Continue Zeroing Search Results

How To: Make fresh rolled sushi

Learn how to make delicious sushi like a real chef. You may think sushi is just raw fish, but you’d only be half right. It’s actually the combination of fish and rice – and how it’s combined is an art form in itself.

How To: Make Your iPhone's Camera Remember Your Last Used Exposure Compensation Value for Later

Your ability to control exposure in the Camera app is much better in iOS 14. Instead of setting the exposure for a single shot, you can also lock an exposure compensation value for an entire session while you take photos and videos. A session ends as soon as you exit the app, but you can also remind your iPhone to use your last used ECV the next time you open Camera.

How To: Apply for Apple Card Right from Your iPhone

Apple slowly rolled out its new credit card, Apple Card, throughout August, but announced on Aug. 20 that it's now available to all qualified users in the US. Here's the problem: it's not totally obvious how to apply. Without any notification, directions, or clear settings, how do you even fill out an Apple Card application? Luckily for you, we're here to show exactly how to find it.

News: Essential Phone 2 Reportedly Canceled, Rubin Looking to Sell

The Essential Phone was undoubtedly one of the most underrated phones of 2018. It launched with buggy software and camera problems, but the company worked diligently to push out updates. Many Android enthusiasts were anxiously waiting for the Essential 2 release later this summer. Unfortunately, news today from Bloomberg indicates that Essential will not release a phone in 2018.

Exploit Development: How to Learn Binary Exploitation with Protostar

Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the lowest level. This is referred to as binary exploitation, and today we're going to check out a tool known as Protostar.

News: Samsung's Latest Oreo Update Doesn't Have a KRACK Fix

Samsung just began rolling out the Oreo Beta 2 to registered users of the Galaxy S8 and S8+. The update's changelog promises the inclusion of the October 2017 security patch. Unfortunately, after downloading the update, we've noticed this is not the case. Omission of the more recent security patch is notable in that it leaves devices vulnerable to several known exploits, such as KRACK.

How To: Turn Your Raspberry Pi into a Wireless Hotspot

When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Creating an AP is also helpful while traveling, or needing to share a connection with a group of people.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.