How To: Finally! Permanently View Battery Percentage in Your iPhone's Status Bar Instead of Battery Levels
When the first iPhone with Face ID came out, Apple removed a popular feature — the status bar's battery percentage indicator — because of how much space the TrueDepth camera system's notch took. It's been absent on all Face ID models since. Now, almost five years later, it's finally made a comeback.
Your days as an ordinary Muggle are over, as long as you have an iPhone. With just a word or two, you can use your iPhone and newfound Muggle-born powers to cast spells just like Harry Potter and team. Only your "wand" is from Apple, not Ollivanders in Diagon Alley.
This is a quick tutorial on how to create a new administrator account on a Windows computer. Step 1: Open CMD Prompt...
Among the many exciting features coming this fall to iPhone, iPad, and Mac is the ability to recover recently deleted texts. Imagine never being frustrated again for accidentally deleting an important text or iMessage, knowing that you can recover it in just a few taps. The feature is long overdue, but it's better late than never.
How To: Use Your iPhone's Hidden Microphone Effects to Improve Your Audio in FaceTime, Zoom, and Other Video Calling Apps
Being seen clearly is an essential part of any video call you're on, but being heard is equally important. Lousy audio from your side can ruin the experience for others on the call if they can't understand you or hear the sounds they need or want to hear. To improve your audio feed during FaceTime, Google Meet, Instagram, WhatsApp, Zoom, and other video calls, unlock your iPhone's hidden audio filters.
If you scan the notification panel on your Samsung Galaxy smartphone daily, all those red circles with numbers that litter the apps on your home screen and app drawer can feel like persistent nagging and unnecessary clutter rather than friendly reminders to check your app alerts — but you can do something about it.
Whenever your iPhone's on Ring mode, you'll hear Apple's iconic "Connect Power" chime every time you connect it to a wired or wireless power source, which lets you know that charging has started. There's no way to disable the sound without turning on Silent mode, but there is a way to make Siri automatically say whatever you want after a successful connection.
How To: Upgrade Your Screenshots by Framing Them with Your iPhone or iPad's Body — No Third-Party App Needed
Have you ever seen an image on social media, somebody's blog, or a news website that shows an iPhone or iPad screenshot with an actual iPhone or iPad model framed around it? You can do that too, and it's really easy to accomplish with a third-party app — but you can do the same thing with a shortcut that won't bug you to pay or subscribe.
Google Voice has a hidden feature that lets you record any phone call you're participating in, and unlike other apps, it doesn't cost a dime.
You've probably connected your Android device to dozens of Wi-Fi networks since you've had it, and your phone or tablet remembers each of them. Whether it's a hotspot at home, school, work, the gym, a coffee shop, a relative's apartment — or even from a friend's phone — each time you type in a Wi-Fi password, your Android device saves it for safekeeping and easy access later.
Remember when water and iPhones couldn't mix? Pools, tubs, and toilets would suck down the working iPhones of clumsy and careless owners and spit out expensive paperweights like they were nothing. Times have changed, however, and the newest iPhones can take a swim without fear of certain death. But a dip in liquid can still cause muffled music and audio from the speakers.
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabilities that could be potential attack vectors.
How To: Edit Your Sent iMessages to Fix Spelling Errors and Other Mistakes (Works on iPhone, iPad, and Mac)
Apple is finally letting us edit iMessages after sending them, and I can honestly say it's a game-changer. Editing texts after sending them can prevent miscommunication and allow you to fix embarrassing mistakes before the other person even notices them.
Many of Apple's apps, including Books, Messages, Photos, Shortcuts, and Weather, are getting significant upgrades in iOS 16. Another app with lots of exciting new features to explore is Notes, and some of the new tools it offers might end up being things you use every day to make lists, save ideas, jot down thoughts, create outlines, draw sketches, record observations, and more.
Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.
When a stuffy nose hits, it feels like breathing clearly and easily may never come again. Allergies, colds, and even changes in weather can leave our sinuses blocked, with medicine seeming like the only option. But don't break out the medication just yet — relieving the pressure of a stuffy nose, a stuffy head, and stuffy ears can be as easy as touching a pressure point.
Warning: Sensitive Info You Black Out in Images Can Be Revealed with a Few Quick Edits on Your iPhone
These days, most images we post online or share with others come from our smartphones. Whenever personal data is in them, such as debit card numbers, addresses, phone numbers, passwords, and other sensitive information, it's easy to jump into your iPhone's markup tools to black out the text before sharing. But a digital marker may not hide everything.
If you own a Samsung phone and enjoy rooting or modding your device, flashing official firmware can be very useful. Odin is Samsung's own internal program for loading such updates for testing purposes, and it's quite easy to use for your own custom modification needs.
Greetings all. Before I get into the tutorial, I would like to mention that I am fairly new to Null Byte (been lurking for some time though), and what really appeals to me about this place is its tight, family-like community where everyone is always willing to help each other and the constant search for knowledge that inhabits this subdomain is a driving motivator for me to join in. I'm glad I arrived at the right time. Anyway, wipes tears (not really)...
Apple's Wallet app lets you store boarding passes, concert tickets, gym memberships, vaccination cards, movie stubs, rewards cards, insurance info, student IDs, and more in one place on your iPhone, and you just double-click the Home or Side button to access them. Unfortunately, a decent amount of cards and passes are not officially supported — but that doesn't mean you can't add them.
After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.
While Apple has included a vibration motor in the iPhone since the beginning, it's never let us use it for haptic feedback on its default keyboard — until now.
Apple's $29 Bluetooth beacons definitely drew some inspiration from Tile's lineup of trackers. But just because AirTags are designed like other smart trackers doesn't mean you can't find other useful ways to use these little homing tags. In fact, we've thought of more than a dozen fun ways to get the most out of AirTags.
To hack a Wi-Fi network, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purchasing will work for Wi-Fi hacking.
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone is running in real time.
Not all websites need a dedicated mobile app, which is why so many don't. Web apps are now designed to scale to whatever the size of your screen is, so the mobile versions of desktop sites in your web browser are easy enough to navigate and utilize. Still, there's just something about an app on your home screen that makes it all so much easier.
Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making customized wordlists. Using the Mentalist, we can generate millions of likely passwords based on details about the target.
CC, which stands for "carbon copy", is a familiar phrase in email, but can also be used in business letters and legal documents. This can be especially useful for letters you want to spend up a company or organizational chain, letting each recipient know exactly who else received the same document.
Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali.
Paywalls make it nearly impossible to access certain content unless you have a subscription. It's a practice that many news organizations and other online publications use to increase revenue: The New York Times, The Wall Street Journal, Vanity Fair, Wired, and so many more. But just because a paywall is in place doesn't mean you can't get around it on your iPhone.
Instead of responding to a WhatsApp message with short texts like "LOL" or thinking too hard about something meaningful to say, use an emoji reaction. They cut down on clutter in group chats and take up less space than typing emoji individually in a conversation. WhatsApp initially limited reactions to just six emoji, but a new update lets you use any emoji you want.
If you're a teacher in any type of school, whether it's high school, college, or middle school, it's imperative that you keep an attendance sheet. The paper and pen route can get pretty messy, and very disorganized, and that's where Microsoft Excel comes in. With this software, you can create a simple yet functional attendance sheet to keep track of your students.
Slack's in-app web browser works fine, but it just doesn't offer the functionality and features that a dedicated browser such as Chrome, Firefox or Safari can. Features like the ability to bookmark a page, search for specific text, or request the desktop site are missing. Luckily, Slack makes it easy to change your default browser.
Battery management is a never-ending struggle. To be on the safe side, you likely won't want to leave your home with less than 100% battery, but continually checking your charging iPhone is a hassle. Instead of continuously monitoring your battery's power level, have your iPhone tell you when it's reached a full charge.
Although iOS 8.4 was just released, the team behind the iOS 8.3 jailbreak have updated their tool for the latest operating system, and will work on an iPad, iPhone, or iPod touch. So if you've been wanting to get all your tweaks back, or want to start exploring all of Cydia's options, now's the time to jailbreak.
Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts.
So, you're trying to show a friend or two a hilarious Reel you liked or saved on Instagram, but where is it? Unlike TikTok, Instagram doesn't make it clear where you're supposed to find your liked and saved Reels. Luckily, we can help.
You know that you have the Gmail app on your iPhone. After all, you get Gmail notifications, you see it in the app switcher, it's in the Settings app, and there's an "Open" button in the App Store instead of "Get" or a download icon. But you cannot find the app on your Home Screen. If this situation sounds like something you're dealing with on iOS 14 or iOS 15, there's an easy answer.
Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.
You might have noticed some of the videos you upload to TikTok don't always look great. If you think the answer is that you need a DSLR, you're wrong. The blurriness, pixelation, and overall bad quality that can happen in your uploaded videos is probably not your smartphone's fault — it might be because you aren't uploading your videos in HD.