I need some help. A friend of mine passed away a couple years ago and his parents have asked me to preserve his data. I have his older Samsung Galaxy E (Samsung-SMT377A) tablet which I'd like to convert into a simple virtual machine -- not expecting any cellular or whatnot, just so it can be interacted with -- especially this device has been dropped many times (not by me!) and who knows when it will cease.
The tablet is not locked; I have full access to it.
Seems to me there must be a way to convert this to a VM that can be interacted with and accessed under VMWare Fusion. Especially, I could root the device so I have CLI access, though I've not gotten an SSH server to run on the tablet (it's too old).
Any tips, advice or pointers would be very much appreciated.
Related
I have a hypothetical question, and while I'm sure someone has surely thought of it before, I can't seem to ask google the right way to find it.
A long time ago, when we were still using those screaming demons called modems, it was believed that the only way to increase your connection speed was to use multiple modems, each with a cat5 port in the computer. It was called stacking, or something like that.
After massively enjoying the process of rooting my Evo, my first ever >free, non-metropcs phone, this got me to thinking. If I have two rooted android phones, can I somehow sync their tether, using a program on the pc to organize which phone downloads which parts of a webpage or file, essentially doubling my connection speed? It seems viable, very possible, leading me to believe that it can be done and is being done and I simply haven't found it yet. This is one of the places where I learned how to root, it's a very knowledgeable community, and I'm sure someone here will have an answer, so thanks in advance.
Hello,
I'm about to develop an app that is intended to run on chinese android tablets. It is going to do some simple animations, sqlite database, and communicate on a wi-fi internal network.
The last part is the one that scares me. This app is going to be designed to simplify the data handling in a business and it needs to be connected between 12-18 hours a day threw a wi-fi network. The network will consist in something between 10-50 tablets and a pc working as server. All the comunication will be done threw java sockets. And all the tablets will have a good wi-fi signal. But I'm afraid that because of some bad-quality wireless driver/card. It disconnects itself, messages get corrupted, corrupted messages are writen in the database and as a result nothing will work and I will have my cellphone flooded with complaints from several businesses.
So, I'm just being paranoid or can I count on these tablets to work as they should? Anyone has some experience developing for them to confirm that I'm just paranoid? I'm about to order one actually to test this particular issue, but maybe someone already did and maybe save me a headache or two by telling me their experience.
Also, should I expect them to stop working after a fixed amount of time like some other chinese products?
I picked these tablets because of their price and because they are needed in large quantities. If I say we are going to need 50 Galaxy Tabs, this project will fail; I need to be able to provide a cheap solution. I will be ordering them directly from China. If there are any known models I should stay away i would love to know them as well.
Thanks
Ive been tossing the idea around on whether or not its something to pursue. In my mind it seems somewhat feasible. I currently have a Samsung Galaxy Player 4.0 (which from what I can tell is basically a Samsung Galaxy S without a data plan through a carrier) and it is rooted. There are even start-up processes and services for the dial pad and phone (even though its only supposed to me a glorified MP3 player). So with that being said here is my idea...
The original Amazon Kindles came with free 3g connectivity right out of the box (no service plan). I am thinking maybe there would be a way to set up the Galaxy to connect to the Kindles free 3g internet. Maybe mock a Kindle ID to the Galaxy. Even if you did something along the lines of running a Kindle ROM in a VirtualBox type app on the Galaxy for server authentication.
What do you guys think????
I am new to the Android world but not new to computers or hacking (by hacking I dont mean black hat. I mean modifying things to suit your needs ie. rooting).
The Galaxy Players don't actually have a cellular baseband. The package's position on the board isn't populated. Thus, it's completely impossible for the Galaxy Player to connect to a cellular network.
The reason the phone and dialer bits are still present is they are core to Android and can't be removed easily.
ok what about tethering the kidles 3g to wifi???
The Kindle's 3G is only usable to download books. The connection is very restricted, and you really can't do anything with it. Obviously, if the operator detects excessive traffic on an account only intended to download eBooks, your access would be killed pretty fast.
Android 3GArrow
Hi, Watch this video , you can get some Idea..
http://www.youtube.com/watch?v=uJj0kHQgC9w
online final year projects
________________________________________________
final year project titles
I have had a malware/hacker problem with my home computers, network and mobile phones for approximately 18 months. I am hoping that someone with your team will be able to help diagnose and assist in permanently removing the issue as I have not had any success with help from others to date. The malware seems to persist across factory resets and/or firmware flashs. Device details are listed below, at the end of this post.
The phones will randomly download/upload personal content, i.e. files and folders, to cloud accounts and other devices, randomly open and close applications, alter or corrupt files that have been downloaded to the phone, change file location on the devices, alter permissions, block or change root status (if rooted), deny un-root, disallow applications to be installed, removed or function correctly, hijack the wireless/blue-tooth and mobile data capabilities, eavesdrop on phone conversations and access the devices camera and microphone, communicate with other devices, possibly controlling them to a certain extent..
Similar problems exist with the personal computers. Mobile data usage has increased from 5G per month to well over 50G, reaching as much as 100G in a months time. I was forced to change plans with my internet service provider to accommodate data usage of 600G a month from the 300G plan I was on originally, where I only used 1/3 of that or less per month. Lastly, my identity has been stolen multiple times over the 18 month period I have had this problem. I am concerned the infection resides at the hardware level but I do not know how to confirm if that is possible with Android devices and don't want to purchase anymore new device as I have previously tried with 6 desktops, 4 laptops, 5 smartphones, 5 routers and 4 modems.
I have reached out to the local authorities, computers repair shops and worked with some of the top names in the anti-malware industry, only to be either turned away with disbelief or the lack of capability to do something to resolve the problem. Any help is greatly appreciated. Thank you.
Device List
Mobile Phones:
- Samsung Galaxy S8 Plus (currently in service with Verizon)
- Samsung Galaxy S7 Edge (currently in service with Straight Talk, previously Verizon)
- Samsung Galaxy S7 (not in service, original service provider: AT&T)
- iPhone 7s (in service with Straight Talk, previously Verizon)
* If necessary, please inquire about additional computing and networking equipment.
lol
Sounds like the easiest solution is to take a hammer to everything and start fresh.
Greetings. My computer was purchased and set up by my father, and he set up his own account as an administrator and mine as a normal user. Many of the drivers for software I needed started breaking awhile ago or outdated ones (such as the Nvidia graphics drivers) need updates. I've asked him numerous times to update the drivers and such or reinstall/ or install but he insists that it isn't necessary. I've had it with not being able to do certain things on my PC. I've asked him to give me administrative access on the computer but he wouldn't allow it. Does anyone know how I could go about doing this if it's even possible?
twistedstriker1234 said:
Greetings. My computer was purchased and set up by my father, and he set up his own account as an administrator and mine as a normal user. Many of the drivers for software I needed started breaking awhile ago or outdated ones (such as the Nvidia graphics drivers) need updates. I've asked him numerous times to update the drivers and such or reinstall/ or install but he insists that it isn't necessary. I've had it with not being able to do certain things on my PC. I've asked him to give me administrative access on the computer but he wouldn't allow it. Does anyone know how I could go about doing this if it's even possible?
Click to expand...
Click to collapse
This is almost the EXACT situation that led me to learning to bypass & crack his password (back on Windows 2000!) which then led me to becoming self-taught in Windows and troubleshooting which then led me to building PCs & hardware which, in the end (finding I had an interest and affinity to it), led me to becoming a computer technician! It's nostalgic to see history repeating itself in another way 2 decades later...
So I can definitely sympathize and can't help but reach out, even if this thread might have expired (it's been 11 days) and/or the (new) OP won't check on this anymore...
"Cracking" your dad's password seems to still use the same general steps, but since it's been crazy long since Windows XP and the software I used isn't active or applicable any longer, I couldn't walk you through it here...
The best idea I have for your situation is to get an elevated (meaning w/ administrative privileges) command prompt and either use that to change your account type to one in the "Administrator" group or even activating the ever so elusive Administrator account; so you could login to that one and/or give your own account the privileges.