As you know by now from the latest buzz. Over 1 Million #Google Accounts Hacked by ‘Gooligan’. Gooligan itself isn’t new, as its just a variant of Ghost Push, a piece of Android malware Researchers from security firm Check Point Software Technologies have found the existence of this malware in apps available in third-party marketplaces. Once installed […]
OS: Unix / Linux Often called the “Super User” command. The su (short for substitute user) command makes it possible to change a login session’s owner without the owner having to first log out of that session. Although su can be used to change the ownership of a session to any user, it is most commonly […]
Not to cause paranoia; Just know that there are people out there looking to compromise your security, especially when you are using wireless networks via your laptop, tablet, or smartphone. One of such tools are the well known tool called dSploit. dSploit, a security toolkit for Android, makes that process so simple anyone can do it. This network […]
Sometime ago I had rooted my Galaxy S4 (SGH-i337) to enabled WiFi Tethering because I wasn’t done testing the stock image from Samsung / AT&T. Now its time for me to prepare to install CyanogenMod; Before I can do so I need to install ClockworkMod Recovery (CWM) which is a replacement recovery option for Android devices, made by […]
This is a video by our buddy Zedomax on rooting the Galaxy S4. This method is only for root access, its not a video on installing custom recovery, so please enjoy and remember to subscribe to his YouTube Channel. . This method works on all Qualcomm Galaxy S4 running Android 4.2.2 including: AT&T SGH-i337, T-Mobile […]
Most wonder and ask why so many of use root / jailbreak and wipe our phones and tablets of the manufactures factory configurations and install custom firmware. This write-up might give you some incite. Check out the following review / guide and learn more.