Including Neon Search Results

UnaPhone Zenith: The No-Google, Super-Secure Android Phone

With the FBI getting access to iPhones, and apps like Waze being used to track people's locations, you've got to wonder just how safe and secure your smartphone is... or isn't. When you consider everything you do on your phone, from taking and sharing pictures to mobile banking, keeping your information safe is a crucial step that may seem out of your hands.

How to Java: E4 (Methods)

Welcome back to another episode of Java Tutorials, In today's tutorial, we'll be learning about what methods are, proper syntax when writing Methods, and why they are beneficial in a program's code.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 14 (Live Memory Forensics)

Welcome back, my budding hackers! One of the most basic skills the forensic investigator must master is the acquisition of data in a forensically sound manner. If data is not captured in a forensically sound manner, it may not be admissible in court. In my Kali Forensics series, I showed you how to acquire a forensically sound, bit-by-bit image of a storage device such as a hard drive or flash drive, but now let's dive into live memory.

How To: Hack into a Mac Without the Password

Hello, my fellow hackers. My name is cl0ck. I am a senior majoring in Computer Engineering with an emphasis is Security. I have been lurking the site for a while now reading and learning from the great minds that reside here. I, too, have some knowledge that I would like to share with all of you. This post actually comes from a personal problem I faced and had to find a solution for. Without further ado, here it is:

Basics of Ruby: Part Two (Loops)

In the last Ruby article, we talked about how to store information in three different kinds of storages: variable, array, and a hash. After we get the data, we have many ways of using them, but, for right now,

How To: Build a Gingerbread Downton Abbey (With Martha Stewart)

Bow down, peasants: your gingerbread house just got owned. By whom? Martha Stewart, of course. The lifestyle guru has constructed elaborate gingerbread buildings in the past, but this year PBS asked her to build a gingerbread reproduction of Downton Abbey, in honor of the show's fifth season coming to PBS starting Jan. 4th, 2015. (PS: For those of you in the UK, the fifth season's Christmas special will be airing on Dec. 25th, 2014.) The materials included 11 batches of gingerbread, 16 cups o...

How To: Add, Remove, & Rearrange Control Center Toggles on Your iPhone

As far as customization goes, there's nothing you can do to change the look and function of the Control Center on your iPhone. By default, you can't alter the system toggles, but if your device is jailbroken, it's a completely different story. With the help of a tweak from developer plipala, called CCSettings for iOS 8, you can add, remove, and rearrange your Control Center toggles.

WANTED: Hackers for Bug Bounties

In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage unit of every country is trying to hire high-quality, experienced hackers as fast as they can to hack their adversaries' computer systems in order to gain a strategic advantage and to spy.

News: Android Devices Will Activate Apple Pay on Your iPhone 6

Apple Pay is ready for use at over 220,000 outlets across the United States. By using your iPhone 6 or 6 Plus, all you have to do is point your device at any NFC-enabled point-of-sale system compatible with Apple Pay, press your fingerprint on the home button, and voilà—you've just paid for something with your card. As a matter of fact, the store doesn't even need to have Apple Pay compatibility to work with your phone. If their machines have NFC-technology, they'll recognize your device (unl...

How To: Completely Trick Out Finder on Your Mac with XtraFinder

For the most part, Finder has had the same basic functionality through the various releases of OS X. But Apple's lack of interest in adding new bells and whistles to the backbone of their operating system simply means that 3rd-party developers get to shine, and Tran Ky Nam is one such developer. He created his own extension for Finder that adds tabbed browsing, dual pane mode, cut & paste functionality, and much, much more.

How To: Block Apps from Logging Your Data on Android

With root access, you're granted greater control over your device, allowing you to do things that your Android system wouldn't allow otherwise. Things like installing Xposed mods are made possible with root, but other advantages address performance and security, like stopping your Android logging, which is exactly what we'll be going over today.