Whether scheduling meetings, events, tasks, or even keeping tabs on the weather, a good digital calendar can help you stay on top of your game in ways that a normal calendar could never do. Indeed, there are many calendars to choose from, but Google Calendar is one of the best due to Google's excellent cloud service, feature-rich web-client, and their easy-to-use Android and iOS applications.
The Google Play Store hosts the largest collection of mobile apps on the planet, and it's the default app store for almost all Android devices. Ironically, though, while Google made its name with a powerful search engine, it can sometimes be difficult to find what you're looking for on the Google Play Store.
Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of hard drives, and in this tutorial, we will examine a number of the most important ones.
Continuing this series, I am now moving on to the section, 'Anonymous'. Hope you are looking forward to read this.
Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them
Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking enthusiast, anyone with a 3D printer can make their own master keys to unlock any TSA-recognized locks.
While Windows 10 is still a few weeks away from a public release, that doesn't mean you can't enjoy its brand new features right now. Anyone with an Insider Preview account can install Windows 10 on their computer. And that doesn't just go for those that own a Windows PC—Mac users can get their hands on Windows 10 as well.
Welcome back, my novice hackers! In this continuing series on Metasploit basics, let's next look at a module that many aspiring hackers find useful—autopwn.
Welcome back, my novice hackers! In my series on cracking passwords, I began by showing off some basic password-cracking principles; developed an efficient password-cracking strategy; demonstrated how to use Hashcat, one of the most powerful password-cracking programs; and showed how to create a custom wordlist using Crunch. In this tutorial, I will show you how to create a custom wordlist based upon the industry or business of the targets using CeWL.
As the largest wireless service providers in the United States, AT&T and Verizon Wireless carry some serious clout. Sadly, they use some of this power to heavily modify the Android phones that they offer.
Transition animations are an essential element of any mobile operating system. They give the user a sense of what's happening on the screen, where the apps are coming from, and where they're going.
Welcome back, my tenderfoot hackers! In continuing my series on digital forensics using Kali, I want to introduce you to two complementary tools, both built right into Kali Linux. These are Brian Carrier's tools Autopsy and Sleuth Kit.
Welcome back, my tenderfoot hackers! I have written many tutorials on hacking using Metasploit, including leaving no evidence behind and exploring the inner architecture. Also, there are my Metasploit cheat sheets for commands and hacking scripts.
One of the best things about the Nexus line of devices is the ease with which one can achieve root. Plug your phone into your PC, download a couple files, type a few commands, and you can be rooted within 30 minutes. No muss, no fuss, no carrier-locked bootloaders.
Welcome back, my newbie hackers! Recently, I "upgraded" to Kali as my hacking platform, despite my preference for BackTrack. I did this reluctantly, primarily because new readers here could no longer download BackTrack from their site. I want to point out here that we all must keep in mind that with any software—or for that matter, any product—that is newer is not necessarily better.
Last night, I was reading a riveting National Geographic article on the green-eyed tree frog, until I was quickly interrupted by an annoying popup asking me to "create a free account" or "sign in." Really, I'd like to do neither. I just want to read about tree frogs.
The flexibility within Android is pretty amazing. Unlike iOS, you can make a lot of modifications with nothing more than a download from Google Play, but to really step up your softModder game, you'll need to go a little further.
Welcome back, my hackers novitiates! As you read my various hacking tutorials, you're probably asking yourself, "What are the chances that this hack will be detected and that I'll land behind bars, disappointing my dear mother who already thinks I'm a loser?"
Automation applications bring the future a little closer. If you've seen Minority Report or other futuristic sci-fi movies, the intrigue of having your electronics work independently is something we can all appreciate.
Welcome back, my budding hackers! In my continuing series on Linux basics for aspiring hackers, I now want to address Loadable kernel modules (LKMs), which are key to the Linux administrator because they provide us the capability to add functionality to the kernel without having to recompile the kernel. Things like video and other device drivers can now be added to the kernel without shutting down the system, recompiling, and rebooting.
Welcome back, my hacker trainees! A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specifically for Linux. There are some exceptions, though, including software like Cain and Abel, Havij, Zenmap, and Metasploit that are developed or ported for Windows.
Welcome back, my nascent Hackers! In my last blog, we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it's totally undetectable, meaning that the target never knows you're scouting them and you leave no tracks. The disadvantage, of course, is that it's limited to only some websites and not entirely reliable.
The iPod changed the music and electronics industries when it was first introduced way back in 2001. It is credited with ushering in the age of "connected devices," and has held a huge market share of around 70% for years. At the height of its popularity, the iPod made up almost 50% of Apple's revenue. Now that the smartphones and tablets we use every day have the ability to store and play music, the iPod's glory days are over. Nevertheless, there are millions of people who still use them, an...
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in Adobe's Reader.
In this article, I'll be continuing my series on microcontrollers. If you haven't read part one, I'd recommend heading over there and reading it!
Connect a piano keyboard or start playing on your computer keyboard right away! Practice one hand at a time, change playback speed, transpose to a different key, create loops to repeat, track your progress and much more.
Summer is the best friend of poison ivy, oak, and sumac. When the weather is hot outside, people spend more time in the great outdoors, which means more people accidentally running face first into some poisonous shrubs, leaves, and vines. If that sounds like you, instead of suffering through the itch or spending money on expensive pharmaceutical solutions, try some of these home remedies out.
I go over how I draw a goblin head. This is useful for anyone that likes fantasy illustration, or fantasy art. For a step by step, or walkthrough. Go here:
If your idea of jewelry making is simply strining on glass beads and vintage knick knacks onto a string and then adding a clasp, then you have some serious learning to do. While in the end creativity trumps all, it's important for many intricate projects that you calculate exactly how much of one particular stone or filigree stamp you need. And in order to do that, you must measure them.
In this video, we learn how to add ray so flight through trees in Photoshop. First, open up Photoshop and open up your picture. Now, go to your channels and choose the one with the most contrast by looking at all of the options. Now, duplicate the layer and go to "image", "adjustments", and then "levels". Now, make the image a lot darker, looking at the image preview as you go. When finished, click "ok", then select this layer and press "control", then click". Go back to the regular image, th...
In order to create 3D lettered signs in lights, you will need to first create an object. Open Illustrator. Type your letters on the page. Adjust the font to the style you would like. Click on "effect". Then, click on "3D". This will allow you to rotate the image for the angle that you will want to see it at.
HTPC. It stands for Home Theater PC. Some refer to it as simply a Media Center. But no matter what you call it, you're going to learn how to build one today. Why would you want to do that? Because one of the main advantages of creating your own home theater system is that you are control, not only of the cost, but the features and functions, as well.
Kipkay is at it again with his pranks. In this video, he shares four fun and easy pranks that anyone can do to drive their friends (or victims) crazy! Their all very simple. They include a cell phone prank, a floss prank, and more!
Want a very nontraditional take on a classic American comfort food? Then this hearty and spicy recipe is it. Made with ample helpings of salsa, cilantro, black beans, yellow corn, green and red bell peppers, and enchilada sauce, this casserole dish will make your mouth smoke with its succulent hotness. The casserole is then topped with a layer of Monterey and Jack cheese for added crunch and gooeyness.
It's a timeless doggie no-no, and one that has been paradied in numerous dog scenes in movies: A plate of delicious fried, steaming food is left by the owner on the table. The owner then leaves for a brief moment. His dog, smelling the delicious goodness, seizes the moment and quickly jumps up, snatches a piece of chicken, and devours it under the table.
In this Home & Garden video tutorial you will learn how to build an outdoor kitchen. You can build it yourself using the AB courtyard walls collection. You should have all tools as per How-to sheet #341 before you begin. Determine the location of your outdoor kitchen and with a measuring tape mark the location of the back wall. Mark the line with masking tape. Begin the 1st layer by placing a corner block in the corner. Then place a large piece of a split block next to it. For information on ...
In order to play Tom Petty's 'Wildflowers' on the ukulele you first have to only know three chords for the whole song's verse and a couple more for the song's bridge. To start the first verse you play a B flat major chord. To play this chord bar the first two strings of the first fret, your second finger on the third string of the 2nd fret and your third finger on the fourth string of the third fret. Next, play F major which is first finger on 2nd string of first fret and the second finger on...
This video is about how to deep fry kimchi. The first step that you will have to do is to pour 1/2 cup bread crumbs in a bowl. Then just simply add 1/4 cup flour. After adding the flour, the next step is to add 1/4 cup corn meal. Then after adding corn meal, just add 2 teaspoons of cayenne, 1 teaspoon of lemon pepper and a teaspoon of Korean red pepper. After adding all the ingredients, you have to do some mixing. After mixing, the next step is to make some egg wash in a separate bowl. In the...
This video has a man by the name of Dr. Neder and he has a book by the name, ‘how to be a man in a woman’s world.’ He answers a series of questions. The first question asked is how to get a girl with a boyfriend. The answer this video provides is simply that all girls are looking to date up. Meaning your value and assets, if there is a greater attraction then the girl will end up with you and dump the guy that she is with. Does size matter? The average size of most man is five inches to five ...