm of your hand. Available for $2.99 through the App Store or Google Play, 57° North is a choose-your-own-adventure game that takes place in augmented reality.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

News: Qualcomm Sues Apple Over iPhone X Gestures

Apple is no stranger to lawsuits. They were in a decade-long battle with Samsung that finally came to an end last month, and they've been duking it out in the courtroom with Qualcomm since last year. The more recent case has seen both companies file suits and counter-suits, but now, Qualcomm is claiming that Apple's new iPhone X infringes on patents from a long-deceased mobile operating system.

Apple AR: Put 3D Emojis & Text in Your Videos with Holocam

People love emojis, it's a scientific fact. So an app that places poops, smileys, and ghosts into social media videos should, in theory, be the most popular app ever. That's likely the reasoning behind the new Holocam app, which is available for $0.99 in the iOS App Store. Sure, Snapchat and Instagram offer users editing tools to stick static text, emojis, and drawings on top of photos and videos. However, Holocam ups the ante by placing fully three-dimensional emoji, text, and drawings, as w...

How To: Force Switch to T-Mobile or Sprint on Project Fi

If you own a Pixel or Nexus device, Project Fi is a great alternative for cellular service outside of the four major US carriers. Project Fi is a Google-managed MVNO, providing service primarily through the T-Mobile and Sprint networks. One of the biggest mysteries on Fi is which network you're connected to at any given time, but there's a simple solution.

How To: Turn Any Phone into a Hacking Super Weapon with the Sonic

The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized flavor of Kali Linux to allow you to unleash the power of Kali from any smartphone — all without the need to create a hotspot to control it.