For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been dying to share this list with someone shopping for you, we've got you covered with our 2018 selection of hacker holiday gifts.
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer.
Contrary to popular belief, augmented reality apps have been available for a while now. I remember using the Layar app (still available for iOS and Android) to explore nearby businesses and landmarks with varying success via an early-generation Android handset.
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And with a smartphone breaking every two seconds, we're truly our own handset's ultimate nemesis.
It always looks different when it's not about you. The Internet is our world's Alterego. Those many bits don't really make sense unless we want them to be valuable, to mean something.
It's already been a banner year for mergers and acquisitions in the augmented reality industry, with WaveOptics and Ubiquity6 among the notable companies acquired. Two of the more active M&A players, Snap and Epic Games, continued their respective buying sprees this week with major deals supporting their AR strategies.
Snapchat may trail Facebook and Instagram in terms of daily active users, but a new partnership with Samsung may get those innovative AR Lenses onto the mobile devices of a lot more users.
The moment arrives when you finally pop a shell on the web server you've been working on, only you find yourself in a strange environment with limited functionality. Restricted shells are often used as an additional line of defense and can be frustrating for an attacker to stumble upon. But with enough patience and persistence, it is possible to escape these restricted environments.
Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.
Sudo is a necessity on most Linux systems, most of which are probably being used as web servers. While the principle of least privilege is typically applied, sudo misconfigurations can easily lead to privilege escalation if not properly mediated. Which brings us to SUDO_KILLER, a tool used to identify sudo misconfigurations that can aid in privilege escalation.
Phone specs get better and better each year, and multiplayer mobile games are right there with them. Instead of playing solo, jump into some real-time gameplay with co-op and player vs. player modes, and battle friends, family, and strangers from around the world. But which multiplayer games are worth your time on Android or iOS?
If you use Apple's Mail app on your iPhone for iCloud and third-party email accounts, install the new iOS update ASAP if you haven't already. While there's not a colossal number of new features, the latest tools and improvements are powerful enough to make the update feel like Mail's biggest ever — and there are features we've been waiting for for years!
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, it requires no special dependencies and can be run via SSH, making it easy to deploy remotely.
What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system.
If we were to assign a theme for the 2019 edition of the Next Reality 30 (NR30), it might be something along the lines of, "What have you done for me lately?"
Our class had been assigned interviews with political representatives from different branches. In these interviews we asked questions that we had generated about their career position, advice to young activists, our government system, getting involved, and their opinion on certain laws. Here are the results from the two interviews that were done.
The arm bar is a great self-defense maneuver to use when being attacked from behind. Learn to perform the arm bar for self-defense from a professional martial arts instructor in this free combat video. Defend against a back attack with the arm bar - Part 1 of 17.
A rear wrist grab is easily defended in Aikido with the Nikyo technique. Learn this ancient Aikido self defense move from a martial arts expert in this free video clip and be prepared. Defend against rear wrist grabs with Aikido Nikyo - Part 1 of 10.
The Aikido Ikkyo wrist grab defense is a great martial art to defend against wrist grabs. Watch this free martial arts video and learn the simplest Aikido technique to avoid a wrist grab. Defend against the wrist grab with Aikido Ikkyo - Part 1 of 10.
In this sports video tutorial, Adrian Heath, Head Coach of Austin Aztex explains how to defend a soccer corner kick. Corner is awarded to the opponent when the ball goes over the goal line after touching a defender. If the ball is close to the goal post, the goal keeper catches the ball. In case the ball is kicked wide of the goal post and lands in the penalty area, a defender kicks the ball out over the side line or passes to another member of the defending team. If the ball is directed slig...
For shaping full eyebrows, Eva recommends the Vitry stainless steel slant-end tweezers, which pluck only one hair at a time. A lot of people don't realize that their tweezers are taking out multiple hairs at once, which can leave them with a hole. Over-plucking results in eyebrows that are too thin. Shape your eyebrows with tweezers.
This is an article about Maxine Waters and how she has tried to defend herself against accusations that she helped bailout OneUnited Bank because her husband had stock there. The article also has a link to video of the news conference she held at Capitol Hill in Washington D.C.
Welcome to the Videojug Soccer School, brought to you in association with the Brazilian Soccer Schools. In this video we show you some drills to improve your defending by intercepting the ball. Intercept the ball playing soccer.
Here at WonderHowTo, we are often presented with morally questionable HowTo's. When it comes to stocking our library, we have to weigh in the community value of indexing tutorials with potentially negative repercussions. Where is the line when it comes to areas like weapons, sex, and drugs?
From LAist: Meg Whitman has set a new record, having now spent more of her own money on her gubernatorial campaign than any politician has spent in US history, according to abc7.
I guess it takes the designer to explain, but it's the altitude that's affecting the unpredictable movement on the ball, not the ball itself. Defending himself, he says the ball's been around since December and no one's complained until now. I know it's a problem in Jo'Burg and Nelspruit (highest venue in WC history). But Cape Town's at sea level, does anyone know if the problem exists there?
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
Geva Mentor shows how she defends a shot in netball. Netball is similar to basketball, but with no backboard. Since every scoring shot has to essentially be a "swish", blocking the high trajectory arc of the shot is key to this technique. Defend a shot in netball.
Apparently a little amateur astronomy can go a long way. On March 21, 2009, Ralf Vandebergh, sitting in his backyard, pointed his 10 inch telescope at the sky and "saw a few bright pixels appear precisely where the work was going on at exactly the moment it was being conducted." A few bright pixels = an astronaut!
We’ve sung the praises of the classic little black dress before, but spring is the season for shaking things up a bit, the old standbys included Ali Larter and Madonna have the look down, and Eva Longoria Parker knows how to rock black-and-white separates for the trend. Watch this how to video for tips on wearing this fashionable two-toned look. Update your little black dress.
I'm starting a series on the top astronomers, with probably about eleven astronomers that I will be covering overall. So, let's start out from the top, with the top most important astronomer. In my opinion, Galileo Galilei is the top astronomer.
Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.
XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...
Dungeon Defenders is finally out on the PC, Xbox 360, and PS3. We've previously featured the tower defense RPG, and if you haven't had a chance to check out the PAX interview with Trendy Entertainment, now would be a good time.
A man going by the pseudonym of Ed Dante has written an illuminating account on his life as a career cheater. His clients include ESL students, hopeless dummies, and spoiled, lazy rich kids:
Name your price for 5 indie games!http://www.wolfire.com/humble This event will run for a week and the money raised will go towards two charities. The Humble Indie bundle is a collection of five indie games where you can set your price! Want to buy the whole package (worth $80 retail) for $10, $5, $1, or even a penny? sure, go ahead, you can pay as much or as little as you want. Some have payed over a hundred for the bundle, but the average is around $7-$8 dollars.The games:
WonderHowTo is game on. Note for the devoted gamers with a code of ethics: spoiler alert. This cheat exemplifies the argument that video games are modern social commentary. Just when you thought this game was only about shooting hookers and scoring drugs. This odd Easter Egg gets to the heart of Liberty City, literally.
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it.
Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.
Tower defense games have covered a lot of creative ground over the last five years. They've gone from simple desktop amusements to a staple of the indie game scene, having been integreated into nearly every other type of game and released on every platform. They have taken place in ancient times, the far future, and on alien planets. But one place they (and most other types of video games) have never taken place is the real world. Not a virtual recreation of the world, but on the very terra f...