Daily Examine Search Results

How To: Keep Your Smartphone Usage in Check for Android & iPhone

We're living through the technological revolution, and while devices like the iPhone 6 or Galaxy S5 have made life easier and more entertaining, it's possible that sometimes our smartphone usage can become uncomfortably excessive. In your own experience, think about how anxious and off you feel when you leave your phone at home—Cell Phone Separation Anxiety or Phantom Phone Vibrations shouldn't be a real thing that we deal with.

How To: Install custom ROM's on a rooted Motorola Droid smartphone

The Motorola Droid is the reigning king of the Android family, but it's getting a little old and you're probably looking for a way to improve your phone's performance if you own one. Why not root the dang thing and install a custom ROM on it so it'll at least be organized the way you want it to be! This video will show you how to install custom ROM's (basically phone UI's) on a rooted Motorola Droid phone, allowing you nearly limitless customization options for your awesome phone. The ROM in ...

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.