Discovered Online Search Results

How To: Everything You Should Do Before Posting Protest Photos & Videos on Social Media

As protests surge in the wake of George Floyd's murder by a Minneapolis police officer, powerful photographs and videos from the demonstrations have gripped the world, putting our nation's very real and very justifiable widespread civil unrest out into the digital world. Unfortunately, these pictures could put you or others in danger if precautions aren't taken before uploading them online.

Gadget Hacks' Pandemic Prep: Apps, Info & Services to Keep You Safe & Productive

As the COVID-19 virus continues to spread, counties, cities, and states are closing down businesses, events, and schools that aren't absolutely necessary. Some companies around the US are recommending or requiring employees to work from home during the coronavirus pandemic. If you're stuck at home, there are apps and services to help you make it through a lockdown.

How To: Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can discover, access, and drop custom payloads on any weak Pi connected to the same network.

News: The iPhone 7 Just Became the Spiritual Successor to the iPhone SE

After announcing the iPhone XR, XS, and XS Max, one thing was noticeably absent from Apple's Sept. 12 event — the iPhone SE 2, the long-awaited upgrade to 2016's niche yet popular 4-inch model. Not only does Apple have no apparent plans for an update, it has also officially dropped the SE from its online store. Looking for a small iPhone that packs a punch? You might have to try the iPhone 7.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.

Market Reality: Qualcomm & DigiLens Prepare Components for AR Wearables & Retailers Get an AR Reality Check

It will likely take a few more years before smartglasses are ready for primetime as component makers achieve the innovations necessary for consumer-centric device designs. Nevertheless, two technology companies are making steps in that direction as Qualcomm is rumored to be working on a chip dedicated to AR & VR headsets, while DigiLens has reduced the size of its waveguide displays for motorcycle helmets.

How To: 8 Tips for Securing a Red iPhone 7 Before They Sell Out

Apple just unveiled a red iPhone and iPhone 7 Plus, dubbed the iPhone 7 (PRODUCT)RED Special Edition, to commemorate the ongoing global fight against AIDS. Apple fans the world over are sure to swarm in and gobble up the initial stock shortly after the new color is released at 8:01 a.m. (PDT) on March 24, 2017, so we'll go over some tips to help you secure a red iPhone before it's sold out.

How To: A Security Bug Just Made It Risky to Open Links on Your iPhone—Here's How to Protect Yourself

A new hack has reopened an 8-year-old iPhone security loophole that Apple thought it had fixed back with iPhone OS 2.2. This is not one of those times when a theoretical attack gets identified and blocked quickly by Apple. On the contrary, it's a hack that actually exists right now, and it can have some serious real-world repercussions, so this is something all iPhone users need to be aware of.

How To: Create Personalized GIFs Using Faces on Your iPhone or iPad

JibJab may not ring the bell, but you've probably seen one of their personalized videos. Using your own images, JibJab will place you first-hand into silly and usually musically-inspired videos that you can view online. Currently in beta, JibJib has made it's way to iOS in the form of personalized GIF creation. And if you're wondering, "why the hell would I want this", trust me, you'll love creating GIFs starring your and your friend's faces. Check out the guide below to get the app installed...

Advice from a Real Hacker: How to Create Stronger Passwords

People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user can take to reduce the chances of being a victim of a hacker.