Using VK.com for our own purposes

By | 06.07.2017

To yong users VK gives unlimited opportunities of online communication. Mature employees of special services – voluntarily and personally created the dossier on the above group of citizens. And what can it give to the programmer? Of course, the free infrastructure for its application! In conditions when there is no server, and someone else offers only… Read More »

Android 6.0 permissions in defense and attack

By | 03.07.2017

Every day in mobile devices reveal vulnerabilities that can be exploited by intruders. They can send SMS to a paid number, they can collect a large database of contacts and sell it, or they can compromise a particular person. Successful exploitation of a vulnerability usually involves a number of conditions. But you can go the… Read More »

How I parsed someone else’s code. What’s useful can be found inside well-known Android applications

By | 25.06.2017

In this article I will tell you how I analyzed the code of other people’s programs and found one interesting undocumented function for working with widgets of applications. Widget with setting when adding Many of us have seen the settings screen that appears when you add a widget to the device screen. For example, a… Read More »