• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Eugene Zobnin

8 Practical Ways to Use Android’s Fingerprint Scanner for Security and Convenience
Mobile

8 Practical Ways to Use Android’s Fingerprint Scanner for Security…

2 weeks ago23/08/2025Eugene Zobnin1570
Official fingerprint reader support arrived in Android 6.0, yet many people still think it’s only for unlocking the phone. In fact, if you know your way around Tasker, you can map it to virtually any action.
CONTINUE READING 🡒
Android Performance Optimization: Eliminate App Lag, Jank, and Long Loading Screens
Mobile

Android Performance Optimization: Eliminate App Lag, Jank, and Long Loading…

2 weeks ago23/08/2025Eugene Zobnin1940
Performance is one of the most critical aspects of a mobile app. Your app can be as feature-rich, polished, and useful as you like, but if it feels sluggish, failure is almost guaranteed. The good news is…
CONTINUE READING 🡒
How to Install VirtualBox on Tails OS and Route VM Traffic Through Tor
Security

How to Install VirtualBox on Tails OS and Route VM…

2 weeks ago23/08/2025Eugene Zobnin1990
Tails is the best operating system if your goal is to maximize your anonymity online. But it has a few quirks, and one of them is that you can’t properly install VirtualBox using the standard tools. We’ll…
CONTINUE READING 🡒
Android Code Injection with Frida: Hooking and Instrumenting Third-Party Apps
Mobile

Android Code Injection with Frida: Hooking and Instrumenting Third-Party Apps

3 weeks ago23/08/2025Eugene Zobnin1300
When we talk about reverse‑engineering and modifying third‑party applications, we usually mean using a decompiler, a disassembler, and a debugger. But there’s a tool that takes a very different approach: Frida—a toolkit that lets you inject into…
CONTINUE READING 🡒
Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS Simulation, and More
Security

Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS…

3 weeks ago23/08/2025Eugene Zobnin890
Nmap is the gold standard among port scanners and one of a pentester’s most important tools. But can you honestly say you’ve mastered all its features and use cases? In this article, you’ll learn how to use…
CONTINUE READING 🡒
Why Smartphone Home Screens Are Broken—and Why I Built AIO Launcher
Mobile

Why Smartphone Home Screens Are Broken—and Why I Built AIO…

3 weeks ago23/08/2025Eugene Zobnin540
I don’t know about you, but I’ve always found it odd that a powerful smartphone—connecting people to each other and to the rest of the world—uses an utterly useless, uninformative screen of icons as its primary interface.…
CONTINUE READING 🡒
13 Essential Sysadmin Utilities Every System Administrator Should Know
Unix

13 Essential Sysadmin Utilities Every System Administrator Should Know

1 month ago23/08/2025Eugene Zobnin530
A well-stocked toolbox is what sets a seasoned pro apart from a newbie. And in Linux administration, that toolbox is about as critical as it gets. In this article, we’re not going to cover things like Nagios,…
CONTINUE READING 🡒
Vim for Beginners: Stop Fearing the Editor You Can’t Exit and Start Using It
Security

Vim for Beginners: Stop Fearing the Editor You Can’t Exit…

1 month ago16/08/2025Eugene Zobnin440
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒
Android vs iOS Security: Is Android Actually Safer?
Mobile

Android vs iOS Security: Is Android Actually Safer?

1 month ago18/08/2025Eugene Zobnin1460
Strange headline, isn’t it? The author must be nuts to compare iOS security—something even the FBI can’t crack—with that leaky bucket called Android. But I’m serious: Android and iOS can, and should, be compared. Not to prove…
CONTINUE READING 🡒
Turning an Old Android Smartphone into a Fully Functional Home Server
Mobile

Turning an Old Android Smartphone into a Fully Functional Home…

2 months ago10/08/2025Eugene Zobnin870
Imagine this scenario: you have an old Android smartphone. Its primary function is long gone – maybe the screen is shattered, the mobile connectivity module has died, or the device is simply outdated. Selling it for next…
CONTINUE READING 🡒
Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t Find on Google
Security

Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…

2 months ago06/08/2025Eugene Zobnin600
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒
Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows
Security

Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows

2 months ago06/08/2025Eugene Zobnin350
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒
10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with Maximum Power
Unix

10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…

2 months ago03/08/2025Eugene Zobnin530
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒
Mastering the Terminal: Essential Tips to Become a Console Guru
Security

Mastering the Terminal: Essential Tips to Become a Console Guru

2 months ago20/07/2025Eugene Zobnin370
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒
Exploring Endless OS: A Package-Free Linux Distribution
Unix

Exploring Endless OS: A Package-Free Linux Distribution

2 months ago12/07/2025Eugene Zobnin480
What does an average Linux distribution look like? Typically, it's a system assembled like a modular kit from thousands of packages, plus various desktop customizations, possibly its own installer and configuration system. In any case, almost all…
CONTINUE READING 🡒
Understanding the Linux Boot Process: From Power-On to Desktop
Unix

Understanding the Linux Boot Process: From Power-On to Desktop

2 months ago12/07/2025Eugene Zobnin620
The best way to understand how an operating system works is to trace its boot process step by step. It is during this boot process that all the mechanisms that get the OS up and running are…
CONTINUE READING 🡒
Running Android Apps on Linux with Anbox: A Guide to Setting Up Without Emulators
Mobile

Running Android Apps on Linux with Anbox: A Guide to…

3 months ago12/07/2025Eugene Zobnin1460
There are numerous Android emulators for all sorts of operating systems. The worst ones barely function, while the best run quickly and even allow gaming. The latter are typically only available for Windows, and their performance on…
CONTINUE READING 🡒
From the Dead in 80 seconds. Bringing the bricked smartphone back to life
Mobile

From the Dead in 80 seconds. Bringing the bricked smartphone…

04.06.2025Eugene Zobnin500
Most of the articles in the X-Mobile section are devoted to hacks and tweaks that require rooting, modifying the firmware, or replacing it with a custom one. However, not every reader is ready to subject their smartphone to such operations, fearing that they can turn the device into…
CONTINUE READING 🡒
Controlling Android. Dangerous APIs enable hackers to intercept data and reset smartphone settings
Mobile

Controlling Android. Dangerous APIs enable hackers to intercept data and…

27.11.202108/04/2025Eugene Zobnin460
In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept…
CONTINUE READING 🡒
Android security: evolution from version 1 to version 11
Mobile

Android security: evolution from version 1 to version 11

25.03.202108/04/2025Eugene Zobnin431
For a long time, Android was known as a slow and insecure OS for losers unable to afford an iPhone. Is this still true, and was Android really so bad? Leaving aside the interface smoothness and OS capacity, I am going to briefly discuss the evolution of the worst…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com