Boooom! Android M preview is out. For those that already flashed it, there might be a really really cool thing for you to try. In fact, Android M comes with multiwindow. It's experimental but seems to be working. Let's try it out!
Firstly, boot into recovery. Be sure to have a custom recovery, TWRP works the best.
Be sure the /system partition is mounted (Go to mount -> mount the system)
Connect your device to your PC, be sure to have your device recognizable by ADB, type adb devices - your device should pop up. (Don't have ADB? Download here!)
Let's access the build.prop, type the following commands in to the terminal:
adb shell
cd /system
vi build.prop
Let's change a line to enable userdebug mode. Change the line:
ro.build.type=user
to
ro.build.type=userdebug
Reboot your phone. Navigate to developer options in settings (to enable dev options, go to "about phone" and tap on "build number" several times).
It's been a little while since the new Samsung flagship reveal, that also showed us the new version of Touchwiz followed by bunch of new apps, mostly with a new Material Design-ish overhaul. Guess what, they are ported!
Unfortunately, all these apps are working on Touchwiz-powered ROMs only (Samsung devices only, in other words). Here's a little list of what apps do we have now:
Launcher
AccuWeather widget
Music Player
Keyboard
Smart Manager
S Health
WallpaperPicker
Gallery
Browser
MyFiles
GalaxyApps
Calculator
SnapBiz Card
S Translator
S Note
And a few more.
As you might've guessed, root is needed for installation of some of the apps.
Before replacing any APK in the /system directory, be sure to make a Nandroid backup first!
Detailed instructions followed by download links can be found in the XDA index:
The newly release LG's flagship, the G4, hasn't even shown up to the public and boom, already got a few apps ported for its older brother, G3. The camera, gallery, contacts, launcher, calendar, voice recorder, alarm clock and some more are all available for installing on your G3!
Since the system dumb has been pushed, the LastStandingDroid@XDA decided to port a few apps for the older generation, the G3. In the result he ported a fine amount of apps, including the well-known and brand new camera, known especially for its manual mode, that is partially working on the G3, and shooting pictures in RAW format.
Here's a screenshot (credit goes to LastStandingDroid) of the new Launcher (which hasn't changed much) and the new Music app.
But the biggest tease would probably be the new camera, as it's driven a lot of attention lately. This is a quick video showing the G4 camera running on G3. Alrough I got it working on my G3, I've experienced some FCs and there are definitely some problems.
But for those who can't wait, go ahead! Your device has to be rooted. The apps are made for Lollipop versions.
Firstly, download the ZIP. Extract it on your PC (or directly on your Android device), you should get an APK file along with a "lib" folder.
Navigate to /system/priv-app (or something like, don't quite remember the exact name), open the LGCamera folder (again, something like that :p) and backup the files there (you can backup the camera easily by changing the type from .APK to .BAK
Now simply put the new camera APK to the folder and change the permissions to rw-r-r.
Next, the folder part. Do the same thing with the folder, delete all the files except libDNVBeautyFace_JNI.so, keep this one. Then move all the files from the new folder and finally change the permissions of the folder, if needed (to rwxr-xr-x).
You should get the similar look to this (just with another Camera icon, since this is the old version).
Done? Reboot! Have fun.
Though this is quite a problematic app, there are some that work seamlessly.
LgMusic
LGIMe
LGFileManager
LGHome
LGMusicWidget
These should be working just fine and you shouldn't have or find any bugs.
Several OnePlus One users have reported this rather annoying glitch when screen becomes unresponsive after a while. Everything seems to be working fine exepct the touchscreen, which stays unresponsive and the only way to fix this is to reboot the device. If you're experiencing such issues, here's a fix for you!
The solution is only temporary and users will probably have to wait for another software update fixing this issue but it seems to be working just fine.
The key to fix this is executing the following command into the terminal: cat /sys/class/input/input0/baseline_test To make this automated, you can use Tasker and create this specific task for command execution every time the screen turns ON.
Open Tasker, add a new profile, navigate to state -> display -> display state, choose ON, then create a new task.
Add an action code -> run shell and input the command cat /sys/class/input/input0/baseline_test which will be executed when the screen turns ON. Make sure root option is ticked and profile with the task is activated. You're good to go!
Don't have Tasker? You might consider buying it! Tasker adds automatic tasks (that you create), events, triggers, whatever you don't want to do manually anymore, Tasker will do for you!
Reverse engineering is the process of "disassembling" a software followed by certain edits and moficiation that aims to recover what's behind the interface and a fully functional app. People who do this process, however, are planning to change the software's source code and exploit the app. Software cracks, keyloggers, those all are products of revers eengineering. As you might guess, reverse engineering can be quite dangerous for us - the users.)
Security is obviously the number one priority. Although we are all trying to protect our personal data as much as possible, it's still not effective enough.
Here's a little info from Arxan Technologies showing us that 70% of Apple apps have been in some way hacked and 95% of apps have been hacked on Android.
The question stays, is really hacking & modifying (or injecting a malicious code) an app that easy?
Let's have a look.
Here's another quick video showing the decompilation of an application using the dex2jar and JD-GUI which shows the source code of the decompiled app.
The code gets changed, app compiled and released to the public. You can't spot the difference as the app is behaving normally but your personal data may get stolen.
These threads may be everywhere, for example if you like to download paid apps for free on the web (APK file), these also may be modified.