Extract the S Pen from the Galaxy Note5 while preserving detection (video)

We know you didn’t listen to all the people screaming at you not to insert the S Pen of the Samsung Galaxy Note5 backwards, not to mention read the manual, which clearly states you shouldn’t.

Fret not, as there is apparently a simple solution, which can save your precious pen detection feature. That is, unless you’ve already managed to take the stylus out, in which case you’re likely past the point of no return.

Shown in the video below, the fix uses a piece of paper inserted parallel to the stuck S Pen, wraps around it and shields the detection lever as you’re pulling the stylus out. Now, while that will preserve the tiny plastic detection lever, its unclear what you need to do of the S Pen’s head gets properly jammed in the other lever deeper down, which is meant to keep the stylus firmly inside. Perhaps, another piece of paper on the other side might help.

Via | Image…

from GSMArena.com – Latest articles http://ift.tt/1EowACQ
via IFTTT

Google Nexus 8 tablet dummy shows up in photos

Most of the talk around Google’s devices now revolves around the Android Marshmallow pioneers – the LG Nexus 5 (2015) and Huawei Nexus 6. The two are rumored to see the light of day on September 29, but they may be joined by another surprise release.

A couple of new photos, originating in China, claim to depict an upcoming Nexus 8 tablet, or at least a dummy unit of it. Photographed next to a ruler, the slate measures just about 200mm in length (with perspective roughly accounted for), which is the proper height for a 4:3 8-incher. And now that we’ve seen Google make the move to the more squarish aspect ratio with the Nexus 9, it’s only natural for the company to continue the trend.

Alleged photos and specs of the Google Nexus 8

The second photo gives a detailed look at one of the corners, and it seems the Nexus 8 will have a metal frame. Chamfered towards the end, it reveals what is likely a speaker grille, but it’s hard to tell which exactly corner it is.

Older info coming from a GeekBench listing (not the most difficult to fake, mind you) states that the alleged tablet will be powered by an octa-core processor, as most any device nowadays, save for the entry-level ones. The Android 5.1.1 OS version suggests the benchmark entry, if genuine, was made early into the tablet’s development, as we’d certainly expect the next tablet to come with Marshmallow on board.

Source (in Chinese) | Via (In…

from GSMArena.com – Latest articles http://ift.tt/1VkzcGl
via IFTTT

Distribuciones vulnerables a propósito para practicar

Seguridad Informática

Existen distribuciones más o menos vulnerables. Ya hemos hablado de algunas de ellas en nuestros artículos y análisis. Por ejemplo Whonix y TAILS son algunos ejemplos de distros más fiables en este sentido. Pero también hemos hablado de otras como las empleadas por hackers y para realizar auditorías de seguridad.

Un complemento para los hackers y los que estén iniciándose en el mundo de la seguridad, es disponer de una distro poco segura, con configuraciones por defecto y otros bugs de seguridad creados a posta para practicar los tests de penetración y ataques. Esto también existe y tenemos un gran ejemplo en Metasploitable (basada en Ubuntu). 

Aparte de Metasploitable (en sus distintas versiones) existen otros proyectos de distros Linux de este tipo. ¿Cuáles? Pues por ejemplo:

  • Dam Vulnerable Linux: otra distro muy similar a Metasploitable, pero basada en Slackware.
  • LAMPSecurity: para los interesados en ataques a servidores LAMP, basada en CentOS.
  • De-ICE Pentest: una distro muy interesante para practicar ataques…
  • Otras ISOs para máquinas virtuales similares: Holynix, pWnOS, OWASP, Hacking-Lab, Moth, Katana, etc.

Con Kali Linux u otra distro similar y una máquina virtual o física con una de estas distros instaladas, podrás divertirte atacando el sistema y aprenderás mucho. Puedes jugar a juegos de captura de bandera marcándote objetivos. ¡Sin duda interesante! Te animo a practicar.

El artículo Distribuciones vulnerables a propósito para practicar ha sido originalmente publicado en Linux Adictos.

from Linux Adictos http://ift.tt/1NF7TW1
via IFTTT