Category Archives: Gadget

Add the KitKat Easter Egg to Your Android 2.3+ ROM

By | Gadget | No Comments

Whereas these aren’t very the essential aspect a couple of ROM, Easter Eggs are very fairly about a selection in one Android. In March, persons defined adding the Jelly Bean Easter Ovum to a Gingerbread or ICS ROM. And then 1-month later, users comprised relatively tad regarding the advancement in Easter-eggs employed in Android. In reality as a result of a straightforward post to XDA Increase Companion MuSaddiq, anyone can add KitKat’s Easter Egg and energy to their own Droid 2.3+ ROM. Android kitkat 2014

As a way to include this specific Easter Egg, you are consulting need to initially get the framework.jar document from the ROM. Afterward you decompile these Package record and also change some smali by way of password made available from Musaddiq. Then, you have to recompile framework.jar, stress this specific again the unit together with the appropriate consents, and install a unique software with an Easter Egg called by the smali principle. From then on, merely publish that the unit improvements so sink your Android edition quantity like one’s life counted on any of it. also visit:

Plainly putting a KitKat Easter Ovum on your non-KitKat ROM won’t magically present this almost any extra characteristics. Nonetheless, it’s nonetheless cold for your appearance factory, particularly when the device lacks a regular driver-capable KitKat ROM. Produce the right path over to a consultant relationship to acquire began. read: kode telp

Nearly All Android Devices Vulnerable to Rooting Attack

By | Gadget | No Comments

A spot in a very Android operating-system could possibly depart a lot of Android phones and weaknesses capsules prone to invasion, like the Samsung Galaxy S5 and Google’s private Nexus five full. Or not it’s exactly the same deficiency that was recently observed within the Linux kernel, on what Droid would depend — and a just released Android “rooting” instrument that all purposes a defect could make the issue a whole lot worse.

Exploiting a flaw in a Android instrument yields heart approvals, or full possession of the technique. That is not itself harmful, nevertheless the manipulate may perhaps let opponents from another location download spyware, content the device owner’s files and also other particular knowledge, disable both the device’s security programs and also create a backdoor with significantly more episodes, determined by San Francisco-based protection firm Lacoon Portable Security. All Android Devices Vulnerable

Those Linux kernel problem, designated CVE-2014-3153 by the information-security neighborhood, was initially located June seven by a pseudonymous teen-age hacker referred to as Pinkie Cake. Four nights afterwards, call hacker George Hotz, that from time 17 turned the very first with “unlock” an iPhone, introduced an Droid rooting resource referred to as TowelRoot that employs those kernel defect.

Hotz has got designed hellos device available because of obtain in, and also said presently there that the resource must focus on every types of all Android made before July three. (In a portable developers’ forums, Hotz confessed many Motorola and HTC mobiles seem to be immune.) In an Lacoon business site article Monday (June 16), Lacoon vice-president Ohad Bobrov advised a bug use within TowelRoot could even be more invested with programs considerably more wicked than a searching the private cellphone. visit: tekno-hp

Those Linux kernel termite influences all of Linux kernels up to 3.14.5 and also is present employed in Droid 4.4 KitKat and weaknesses previous, so that most commercial Android phones are affected. And energy to make use of a termite, attackers would need to technique device homeowners and energy to put in a specially-crafted harmful software in their kind generally within “off-road” Droid software niches.

With force away such an, customers should just install Droid applications contrary to the Google Perform Shop and also be sure their systems can’t recognize software from one “unknown sources.” An appropriate Droid security application may also be capable of identify the use code employed in saved program.

Samsung’s compartmentalization feature Samsung Knox just can’t end apps of the manipulate from adding, though Knox may point a right inform, Lacoon CEO John Shaulov told protection blog Threatpost. read: kodetelp