Welcome back to the Awesome Android eXteme Hacking Tutorial. Hope you are ready for some more awesomeness :). In the last issue (http://papermint-designs.com/community/node/419) we learn how to create and run a C application on our Android phone. That allows you to build almost any application that does not require access to special features on your phone, in other words, pretty much any standard console based UNIX application.
Now we are going one step further hacking into your phone sensors. Yes, you phone is full of sensors and peripherals: Buttons, Touchscreen, accelerometers, gyroscopes and even temperature and pressure sensors. Android provides APIs to access those sensors from Java in a convenient way, but we want to hack into them, because that is a lot more awesome!... So, let's start.
So you'd got here because of the catchy title?. Good luck!, you are in the right place. You had just landed in the first part of a series of awesome tutorials on how to extreme hack your Android devices. Yes it is extreme, so let's start straight away. The first thing you have to know is that... your Android phone is actually a Linux computer!. Yes, it is. And that is the reason we can do quite some amazing things just out of the box.... Interested?... Keep reading
Recently I had to solve the problem of finding the wifi ESSID of the current wifi connection. Well, the solution is nothing special, but I'm writing this, because; first it was not straightforward to get the snippet, and second, because of the way I found the solution. Just for clarification, what I was looking for was C language function to get the ESSID in my own application in order to do something with it.
Xmas present this year was an Arietta G25 with 256Mb of memory from ACME Systems. This little one features an ARM9 processor at 400MHz, 256Mb of RAM and a bunch of I/O possibilities (GPIO, I2C, SPI, PWM and even I2S and ADC!!!) in around 5cm x 2cm.
It is 2014. It took some time for the people to realise the threats of current Social networks, specially with regards to people's privacy. A lot of people had been rising their voices for several years on this specific topic. A lot of bad things had happen to reach to this point. Bullying, fraud,... Some people had even die. It is pretty sad.
I had just come back from a trip with hundreds of photos on my new Samsung S4. I plug it into my computer to backup them and make some room in the phone, and then I'd got this annoying dialog popping up.
For a long time I had been aiming to connect some small display to any of my small computers, specially the BeagleBone. Well, some weeks ago I finally succeeded to get one up an running. The display is the Watterott MI0283QT-9A (https://github.com/watterott/MI0283QT-Adapter). It is well-known by the Raspberry Pi and the Beaglebone communities. It has a reasonable quality-price ratio and is very easy to use.
Veronica – ROM Monitor.
New chapter for this cool project to builld a 6502 based micro-computer
RIVERWATCH - A Marsupial Surface-Aerial Robotic Team for Riverine Environmental Monitoring
IMMERSION. Integrating biometrics and video games to solve gamer rage
3Duplica 3D Photocopier
Gadget Freak Case #250: DIY Flexible Display
OpenCamera - Lux
Cool Photography Hacks from Dr. Frankenfilm
Convert Optical Mouse into Arduino Web Camera
Three-Dimensional Mid-Air Acoustic Manipulation (2013-)
Resonant Wireless Power Transfer to Ground Sensors from a UAV (PDF)
Infrarred Eye Tracking System
Immunity Project. "We're developing a free vaccine to end HIV and AIDS." Virus Hacking!
Cut your Raspberry in Two and keep using it!
Autonomously Estimating Attractiveness using Computer Vision
I had already used my ID-12 RFID reader with the BeagleBoard, the Pandaboard and also Arduino. It is very straight forward but I will just keep some notes here for the future.
The ID12 outputs the RFID codes through a 5V serial port, so the interfacing is very simple. For the BeagleBone Black we just need to shift the serial port levels to 3.3V and enable one of the multiple serial ports.
In our NULLCape tutorial (LINK) we explored the basics of BeagleBone cape development. Now it is time to go into the real stuff, and for that, we need to understand how the Device Tree infrastructure works. Here begins the development of the TESTCape and our journey into this black magic stuff!
Had you ever got feed up with all those images on Google+ with the same file name?. Maybe this is not an issue for you or maybe there are simpler solutions, but for me it had become pretty annoying the fact that most of the pictures in the Google+ post have the same name so I have always to rename the file before saving it.