Tuesday, November 30, 2010

Ebook Java Programming For Beginners

For my friends who pingin learn Java programming but do not yet know the basics nich I love her ebook please download at:


http://www.easy-share.com/1903444360/Java - A Beginner's Guide, 3rd Edition (2005). rar

(English version)

www.flazx.com

www.knowfree.net

http://jeechojava.blogspot.com/

http://osum.sun.com

Connect to Accest Point use Linux LIVE CD BACKTRACK 2

* To connect to a wireless LAN that Open or Secured by WEP (DHCP)
# Iwconfig [interface] mode managed key [WEP key]
-> Replace the word "interface" with the name of your interface is more active at this time, eg ath0, wlan0 or eth1.
-> WEP key, WEP key it says Kuci, 10 carakter hexadecimal to 64 bit and 26 carakter to 128 bits.
# Iwconfig essid "[ESSID]" -> the SSID of a WLAN Specifications
# Dhclient [interface] -> to get the IP address, netmask, DNS server and default gateway of access points

* To connect to a wireless LAN that Open or Secured by WEP (IP Manual / Static)
# Iwconfig [interface] mode managed key [WEP key]

# Iwconfig essid "[ESSID]"
# Route add default gw [IP of default gateway] -> Enter the gateway IP Address
# Echo nameserver [IP address of DNS server]>> / etc / resolve.conf, configure the AP -> Configure your DNS server
# Ping www.detik.com -> ping to the internet to test connection

* Collection of iwconfig
iwconfig [interface] mode master -> Making the PCMCIA card in mode access points
# Iwconfig [interface] mode managed -> Making your PCMCIA card in client mode on wifi network infrastructure
# Iwconfig [interface] mode ad-hoc -> Set your card as a member of the ad hoc wifi network without Access Point
# Iwconfig [interface] mode monitor -> Set your card in monitor mode
# Iwconfig [interface] essid "your ssid_here" -> configure your network ssid.
# Iwconfig [interface] key 1111-1111-1111-1111 (set a WEP 128bit key)
# Iwconfig [interface] key 11111111 (set 65 bit WEP key)
# Iwconfig [interface] key off (disable WEP key)
# Iwconfig [interface] key open (set as the open mode, no authentication required)
# Iwconfig [interface] channel [channel no.] (Set a channel 1-14)
# Iwconfig [interface] channel auto (automatic channel select)
# Iwconfig [interface] freq 2.422G (channels set in GHz)
#

# Iwconfig [interface] ap 11:11:11:11:11:11 (forcing the card to register AP address)

# Iwconfig [interface] rate of 11m (the card will use a certain speed)

# Iwconfig [interface] rate auto (select speed automatic)

# Iwconfig [interface] rate auto 5.5M (card will use a certain speed and at lower speeds if necessary)

* The command ifconfig

# Ifconfig [interface] up (activate the network card)

# Ifconfig [interface] down (disable the network card)
#ifconfig [interface] [IP address] netmask [subnet-mask] (set the IP address and subnet mask manually)
#ifconfig [interface] hw ether [MAC] (Change the MAC address of the PCMCIA card in the format 11:11:11:11:11:11)

Create Game Snake with Netbeans

nakehq package;

import java.awt.Point;

/ **
* Snake class, a representation of a snake
*
* @ Author Haqqi
* /
public class Snake {
//*********************//
//*** Variable area ***//
//*********************//
/ / Coordinates of body
private Point [] body;
/ / Facing
private int face;

/ / Maximum snake's length
private final int MaxLength = 10;

/ / Orientation
public static final int NORTH = 0;
public static final int EAST = 1;
public static final int SOUTH = 2;
public static final int WEST = 3;

/ / Snake pixel size
public static final int SNAKE_SIZE = 10;

//************************//
//*** Constructor ***// area
//************************//
public Snake () {
body = new Point [MaxLength];
for (int i = 0; i <MaxLength; i + +) {
body [i] = new Point (20 - i, 15);
}
face = EAST;
}

//*******************//
//*** Method ***// area
//*******************//
public Point [] getBody () {
return body;
}

public void moveEast () {
if (face! = WEST)
face = EAST;
}

public void moveWest () {
if (face! = EAST)
face = WEST;
}

public void moveNorth () {
if (face! = SOUTH)
face = NORTH;
}

public void moveSouth () {
if (face! = NORTH)
face = SOUTH;
}

public void update () {
/ / Update body
for (int i = body.length - 1; i> 0; i -) {
body [i]. x = body [i-1]. x;
body [i]. y = body [i-1]. y;
}
/ / Update head
Point head = body [0];
if (face == NORTH) {
if (head.y <= 0)
head.y = Panel.AREA_HEIGHT - 1;
else
head.y--;
}
else if (face == EAST) {
if (head.x> = Panel.AREA_WIDTH - 1)
head.x = 0;
else
head.x + +;
}
else if (face == SOUTH) {
if (head.y> = Panel.AREA_HEIGHT - 1)
head.y = 0;
else
head.y + +;
}
else if (face == WEST) {
if (head.x <= 0)
head.x = Panel.AREA_WIDTH - 1;
else
head.x--;
}
}
}

/ *
* DO NOT REMOVE THIS COPYRIGHT
*
* This source code is created by Muhammad Fauzil Haqqi
* You can use and modify this source code but
* You are forbidden to change or remove this license
*
* Nick: Haqqi
* YM: xp_guitarist
* Email: fauzil.haqqi @ gmail.com
* Blog: http://fauzilhaqqi.blogspot.com
* /

snakehq package;

import java.awt.Dimension;
import java.awt.Graphics;
import java.awt.Graphics2D;
import java.awt.Point;
import java.awt.RenderingHints;
import java.awt.event.KeyAdapter;
import java.awt.event.KeyEvent;
import javax.swing.JFrame;
import javax.swing.JPanel;
import javax.swing.SwingUtilities;

/ **
* Panel class, the skeleton of the game
*
* @ Author Haqqi
* /
public class Panel extends JPanel {
//*********************//
//*** Variable area ***//
//*********************//
private Snake snake;
private Thread animation;

public static final int PANEL_WIDTH = 400;
public static final int PANEL_HEIGHT = 300;
public static final int AREA_WIDTH =
PANEL_WIDTH / Snake.SNAKE_SIZE;
public static final int AREA_HEIGHT =
PANEL_HEIGHT / Snake.SNAKE_SIZE;

//************************//
//*** Constructor ***// area
//************************//
public Panel () {
setPreferredSize (new Dimension (
PANEL_WIDTH, PANEL_HEIGHT));
snake = new Snake ();
initThread ();
addKeyListener (new KeyManager ());
setFocusable (true);
requestFocusInWindow ();
animation.start ();
}

//*******************//
//*** Method ***// area
//*******************//
@ Override
protected void paintComponent (Graphics g) {
super.paintComponent (g);
Graphics2D g2 = (Graphics2D) g;
g2.addRenderingHints (new RenderingHints (
RenderingHints.KEY_ANTIALIASING,
RenderingHints.VALUE_ANTIALIAS_ON));
drawSnake (g2);
}

/ / Render the snake
private void drawSnake (Graphics2D g2) {
Point [] s = snake.getBody ();
int pixel = Snake.SNAKE_SIZE;
/ / Fill the head
g2.fillOval (s [0]. x * pixel, s [0]. y * pixels,
pixel, pixel);
/ / Draw body outlines
for (int i = 0; i <s.length; i + +) {
g2.drawOval (s [i]. x * pixel, s [i]. y * pixels,
pixel, pixel);
}
}

/ / Initiate animation thread
private void initThread () {
animation = new Thread (new Runnable () {
public void run () {
while (true) {
try {
/ / Sleep a while loop for animation
Thread.sleep (300);
} Catch (InterruptedException ex) {}
snake.update ();
SwingUtilities.invokeLater (
new Runnable () {
public void run () {
repaint ();
}
});
}
}
});
}

/ / Keyboard handler of the game
private class extends KeyManager KeyAdapter {
@ Override
public void keyPressed (KeyEvent e) {
super.keyPressed (e);
int c = e.getKeyCode ();
switch (c) {
KeyEvent.VK_RIGHT case:
snake.moveEast ();
break;
KeyEvent.VK_LEFT case:
snake.moveWest ();
break;
KeyEvent.VK_UP case:
snake.moveNorth ();
break;
KeyEvent.VK_DOWN case:
snake.moveSouth ();
break;
}
}
}

/ **
* Main method Pls That Firstly run the program starts
* @ Param args the command line arguments
* /
public static void main (String [] args) {
/ / TODO code application logic here
SwingUtilities.invokeLater (new Runnable () {
public void run () {
JFrame f = new JFrame ("Snake HQ");
f.setDefaultCloseOperation (
JFrame.EXIT_ON_CLOSE);
f.add (new Panel ());
f.pack ();
f.setResizable (false);
f.setLocationRelativeTo (null);
f.setVisible (true);
}
});
}
}

How to Hacking Wireless/WiFi/Hotspot and Trick



Wi-Fi (Wireless Fidelity)
Wi-Fi (Wireless Fidelity) is a wireless connection such as mobile phones using radio technology so that users can transfer data quickly. Wi-Fi not only allows you to access the Internet, Wi-Fi can also be used to create wireless networks in the enterprise. Because of that many people associate with Wi-Fi "Freedom" because Wi-Fi technology gives freedom to users to access the Internet or transferring data from the meeting room, hotel rooms, campus, and cafes are marked "Wi-Fi Hot Spot".
Wi-Fi was originally intended for the use of wireless devices and Local Area Network (LAN), but now more widely used to access the Internet. This allows anyone with a computer with a wireless card (wireless card) or personal digital assistant (PDA) to connect to the internet using access point (or known as hotspots) nearby. Specification
Wi-Fi was designed based on the IEEE 802.11 specification. 

Today there are four variations of 802.11, as follows: 802.11a, 802.11b, 802.11g, and 802.11n. Specifications b is the first Wi-Fi products. The variation of g and n is one product that has the most sales in 2005.
Specifications Wi-Fi

Specification

Speed

Frequency Band

Match with
802.11b  


11 Mb / s

2.4 GHz

B
802.11a

54 Mb / s

5 GHz

A
802.11g

54 Mb / s
 

2.4 GHz

b, g
802.11n

100 Mb / s

2.4 GHz

b, g, n 



Operational Technically, Wi-Fi is one variant of communications and information technology that works on the network and the WLAN (wireless local area network). In other words, the Wi-Fi is a certification trademark given to telecommunications equipment manufacturers (Internet) working in WLAN networks and interoperates capacity already meets the required quality.
Technology-based Wi-Fi internet created and developed a group of U.S. engineers who worked at the Institute of Electrical and Electronis Engineers (IEEE) technical standards-based numbered devices 802.11b, 802.11a and 802.16. Wi-Fi devices are not only able to work on WLAN networks, but also on network Wireless Metropolitan Area Network (WMAN).
Because the device with the technical standard 802.11b WLAN devices intended for use in the 2.4 GHz frequency or frequencies, commonly called ISM (Industrial, Scientific and edical). As for the technical standards 802.11a and 802.16 WMAN or destined for the device is also called Wi-Max, who works in the vicinity of 5 GHz frequency band.
Wi-Fi Advantages
High public interest-particularly among the community of Internet-using Wi-Fi technology because at least two factors.

    
ease of access. This means that users in one area can access 

the Internet simultaneously without having to be bothered with cables.
    
users who want to do surfing or browsing news and information on the Internet, simply bring the PDA (pocket digital assistance) or Wi-Fi enabled laptop into a place where there is access point or hotspot.
The proliferation of hotspots in places such-which is built by telecommunications operators, Internet service providers and even individual-triggered second factor, namely because construction costs are relatively cheap or only around 300 dollars U.S.. Also one of the advantages of Wi-Fi is a speed several times faster than the fastest cable modem. So Wi-Fi users no longer have to be in office space to work
Wi-Fi Hardware
Wi-fi hardware on the market today there is a
Wi-fi in the form of PCI Wi-fi in the form of a USB
There are 2 mode Wi-fi access, ie
Ad-Hoc
This connection mode is a mode where multiple computers are connected directly, or better known as Peer-to-Peer. Advantages, cheaper and more practical when connected only 2 or 3 
computers, without having to buy an access point
Infrastructure
Using the Access Point that serves as a regulator of the data traffic, allowing many clients to connect to each other via a network (Network).
Weakness on wifi
Easily dihacking by hacer to steal user passwords wi-fi
The way is as follows:
First we must know the difference between network Hub and Switch:
* At the network hub of all data flowing on the network can be viewed / picked up by any computer on the network computer asalakan requesting such data, if not requested it will not come.
* The only computer network switches which exchange of data that can see the data, other komputer2 not entitled to requesting the data.
The problem is the price of routers hubs and switches do not differ
much so that most places are now using a switch that makes it difficult for network hacking.
Hacking is using technique:

    
Sniffing
    
ARP Poison Routing
The two techniques above will not be prevented by any firewall on the victim's computer, guaranteed.
Important Note: ARP Poison Routing can cause denial of service (dos) on one / all the computers on your network
Pros:

    
It will not be detected by the firewall types and any series because of the weakness lies in not on the computer network system
    
Could steal all kinds of login passwords through the HTTP server
    
Can people steal all the login passwords on the network hub for the program is activated
    
For the ARP Poisoning can be used to steal passwords in HTTPS
    
All programs free
    
For network switch must be in the ARP poisoning one by one
and your bandwidth will be consumed a lot for it (if inet super fast do not matter)
    
Caught or not by the network administrator outside of my responsibilities
    
Start here assume that the network in this story there are 3 computers, namely:
    
Computers Victims
    
Computer Hacker
    
Servers
First Steps:

    
1. Check your network type, you have the network switch / hub. If you are in the network hub thankful because the process of hacking you will be much easier.
    
2. Download the required programs of Wireshark and Cain & Abel.Code:
http://www.wireshark.org/download.html
http://www.oxid.it/cain.html
How to Use Wireshark:

    
Run wireshark program 

    Press the Ctrl + k (capture and then click option)
    
Make sure the content on your Card Ethernet interfaces are bound to the network, if not replace and make sure that "Capture packets in promiscuous mode" on
    
Click the start button
    
Click the stop button after you feel confident that no password is entered selamaanda pressing the start button
    
You can see all types of incoming and outgoing packets on the network (or on your computer only if your network uses Swtich
    
To analyze the data right click on the data you want in the analysis and click "Follow TCP Stream" and congratulations to analyze the package (I will not explain how because I can not)
    
What is clear from the data contained therein must informasi2 entered the victim to the website and vice versa
Way above applies only if your network is not a switch hub
From the above you can find out that your network is a hub / switch by looking at the column IP Source and Destination IP. If at each line one of them is your ip it is certain that your network is a network switch, if not ya mean the opposite.
How to Use Cain & Abel:

    
* The use of this program is much easier and simpler than using wireshark, but if you want all packets that have been in and out is 
recommended that you use wireshark program
    
* Open the program you Cain
    
* Click on the Configure
    
* In the "Sniffer" select ethernet card that you will use
    
* In the "HTTP Fields" you should add your username and password fields his fields if you want is not listed.
    
As an example I'll let you know that if you want to hack Friendster password you have to add in the username fields and fields passworsd word name, for others you can find it by pressing the right click view source and you should seek the input variables from the website login and password. Already in default rasanyan already quite complete, you can steal the pass that is in klubmentari without adding anything.
    
* After that apply and click ok settingannya
    
* On the main menu, there are 8 tabs, and which will be discussed only 1 tab is the tab "Sniffer" because it is select that tab and do not pindah2 from that tab to prevent your own confusion
    
* Activate the Sniffer sniffer by clicking the button at the top tab2 it, find the button that his writings "Start / Stop Sniffer"
    
* If you're at a network hub at this time you already know the password can enter by clicking the tab (this time the tab at the bottom instead of in the middle, the middle is no need to click-click again) "Passwords"
    
* You can just choose a password from which the connection you want to see will already listed there
    
    * If you were there at the network switch, it requires more struggle, you must activate the APR which is on the right tombolonya Sniffer (And is not guaranteed to succeed because the manage of the switch is much more comprehensive and secure from the hub)
    
* Before activated at the bottom of the sniffer tab select APR
    
* It will be seen 2 pieces that are still empty list, click an empty part of the list then click the "+" (shaped like it) in the ranks of the sniffer APR etc.
    
* There will be 2 pieces of field containing all the available hosts on your network
    
* Connect the victims ip address ip address and gateway servers (to know the address of the gateway server click start on the comp you select the run type cmd then type ipconfig at a command prompt)
    
* After that activate the APR, and all the data from the comp victim to a server you can see in the same way.
You can run both programs on simultaneously (for APR Cain and wireshark for packet sniffing) if you want maximum results.
Passwords can be stolen is the password in HTTP server (the server is not encrypted), if such data exist on the server that is encrypted then you have to decrypt the data before obtaining the
password (and it will require a much longer langkah2 of the way this hack )
For terms that do not understand can be found on wikipedia (but the english indo jg ya if that does not necessarily exist).
Technologically-frequency bands both 2.4 GHz and 5 GHz, which became operational container technology, Wi-Fi is not free from limitations.
Because the users in a new area can take advantage of wireless Internet system is optimally, when all the devices used in the area using a uniform transmit power and limited.
If the preconditions are not honored, you can bet will happen is not only harmful interference between devices of Internet users, but also with other telecommunications systems devices.
If interference continues, because users want more superior than other users, and therefore lack of understanding of the limitations of the technology-in the end will make the frequency band 2.4 GHz and 5 GHz could not be used optimally.
Another limitation of this second wireless frequency bands (particularly 2.4 GHz) is due also used for ISM (industrial, science and medical). 

Consequently, the use of radio communications or other telecommunication device that works in the frequency band it should be ready to accept interference from ISM devices, as stated in S5.150 of the Radio Regulations.
In the recommendation ITU-R SM.1056, also informed the device characteristics of the ISM which basically aims to prevent occurrence of interference, both between devices with the ISM as well as telecommunications equipment sharing.
The same recommendation affirms that every member of the ITU-free establish administrative requirements and rules of law relating to mandatory power restrictions.
Recognizing the limitations and the impact that may arise from the use of both of the wireless frequency bands, various countries and impose regulations that limit the transmission power of the devices used.
Wireless Signal
Wireless LAN signals can be captured normally in the range of about 200 meters from the access point, but the client that uses an external antenna to capture signals as far as 1000 meters. If you put AP near door or window, you can bet the neighbors can enjoy Internet access or do sniffing of network traffic.  

If the wireless LAN infrastructure that involves wireless connections between tall buildings, then the client is not desirable to do sniffing from the bottom as far as 2,500 feet (762 meters). So even though the ISP's wireless LAN signal to be placed in the tops of tall buildings can be in-sniffing from below (known as the war flying).
If you want the connect internet using wifi while you are away from the AP or wifi is available you can get closer to the area and can play online as much with the following steps
1) You must have a USB Wireless Adapter. You can get a computer shop in stores with prices ranging from Rp 210,000 (quite cheap for this sophisticated technology) + UHF antenna parabolic shape.
2) This step is a key step, using a shaped antenna Uhv as Grid Parabolic Reflector to strengthen the signal.
3) To further strengthen the power of parabole reflexy you can add wire netting on the entire surface, lalujangan forget screwing with the order parabola. You can also add aluminum foil.
4) Install a USB WiFi adapter on a pillar in the middle of the dish. If too long the focus can be cut.
 
Try to keep a USB WiFI is located at the focus of parabola. Remember the focus of parabola formula. If you doubt ya simple formula.
F = D (squared) / 4 (squares). C
D: diameter satellite dish
C: deep dish
5) attach the USB cable (USB 2.0 High Speed ​​cable system) in such a way.
6) Then reinstall the USB wifi support poles on the parabola. Put the iron pipe to facilitate Antenne played so good to play.
7) If you've installed the USB drivers WiFI earlier (factory default).
Then install "NETWORK STUMBLER" to find a strong signal and the closest.
cool icon Hacking How to Know Your Wireless / WiFi / Hotspot and trick Put the antenna outside and insert USB cable on your computer port. Scan pake Net Stumbler. Find a network that guns' in most deket encrypt and the distance with you

 


 


Monday, November 29, 2010

Configuration USB 3G/HSDPA or CDMA/EVDO on Ubuntu

I often hear / read about the users of Ubuntu who complains about how to use a 3G/HSDPA USB modem or CDMA / EVDO in Ubuntu, especially on Facebook Page Community Ubuntu Indonesia. In this paper, I will try to help by giving general guidelines on how to configure a USB 3G/HSDPA modem or CDMA / EVDO in Ubuntu.
Before you begin, it helps you see a list of modem devices that have been tested by other Ubuntu users. Maybe there is a special configuration required by the device to your USB modem in there.
The following guide is my attempt at Ubuntu 10.04 Lucid Lynx uses a USB 3G/HSDPA modem provider Sierra 885 with Three / Tri and EVDO ZTE AC2726 USB modem with the provider Smart Telecom. (Caution: I am not a member of the Three marketing and Smart ^ ^)
NOTE: I am not responsible if any damage and / or loss of data on the modem and your system, and a soaring mobile phone bills or your credit runs out due to follow these guidelines.
First, do not plug your USB modem device first. Install the package usb-modeswitch first. What is a usb-modeswitch? At the USB modem 3G/HSDPA/CDMA/EVDO released lately, there are 2 modes in the device, namely ZeroCD (usually containing drivers and installation guide on Windows) and a modem.
 ZeroCD mode typically used by vendors to incorporate support applications (such as Sierra Wireless Watcher on brand Sierra USB modem), digital manuals, etc.. If you ever try plugging your USB modem on Windows-based systems, usually will appear a new drive, which is recognized as CD-ROM drive. ZeroCD is used by vendors to reduce distribution costs do not include a modem with driver CD, because all firmware and drivers are already loaded in the modem itself.
Well, when you plug in your USB modem in Ubuntu (or other Linux distros), then the mode is automatically activated ZeroCD mode. This is what usually causes the USB modem you usually can not directly be used in Ubuntu. By installing the usb-modeswitch, Ubuntu will enable modem functionality to your USB modem. with the entrance to the terminal (via the menu Applications | Accessories | Terminal) and enter the following command:
sudo apt-get install usb-modeswitch
After the installation is finished, now you can try to plug in your USB modem device. After that, enter the following command in a terminal:
lsusb


Is the device you written there? If yes, now you just click on the Network Manager icon in the upper right, select "New Mobile Broadband (GSM / CDMA) connection ...".
Pilih menu ini untuk memulai konfigurasi modem

Select this menu to start the modem configuration
Later will come the USB modem configuration wizard as follows:
Tampilan pemandu konfigurasi modem mobile broadband
Views mobile broadband modem configuration wizard
Pilih INDONESIA
Choose INDONESIA
Pilihan provider seluler
Options cellular provider
If the provider you are using is listed in the list, please directly select that provider. I myself use the card Three / Three that is not on the list, so I decided to fill it manually.
Isikan APN secara manual
Fill in the APN manuallyI used a package of Internet Monthly 3data Three with the APN settings (can be seen here). If you use another provider, please adjust the APN configuration is given in accordance with your provider.
Konfirmasi untuk konfigurasi modem USB
Confirmation for the USB modem configurationAfter you click "Apply" on view at the top of this, Ubuntu will try to open a connection to the APN. Since you have not entered a username and password settings for data services, you should "break" connection first by left-click on Network Manager icon and select "Disconnect".
Putuskan koneksi terlebih dahulu
Disconnect the first connectionAfter that, right click on Network Manager icon and select "Edit Connections ...". Select Mobile Broadband tab, then select the configuration provider before you enter, then click "Edit". You will be taken into account your provider's configuration screen. In the Internet settings Monthly Three, I fill in the username and password 3data. After that click "Apply" then "Close
Konfigurasi akun layanan data dari provider
Configuring the data service provider's account
Now is the time try to connect 3G/HSDPA or CDMA / EVDO through your USB modem. Left-click on Network Manager icon and select your provider configuration on the Mobile Broadband. Happy surfing the Internet with your broadband USB modem! ^ ^

ADDITIONAL TIPS
Guide above is about how the installation or initial configuration your USB modem. For further usage, here are the steps to use your USB modem:          1.Plug in your USB modem.      
          2.Right-click on Network Manager icon and select "Enable Mobile Broadband".
  1. Pilih Enable Mobile Broadband untuk mengaktifkan modem
    Select Enable to activate the Mobile Broadband modem
    If this option still does not appear, open the terminal and then type "lsusb" and wait several seconds (up to 1 minute), then try again right click on Network Manager icon and see if the option is there. Repeat this step until the "Enable Mobile Broadband" appears and select the menu
    3.Klik left on Network Manager icon and select the provider that you have configured.
  2. Pilih provider yang telah dikonfigurasikan
    Choose a provider that has been configured
    4.Wait a while until a notification that the system is already connected to success. If the connection fails, repeat again from step 3.
    5.Happy surfing with your broadband USB modem!

Ubuntu on Samsung Galaxy S


Some time ago, I never talk about Ubuntu that can run on a Samsung Galaxy S. Now the latest tablet device from Samsung, Galaxy Tab also receive "treatment" similar. Yes, a XDA forum member with the nickname dviera88 successfully running Ubuntu on Galaxy Tab he has.

You also want to try it? First make sure that the Galaxy Tab you've been rooted. In addition, you also need busybox, Superuser, Android SDK (and how to operate it), AndroidVNC, and Terminal Emulator. Please check this forum thread to find out more (there is also his YouTube videos in there).

Install Android on iPhone


Surely you've heard that Google Android can be installed on the iPhone, but how very complicated and may not be "friendly" for ordinary users. But now it is available an easy way to install Android on the iPhone, which is using iPhoDroid. There is also a tool that can install Android Bootlace 2.2 (Froyo) on the iPhone without using a computer. Wow!

You need to consider that iPhoDroid / Bootlace this can only be run on the iPhone 2G/3G only; iPhone 3G and 4 are not supported. In addition, although nearly all functions can run Android, but there are still some modules are not supported, such as power management. This resulted in the middle of your iPhone battery runs Android is only able to survive for about 1 hour.

I am also not responsible if your iPhone is damaged and / or your data is lost by following these guidelines. Ready with all the risks? Please read the guidelines here. Good luck!