For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been dying to share this list with someone shopping for you, we've got you covered with our 2018 selection of hacker holiday gifts.
When I review apps, I'll oftentimes end up downloading at least one or two "bad" apps that either lied about their functionality or were riddled with ads. These apps, while not as harmful as malware, can still be a major headache. This got me thinking about the other bad apps on the Play Store and how to avoid them.
There's always an iPhone in our list of top phones for privacy and security, due in large part to advanced security measures like Face ID, consistent iOS updates, and easy ways to prevent unwanted access and excessive data sharing. However, some of those options actually do the opposite and hinder security. It all depends on how you use your iPhone, but you should at least know everything available.
The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.
Your iPhone has a lot of personal information contained within it, so of course you want your device to be secure. You don't want that information getting into the wrong hands — or any hands other than your own, for that matter.
The race for the future of AR wearables gained steam this week with several pivotal developments. First, Apple, the subject of numerous reports and rumors regarding its purported AR headset, is reportedly eyeing an in-person unveiling of the device for later this year, rather than introduce it at its upcoming virtual Worldwide Developers Conference, which would usually be as good a time as any to make a big AR hardware announcement.
GTFOBins and LOLBAS are projects with the goal of documenting native binaries that can be abused and exploited by attackers on Unix and Windows systems, respectfully. These binaries are often used for "living off the land" techniques during post-exploitation. In this tutorial, we will be exploring gtfo, a tool used to search these projects for abusable binaries right from the command line.
With Unc0ver, Pwn20wnd was the first to jailbreak an iPhone and iPad running iOS 12 versions. While it initially couldn't work on all devices, it's an entirely different story now. Unc0ver currently works up to iOS 13.5 for most A7 to A13-powered devices. Plus, Chimera, another jailbreak tool, supports a similar range of models on iOS 12 to 12.3 and iOS 12.4.
Believe it or not, there are legitimate iOS apps beyond the App Store that you can install on your iPhone. Some of them even work for iPad, Apple TV, and Mac, and there are also benefits to using them over apps found in the App Store.
Android 11 is here. Prior to Google dropping the naming scheme, this would have been a dessert with an R name (maybe Rice Krispies Treat or Red Velvet Cake) — but nope, just plain ol' Android 11. And after months of betas and a global pandemic, it finally debuted a little over a year after Android 10.
Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about security on an application level. If a malicious file is opened on your system, will an attacker be able to access every file on the computer? The chances are much slimmer if you put the proper defenses in place.
Apple's iOS 16.3 update for iPhone had impressive new features, but iOS 16.4 might impress you even more.
Apple's iOS 14 is here. With it, you'll see over 200 new features and changes hit your iPhone, including home screen widgets, inline replies in Messages, and cycling routes in Maps. Here's how you can get your hands on the brand new update.
Quarters don't get you very far at the mall, but they are very impressive when used in magic. Grab a fake trick quarter and follow these steps and you will be on your way to impressing your friends in no time!
Having problems with your anti-virus software on Windows? Learn how to delete the fake virus software Personal Antivirus! Personal Anti-Virus is NOT a legitimate anit-virus software and will use spyware to steal info from your computer.
If you're a diehard Apple fan, chances are the new iPad 2 caught your eye, stole your heart and emptied your wallet. Who couldn't resist the sophisticated slim-body design or its fascinating new Smart Cover? Well—it seems nobody could. And if you were late to jump on the bandwagon, you're still probably cleaning that dust out of your mouth because it took off without you—leaving the latest and greatest Apple gadget out of your reach.
If you're looking to acquire the newest iPod model or latest Xbox without breaking the bank, your first stop would probably be eBay, maybe even the Amazon Marketplace, or any of the other reputable online marketplaces and auction sites. But you probably haven't hit up the penny auctions yet, and that could be a good thing, depending on how you go about it.
Tol Barad sounds pretty exotic, but really, what doesn't in World of WarCraft: Cataclysm? If you're a WoW: Cataclysm player and haven't heard of the Tol Barad zone yet, then what in the hell have you been doing? Letting a bot play your game? Maybe the WoW Glider? Tsk, tsk.
There is no fan experience in professional sports quite like watching an NBA game live. Partly, this can be attributed to the combination of fluid teamwork and jaw-dropping athleticism the players exude in the form of size, speed, jumping ability, grace, and strength. What truly differentiates the NBA from the spectators' perspective, though, is the figurative nakedness of the players. While the NFL buries its athletes beneath pads and masks, the NBA presents its talent in shorts and a tank top.
Dual booting Ubuntu 10.10 Maverick Meerkat and Windows 7 is fairly easy. If you don't believe me, just read on!
Join the Pilot program and learn how to fly! But you're not going to be flying airplanes in this Pilot program, you'll be trying your hands at Google's first laptop computer.
Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the following information can't be found by a random person who you didn't accept you as a friend:
There are hundreds of websites that claim you can win cash or prizes by signing up and using their website. Sadly, most of these are scams but there are a couple out there that are legitimate. I have investigated many of these websites and tried them out personally, with many failures. The one that sticks out the most, for me and many other people, is beezag.com. Beezag is a website that hooks you up with companies that are currently offering cash or sweepstakes entries for prizes they are gi...
It's been a great year for video games, kind of. Sure, the AAA release lineup has been a trainwreck and hacking has been a bigger problem than ever. But two things have happened involving the federal government that have made video games more legitimate in the United States than ever before. The Supreme Court ruling establishing that video games were the equivalent of movies and books, not porn, was the more significant decision. But in May, the National Endowment for the Arts made another si...
In the news this past couple of days, we've heard of about 10 Argentine hooligans being deported back to Argentina before the start of the World Cup. I'm glad for the South African authorities showing that they have a firm grasp of security leading up to Friday's kick-off, and that the inter-agency cooperation between countries was a serious one.
An Australian Liberal senator has slammed the use of Lego to promote creativity among ABC staff as a "bizarre" waste of money, suggesting finger painting would have been cheaper and just as effective.
Via WonderHowTo World, SCRABBLE: Dirty SCRABBLE. Everybody likes to play dirty, but we're not talking bluffing with fake words or closing up the board—we're talking actual "dirty" and offensive words.
Dirty SCRABBLE. Everybody likes to play dirty, but we're not talking bluffing with fake words or closing up the board—we're talking actual "dirty" and offensive words.
The US judge handling the Megaupload case noted today that it may never be tried due to a procedural error, a comment that has sparked the anger of Megaupload’s founder. Kim Dotcom is furious with the US Government for destroying his businesses and rendering hundreds of people unemployed. According to Dotcom the case is the result of “corruption on the highest political level, serving the interests of the copyright extremists in Hollywood.”
You're currently playing a heated game of Scrabble or Words with Friends. The game is close, too close for comfort. But you're not sweating because you're confident. You play a huge word that puts you in the lead, but then when your letter tiles are drawn...
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC
Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" because it can get around their filter. Quick web proxies can be used for tons of other things, though.
JUMBUCK 74 points (24 points without the bingo) Definition: a sheep [n]
ALAMEDA 60 points (10 points without the bingo) Definition: a shaded walkway [n]
Though it's unlikely you'll ever have a need for hostage survival skills, it never hurts to take in a few tips on what to do in the event of being accosted by Somali pirates off the Horn of Africa. Wired has tracked down a HowTo guide that addresses such a scenario. Though most of the advice is fairly general, one important point addresses the dangers of lighting up with the enemy:
As Theo Gray of Gray Matter demonstrates below, contrary to what the ads may say, diamonds CAN expire. Especially when attacked with a blow torch and liquid nitrogen. Gray says:
Not only am I ecstatic that my favorite team moved on to the semifinals, but I'm also so excited to see a team that's not Brazil in the semis! Just like supporting the Yankees, rooting for Brazil was like rooting for gravity. No longer.
Yonex has been monopolizing the badminton racquet market and still does. New competitors have come and go over the years without much success. Introducing Li Ning, a brand that shows great potential to challenge Yonex.
As many of you know, Standard User proposed that we start a Capture the Flag (CTF) competition. I think this is a great idea! Standard User proposed to set up the server and the flags for this first competition. Since Standard User was new to our community, I asked him to postpone the start of this competition until I had a chance to make certain that this was safe and legitimate for our community. I have good news! With the help of Phoenix750, we have done the necessary due diligence and we ...
I just came across an article on Reddit about some iOS malware called XcodeGhost that has affected many apps in Apple's Chinese App Store. After reading more about it, I thought it was pretty incredible how the attackers had pulled this off. As the name might imply, the malware was not loaded onto iOS devices because the iOS devices were directly hacked, but rather it was the Xcode versions used by the developers of legitimate apps that were hacked! Basically, some devs were using hacked Xcod...