Launch Rigidity Search Results

How To: Stop Incoming Calls from Ignoring Do Not Disturb on Your iPhone

Do Not Disturb is the best way to block out all interruptions on your iPhone without having to power down. All notifications and alerts are silenced, but the same can't be said for phone calls. By default, repeat calls will bypass Do Not Disturb, which can be quite frustrating when you're in a movie, classroom, or board meeting. It's good for emergencies, but not for people who can't take the hint.

How To: Get Netflix Beta on Android — Even When the Beta Program Is Full

Netflix has offered its beta program officially through the Play Store for some time now. Still, the issue most of us face — the beta availability is always scarce. Without getting lucky and landing a beta spot early on when the gates were open, there wasn't much you could do about it. However, there's now a brand new method you can use to sideload the Netflix beta app and join in on the fun.

How To: Use Spotify Voice Commands to Play Artists, Playlists & More on Your Phone

Spotify launched an experimental feature in early-2018 called Spotify Voice, a voice assistant that lives right in the app. It lets you speak to quickly find and play your favorite songs, albums, artists, videos, and podcasts on the music streaming service. Although the feature was initially only available on iOS, it's been ported over to Android so that anyone can take advantage of it.

How To: Use John the Ripper in Metasploit to Quickly Crack Windows Hashes

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Metasploit actually contains a little-known module version of JTR that can be used to quickly crack weak passwords, so let's explore it in an attempt to save precious time and effort.

How To: Identify Missing Windows Patches for Easier Exploitation

No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches to fix things. From an attacker's point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.