Investigation Unit Search Results

News: Five Windows Holographic Mixed Reality Headsets Have Now Been Seen, but Most Have Not Been Touched

Some of the products I have been looking forward to seeing the most during CES 2017 has been the upcoming Windows Holographic virtual reality headsets. These are VR headset that will run a version of the Windows Holographic platform, which will allow users to have a similar experience as the HoloLens with a mixed reality environment. Of the six headsets that could have possibly made it to CES, five had shown up. Unfortunately, most of them are behind glass.

News: The Scaling Ratios Every HoloLens Dev Should Know for Clean Text in Mixed Reality

Designing for mixed reality, especially for the HoloLens, can present unique challenges. Dong Yoon Park, a Principal UX Designer at Microsoft with a passion for typography, recently gave a talk to the Windows Holographic Users Group Redmond (WinHUGR) about the pitfalls he ran into trying to convert what started out as a 2D iOS app 5 years ago to the newer 3D Holographic frontier with Unity.

News: This Easy Trick Frees Up Lots of Storage Space on Your iPhone

Clearing storage space is a constant concern for people with iPhones, especially since they don't come with expandable storage, limit the amount of free iCloud storage, and still, unfathomably, produce units with only 16 GB of space. Thankfully, Reddit user eavesdroppingyou shared this quick and easy tip you can use to wipe unnecessary files from your phone and potentially free up gigabytes worth of storage.

LG’s New G4 Flagship Phone: Everything You Need to Know

It's already that time of year again—LG has unveiled its latest high-end smartphone, dubbed the G4. In past iterations, LG released its flagship devices in the fall. But slowly over the course of the past 2 years, the release schedule has been bumped up to be more in line with HTC and Samsung's springtime releases, and further away from the sales-sucking iPhone event each fall.

CES 2015: Wocket Digitizes All the Cards in Your Wallet into One Single, Secure Card

As far as wallets go, mine is as full as they come; think something like George Castanza's overstuffed wallet on Seinfeld. I've got receipts, pictures, and tickets jammed inside, but what takes up the bulk of the space are all of the cards—credit, debit, gift, rewards, customer loyalty... I've got pretty much any card you can think of squeezed in. While it is a strain on my rear end, there's nothing I can do besides keep some of the cards elsewhere. However, looking for them when I need them ...

How To: Preserve Battery Life on Your Apple iPad Mini

Apple has begun selling their new iPad mini at stores around the world starting today. The mini, a smaller and cheaper alternative to the larger iPad, has a starting price of $329 and is expected to sell around 1 to 1.5 million units in the first weekend, far below the 3 million iPad 3s sold last March (who all probably want their money back). Something that's sure to be brought up in the following days, as with most new devices, is the battery life. As we previously provided you tips on savi...

How To: Disassemble an HP iPAQ 6900 series PDA

Accidents will happen. This brief how-to will guide you through the process of disassembling your HP iPAQ hw6500, hw6510 (hw6510a, hw6510b, hw6510c, hw6510d, hw6510g), hw6515 (hw6515a, hw6515b, hw6515c, hw6515d, hw6515f), rw6815, rw6818, rw6828, hw6900, hw6910, hw6915, hw6920, hw6925, hw6940, hw6945, hw6950, hw6955 or hw6965 series pocket PC quickly and efficiently without damaging any of the components, the first necessary step of any successful repair. This tutorial will also be of use to t...

How To: iOS 16 Has a Hidden Unit Converter for Temperatures, Time Zones, Distance, and Other Measurements

Fans of "The Hitchhiker's Guide to the Galaxy" will remember the Babel fish, the universal translator you put in your ear so you can understand every language you hear. While Apple has its Translate app, there's another iPhone feature reminiscent of the Babel fish, but it lets you convert measurements, times, and other units without having to leave the app you're currently using.

How To: Read a ruler

Everyone has used a ruler at some point in their life, whether for art sizing, blueprint plans, or sizing up your widescreen television on your living room wall. But there's a lot of little ticks on the ruler that you may not be aware of. Your ruler shouldn’t be used only to draw a straight line. Make sense of all those little lines and take advantage of its intended use.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

How To: Use Photon Scanner to Scrape Web OSINT Data

Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through URLs on our behalf to retrieve information of value to a hacker.

How To: Exploit Recycled Credentials with H8mail to Break into User Accounts

Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can search through over 1 billion leaked credentials to discover passwords that might still be in use today.

News: A Human Has Caught the Bird Flu... From a Cat!

Cats give us so much—companionship, loyalty, love... and now the bird flu. Several weeks ago, a veterinarian from the Animal Care Centers of New York City's Manhattan shelter caught H7N2 from a sick cat. According to a press release from the NYC Health Department on December 22, "The illness was mild, short-lived, and has resolved." This isn't the first time cats have passed infections on to humans, but it is the first time they passed on the bird flu—avian flu H7N2, to be exact.

How To: Buy Used Phones Without Getting Screwed

I've seen my fair share of heartbreaks when it comes to used phones. As a repair tech, I often had to try and help out customers who bought used handsets which turned out to be useless, either because it was stolen or not working on their carrier's network. More often than not, there was very little I could do. To help you from being stuck in the same situation, here are some tips to prevent you from getting scammed out of your hard earned money when buying a used handset.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 13 (Browser Forensics)

Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic analysis. For those of you who are seeking career as a forensic investigator or security engineer, this can be invaluable training. For hackers, it might be life-saving.