Increasing Manufacturers' Search Results

How To: Save Up to 60% Battery Life by Enabling Dark Mode in the YouTube App

With the increasing popularity of OLED displays, companies like Apple, Google, and Samsung have all shifted away from traditional LCDs for their flagship devices. An OLED screen provides deeper blacks and is better for battery life since each pixel can be controlled individually while emitting its own light. This, in turn, has made dark themes an important software feature.

News: What Huawei's Rumored Mobile OS Means for the US Market

Huawei has been in a losing battle with the US government for around ten years, with the last year being the spike of Huawei's problems. Because of US pushback against some Chinese-based smartphone manufacturers due to security concerns, Huawei is hoping to limit its dependency on US-based companies, and recent rumors of Huawei's very own mobile operating system may be the first step.

How To: Customize the Back & Forward Skip Button Lengths in Apple Podcasts from 10 to 60 Seconds

Apple's stock Podcasts app in iOS remains my go-to for all of my podcast-listening needs, but skipping around during an episode can be frustrating. Scrubbing audio along the timeline is often an imprecise maneuver, which is why the skip buttons can be so useful and efficient. Without customizing skip lengths, however, you may find yourself tapping far more than you need to.

October 30: The OnePlus 6T — What's Rumored & What We're Hoping For

OnePlus will be releasing a new phone in the second half of 2018, specifically, an upgrade to their T-series. Over the past two years, #T versions have come out about five months after their predecessors and have included small updates that fix any problems from the previous OnePlus device. While we do know a bit about OnePlus 6T, what it could be is much more exciting.

News: Kickstarter Game System Uses iOS & Android Devices to Merge Tabletop Gaming with Augmented Reality

The fortunes of ARKit and ARCore are still in the hands of developers, who have been increasing the number of mobile augmented reality apps on the market, but perhaps not as fast as companies like Apple might have expected. But one new product is looking to literally kickstart mobile AR gaming by introducing a few key components that harness the traditional board game model.

How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy

Just like cash, bitcoin is used for everything from regular day-to-day business to criminal activities. However, unlike physical cash, the blockchain is permanent and immutable, which means anyone from a teen to the US government can follow every single transaction you make without you even knowing about it. However, there are ways to add layers of anonymity to your bitcoin transactions.

How To: Create Custom Wordlists for Password Cracking Using the Mentalist

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making customized wordlists. Using the Mentalist, we can generate millions of likely passwords based on details about the target.

News: What Every Phone Gained by Adding a Notch

If bezel-less was the goal of OEMs in 2017, 2018 seems to be the year of the notch. Thanks in no small part to Apple's iPhone X, more and more smartphone manufacturers are designing their displays with this polarizing cutout. While many are frustrated with the trend, it's worth taking the time to consider what each phone gains with the unique design.

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them.