Recently we put together a basic geek desktop around i3, but we left a lot of smaller, less obvious pieces out of the write-up. Today we’ll finish polishing the setup: teach dmenu to control brightness, volume, and…
CONTINUE READING 🡒 Author: Eugene Zobnin
Android: Island app to isolate and freeze apps — no…
On Android, it’s all too easy to pick up malware. But what if you still have to install a sketchy app? Don’t sweat it—Island lets you not only keep that app away from your data, but also…
CONTINUE READING 🡒 The Problems with Xiaomi’s MIUI
MIUI is a great OS and a prime example of how far you can push Android if you want to turn it into something more. And, paradoxically, for that very reason it’s also a bad OS—one that…
CONTINUE READING 🡒 Android: 8 Universal ROMs, Modern Click Bots, App Hacking, and…
In this issue: universal Android 8 ROMs, multi-headed trojans and chatbots, clickbots, abusing Android notifications, breaking into apps via trusted components, and of course a quick network pentest—how to make apps trust us. We didn’t forget coding…
CONTINUE READING 🡒 Android for Linux Users: Integrating Your Smartphone with Linux
Android and Linux distributions aren’t just related OSes—they share the same kernel and are very similar under the hood. Most Linux commands work on Android; you can install bash, write scripts, and even run servers. Set up…
CONTINUE READING 🡒 3 Reasons to Skip the Latest Android Updates
For power users and app developers, Android has long been a very comfortable platform. Open-source code, rich capabilities, and the absence of heavy-handed control from Google made an Android smartphone a true pocket computer. But times change,…
CONTINUE READING 🡒 Hiding Sensitive Data in Android Apps: Techniques for Storing and…
At some point, almost every developer has had to hide data inside an app. This could be encryption keys used to decrypt parts of the program, API endpoint URLs, or strings you’d rather conceal to make a…
CONTINUE READING 🡒 Is Google Building an Android Successor?
In April of last year, without any fanfare, Google quietly published the source code for a new OS called Fuchsia, written in Dart. Because Fuchsia was built on a tiny microkernel, the knee‑jerk reaction from journalists and…
CONTINUE READING 🡒 How to Build an Unconventional Raspberry Pi Media Center: A…
In the six years since the Raspberry Pi appeared, countless guides have shown how to turn it into a home media center. The problem is, the classic media-center setup on a Pi is so underwhelming it loses…
CONTINUE READING 🡒 8 Practical Ways to Use Android’s Fingerprint Scanner for Security…
Official fingerprint reader support arrived in Android 6.0, yet many people still think it’s only for unlocking the phone. In fact, if you know your way around Tasker, you can map it to virtually any action.
CONTINUE READING 🡒 Android Performance Optimization: Eliminate App Lag, Jank, and Long Loading…
Performance is one of the most critical aspects of a mobile app. Your app can be as feature-rich, polished, and useful as you like, but if it feels sluggish, failure is almost guaranteed. The good news is…
CONTINUE READING 🡒 How to Install VirtualBox on Tails OS and Route VM…
Tails is the best operating system if your goal is to maximize your anonymity online. But it has a few quirks, and one of them is that you can’t properly install VirtualBox using the standard tools. We’ll…
CONTINUE READING 🡒 Android Code Injection with Frida: Hooking and Instrumenting Third-Party Apps
When we talk about reverse‑engineering and modifying third‑party applications, we usually mean using a decompiler, a disassembler, and a debugger. But there’s a tool that takes a very different approach: Frida—a toolkit that lets you inject into…
CONTINUE READING 🡒 Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS…
Nmap is the gold standard among port scanners and one of a pentester’s most important tools. But can you honestly say you’ve mastered all its features and use cases? In this article, you’ll learn how to use…
CONTINUE READING 🡒 Why Smartphone Home Screens Are Broken—and Why I Built AIO…
I don’t know about you, but I’ve always found it odd that a powerful smartphone—connecting people to each other and to the rest of the world—uses an utterly useless, uninformative screen of icons as its primary interface.…
CONTINUE READING 🡒 13 Essential Sysadmin Utilities Every System Administrator Should Know
A well-stocked toolbox is what sets a seasoned pro apart from a newbie. And in Linux administration, that toolbox is about as critical as it gets. In this article, we’re not going to cover things like Nagios,…
CONTINUE READING 🡒 Vim for Beginners: Stop Fearing the Editor You Can’t Exit…
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒 Android vs iOS Security: Is Android Actually Safer?
Strange headline, isn’t it? The author must be nuts to compare iOS security—something even the FBI can’t crack—with that leaky bucket called Android. But I’m serious: Android and iOS can, and should, be compared. Not to prove…
CONTINUE READING 🡒 Turning an Old Android Smartphone into a Fully Functional Home…
Imagine this scenario: you have an old Android smartphone. Its primary function is long gone – maybe the screen is shattered, the mobile connectivity module has died, or the device is simply outdated. Selling it for next…
CONTINUE READING 🡒 Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒