Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒 Author: Eugene Zobnin
10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒 Mastering the Terminal: Essential Tips to Become a Console Guru
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒 Exploring Endless OS: A Package-Free Linux Distribution
What does an average Linux distribution look like? Typically, it's a system assembled like a modular kit from thousands of packages, plus various desktop customizations, possibly its own installer and configuration system. In any case, almost all…
CONTINUE READING 🡒 Understanding the Linux Boot Process: From Power-On to Desktop
The best way to understand how an operating system works is to trace its boot process step by step. It is during this boot process that all the mechanisms that get the OS up and running are…
CONTINUE READING 🡒 Running Android Apps on Linux with Anbox: A Guide to…
There are numerous Android emulators for all sorts of operating systems. The worst ones barely function, while the best run quickly and even allow gaming. The latter are typically only available for Windows, and their performance on…
CONTINUE READING 🡒 From the Dead in 80 seconds. Bringing the bricked smartphone…
Most of the articles in the X-Mobile section are devoted to hacks and tweaks that require rooting, modifying the firmware, or replacing it with a custom one. However, not every reader is ready to subject their smartphone to such operations, fearing that they can turn the device into…
CONTINUE READING 🡒 Controlling Android. Dangerous APIs enable hackers to intercept data and…
In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept…
CONTINUE READING 🡒 Android security: evolution from version 1 to version 11
For a long time, Android was known as a slow and insecure OS for losers unable to afford an iPhone. Is this still true, and was Android really so bad? Leaving aside the interface smoothness and OS capacity, I am going to briefly discuss the evolution of the worst…
CONTINUE READING 🡒