Reload Bonus Search Results

How To: 3 Music Player Apps That Put Your iPhone's Built-in Music App to Shame

The stock music player on the iPhone hasn't changed much since its inception. Sure, with the recent iOS 6 update the design became sleeker, but it's not really what you'd expect from a top of the line smartphone. And when I say "MEH," it isn't directed towards the Kendrick Lamar album (which is awesome). It's the layout of the application, the lack of gesture control, and the sometimes tedious job of shuffling through certain albums and artists.

How To: Watch Tonight's Peaking Geminid Meteor Shower—About 100 Shooting Stars Per Hour!

The Geminid meteor shower happens every December and has been observed for over 500 years. It's is also known as Winter's Fireworks because when viewed from the right location, there are enough meteors to light up the whole night sky, and some of them can even be different colors. The shower appears to come from the Gemini constellation, but is actually caused by Earth passing through the tail of dust and debris left behind by the comet 3200 Phaethon.

How To: The Humble THQ Bundle Is Out Just in Time for Christmas—7 Games for Any Price You Want!

Over the past few years, indie game developers have gathered together to release their products in the widely popular Humble Indie Bundle, a collection that gamers can purchase for whatever price they want. It's a win-win for both. Developers get more exposure for their games, and customers get tons of games for whatever they could afford. Heck, charities even get a little piece of the pie.

How To: Send Self-Destructing Spy Messages via Google Docs, Texts, and Private Links

There's really nothing safe about transmitting sensitive information electronically, but even if it gets there safely without being seen by prying eyes, there's no guarantee what happens to it once it reaches its destination. And let's face it, there are some things that you just don't want floating out there forever. So what can you do? Whether you want to send an email, a text, or a link, there are ways to send messages that self-destruct so that once they're read, they immediately vanish. ...

How To: Throw a frisbee and play disc golf & football

This video series will teach you tips, ideas and techniques on how to catch and throw a disc in fun unique ways as well as the rules and regulations of disc golf. It will explain the history of the disc and how the throw has evolved over the years and, as a bonus, instructions on how to play disc football and it's rules.

How To: Play solitaire

In this video clip series, our expert will discuss the game of solitaire in both traditional, table-top games and computer versions. Learn the basics of the game, tips for improving the game and information on the foundations of the game and its rules. Tips for keeping score, dealing the cards, shuffling and playing through the stacks are included, as well as bonus footage of fun tricks to play with the card deck and Vegas pointers.

How To: Use John the Ripper in Metasploit to Quickly Crack Windows Hashes

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Metasploit actually contains a little-known module version of JTR that can be used to quickly crack weak passwords, so let's explore it in an attempt to save precious time and effort.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Sick of Thumbs Up? Here's How to Change the Default Chat Emoji in Individual Messenger Threads

When you can't think of a way to respond in Messenger with words, emojis and stickers will do the trick. Since Facebook is all about the "likes," which use a thumbs-up icon, there's a shortcut to the symbol just to the right of the chat field. It's always there to send a quick like in response to something. But it doesn't have to be the standard Facebook thumbs-up sign — it can be any emoji you want.

How To: Get Android's Quick Settings on Your iPhone for Instant Access to Location Services, Settings & More

In iOS, the Control Center is an easy way to toggle settings such as Wi-Fi, Do Not Disturb, and Low Power Mode. Its Android counterpart is called "Quick Settings," which provides much of the same functionality with a few bonuses. If you're curious about how this toggle menu works or miss having it before you made the switch from Android, you can test it out on your iPhone right now.

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits and vulnerabilities when scanning servers.

Gaming: The 9 Best Paid Action Games for Android & iPhone

Thanks to ever more powerful smartphones — the iPhone X with its advanced A11 processor and the Galaxy Note 8 powered by Snapdragon's 835 come to mind — the mobile industry is fast closing in on consoles and PCs with regards to gaming. Game developers have been aware of this fact, and have ported many games once dedicated to computers onto our handheld devices.

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

How To: Install OpenVAS for Broad Vulnerability Assessment

OpenVAS is a powerful vulnerability assessment tool. Forked from Nessus after Nessus became a proprietary product, OpenVAS stepped in to fill the niche. OpenVAS really shines for information gathering in large networks where manual scanning to establish a foothold can be time-consuming. OpenVAS is also helpful for administrators who need to identify potential security issues on a network.

News: Samsung Galaxy S8 Preorder Links & Pricing for Major US Carriers & Retailers

The new Samsung Galaxy S8 and S8+ are two of most head-turning phones we've ever seen, thanks to gorgeous build quality and a seemingly bezel-less Infinity Display. Combine that with flagship-grade internals for top notch performance, and you can almost guarantee that Samsung has a hit on its hands—which means it's probably not going to be easy to get your hands on one of these beauties.