• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Eugene Zobnin

Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows
Security

Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows

2 months ago06/08/2025Eugene Zobnin880
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒
10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with Maximum Power
Unix

10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…

2 months ago03/08/2025Eugene Zobnin970
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒
Mastering the Terminal: Essential Tips to Become a Console Guru
Security

Mastering the Terminal: Essential Tips to Become a Console Guru

3 months ago20/07/2025Eugene Zobnin760
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒
Exploring Endless OS: A Package-Free Linux Distribution
Unix

Exploring Endless OS: A Package-Free Linux Distribution

18.07.202512/07/2025Eugene Zobnin1240
What does an average Linux distribution look like? Typically, it's a system assembled like a modular kit from thousands of packages, plus various desktop customizations, possibly its own installer and configuration system. In any case, almost all…
CONTINUE READING 🡒
Understanding the Linux Boot Process: From Power-On to Desktop
Unix

Understanding the Linux Boot Process: From Power-On to Desktop

17.07.202512/07/2025Eugene Zobnin1130
The best way to understand how an operating system works is to trace its boot process step by step. It is during this boot process that all the mechanisms that get the OS up and running are…
CONTINUE READING 🡒
Running Android Apps on Linux with Anbox: A Guide to Setting Up Without Emulators
Mobile

Running Android Apps on Linux with Anbox: A Guide to…

14.07.202512/07/2025Eugene Zobnin2890
There are numerous Android emulators for all sorts of operating systems. The worst ones barely function, while the best run quickly and even allow gaming. The latter are typically only available for Windows, and their performance on…
CONTINUE READING 🡒
From the Dead in 80 seconds. Bringing the bricked smartphone back to life
Mobile

From the Dead in 80 seconds. Bringing the bricked smartphone…

04.06.2025Eugene Zobnin1010
Most of the articles in the X-Mobile section are devoted to hacks and tweaks that require rooting, modifying the firmware, or replacing it with a custom one. However, not every reader is ready to subject their smartphone to such operations, fearing that they can turn the device into…
CONTINUE READING 🡒
Controlling Android. Dangerous APIs enable hackers to intercept data and reset smartphone settings
Mobile

Controlling Android. Dangerous APIs enable hackers to intercept data and…

27.11.202108/04/2025Eugene Zobnin930
In addition to traditional permissions, Android has three metapermissions that open access to very dangerous APIs enabling the attacker to seize control over the device. In this article, I will explain how to use them so that you can programmatically press smartphone buttons, intercept…
CONTINUE READING 🡒
Android security: evolution from version 1 to version 11
Mobile

Android security: evolution from version 1 to version 11

25.03.202108/04/2025Eugene Zobnin811
For a long time, Android was known as a slow and insecure OS for losers unable to afford an iPhone. Is this still true, and was Android really so bad? Leaving aside the interface smoothness and OS capacity, I am going to briefly discuss the evolution of the worst…
CONTINUE READING 🡒
« Previous 1 2
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com