News, Articles & Tutorials

This is an aggregate feed of all our article topics. We often share great freebies, tutorials, cheatsheets and helpful links. We will also periodically make posts about the company's growth here as well.

Become a Subscriber

Common Hacking Methods

all
  • Clayton Unicorn
  • Hacking

The resources for a hacker are so numerous, that it is entirely possible that no two hackers have the same tools or approaches for how they operate. With a choice of over a thousand programming languages, dozens of operating systems, and hundreds of different communication protocols, hackers have so many options to explore and test for vulnerabilities. While it would be impossible to describe every tool and technique, it is easy enough to talk address the most common form of attacks and how to protect against them.

Hacking as a Trade

all
  • Clayton Unicorn
  • Hacking

Most hackers are hobbyists, tinkerers or they are employed in technology fields. Fictional tales have created the modern day image for what a hacker looks like. In such movies as The Girl With the Dragon Tattoo and Ex Machina hackers are portrayed as possessing a rare combination of genius and skill. If you replace these characters with a humble family technician working for Google, you lose the mysterious edge to the tale. The truth is hackers can be average doers and dreamers with an above average interest in technology.

UI Freebie: Tinder Dating App Design Template

design
  • Clayton Unicorn
  • Design Freebies

Everyone loves freebies, and designers rely on UI kits just like developers rely on frameworks. We made this design while working on an upcoming product that we are launching, and decided that the few iterations before the final would be useful for other designers. Artboards and groups are pretty well organized in this file, and the UI components and landing pages make for a great starting point for a number of different apps including a dating app design.

Famous Hackers

all
  • Clayton Unicorn
  • Hacking

While most hackers escape with only minor traces of their organization left behind, there have been times when individuals have come forward or been captured. Most of these names never make the headlines, however, and thus tend to only be known within circles involved with security. Names like Snowden and Assange are recognized by most of the general public for their whistle-blower actions while other significant individuals like Mitnick, Iceman, Poulsen or McKinnon may go unnoticed.

Famous Hacker Secs

all
  • Clayton Unicorn
  • Hacking

For years hacker secs have been relatively small and tight knit. Most have initiation rituals, similar to what you would see in a street gang or fraternity. For a black hat or grey hat group, the reasons behind this are fairly obvious. Since the activities of a black hat group are seldom legal, they need to be more selective about who they allow in. Often times this involves a hazing or initiation ritual to weed out the government spies and to quantify the initiate’s talents and abilities.