Corporate Services Search Results

News: Boring (Yet Mesmerizing) VR Experiences Could Calm Anxiety & Reduce Pain

Opioids, or narcotic painkillers, serve as our primary method for alleviating physical distress. They also happen to be a leading cause of death due to their addictive nature. AppliedVR hopes to introduce a safer alternative: virtual reality gaming. They utilize the existing Samsung Gear VR for the hardware, but provides specialized software that offers up a distracting experience that fosters greater pain ignorance.

News: A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use in the 1990s, hacking went into hyperdrive.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 13 (Browser Forensics)

Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic analysis. For those of you who are seeking career as a forensic investigator or security engineer, this can be invaluable training. For hackers, it might be life-saving.

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

How To: Order an Uber Ride Without a Smartphone

Taxi drivers and cab companies across the globe are in an uproar over Uber, and for good reason, too—you just can't compete with the low fares and ease of use that Uber brings to the table. The only downside is that the groundbreaking ride share service usually requires a smartphone—but that shouldn't be an issue anymore with one simple tip that I'll outline below.

How To: Introduction to Botnets and RATs : Part 1

Hello everyone. I'm Calypsus and i've been around for a while learning from various tutorials, expanding my knowledge and this is one of the best platforms for newbies to sharpen the skills. Today i decided to register myself and contribute to this wonderful community. Since this is my first post, any kind of feedback is appreciated.

How To: Set Up Private Internet Access in Linux

This tutorial is for those who've purchased an account with Private Internet Access to hide your VPN and would like to set it up in Kali. Please note, you can chose to run your PIA service from your Windows computer without configuring it in linux as long as you'll be using a NAT connection. Using a NAT connection will allow your Windows machine and Kali Virtual Machine to use the same IP address, hence if your IP is hidden on one, it will be hidden on the other.

How To: Use Google to Hack(Googledorks)

hello my dear colleagues, I made a visit to nullbyte and found that there is not a complete tutorial about the google dorks, so I felt the need for this tutorial, and seeing that there are many newbies around, so here's a tutorial that will teach you how to use google to hack.

How To: Use Snapchat's Hidden Filter to Add Color Overlays to Your Photos & Videos

Snapchat has built upon the photo-sharing service it once was to become a money-sending, commercial-shelling, video-messaging giant. They improved their user experience by adding Stories, Geofilters, and even the rarely-used Snapcash feature, but why isn't there something as simple as color filters? Yes, they have filters for black and white, saturated, and sepia, but that's it as far as color goes.

How To: Remove the Boot-Up Sound on Your Galaxy S6

Mobile service providers have an uncomfortably strong grip on the Android platform as a whole. For instance, all four U.S. versions of the Galaxy S6 and S6 Edge play their carrier's obnoxious jingle every time they boot up. You don't get any say in the matter—if you buy your phone from one of the big 4, you're a walking audible billboard.

News: White House Hacked by Russian Hackers!

Yesterday, April 7th, it was revealed that the United States White House had been hacked by allegedly Russian hackers. According to reports, the Russian hackers used social engineering/phishing to get a foothold in the U.S. State Department and then pivoted from that system/network to the White House. Although the White House said no confidential information was compromised, the President's appointment calendar and other information were. Attribution or "blame" for the hack was made more diff...

News: Play Pac-Man Around the World in Google Maps

It's that time of year again. Each spring, Google likes to have a bit of fun with April Fool's Day. Pranks have ranged from a fake email printing service called Gmail Paper to a search engine for smells. It's all fun and games, but this year, they've taken that mantra rather seriously with a Pac-Man game baked right into Google Maps.

How To: Share Music Directly from Your iPhone's Keyboard

Apple's iOS 8 ushered in a new way of typing with the addition of third-party keyboard compatibility. We've seen everything from keyboards with swipe gestures, customizable themes, different sizes, and even embedded GIFs. Now we've got one for all of you music lovers called AudioShot, which allows for easy sharing of music directly from the keyboard.

How To: Remove the Carrier Name from Your Lock Screen in Android Lollipop

I know where I bought my phone, and I definitely know who I'm paying money to every month for cellular service, so there's absolutely no need to see my carrier's name draped all over my device. Fortunately, with Android Lollipop, the carrier label is only present on the lock screen. Nevertheless, that label can keep your phone from feeling just right, so let's go ahead and show you how to get rid of it.

How To: Unlock Your Android with a Secret Sequence of Volume Key Presses

Yes, they're called volume keys, but they can do much more than adjust your volume. With minimal effort, you can do some amazing things with these physical buttons, like secretly record videos, toggle on your flashlight, scroll through pages, control your music, and much more. And while using them to wake your screen is useful, let's take it a step further and show you how to use them to completely unlock your device, even if the screen is off.