I’ve been using Google Voice for a while now and recently upgraded to the Pixel2 XL on Verizon … No, I won’t do a coverage as there are many out there that are pretty awesome; I will say tho that the issues people are talking about have not plagued my phone at all.
Back to the post, after the switch from my Note5, my Google Voice stopped working with inbound calls and I could not for the life in me figure this out. I was just about to give up when I came across a solution that was way easier than I expected and thought I’d share it here should someone else need it.
Once I had Google Voice setup and connected to my phone (several times 🙂 ), all I had to do was dial *71[Google Voice number] from my phone. example: *710123456789
Some other things you can do :
To Activate Busy Transfer, dial *90[Your Google Voice number]
To Activate No Answer Transfer, dial *92[Your Google Voice number]
To Deactivate the Call Forwarding, dial *73 [Send]
To Deactivate the Busy Transfer, dial *900 [Send]
To Deactivate the No Answer Transfer, dial *902 [Send]
While Facebook, Google, Yahoo and other Social Media Giants debate on whether blocking fake news on their services will be bad enough for their bottom line (because they make revenue for clicks on their sites and traffic flow) instead of focusing on the greater good for their users and society on a whole, a group of college Students have stepped up on done their job for them. Continue reading Students do what Social Giants drag ass on
Most people connect to the internet via their ISP’s DNS servers which more than likely are not the best and more than likely is slowing down your browsing. Using a 3rd party service not only speeds up your experience online. A while ago we wrote about OpenDNS, today we’re going over Google’s DNS service.
Make sure to write down your ISP’s DNS servers.
Google Public DNS IP addresses
IPv4 addresses are as follows:
IPv6 addresses are as follows:
Making the changes
Start the Network and Sharing Center (this process varies by windows version)
Click Change adadpter settings
Right-click Local Area Connection or Wireless Network Connection slelect Properties
Type in your administrator password if you are promted for it.
Click the Networking tab
Under the Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) and click Properties
Click Advanced and select the DNS tab, write down any IP’s that are listed here for future reference in case you want to revert later on.
Select Use the following DNS server addresses
Enter the IP’s from above
Restart your computer
Click the Apple menu ()
Click System Preferences and click the Network logo.
Select the connection you want to configure (Thunderbolt Ethernet or Wi-Fi or Display Ethernet) then click Advanced
Select the DNS tab
Click the + icon to enter the IP Addresses (repeat for each address)
Click Apply then click OK
I will go over doing this in Ubuntu since that is one of the more common flavors.
Start System Preferences and click Network Connections
Select the connection you want to configure Wired or Wireless tab, then select the appropriate network.
Click Edit, and in the window that appears, select the IPv4 Settings or IPv6 Settings tab.
If the selected method is Automatic (DHCP), open the dropdown and select Automatic (STATIC) addresses only instead.
If the method is set to something else, do not change it.
In the DNS servers field, enter the IP addresses, separated by a space:
If you are prompted for a password or confirmation, type the password or provide confirmation.
If your distribution doesn’t use Network Manager, your DNS settings are specified in /etc/resolv.conf.
sudo vi /etc/resolv.conf
If any nameserver lines appear, write down the IP addresses for future reference. Replace or add, the following lines:
Every router uses a different user interface for configuring DNS server settings; we provide only a generic procedure below. For more information, please consult your router documentation.
Some ISPs hard-code their DNS servers into the equipment they provide; if you are using such a device, you will not be able to configure it. Instead, you can configure each of the computers connected to the router, as described above.
In your browser, enter the IP address to access the router’s administration console.
When prompted, enter the password to access network settings.
Find the screen in which DNS server settings are specified.
If there are IP addresses specified in the fields for the primary and seconday DNS servers, write them down for future reference.
Replace those addresses with the IP addresses from above
Even when installing from the Google Play store, caution should be used when installing apps.
A good rule to follow is to ask yourself if the app being installed is asking for more permissions than what it needs to function. When it comes to a wallpaper app, the list of permissions should be rather short.
It was recently brought to our attention that there was a wallpaper app on the Google Play store that had an extra permission that didn’t fit. It was using the permission GET_ACCOUNTS which allows access to list accounts.
This wallpaper app was doing a bit more than just displaying pictures on the device’s background.
The app goes by the name of Sexy Girls Wallpaper Gallery with the package name com.sexywallpapers.wallpaper.sexy. With the permission GET_ACCOUNTS accepted, it then uses the getAccountsByType() function to gather account information from Google, Facebook, and Twitter.
The stolen account information is then sent to a remote server. This is all triggered when the app is opened.
It uses the value email for Google/email account info, emailf for Facebook account info, and emailt for Twitter account info when sending to the remote server.
YouTube is launching a subscription music service called YouTube Music Key, with the beta version coming next week. You’ll be able to pay $10 per month for mercifully ad-free music and videos.
It will also include a subscription to Google Play Music, with 30+ million songs, expert-curated playlists, and in the coming days, the ability to watch many YouTube official music videos right from the app.
This launches YouTube into direct competition with other streaming services like Spotify, Beats, and Amazon
Security researcher Axelle Apvrille recently published a paper about AdThief, a malware aimed at hijacking ad revenue from a reportedly 75,000 infected devices. First discovered in March 2014, and also known as “spat,” the malware, which comes disguised as a Cydia Substrate extension, was found to replace the publisher ID of publishers with the one of the malware creator, effectively attributing all ad revenue to him.
A publisher ID is used to identify a publisher’s account on an ad platform, which helps track revenue generated by said publisher. By being able to swap the publisher’s publisher ID with his own, the malware creator was able to hijack revenue from about 22 million ads. In effect, when clicking on an ad, an infected user would generate ad revenue for the attacker instead of the developer of the application or website.
Infected devices: ~75k
Total activate times: ~22m
Daily activate times (around 3/20/2014): ~22k
The malware was designed to target ad kits from 15 ad networks, including Google-owned AdMob and Google Mobile Ads, both representing a large share of mobile advertising at least here in the US. Other American companies targeted by AdThief are AdWhirl, MdotM, and MobClick. The remaining targeted ad networks were all from China or India.
A list of mobile adkits targeted by the malware is provided in a report: YouMi, Vpon, MobClick, Umeng, AdSage/MobiSage, MdotM, InMobi, Domob, AdWhirl, AdsMogo, Google Mobile Ads SDK, AderMob, Weibo, MIX SDK and Poly SDK. The majority of these are Chinese, four are based in the US, and two in India.
In his report, Xiao remarks that Weibo is a popular social network in China, but is unable to attribute MIX SDK and Poly SDKmore precisely. In fact, Sina Weibo, introduced in 2013, is an advertisement SDK, so that solves one mystery.
MIX SDK can be attributed to GuoHeAD. It probably refers to the GuoHe MIX platform for cross-promotion of mobile games. This is also backed up by the name of a source file found in the malware: /Volumes/MacOsStore/Project/IOS/SpAd/SpAd/AD_GuoHe.xm.
Finally, Poly SDK is not a new adkit: it corresponds to AderMob. This is confirmed when downloading the AderMob iOS SDK.
Implementation details of adkit hooks found in iOS/AdThief.A!tr
Typical class names
AdMob and Google Mobile Ads SDK
YouMi* – delegated to Google Ads
iOS/AdThief is a technical and malicious piece of code which hijacks revenue from 15 different adkits. It is built on top of the Cydia Substrate platform, available for jailbroken devices, which provides it with an easy way to modify advertisement SDKs. With Substrate, the malware needs only to focus on the call and implementation of each hook.
At first, the identification of every adkit the malware targets was difficult because the code mentions only class names used by each adkit SDK. However, the fact that the malware author did not strip out debugging information helped us to identify all 15 adkits. In particular, this is how support for Komli Mobile and GuoHeAD was detected.