When you dislike or hide a song in Spotify, you'll never hear it again in the playlist or radio station that you blocked it from. If you bury it for the entire app, it won't play anywhere. But that doesn't mean you can't get it back if you change your mind.
In recent years, Google's Arts & Culture project has been leading the way in terms of innovating the practice of using technology to preserve landmarks and great works of art via digital 3D copies. Increasingly, these efforts are also giving history buffs the chance to experience classic works and spaces with unparalleled intimacy through the wonders of augmented reality.
The streaming content vision from Magic Leap recently underwent a quiet but major update, courtesy of AT&T.
While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten favorite browser extensions for hackers — and how to use them.
For some reason, the Slack app on Android and iOS is a little less customizable than Slack on other platforms, so you can't adjust the sidebar theme to different colors directly inside the app. But that doesn't mean you can't customize the look of your mobile app at all. It's just a little less convenient.
Huawei has been in a losing battle with the US government for around ten years, with the last year being the spike of Huawei's problems. Because of US pushback against some Chinese-based smartphone manufacturers due to security concerns, Huawei is hoping to limit its dependency on US-based companies, and recent rumors of Huawei's very own mobile operating system may be the first step.
With iOS 12, Apple is offering users more options than ever to create, store, and manage their saved passwords. Not only can iOS 12 make you new passwords via the AutoFill feature, you can quickly and efficiently access your entire iCloud Keychain using Siri. Why go hunting for the passwords yourself when you can ask your iOS assistant to find them for you?
Android used to have a notification ticker, but those days are long gone. Now, important new messages pop up on the top half of your screen with what's known as a "heads up notification." If you're in the middle of something, these popup notifications can be pretty annoying — luckily, it's pretty easy to turn them off.
While not cuddly to most, bats are shy, skilled flyers that fill an important role in their environments. A new study reveals a deadly disease decimating North American bat populations has stepped up its attack on vulnerable bat populations in the summer months.
Zenge came to my attention as a free game on the Google Play store — it will remain free until midnight, so anyone catching this review on the 25th, download it ASAP — but I imagine it would be worth the typical $0.99.
A new dating advice site, WittyThumbs, launched today that lets users offer advice to others as well as seek it; the site combines that collaboration with advice from designated dating experts.
All Galaxy S8 models apparently weren't created equal. According to numerous user reports, it appears that Snapdragon-powered Galaxy S8 variants are using an older flash storage standard than what Samsung was originally advertising.
As much as you try to safeguard your personal information, you may have made a small mistake by giving your phone number to the wrong entity, and now you're being bombarded with dozens of spam calls every day. To help parse your call log and reject the proper numbers without answering or trudging through voicemail, a good reverse phone lookup app is needed.
Sophisticated hackers have been exploiting vulnerabilities in Chrome and Firefox to trick even the most careful internet users into logging into fake domains for sites like Apple, Google, and Amazon.
Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of hard drives, and in this tutorial, we will examine a number of the most important ones.
In the last iteration of how to train your python, we covered the concept of control flow and covered the booleans associated with it. Today, we'll be putting those to use as we discuss how to use if, else, and how to make conditional statements. So, Let's get started!
Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them
hello my dear colleagues, I made a visit to nullbyte and found that there is not a complete tutorial about the google dorks, so I felt the need for this tutorial, and seeing that there are many newbies around, so here's a tutorial that will teach you how to use google to hack.
Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method.
2015 is quickly shaping up to be the year of the cord cutter, with various media companies finally warming up to the concept of offering live streaming content. In the wake of Dish Network announcing a streaming cable service called Sling TV and Sony unveiling a similar platform in PlayStation Vue, NBC has decided to stream the Super Bowl and all of its festivities online. Before we get to all of the many ways you can stream Super Bowl 49 between the New England Patriots and Seattle Seahawks ...
With all of the different websites we use in our day-to-day lives, keeping track of our numerous login credentials can start to become a hassle. This has created a market for password managers that aim to centralize these account credentials and generally streamline the process of logging into our favorite sites.
Welcome back, my greenhorn hackers! Earlier in this series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to use netcat and connect to port 80 and pull the webserver banner.
In this video, we learn how to find your IP address. First, start up your computer and open up your web browser. Next, you will type in the site: WhatIsMyIPAddress. Once you do this, you will be led to a new site which will load up your IP information at the top of the page. Once you have this information, make sure you don't share it with anyone else. If someone gets this information, they will be able to hack into your computer and ruin it. They could also access sensitive information and s...
In this video, we learn how to unblock a Facebook firewall at school. First, you will need to try to go to the website you want to go. If you try this and you can't reach the site, go to the top of the bar where you typed the website in at. Once here, you will find where it says "http". Type in an "s" after the "http" so you end with "https" then type in the website that you want to visit. After this, you should be able to go to the website you want to go to without any trouble, just make sur...
In this video, we learn how to find music and movies easier using "insite" in Google. If you are looking for media and can't find it through iTunes or an official site, you can find it on Google. First, go to Google, then type in "intitle:"index.of"(mpg(avi)wmv) (word you're searching for) -html -htm -php -jsp -asp". After you search this, you will see "index of" pages where you can do searched of what you are looking for. Once you click on the links that are available, you will be able to do...
In this tutorial, we learn how to get started out on Twitter. First, you will need to go to the main website and sign up by entering in your personal information. After you do this, you will be asked to enter in your other e-mail addresses to see if your other friends are on Twitter as well. After this, you can change your settings to change the icon that shows up on the site. Next, you will be able to start to follow people and enter in what you want your tweet to say. Go through the differe...
In order to find out if an email is a scam, you should avoid clicking on any links in that are in any emails. The links that are attached to emails, in this manner, usually have cloned the website of the institution where you do your banking. The link will look similar to your banking institutions site. Do not enter any of your personal information in emails in this fashion. Your bank will not contact you in this way.
Peter Answers is a fun website online that you can use to play pranks on your friends. This site is easy to access, free and requires no downloads.
In this how to video, you will learn how create a torrent using uTorrent. First, download the program uTorrent. Next, find a tracker on a website such as Mininova. Open up uTorrent and go to file and create new torrent. Next, select the folder in which the files you want to upload are located. Paste the tracker in the form shown. From here, press create and save us. Choose a name and then close. Now your tracker will be created. Next, upload to the site by going to the website and uploading t...
This video shows how to make a Google Custom Search Engine. A Custom Search Engine safely searches only the sites you want, and gives you relevant results. To set it up go to the Google home page and sign in. If you don’t have a Google account, you can easily set one up by following the directions. Sign in, then enter in your browser “www.google.com.coop/cse”.
This will illustrate us how to use the reverse auction site Dubli. Here are the following steps.Step 1: First of all enter the link and log onto the official website of DubliStep 2: Now you will find various options on the homepage of Dubli.Step 3: go and click the option of auction option.Step 4: The various product that are for auction will be displayed.Step 5: Search for the product that you want to auction for and enter the amount that you pay for the product and press the go button.Step ...
This video is about how to install custom fonts on XP. The first thing to do is to open your browser and type "fonts" in the search bar. Several sites will appear and just simply click on any of the websites. Once you have found the site that suits you best, just start looking for fonts that you may like. And if you already have found a font, just simply press download then save it in your computer. Once you have saved it, other files need to be extracted so just simply extract it. After extr...
In this video you will learn how to download a torrent PC game, mount and the burn it. For this you will need a torrent program (to download torrents), daemon tools (to mount the images) and powerISO (to burn it). To get a torrent go on site mentioned in the video or on other torrent sites. After you downloaded the file, right click on daemon tools icon select virtual drive and mount your image. Enter in image from my computer, take the CD key from crack and write it on a CD case. To burn it ...
In this video tutorial, viewers learn how to start and set up a free blog. Viewers will learn how to setup a free blog for a charity, make a blog entry, edit and customize a blog and share a blog with their network. A blog is a online journal that provides the reader with regular posts on various topics. Three of the most popular blogging sites are: Blogger, Word Press and Live Journal. When creating a blog, keep the posts short and meaningful. Try to engage the reader. Update your blog regul...
This video shows the method on how to Retweet web sites using Twitter. The website used on this video is Dream Systems Media. First, choose an interesting topic to tweet. Highlight and copy the entire tweet. Second, using either of the following codes: RT, rt, R/T or retweet, and the ‘@’ symbol; paste the tweet previously copied. Check if the tweet contains the name of the site and the URL. Third, place your comment inside the parenthesis following the tweet. Last, click the update button and...
Facebook is one of the most popular Social Networking Sites around. Watch as this video shows you how to make your very own Facebook page so you will be included in one of the biggest things around! First, you want to sign up for an account. "Its free and anyone can join" is their slogan! Go to www.Facebook.com and get to signing up! After that simply login into the site using your user name and password. After that your profile is set up you must simply just personalize it. Fill our your inf...
locker gnome teaches you how to unzip files online. The site you need to visit is WobZip. You can use a file from your own computer or one from the web. If the archive has a password, type that in the field. The formats supported are 7z, zip, gzip, bzip2, tar, rar, cab, ISO, arj, lzhchm, z, cpio, rpm, deb and nsis. The site is free and there is nothing to install. This allows you to see what's inside an archive that's online, without downloading that file beforehand. Now you know how to unzip...
Shannon Smith shows how to upload files using Filezilla in this episode of No Mac, No Cheese. Filezilla is useful in assisting you with putting files onto a web site. Simply type in your web address, user name, and password. Then create a folder and name it appropriately. Adjust the properties by keeping all permissions enabled. Then, open up the file to find all of the folders on your hard drive. You can easily drag and drop a folder from your hard drive or double click to individually selec...
Are you a Windows user who wants to jailbreak your iPod Touch 2G 3.1.1? George from the iPhone Press shows you how in this video. The needed firmware is on the Megaupload site. There is a link provided that will take you to the site so you can download the firmware. Next, it tells how to put your device into DFU mode using Pwnage Tool. Then it explains how you connect your device to your computer, and get iTunes to open up. After iTunes opens, the video shows how to navigate in iTunes to get ...