New Posts

How To: Check & Delete Devices Connected to Your Apple ID to Remove Items You No Longer Use

With the growing list of products Apple offers, the number of devices connected to your Apple ID can get quite extensive. Having all those devices connected to your Apple ID helps you keep track of them, but when it comes time to part ways with an Apple TV or Apple Watch, those devices can still be attached to your Apple ID. In some cases, this could affect the overall security of your account.

How To: Secure Your Facebook Account Using 2FA — Without Making Your Phone Number Public

When it comes to digital security, one of the best ways to protect yourself is to use two-factor authentication. Most apps these days support it, including Facebook, a site where the more privacy you can muster, the better. However, of the two 2FA options available for Facebook, only one should be used as the other will share your phone number with the world, a huge privacy concern.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Boot Your Galaxy S10 into Recovery Mode & Download Mode

You don't need to be a hardcore modder to know the importance of booting your S10 into either recovery mode or download mode. In fact, these pre-boot menus are something everyone should be familiar with. The former can help you get out of soft bricks, while the latter lets you use utilities like Odin and Smart Switch to flash firmware files and fix your phone when all other solutions fail.

How To: Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you to select targets in range and let the script choose the best strategy for each network.

How To: Hide the Annoying Home Bar Indicator on Your iPhone X for Fewer On-Screen Distractions

The home bar, that tiny sliver of color at the bottom of the screen on Home button-less iPhone models, is helpful when first getting used to an iPhone X or newer's gestures. It helps you learn how to swipe up to unlock, go to the home screen, view the app switcher, and so on. But after a few weeks, it just becomes an annoying eyesore you can't get rid of — unless you have a jailbroken iPhone X.

How To: Clear Your Frequently Used & Recent Emojis from Your iPhone's Keyboard

The Frequently Used section in the iPhone's Emoji keyboard is a weird place, to say the least. Despite its name, the section features both frequently and recently used emojis, and it may contain emojis you've never even touched. And let's not even talk about its strange way of organizing emojis. If you're sick of seeing weird emojis in there, there is a way to reset what appears in there.

News: Apple Releases iOS 12.2 Public Beta 4 to Software Testers Early, Includes New Icons & Other Small Tweaks

Apple released iOS 12.2 beta 4 to developers on Monday, March 4, then shortly thereafter also pushed it out to everyone on the iOS 12.2 public beta program. All previous public beta updates for iOS 12.2 were released the following day, but this one changes course. In the iOS 12.2 public beta 4, there are new icons, an updated "About" page, and better Now Playing tile.

News: Apple Just Released iOS 12.2 Developer Beta 4 for iPhone, Includes New Icons, Updated About Page & More

Apple released iOS 12.2 beta 4 to developers on Monday, March 4, and that means public beta testers will likely get the update on Tuesday. The update features a fresh "News" app icon, a new "Apple TV Remote" tile in Control Center, and a tweaked "About" page, in addition to seemingly under-the-hood updates. If you're not yet on the beta, now's your chance to see it for yourself.

How To: What to Do After Your iPhone Is Lost or Stolen — The Ultimate Guide

Your iPhone just went missing, and now you're panicking. You need it for work, to get around, to contact your friends and family, and pretty much everything else in your life. So, what are the chances you might get it back? The odds may be stacked against you unless it's just under a couch cushion, but you can improve your chances of recovering your iPhone by taking certain steps.

How To: All the Privacy & Security Settings You Should Check on Your OnePlus

One of the best things about Android is the ability to customize every aspect of your device to make it your own. However, unless you have prior knowledge or experience with every single setting available to you, you might have missed a few critical features without even knowing it. Some settings are easy to find, while others might be tucked away in another menu of their own.

How To: The Easiest Way to Make the Bixby Button Open Google Assistant on Your Galaxy

After years of user complaints, Samsung is finally letting us remap the Bixby button without the need of a third-party app. The new feature requires One UI a simple app update to Bixby, but there's one major downside: Samsung won't let you remap the button to open other digital assistants like Amazon Echo, Microsoft Cortana, and Google Assistant. Luckily, there's an easy workaround.

How To: Remove Unnecessary Profiles & Certificates on Your iPhone to Protect Your Privacy & Security

When you want to install a new tool or game on your iPhone, you go straight to the App Store to do so — but it's not the only place you can get apps from. Some developers use back alleys to get their apps to you, while others can trick you into installing them without giving it much thought. This can lead to malicious software running on your iPhone, software you'll want to get rid of asap.

How To: Everything You Need to Set Up on Your iPhone Just in Case It Ever Gets Lost or Stolen

For lack of a better word, a missing iPhone sucks. Not only do you lose a physical device that cost you a small fortune, but there's also the probability you'll never see your precious data again. Hackers and thieves might, just not you. To keep this from ever happening, there are preventative measures you should take, and the sooner you do them the better.

How To: The 4 Best VPN Apps for iPhone & Android

There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help clear the air on some of these issues while objectively ranking the best of the best.

How To: The Ultimate Guide to Using Android Without Google

There have been some concerns with Google when it comes to how much personal information they track and all the things know about us. Of course, that's what makes Google services so useful, though — they can use that information to cater to each of us individually based on our account activity. It serves a purpose, but it can also cause a stir when it comes to personal data security all the same.