Keeping up with current events is a good step towards becoming a well-informed person, but sometimes it's a chore. In-between work, school, commuting, social lives, and hobbies, it can be extremely hard to find time to pick up a newspaper or browse CNN to find out what's going on in the world.
Welcome back, my hacker noviates! In a recent post, I introduced you to Shodan, the world's most dangerous search engine. Shodan crawls the globe from IP to IP address, attempting to pull the banners of each web-enabled device and server it finds.
The point of ice in your cocktail is to make it cold, right? Yes and no.
Now that the Chromecast development kit has been out for over a month, more and more Android apps are being released or updated to work with the Chromecast.
Today I'm going to show you 7 easy ways to organize your room. They are really simple and cheap so I hope you find them useful!
Sometimes I actually search Google Images for things other than GIFs and pictures of athletes' extremely hot wives. Google Images has helped me with school projects, work, and proving my friends wrong on numerous occasions. Unless you're strictly using it for the latter, you're going to have to be aware of copyrights.
NSA aside, Apple makes it difficult for users to extract and download text messages from their iPhones onto a computer. For whatever reason (legal, devious, neurotic, etc), we've all found a time where we'd like to save backups of certain meaningful, important, or perhaps incriminating conversations (including all MMS or iMessage pictures and videos). While there are a handful of third-party applications that can help with this process, the majority of them cost money and implement certain te...
For a photo- and video-sharing app based around privacy, Snapchat sure has a lot of security holes floating around. At one time, you were able to take screenshots of Snapchats in iOS 7 without the sender knowing, which is something that you can still do on rooted Android devices.
While the Play Store has a plethora of apps available for finding lost Android phones, Google came out with its own web-based application, Google Device Manager, earlier this year to help you keep track of all your Android devices and remote lock, erase, ring, and track if need be.
In old-school Konami fashion, there's an Easter egg lurking inside your Samsung Galaxy S3, and I'm not talking about gingerbread men, robots, or jelly beans. In fact, it's actually an achievement, like those you would unlock in Black Ops on your Xbox 360, and it's pretty easy to find.
A wave of shock and anger swept across the country after Edward Snowden released private documents recounting the U.S. government's secretive mass surveillance programs. Although some of the fear was unwarranted (they don't read your emails or listen to your calls), many scrambled to find privacy of new heights for protection from the all-watchful eye. While the government may not be tracking you down, there are a myriad of other candidates that fill that Big Brother role—and I'm not talking ...
This slime is toxic-free and can be used as either a kid toy or to make a great prank. This slime can be made in just a few minutes and doesn't require much for materials. Our video explains in detail how to accomplish this project with step-by-step instructions.
Welcome back, my rookie hackers! Several of you have written me asking about where they can find the latest hacks, exploits, and vulnerabilities. In response, I offer you this first in a series of tutorials on finding hacks, exploits, and vulnerabilities. First up: Microsoft Security Bulletins.
What Is Pythagorean Theorem? Pythagorean Theorem is an equation discovered by a man named Pythagoras. It can be used to determine whether or not a triangle is a right triangle and find missing lengths of a triangle. The equation is: Parts of a Triangle
Glow sticks, a popular favor at parties and outdoor events, and a must-have on Halloween, can be traced back to the United States Navy in the mid-1960s. The military desired improved visibility during night operations, and glow sticks, with their small-size portability and lack of batteries, were a perfect tactical solution.
This is a illuminated pen holder that I made out of a couple recycled hard drives. The LEDs receive power from the standard USB cable connected to a computer. The stand for the penholder is taken from a clip light, and the penholder itself is made from 3 hard disk drive platters. Also, I hid a small 4GB flash drive inside the base hard drive for some hidden storage.
This step-by-step tutorial will show you how to install Mac OS on Windows 7 on Virtual Box. Video: .
Facebook just released its new "home on Android" last Friday, appropriately called Facebook Home. Taking a cue from Amazon's Kindle, Home serves as an "operating system" that runs over Android.
Tire pressure is often overlooked, but can decrease your fuel mileage if you tires are not properly inflated. Have you ever peddled a bike with low tires. If you have, then you know it was much harder than when the tires are aired up. A car is no different. Low tires requires the engine to work much harder as well.
Is there anything better than finding a couple dollars sitting in your coat pocket that you forgot about? Well, after checking my trophy list for BioShock: Infinite, I realized that unlocking 1999 mode is actually an achievement. Hooray me. The achievement trophy is called "Should Auld Acquaintance", and instead of beating the game in easy, normal, or hard difficulty, you can just use the Konami code (found here) to skip right to 1999 mode and get that trophy.
This week, another guest returns to our Steampunk R&D show for the second time, Thomas Willeford. In our very first podcast, Thomas talked to us about creating his empire; this time we most notably talk about his recent appearance on the Science Channel's program Odd Folks Home, in an episode entitled "Blow Off Some Steampunk". Thomas Willeford is the owner and operator of Brute Force Studios, and has been responsible for some of Steampunk's most recognizable props and accessories, such as th...
Being lost sucks. There really is nothing worse than going to a huge event with a bunch of friends or family and then getting separated. Instead of partying with the bros, you get stuck next to this lame couple who keeps seriously making out every ten seconds. SMH.
Playlists are a great way to organize and share groups of videos on YouTube. Playlists can consist of your videos, someone else's videos, or a combination of the two.
Like a computer, your brain can store and process large amounts of information. It can remember names, solve math problems, and save tips that you might need at a later time.
MAC addresses (not to be confused with Macs) are unique identifiers assigned to network devices in order to access the internet. Hotels use these Mac addresses in order to check if a registered patron has agreed to their terms and conditions, how much bandwidth is being consumed, and of course, whether they've paid or not.
Have any Star Wars fanatics in your family? Well, here's a great Christmas gift idea for those Star Wars fans who think they have everything... a freaking LEVITATING DEATH STAR!
The Jetsons may not have gotten everything right about the future, but even though we may not have flying cars or live in the sky (yet), one thing they imagined correctly was our electronics eventually being able to understand us.
People use search engines for a wide variety of subjects (just look at some of the results that pop up in autofill). The results you get with each different search engine are usually different, but almost all of them display the same number of results per page by default—ten. If you find what you're looking for at the top of the first page, great. But if you have to do a lot of digging, it can be a pain to load so many different pages to find it, especially if your connection is slow.
Windows 8 and its new Windows Store have simplified the process for uninstalling and cleanly deleting applications from your computer. Removing applications in older versions of Windows required a few more steps: My Computer -> Control Panel -> Add or Remove Programs -> Find the Program -> Click Uninstall.
There are certain files on your Mac that do not warrant encryption, but still need to be hidden. Whether it be snoopy parents trying to find pictures, or friends stumbling upon one of your love letters, there are times when you need to hide a file and have it kept secret. Obscure Your Files with Obscurity
It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.
Yesterday, the entire Internet was talking about how the new Kindle Fire HD was supposed to be incredibly difficult to hack. Turns out, the folks over at XDA Developers are smarter than they thought—one day later, the mystery has already been solved. The exploit is the same one found by sparkym3 in Ice Cream Sandwich, but Amazon must have forgotten to patch it. As with any root, you can cause some serious damage, or brick your device completely if it's not done properly, so proceed at your ow...
Say whatever you want, but Steampunk is primarily a maker culture. Consider that Steampunk has existed since the 1960s and yet more or less languished in obscurity until approximately 2005, which is when it made the leap to costuming. That costuming was what provided the leap to the tangible, despite the fact that Steampunk art had also existed for years.
It's no secret that there's a lot of surveillance going on these days. It's easier than ever to end up in a database, and even former government agents are speaking out about the atrocious amount of spying being done against our own citizens. They've targeted our laptops, cars, IP addresses, and now they're coming for our iPhones. AntiSec hackers managed to get their hands on a list of over 12 million Apple UDIDs (Universal Device IDs) from an FBI computer, and they published 1,000,001 of the...
There have been plenty of headlines recently about fake followers in both politics and entertainment. Everyone gets hit by a spam account here and there, but when a large percentage of someone's followers are fake, it can look pretty bad, especially with influential people being accused of buying their followers to look more popular.
There's something special about Laika Inc.'s Paranorman... Hey! Did you love Coraline? Are you interested at all in stop-motion animation? Well, watch this feature on Laika Inc.’s new film, Paranorman.
Let's say you forgot the code to your Master Lock combination padlock. What can you do besides buy another one? Well, there's a surprising abundance of ways to open a combination lock other than with just the combination, some of which will even let you reset the code. Of course, these hacks aren't limited to folks just looking to open their own locks, but let's just assume that's what you're here for.
Even though we all know it's a bad idea, a lot of people still use their browser's store password function to keep up with all their accounts. While convenient, this shortcut also makes their passwords very easy to find if you have access to the computer they're stored on.
How to draw a tattoo. I go over how to draw your own tribal tattoo design. i sketch out a random assortment of extremely light lines. This is meant to help find distinct interesting shapes. Once you find something elaborate on that shape. Whether you want t be a tattoo creator, learn to tattoo. Or just want to do drawings of skulls. I try to go over a small part of it here. Source: http://howtodrawatattoo.blogspot.com/
If you're playing Minecraft multiplayer and trying to figure out how to switch between either the creative or the survival modes in the Minecraft 1.8 pre-release, take a look at this walkthrough to find out which options to tweak so you can fight creepers or just build!