Engineering Search Results

How To: Missing the 3D Touch Multitasking Gesture in iOS 11? Try This

Now that iOS 11 is officially rolling out to millions of iPhones, many users are upset with the fact that Apple has removed the 3D Touch multitasking gesture that we enjoyed in older iOS versions. Though not as fluid as this gesture, there is still a hidden way to quickly get into the app switcher without having to double-click the home button.

News: Merge VR's Holo Cube—An Augmented Reality Toy That Transforms into Interactive Holograms

Merge VR, a company mostly known for its virtual reality experiences, is moving into and creating an augmented reality experience that combines an iPhone or Android smartphone, a set of goggles to put your phone in, and a box about the size of a Rubik's Cube which looks more akin to the Lament Configuration seen in the Hellraiser film series. When used in concert with the smartphone and goggles, the toy cube, called Holo Cube, becomes one of many AR experiences.

News: A Siri 'Feature' Makes Personal Information Accessible from a Locked iPhone

If you follow tech, you're probably familiar with Siri, Apple's personal voice assistant, which has been integrated heavily into iOS ever since iOS 5. But you might not have known that Siri is capable of performing some tasks when the iPhone is in a locked state. The default state of iOS is to allow access to Siri from the lock screen, most likely for the convenience of hands-free access to the phone.

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Hack into a Mac Without the Password

Hello, my fellow hackers. My name is cl0ck. I am a senior majoring in Computer Engineering with an emphasis is Security. I have been lurking the site for a while now reading and learning from the great minds that reside here. I, too, have some knowledge that I would like to share with all of you. This post actually comes from a personal problem I faced and had to find a solution for. Without further ado, here it is:

News: 9 Notorious Hackers

I found this article a while back and I found it underneath a bunch of junk. Anyway, it's a article on 9 notorious hacker including Walter O'Brien (You know the T.V. show Scorpion? Well that's him). Not to mention the weird names:

How To: Block Apps from Logging Your Data on Android

With root access, you're granted greater control over your device, allowing you to do things that your Android system wouldn't allow otherwise. Things like installing Xposed mods are made possible with root, but other advantages address performance and security, like stopping your Android logging, which is exactly what we'll be going over today.