How To Get Android P on Your Phone!

Sponsored Links

Lets face it according to the Android Developer Dashboard , Oreo is only present on 1.1% of all Android devices. And now with Android P rolling in Google has decided to end the OS support for the Nexus with only the Pixel phones receiving the update.

The Android P Developer Preview

So if you’ve a spare old Pixel phone you can go here and follow all the details that will help you get the developer preview! (As the OS is unstable its not recommended on your main phones).

For all the other peeps left out don’t feel sad here is the link for Android P /Pixel Launcher.

The new look of Android P’s home screen has gotten a terrific refresh . The top of the screen is largely unchanged, but the dock is completely different. The new look is great, but far more important is the fact that it puts the Google search bar right at the bottom of the screen where users can easily access it. Here’s a screenshot.

Android P/Pixel Launcher

The Android P Developer Preview

Sponsored Links

Are you ready for the next version of Android?

Google has launched out its 1/5 Developer previews for Android P .

Its name will be disclosed with full release later this year but now its code-named as “P”.

So here are the new features of Android P :

Notch Style Display like iPhoneX

As manufacturers shrink bezels and the front-facing sensors leave a notch on your display,The next major version of Android will have built-in “display cutout” support, ensuring that app content doesn’t creep into the areas on either side of the camera and speaker slot.Developer options screen showing different cutout sizes

Indoor Positioning

Google wants to make turn-by-turn directions while you are inside just as good as Maps has become when you are outside, and Android P is going to start making that happen with a little help from WiFi Round-Trip-Time (RTT). This feature in IEEE 802.11mc will make it possible for apps to know how far you are from the WiFi access point you are connected to, and developers will be able to use that information to give you a more accurate location indoors.

New RTT APIs support indoor positioning in your apps.

Improvised Notifications

Starting from Android 7.0 (API level 24), you can add an action to reply to messages or enter other text directly from a notification. Android P enhances this feature with the following enhancements:

  • Android P now displays images in Messaging Notifications on phones  replacing that dreaded “person has sent an attachment” message you get now.
  • Simplified support for conversation participants: It is able to identify people involved in a conversation, including their avatars and URIs.

Updated Security

Google has tripled down its efforts on improvising security for its phones.The biggest by far is a new restriction system for sensors, cameras, and microphones when an app is marked as idle.

An app won’t be able to access your camera, microphone, or most of its sensors while it’s running in the background — unless it makes it perfectly clear to you that it’s doing so. For all Security Updates.

 

Multi-Camera Support

Several Android phones have multiple cameras on the front or back these days, but very few of them are able to work simultaneously. Google is adding an API for developers to explore a world where multiple cameras being used at the same time is possible.

This could mean anything, from depth-sensing magic using multiple cameras to an Apple-style live Portrait Mode or even commercial phones using a standard camera and a thermal camera at the same time to overlay the two images.

Here’s an in-depth video of the same

How was Memcached Used For Largest DDos Attack Ever Recorded

Sponsored Links

GitHub became the victim of the largest DDos attack with 1.3 terabits per second of traffic hitting the platform all at once-interesting thing of this attack was that it required no botnet as typical DDos attack require botnets.

Real time traffic from the DDos attack

So instead of botnets attack was caused through Memcached Servers .

Now we will see what is Memcached and how was it used to create such high volumes of traffic.

What is Memcached?

Wikipedia describes Memcached as a general-purpose distributed memory caching system, but what exactly does the term Memcached mean? Cache is memory used to store the most frequently used resources (e.g. browsers store every website visited during a session in cache), because accessing resources from a cache is faster than accessing them from a disk drive. So Memcached means “memorycached” which simply is caching resources in the memory. These resources can be data retrieved from  database operations or  HTML pages. The data is stored in key/value pairs in the form of large hash tables.

As distributed system is part of the Memcached definition, you can install Memcached on various servers to make a larger caching server. In this way, Memcached helps reduce database loads to a minimum, resulting in faster and more responsive Web applications.

Memcached is best implemented for queries that are triggered multiple times in a second and demand huge data as output. Access to Memcached data is faster than the access time to disk drives because the Memcached data is stored in temporary memory.

How was it used to create traffic?

As Memcached DDoS attacks don’t require a malware-driven botnet. Attackers simply spoof the IP address of their victim and send small queries to multiple memcached servers—that are designed to elicit a much larger response. The memcached systems then returns large output data of the requests back to the victim.

It is difficult to determine the exact amplification factor of memcached, but the attacks Akamai saw generated nearly 1 Gbps per reflector.

Spoof of IP address is possible because memcached uses UDP  transfer protocol(which is unreliable and doesn’t require connection)

How Amplification Works

Whats the Solution?

For attackers the beauty of memcached DDoS attacks is there’s no malware to distribute, and no botnet to maintain.

  • Primary solution to memcached attacks is to not have the reflectors exposed to the internet. However, relying on remote systems administrators to remove their servers from the internet is not a solution likely to see immediate results.
  • Set up a firewall to ensure your memcached service is only accessible from the trusted hosts that require access to the service. Block all access to the service from the public Internet.

The developers behind memcached say that the latest version, Memcached 1.5.6, “disables the UDP protocol by default.”