Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43441
  • Total Topics: 16533
  • Online today: 3223
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 3223
Total: 3224









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 20. September 2020., 21:38:49 »

Tell me the best way to install android on Honor 9x pro smartphone.

I suppose that video could help: https://www.youtube.com/watch?v=npqk-d7fOXc

Good luck and let us know did you succeed.
Posted by: hazelfrank
« on: 06. September 2020., 16:22:21 »

Tell me the best way to install android on Honor 9x pro smartphone.
Posted by: Samker
« on: 19. September 2015., 08:23:48 »



If you've got an Android 5 smartphone with anything but the very latest version of Lollipop on it: http://www.theregister.co.uk/2015/09/12/roundup_android_fireeye_impero/ , it's best to use a PIN or pattern to secure your lock-screen – because there's a trivial bypass for its password protection.

The vulnerability, details of which were published here by University of Texas researchers on Tuesday: http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass/ , allows miscreants to sidestep lock-screens on Android 5 devices, unless they've been fully patched to version 5.1.1 including last week's security updates.

"By manipulating a sufficiently large string in the password field when the camera app is active, an attacker is able to destabilize the lockscreen, causing it to crash to the home screen," the researchers write.

Yes, by typing in too many characters, you can kill off the security mechanism and gain full access to the device, even if its filesystem is encrypted – miscreants can exploit this to run any application, or enable adb developer access to the device: http://developer.android.com/tools/help/adb.html

The attack only works if the gadget has a lock-screen password set, the researchers note: the attack doesn't work against pattern or PIN setups.

Google patched the flaw here: https://code.google.com/p/android/issues/detail?id=178139
Nexus users who install the patch themselves can protect themselves – everyone else will have to wait for their network carrier to emit the updates over the air. T-Mobile US, for one, has already started doing this.

You can watch the bug being exploited in the video here: https://www.youtube.com/watch?v=J-pFCXEqB7A#t=23

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023