Hello, my fellow hackers.
My name is cl0ck. I am a senior
majoring in Computer Engineering with an emphasis is Security. I have
been lurking the site for a while now reading and learning from the
great minds that reside here. I, too, have some knowledge that I would
like to share with all of you. This post actually comes from a personal
problem I faced and had to find a solution for. Without further ado,
here it is:
Imagine
this. Your girlfriend needs to type a very important report for her
Accounting class but she forgot the password to her MacBook Pro. She
tries and tries, but keeps getting the password wrong. She asks her
boyfriend if he can "hack" into her laptop. He actually knows how to do
this so he breaks in and puts a password of his choice. He then gives it
to her and tells her to change her password and to not forget it this
time.
Question is, how did he do it without knowing the password? Here's how...
Power off the MacBook.
Turn it back on and immediately press the Command + R keys until the apple logo appears. You will now be in this screen:
Note: If Recovery doesn't load, restart your Mac and try again.
The
combination of these keys launches OS X Recovery. Mac OS X Lion (10.7)
through El Capitan (10.11) include OS X Recovery. This feature includes
tools that you need to reinstall your operating system, repair your
disk, and restore from a Time Machine backup.
Select Utilities -> Terminal from the top menu bar.
Once the Terminal window loads, type "resetpassword" without quotations and press Enter. The screen below will load.
Select the user and type the new password. Click Save.
Restart your Mac and log in with your new password.
So
it turns out that Apple included a feature just in case we forgot our
passwords. But how do we prevent this from happening to us? Stay tuned,
as in my next tutorial I will be showing you how to prevent this from
happening to you.
want you to imagine your best friend from college challenges you to a duel. Here’s the deal: you both graduated with honors from ivy league schools but your careers bifurcated down different paths. You decided to work in corporate america but he started his own software company in Silicon Valley. Now you’re friend has a kinetic personality. He’s incredibly smart, talks faster than you can think and really understand technology. But he’s also full of hubris and lacks humility. One day over drinks, in a moment of spontaneity, he looks you straight in the eye and challenges you to a duel. He leans in and boasts: With a smug smirk on his face, he stretches out his hand for the shake. Would you shake on it? You decided to shake on it. After all, it’s not going to cost you anything to accept the challenge. The first thing you need to do is figure out how you’re going to gain access to his corporation. Are you planning to penetrate h...
MIT App Inventor is a groundbreaking tool for developing Android applications without any prior programming and coding skills. Using this open source tool, one can convert his/her creative ideas into Android applications. As this utility is browser and cloud-based, you don’t need to download any software or store anything on your computer. A pp development is one of the most in-demand technical skills. However, making a polished and responsive app that’s free from bugs isn’t always simple. To develop a native mobile app , one also needs to have a clear idea of multiple aspects like the market for that app, available resources, and skills needed to write that app.Android app development isn’t any different from this opinion. However, if you’ve got your creative energy flowing and you have a bright idea in mind, all you need to do is grab a proper tool, start learning, and implement your ideas. But, what if you come from a non-coding background? Worry ...
Keep yourself safe online with these 5 free cyber security courses Does ever the thought of your personal details lying unsafe online cross your mind? Have you ever thought of how to keep your personal data secure online? At some point of time, these questions do cross everyone’s mind at one point or the other. With hacking and data breaches on the rise, internet and information safety is hugely important. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. For instance, if your credentials are stolen, there is very little you can do to stop their resale and reuse. However, there are plenty of free online resources designed to teach you about basic information security techniques that can keep yourself safe from criminals who could use them against you. Even though your credentials may be stolen, you can definitely lessen the potential damage that is causes. In ...
Comments
Post a Comment