How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

Market Reality: As Magic Leap & Microsoft Seek Funds, Educators Prepare the Next Class of AR Innovators

For a company who hasn't released a product and has a reputation for being secretive, Magic Leap sure has a tendency to make waves. Over the past few weeks, they've refreshed their website design, released an abstract YouTube video, and announced a partnership with Madefire to offer mixed reality comics on its device whenever it launches. Next, they are gearing up for another round of funding.

How To: Get the Pixel 2 Launcher with the Bottom Search Bar & Google Now — No Root Needed

Update 10/14: Developer paphonb has added rootless Google Now integration to the leaked Pixel 2 launcher, so now, anyone running Android Nougat or Oreo can get the full Pixel 2 home screen experience. For those running Lollipop or Marshmallow, we've left the unaltered leaked version linked out below, but we've added a new link for the tweaked version with Google Now integration.

Snapseed 101: How to Save Photos in Full Quality

If you want to take your iPhone or Android photos to the next level, Snapseed is one of the best options. When it comes time to share pictures with friends and family, you want them to look as good as possible, so a little post-processing is in order. The problem is that Snapseed, by default, saves your edited photos at a lower quality than it first came in. What gives?

How To: Detect BlueBorne Vulnerable Devices & What It Means

Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In this post, we will learn about the vulnerabilities, then look at how to find devices that have them.

WhatsApp 101: How to Delete Individual & Group Chats on Your iPhone or Android

One of the downsides of living in an unprecedented age of connectivity is the near-constant bombardment of information. WhatsApp, the go-to messaging app for people the world over, is just as susceptible to buildup of useless media files, thanks to awesome features that allow us to communicate in multiple ways, such as broadcasting to friends and family. Luckily, the app makes it easy to remove old and unwanted data from your iPhone or Android.

Snapchat 101: How to Use Context Cards

Not that long ago, Snapchat was an app with only one purpose — to send and receive self-destructing picture messages. The app has clearly grown since, adding many features that both adhere to its original function as well as ignore it. One of these new features is Context Cards. You may have heard about them, but what exactly are they?

HoloLens Dev 101: Building a Dynamic User Interface for the HoloLens, Part 7 (Unlocking the Menu Movement)

In the previous section of this series on dynamic user interfaces for HoloLens, we learned about delegates and events. At the same time we used those delegates and events to not only attach our menu system to the users gaze, but also to enable and disable the menu based on certain conditions. Now let's take that knowledge and build on it to make our menu system a bit more comfortable.

Android Security 101: How to Secure Your Communications & Messages

Due to the overnight success of smartphones, millions of people are connecting with others. Currently, over 15 million text messages are sent every minute worldwide. Most of this communication is happening in the open where any hacker can intercept and share in the discussion unbeknownst to the participants. However, we don't need to communicate insecurely.

How To: Execute Code in a Microsoft Word Document Without Security Warnings

Code execution in Microsoft Word is easier than ever, thanks to recent research done by Etienne Stalmans and Saif El-Sherei. Executing code in MS Word can be complicated, in some cases requiring the use of Macros or memory corruption. Fortunately, Microsoft has a built in a feature that we can abuse to have the same effect. The best part, it does so without raising any User Account Control security warnings. Let's look at how it's done.

Waze 101: How to Download Routes for Offline Use on Android

Google's Waze app sets itself apart from other navigation apps with its seamless use of your Android's GPS and internet connections to provide real-time updates on traffic conditions. And if you scratch below the surface, you'll even find an awesome feature within the app that lets you navigate through areas with poor internet connection without a hitch.

How To: Dump a MacOS User's Chrome Passwords with EvilOSX

This weeks' article on Pupy made me wish for a RAT that could be targeted at an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do particularly severe damage by dumping a user's stored credentials for many accounts. The best loot lives in the Chrome Password cache, so today we'll be using EvilOSX, an OS X RAT, to infiltrate macOS and dump these credentials.

TIDAL 101: How to Adjust the Quality of Streaming or Downloaded Music

Thanks to their partnership with Tidal, over 30 million Sprint customers can access Hi-Fi audio on the go. And the Jay-Z-owned music service isn't limited to just Sprint customers — for $19.99/month, anyone can listen to lossless audio from their favorite artists. But streaming uncompressed audio files uses a lot more data than standard quality, so how do you use Tidal without hitting your data cap?

How To: Create a Wireless Spy Camera Using a Raspberry Pi

Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeOS running on a Raspberry Pi Zero to create a small, concealable Wi-Fi connected spy camera that is both affordable and easily concealed.

Cydia 101: How to Re-Enable a Semi-Tethered Jailbreak

Unlike fully untethered jailbreaks such as Yalu's iOS 10.2 method, semi-tethered jailbreaks require users to re-enable the mod each time their device is turned off. Fortunately, the process of kickstarting a jailbreak is easy to do, since it's already embedded in your iPhone's OS and doesn't require reinstallation.

How To: Block Cross-Site Tracking in Safari in iOS 11

Apple has a history of promoting and protecting user privacy. One of iOS 11's less talked about features is its furthered commitment to this endeavor, especially with Safari. At a time when every move you make online is tracked and traced by ad companies, among others, Apple is implementing new techniques to safeguard iPhone users as much as possible.

TIDAL 101: How to Cast Music to Your Google Home or Chromecast

With so many Chromecast-powered devices available, chances are, you're near something with casting abilities right now. Whether it's Android TV, Google Home, or any one of the various gadgets with Chromecast built-in, you can use a more powerful speaker to play media from your smartphone. The only caveat is that the app you're streaming from needs to support Google Cast, but thankfully, Tidal does.

Prev Page