Showing posts with label smartphone. Show all posts
Showing posts with label smartphone. Show all posts

Linux-based YunOS To Beat Apple’s iOS In China

Alibaba’s YunOS is expected to bypass iOS in Chinese mainland by the end of this year. It’s a Linux-based mobile operating system that aims to become the top smartphone operating system in the country. The analysts have also predicted that outside China, YunOS isn’t expected to enter the premium smartphone segment.
The chances are slim that you might be knowing about YunOS, the mobile operating system developed by China’s Alibaba group. In a recent development related to YunOS, this relatively newer OS is on the track to gather a 14 per cent share of phone shipments in mainland China.
According to forecasts made by analysts, by the end of this year, YunOS will beat iOS to become the second-largest mobile operating system in China. This forecast falls in line with Alibaba’s previous claims that YunOS has already passed iOS.
The top YunOS suppliers are Alibaba-backed Meizu, XiaoLaJiao, Strategy Analytics, and Doov. It’s being estimated that the total volume of YunOS-powered smartphones will top 100 million units.
Talking to Alibaba-owned South China Morning Post, a senior analyst said that despite the efforts made by Alibaba, the growth prospects of YunOS outside the country are likely to be limited to the cheap category.
Last month, at Alibaba’s cloud computing conference, YunOS director Aiden Yong said that YunOS aims to become the “go-to operating system” for China’s smartphone industry.
One of the main reasons why Chinese hardware makers are adopting YunOS is the subsidies provided by Alibaba.

Android-YunOS controversy

In the past, Google has called YunOS an Android fork. Google also allegedly pressurized Acer to pull the plug on its YunOS-powered Android smartphone. The company said that Acer couldn’t work with an Android fork due to its membership in Open Handset Alliance.
On the other hand, in the past, YunOS executives have stressed that it’s not an Android fork and it’s developed using open source Linux software. YunOS claims that its runtime environment consists of its own Java VM and cloud app engine, which supports HTML5 web apps. However, it accepts the act of borrowing some open source Android application framework and tools for allowing the users to enjoy 3rd party apps.
Did you find this story on YunOS interesting? Share your views in the comments section below.

Here Are Anonymous Share Simple Guide On “How To Hack Donald Trump’s Smartphone”



The notorious hacking group Anonymous has shared a little guide on Twitter, telling how to hack Donald Trump’s Android smartphone. The guide mentions that Trump’s Samsung Galaxy S3, which run Android 4.4, is outdated. It makes Galaxy S3 easily hackable using techniques like Stagefright. Notably, many security researchers have also pointed out this loophole in the past.


One of the major factors in the recent US presidential elections were the email leaks of Hillary Clinton’s campaign manager John Podesta, which signaled the weak cyber security measures. Now, Donald Trump is himself a target of popular hacktivist group Anonymous.

Anonymous doesn’t have much affection for the United States President Donald Trump. Given the absurd policies of Trump, this stance shouldn’t surprise anyone. The hackers have published a little guide on Twitter, telling how to hack Donald Trump’s smartphone.
The notorious group claims that the President is an easy target to hacking attacks. Wondering why? Because he “refuses to use another smartphone other than the Galaxy S3.”
In the tweet, Anonymous mentioned a popular Android exploit that could potentially do the job of cracking Donald Trump’s smartphone. It says that a Galaxy S3, which runs Android 4.4, doesn’t even meet the security requirements of an average teenager.
The group insists that using Stagefright, one can easily hack Galaxy S3 by “enticing Trump to click on a link.” To use Stagefright exploit to hack Trump’s phone, a hacker will need to make him download a crafted MMS containing a .MP4 file.
It should be noted that, in all likelihood, since taking office, Trump has been using a Samsung Galaxy S3 Phone. Many media reports have also noted that the standard Galaxy S3 received its last security update about 2 years ago. Thus, as Anonymous points out, it might be vulnerable to Stagefright.
What do you think? Is Trump’s Android phone a threat to the US security? Do share your feedback and views.

Linux Basic Commands

The below commands are important and often used. For more checkout the image at the bottom of the article
  • mkdir – make directories
    Usage: mkdir [OPTION] DIRECTORY…
    eg. mkdir lhn
  • ls – list directory contents
    Usage: ls [OPTION]… [FILE]…
    eg. ls, ls ­l, ls lhn
  • cd – changes directories
    Usage: cd [DIRECTORY]
    eg. cd lhn
  • pwd ­-  print name of current working directory
    Usage: pwd
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vim lhn.txt
  • cp – copy files and directories
    Usage: cp [OPTION]… SOURCE DEST
    eg. cp sample.txt sample_copy.txt
    cp sample_copy.txt target_dir
  • mv – move (rename) files
    Usage: mv [OPTION]… SOURCE DEST
    eg. mv source.txt target_dir
    mv old.txt new.txt
  • rm ­ remove files or directories
    Usage: rm [OPTION]… FILE…
    eg. rm file1.txt , rm ­rf some_dir
  • find – search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find file1.txt, find ­name file1.txt
  • history – prints recently used commands
    Usage: history
  • cat – concatenate files and print on the standard output
    Usage: cat [OPTION] [FILE]…
    eg. cat file1.txt file2.txt
    cat ­n file1.txt
  • echo – display a line of text
    Usage: echo [OPTION] [string] …
    eg. echo I love India
    echo $HOME
  • grep ­- print lines matching a pattern
    Usage: grep [OPTION] PATTERN [FILE]…
    eg. grep ­i apple sample.txt
  •  wc ­- print the number of newlines, words, and bytes in files
    Usage: wc [OPTION]… [FILE]…
    eg.  wc file1.txt
    wc ­L file1.txt
  • sort – sort lines of text files
    Usage: sort [OPTION]… [FILE]…
    eg. sort file1.txt
    sort ­r file1.txt
  • tar – to archive a file
    Usage: tar [OPTION] DEST SOURCE
    eg. tar ­cvf /home/archive.tar /home/original
    tar ­xvf /home/archive.tar
  • kill – to kill a process(using signal mechanism)
    Usage: kill [OPTION] pid
    eg. kill ­9 2275
  • ps – report a snapshot of the current processes
    Usage: ps [OPTION]
    eg. ps,  ps ­el
  • who – show who is logged on
    Usage: who [OPTION]
    eg. who , who ­b , who ­q
  • passwd – update  a user’s authentication tokens(s)
    Usage: passwd [OPTION]
    eg. passwd
  •  su –  change user ID or become super­user
    Usage: su [OPTION] [LOGIN]
    eg. su remo, su
  • chown – change file owner and group
    Usage: chown [OPTION]… OWNER[:[GROUP]] FILE…
    eg. chown remo myfile.txt
  • chmod – change file access permissions
    Usage: chmod [OPTION] [MODE] [FILE]
    eg. chmod 744 calculate.sh
  • zip – package and compress (archive) files
    Usage: zip [OPTION] DEST SOURSE
    eg. zip original.zip original
  • unzip – list, test and extract compressed files in a ZIP archive
    Usage: unzip filename
    eg. unzip original.zi
  • ssh – SSH client (remote login program)
    “ssh is a program for logging into a remote machine and for
    executing commands on a remote machine”
    Usage: ssh [options] [user]@hostname
    eg. ssh ­X guest@10.105.11.20
  • scp – secure copy (remote file copy program)
    “scp copies files between hosts on a network”
    Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
    eg. scp file1.txt guest@10.105.11.20:~/Desktop/
  • fdisk – partition manipulator
    eg. sudo fdisk ­l
  • mount – mount a file system
    Usage: mount ­t type device dir
    eg. mount /dev/sda5 /media/target
  • umount – unmount file systems
    Usage: umount [OPTIONS] dir | device…
    eg.  umount /media/target
  • du – estimate file space usage
    Usage:  du [OPTION]… [FILE]…
    eg. du
  • df – report filesystem disk space usage
    Usage: df [OPTION]… [FILE]…
    eg. df
  • quota – display disk usage and limits
    Usage: quota [OPTION]
    eg. quota ­v
  • reboot – reboot the system
    Usage: reboot [OPTION]
    eg. reboot
  • poweroff – power off the system
    Usage: poweroff [OPTION]
    eg. poweroff
  • kate – KDE Advanced Text Editor
    Usage:  kate [options][file(s)]
    eg. kate file1.txt file2.txt
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vi hello.c
  • gedit ­ A text Editor. Used to create and edit files.
    Usage: gedit [OPTION] [FILE]…
    eg. gedit
  • bg – make a foreground process to run in background
    Usage: type ‘ctrl+z’  and then ‘bg ‘
  • fg – to make background process as foreground process
    Usage: fg [jobid]
  • jobs – displays the names and ids of background jobs
    Usage: jobs
  • sed ­  stream editor for filtering and transforming text
    Usage: sed [OPTION] [input­file]…
    eg. sed ‘s/love/hate/g’ loveletter.txt
  • awk ­ pattern scanning and processing language
    eg.  awk ­F: ‘{ print $1 }’ sample_awk.txt
  • find ­ search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find ­name file1.txt
  • locate – find or locate a file
    Usage: locate [OPTION]… FILE…
    eg. locate file1.txt
Linux File Permissions
  • 3 types of file permissions – read, write, execute
  • 10 bit format from ‘ls ­l’ command
    1             2 3 4      5 6 7     8 9 10
    file type    owner     group    others
    eg. drwxrw­r­­   means owner has all three permissions,
    group has read and write, others have only read
    permission
  • read permission – 4, write – 2, execute ­1
    eg. rwxrw­r­­   = 764
    673    =   rw­rwx­wx

Why The First Windows Drive Letter Is Always C? Why Doesn’t It Start With A Or B? | Padsa Information

The various logical drives in Windows are assigned a drive letter. Generally, the drive letter for the first logical drive is C followed by D, E, F. Well, A and B are also alphabets. These drive letters are kept in reserve for some special purpose. Here is the reason.
In the case of Windows and many other operating systems, a physical hard drive–used to install OS files and store data–is divided into partitions. In Windows, these partitions can be formatted using file systems like NTFS, FAT32, etc. These partitions are then known as logical drives and they are assigned a drive letter.
As far as my tech knowledge is concerned, it started to sprout in the mid-2000s. My first computer came with Windows and, obviously, or as some sort of a tradition, the first drive letter was C. In the beginning, I was told not to put any stuff in the C drive. Later, when a repair guy fixed my desktop, he installed Windows to the D drive. It seemed a bit unusual and it was a dilemma for me, whether I should keep my data on the C drive or not.
Even though I was a little bit uncomfortable with the changed drive letter, I actually never thought why the first drive letter was C, why not an A or a B, or a Z. It was years later, in fact, recently, when I asked the question to Google–Why is C the first Windows drive?
It was not the case that the people who assigned the drive letters didn’t know that A and B also existed as an alphabet. It was done to prefer an old technology with is nowhere to be seen now, the floppy disk.
The drive letters are assigned according to a preference scheme for different kinds of media attached to the computer. These letter date back to the time when IBM ruled the PC market. Then, PCs didn’t have a hard drive, sounds strange? But you might be aware of the fact that the floppy drives were used as primary storage in earlier computers. So, they were given a special preference while assigning the drive letters.
IBM’s VM family member CP/CMS took the help of drive letters to identify minidisks attached to a user session. The file reference (pathname) comprised of the drive letter, file name, and file letter. For example, A:MYFILE.TXT. The drive letter system was later visible in other operating systems including Microsoft’s MS-DOS and later in Windows.
Earlier, computers had two floppy drives for running programs and storing data. The hardware had support for two floppies. Thus, the preference for them was built into the OS itself. The hard drives came at a later stage and were assigned the letter C. Initially, the physical drives were assigned letters. As they got bigger in size, the logical volumes came up which are now assigned the drive letter. Starting from C, it makes room for floppy drives to be added at a later stage.
This thing doesn’t have a practical application anymore. But if you connect a floppy drive, it’ll be assigned the letter A and B for the next one. If you don’t have a floppy drive connected to your machine, you use the reserved letters A and B.
If you have something to add, tell us in the comments below.