Simultaneously Accessed Search Results

How To: Android 10 Drastically Updated Location Permissions — Check Your Settings ASAP

With Android 10, there are now three options when an app asks to access your location: Allow, Deny, and Allow While In Use. That last one prevents apps from seeing your location unless you're actively using them, and it's the default now. But when you first update, most of your apps will still be allowed to access your location in the background — at least, until you do something about it.

How To: Open Previous Drafts Faster in Your iPhone's Mail App — From Any Mailbox or Folder

All of your partially written, unsent emails live in your "Drafts" folders, in limbo until the day they are sent off or deleted. In Apple's Mail for iPhone, you can access all drafts from all accounts in a combined "All Drafts" folder from the app's main Mailboxes list — but only if you added it manually. But there's an even better way to access all of your drafts in Apple Mail in iOS; it's just not obvious.

How To: All the Privacy & Security Settings You Should Check on Your OnePlus

One of the best things about Android is the ability to customize every aspect of your device to make it your own. However, unless you have prior knowledge or experience with every single setting available to you, you might have missed a few critical features without even knowing it. Some settings are easy to find, while others might be tucked away in another menu of their own.

How To: Set Up Instagram Recovery Codes So You Can Always Access Your Account with 2FA Enabled

Two-factor authentication (also known as 2FA) adds a necessary additional layer of security to your username and password in many important apps. On Instagram, 2FA requires you to confirm it's you attempting to log in, with a special code sent to you via text message. Enter the code and you're in ... but what happens when you need to log in and don't have access to your phone?

How To: Root Apps Not Working with Magisk? Here's What to Do

It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for still won't work — and the signs point to a lack of root access. Don't lose hope, because we have some tricks up our sleeve.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

News: Use Facebook Messenger to Interrogate This Chatbot for Game of Thrones Spoilers

Winter is here, which means we have a lot of questions about the coming season of Game of Thrones. It's hard finding someone who cares enough to listen to you rant about why Jon Snow is the rightful ruler of Westeros. It's also hard to figure out who exactly everyone is and is related to since there are over 150 major characters on the show. We're all getting a little antsy waiting for the new season, so to hold us over a new bot has rolled out 'G0TB0t' on Facebook Messenger. Specifically, it...

Snapchat 101: How to Turn On Ghost Mode for Snap Map to Keep Your Location Private

Snapchat recently updated their Android and iPhone apps with a new feature called Snap Map which lets you share your current location with other Snapchatters, as well as see their current locations. It may sound like an interesting new feature, but sharing your exact location with all of your Snapchat followers is dangerous, to say the least. Luckily, it's easy to turn this feature off.

How To: Automatically Launch Two Apps at the Same Time in Android's Multi-Window Mode

Android 7.0 Nougat brought a lot of multitasking improvements along with it, but the most notable addition is a unified multi-window mode (which shines bright in Google's Pixel phones). This means that every Android device can now use the same split-screen interface, and the days of software fragmentation caused by differing multi-window implementations by LG and Samsung are now over.

News: Girl Plays Super Mario Bros. Theme on Ancient Chinese Instrument—& It Sounds Exactly the Same

Super Mario Bros. is one of the most renowned games in history. It helped resurrect a dying video game industry in the mid-'80s and still remains one of the best-selling video games of all time—one reason why the new NES Classic Edition is so popular and impossible to get these days. Its simple story of a plumber trying to rescue a princess resulted in a video game empire for Nintendo.

How To: Use a Misconfigured SUID Bit to Escalate Privileges & Get Root

Gaining access to a system is always exciting, but where do you go from there? Root or bust. Sure, a compromised host is a great way to run a botnet, or do some other boring, nefarious thing—but as hackers, we want root. We also want to take the easiest path possible, search out low-hanging fruit, and exploit them. SUID programs are the lowest of the low-hanging fruit.

News: Your iPhone's Lock Screen Is Getting Better Widgets, Notifications, & More in iOS 10

Your iPhone's lock screen is about to get a major upgrade in iOS 10, as shown off by Apple at WWDC '16, and it will make dealing with notifications and apps a breeze. The new lock screen has been fully redesigned to give users better and faster interaction with the apps they need. It's also snappier and more aesthetically pleasing with notifications no longer darkening the wallpaper.

How To: Bypass School Internet Filters to Unblock Websites

School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block access to the educational material in National Geographic or forbid searching terms like "China," "Iran," or "Russia"—because, you know, breasts and commies.