The Xposed Framework offers many great customization options for your Galaxy S5. S Health, with its ability to read your heart rate through a built-in monitor, is one of the main selling points of the GS5. Trouble is, the two don't seem to play nice together.
Android's permissions system is simple, transparent, and straightforward. When installing an app, you get a chance to review all of the permissions that the app has requested. These can range from accessing your location data to holding a "wakelock" in order to prevent your phone from entering sleep mode. But your only choice in this matter is to accept all requested permissions, or not install the app.
Apple has Siri, Google has its Now service, and Microsoft has Cortana. All of these voice-activated services can bring you information quickly and easily without having to type anything into your smartphone. Speak and within seconds you're provided with either an answer or somewhere you can find it.
Aside from its many high-end features, the camera on the LG G3 is up there with other heavy hitters like the Galaxy S5 and HTC One.
Android uses a set of permissions that apps can request to perform certain actions, and you're notified of these permissions each time you install an app. The problem here is the fact that you aren't given any built-in way to deny apps these permissions (although Danny just showed a workaround for this).
Just the fact that you own an Android device means you're privy to an entire world of third-party development. Many of the mods you'll see here on Gadget Hacks can be performed fresh out of the box, but with root and Xposed, the list grows longer. But to truly be able to take advantage of all that Android's massive development community has to offer, you'll need to have a custom recovery installed.
What separates the work habits of the ultra-productive from us mere mortals struggling to check items off our never ending to-do lists? While the answer to that question is by no means simple, one undeniable factor in their success is a clearly defined, highly organized workflow.
Back in August, Google introduced Android Device Manager. This new service allowed you to locate, lock, or wipe a lost or stolen Android device from either a companion app or a web interface. Effectively, this is the "kill switch" that legislators are clamoring for.
I rarely receive spam mail, but every now and then I’ll get an email from Cat Fancy Magazine. I’ve never read an issue of Cat Fancy Magazine or been to their website. Actually, I’m allergic to cats. So how did they manage to get my information?
Welcome back, my greenhorn hackers! Sometimes, we don't have a specific target in mind, but rather we are simply looking for vulnerable and easy-to-hack targets anywhere on the planet. Wouldn't be great if we had a search engine like Google that could help us find these targets? Well, we do, and it's called Shodan!
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or better yet, you could simply simply make a copy of the original site and host it on your own server!
LastPass is a password manager that's been around for some time, and has finally made its way over to Android for use with apps, not just websites.
Welcome back, my aspiring hackers! Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message.
Welcome back, my budding hackers! In previous tutorials, we've looked at some of the basic commands and concepts for using Linux. Along the way, I realized that I've failed to provide you with some basic background material on the stdin, stdout, and stderror.
Whether you have the original Nexus 7, or the 2013 Nexus 7 tablet, rooting it will give you access to tomorrow's features, today.
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client.
Russians are well known for their knack at documenting exciting and horribly beautiful events on the go, from insane car accidents to attempted insurance fraud and even a superbolide meteor streaking across the sky.
Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.
The stock Android app icons that come with your Samsung Galaxy S4 can vary wildly in shape and size, as they will with any out-of-the-box Android device.
Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic.
I remember how fast my Nexus 7 was the first time I turned it on. Boy, do I miss it. Now my tablet is pretty buggy and crashes happen frequently, and I'm sure that goes for many of your Nexus 7s as well. Even if you upgrade to the new Nexus 7 next week, it will eventually develop similar issues.
In my first tutorial on Linux basics, I discussed the importance of hackers using Linux and the structure of the directory system. We also looked briefly at the cd command. In this second Linux guide, I'll spend a bit more time with changing directories, listing directories, creating files and directories, and finally, getting help. Let's open up BackTrack and getting started learning more Linux for the aspiring hacker.
I was kinda disappointed with last year's James Bond movie, Skyfall. Don't get me wrong, it was a solid flick, but only made me jealous with all its super spy hacker stuff.
Shark jumps Steampunk, experts unsure of the meaning. Cape Town -- In an unprecedented move today, a Shark have jumped a steampunk couple as they were attempting to work on their hobby steamboat.
When a phone has only one main button, it can be pretty frustrating when that one button doesn't really work anymore. If you have an iPhone 4 or 4S, you know exactly what I'm talking about. Yep, the Home button, which is prone to unresponsiveness and lag. Most users blame the Home button issues on either dirt, moisture, or misalignment. No matter what the reason, having a busted Home button sucks, especially for those of you no longer under warranty. But that's okay, because there are a few t...
Offensive pictures, depressing tweets, political statuses, and just plain old dumb comments are only a few of the reasons why people unfriend or unfollow others on social media sites. Sometimes it's just social spring cleaning, other times there's no reason at all.
Ralph Waldo Emerson once observed that "the seed of science" was "wonder," and taking a look at this nine-layer liquid tower from Steve Spangler's Sick Science! channel, one can't help but do just that — wonder. How is this possible? Is this magic or what?
When browsing the web, I enjoy my privacy. It's reassuring that I can peruse the internet without the worry of having my activity tracked back to me, allowing me to leave fun, anonymous comments when I get the urge to troll.
When it comes to milk, my family consumes anywhere between two and four gallons every two weeks. That's about four to eight gallons every month. That's a lot of milk—and a lot of empty milk jugs! Instead of simply tossing them in the recycling bin, why not get creative and make something useful out of them yourself?
If your idea of jewelry making is simply strining on glass beads and vintage knick knacks onto a string and then adding a clasp, then you have some serious learning to do. While in the end creativity trumps all, it's important for many intricate projects that you calculate exactly how much of one particular stone or filigree stamp you need. And in order to do that, you must measure them.
HTPC. It stands for Home Theater PC. Some refer to it as simply a Media Center. But no matter what you call it, you're going to learn how to build one today. Why would you want to do that? Because one of the main advantages of creating your own home theater system is that you are control, not only of the cost, but the features and functions, as well.
Kipkay is at it again with his pranks. In this video, he shares four fun and easy pranks that anyone can do to drive their friends (or victims) crazy! Their all very simple. They include a cell phone prank, a floss prank, and more!
Want a very nontraditional take on a classic American comfort food? Then this hearty and spicy recipe is it. Made with ample helpings of salsa, cilantro, black beans, yellow corn, green and red bell peppers, and enchilada sauce, this casserole dish will make your mouth smoke with its succulent hotness. The casserole is then topped with a layer of Monterey and Jack cheese for added crunch and gooeyness.
It's a timeless doggie no-no, and one that has been paradied in numerous dog scenes in movies: A plate of delicious fried, steaming food is left by the owner on the table. The owner then leaves for a brief moment. His dog, smelling the delicious goodness, seizes the moment and quickly jumps up, snatches a piece of chicken, and devours it under the table.
In order to play Tom Petty's 'Wildflowers' on the ukulele you first have to only know three chords for the whole song's verse and a couple more for the song's bridge. To start the first verse you play a B flat major chord. To play this chord bar the first two strings of the first fret, your second finger on the third string of the 2nd fret and your third finger on the fourth string of the third fret. Next, play F major which is first finger on 2nd string of first fret and the second finger on...
This video is about how to deep fry kimchi. The first step that you will have to do is to pour 1/2 cup bread crumbs in a bowl. Then just simply add 1/4 cup flour. After adding the flour, the next step is to add 1/4 cup corn meal. Then after adding corn meal, just add 2 teaspoons of cayenne, 1 teaspoon of lemon pepper and a teaspoon of Korean red pepper. After adding all the ingredients, you have to do some mixing. After mixing, the next step is to make some egg wash in a separate bowl. In the...
This video has a man by the name of Dr. Neder and he has a book by the name, ‘how to be a man in a woman’s world.’ He answers a series of questions. The first question asked is how to get a girl with a boyfriend. The answer this video provides is simply that all girls are looking to date up. Meaning your value and assets, if there is a greater attraction then the girl will end up with you and dump the guy that she is with. Does size matter? The average size of most man is five inches to five ...
In this video from sfehmi we learn how to make Gajar ka halwa which is a Indian carrot pudding. It is difficult to make but she shows us how to do it simply. For this we need two pounds of carrots, 14 oz sweet condensed milk, four oz unsalted butter, four green cardamom, 1/4 cup of blanched skinned almonds, and 1/4 cup of cashew nuts. She chops the nuts and then shreds the carrots in food processor. Now melt the butter in the pan and while it's melting put in cardamoms. When the butter is mel...