Platforms Supply Search Results

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

How To: Cancel Your MyFitnessPal Premium Subscription on Android & iOS

In 2015, MyFitnessPal launched its premium service, an ad-free subscription for $9.99 a month or $49.99 a year which provides food analysis, deeper nutrient tools, more goal options, and exclusive content. After giving MyFitnessPal Premium a shot on your iPhone or Android phone, those perks may be unnecessary to your end goal, but you'll find that canceling your paid membership isn't very easy.

Snapchat 101: How to Attach URLs to Your Snaps as Links

While Instagram users can attach links to images, they can only do so in stories, and only if they meet the special requirements that most users cannot obtain. Snapchat, on the other hand, lets anyone add a link, and it can be done in regular snaps and in your story. This feature has only been around since July 2017, so you may have missed it and not even realized it was a possibility.

News: This Is the Best Swype Alternative for iPhone & Android

We regret to inform you the former king of third-party keyboards, Swype, has officially retired on both Android and iOS. A few weeks ago, we noticed Swype's mysterious disappearance from the iOS App Store but had hoped it was just pulled temporarily, not gone forever. Unfortunately, Swype is no more, but there's something that's ready to take its place for you on your phone.

News: The Best Augmented Reality of 2017

The augmented reality industry made great strides in 2017, but its apex is not even in sight. In terms of software, augmented reality is approaching meaningful mainstream awareness, thanks mostly to Apple and ARKit. Meanwhile, on the hardware side, AR is very much in its infancy, with headsets mostly limited to enterprise customers or developer kits and the majority of smartphones lacking the sensors necessary to achieve much more than parlor tricks.

News: How Would the Pixel 2 XL Look if HTC Built It? Now We Know

The Pixel 2 and Pixel 2 XL were built by different manufacturers. This is pretty common knowledge among Android fans at this point — Google's smaller Pixel 2 was built by HTC, while the larger Pixel 2 XL was built by LG. What would the Pixel 2 XL look like if HTC had followed through and delivered on the larger phone for Google? Today we have some answers.

AHS Cult: How to Grow a Beehive Out of Your Skull for Halloween

The promotional images for American Horror Story: Cult have been some of the most arresting in recent memory. They mash coulrophobia, trypophobia, and body horror together with some serious economy into a succinct, colorful, image. It's like a bad car accident that you can't stop rubbernecking. Which makes it perfect for a Halloween costume — you'll be repulsive, but no one will be able to look away. While the beehive skull hasn't made an actual appearance in Cult yet, and probably won't sinc...

How To: Make a 'Thor - Ragnarok' Costume That Will Rock Halloween

You can bet Thor costumes will be prominent among the superheroes seen this Oct. 31. Since the summer, there has been no shortage of coverage for Thor: Ragnarok, and the timing of its November release couldn't be better as a tie-in with the cosplaying holiday known as Halloween. This year, the success of pulling off the Thor costume will rely on how well your new Thor helmet looks, which as it happens, you can DIY at home, using a few simple supplies and perhaps a trip or two to the craft and...

How To: Detect Bluetooth Low Energy Devices in Realtime with Blue Hydra

Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecure attack surface. This surface can now be mapped with the use of Blue Hydra.