NewImage


 


Tockle enables control of your phone from your wrist. Toggle WiFi and other system settings, send an SMS message, and even activate Tasker tasks with a simple tap.


NewImage


Create a note with simple voice commands.View a note on your phone, lock the screen and that note appears on your watch. 


NewImage



IFTTT lets you create powerful connections with one simple statement — if this then that. Activate your Channels and create Recipes on IFTTT. Channels are services like Facebook, Gmail, Twitter, as well as devices like Philips Hue, Belkin WeMo, and UP by Jawbone.


 


NewImage


If you want to play games on your android wear, Tales of Pocoro - Android ear. Tales of Pocoro is a unique and interesting puzzle game with gorgeous and cute RPG graphics for *Android Wear* smartwatch and wearables.


 


NewImage


WearMail for Android Wear will displays email notifications stacked in a single notification on an Android Wear device.The notifications contain commands such as 'quick reply' and 'delete email' that are designed to facilitate ultra-quick processing of email.

NewImage


Just forget about #bendgate test, this is the future of Android, this is nutella test. hehe. The most stressful test for your android smartphone. It the most stupid test for your smartphone but who cares if its when viral. The video is the viral genius. Make sure you don’t eat the phone. Watch the full video test.


Welcome to Android Augmented Reality. Augmented reality enhanced environment around you can have various opportunities to get you interact. There are several successful Android AR apps in the market. 


NewImage


ModiFace
ModiFace mobile apps are pushing the boundary of photo-realistic facial visualizations.


NewImage


Star Walk
Star Walk was one of the first apps to create a form of digital stargazing with augmented reality.


NewImage


Google Ingress (Android) — Free
AR game market, and it’s easily one of the most creative AR applications we’ve ever seen


 


What if you want to create your own Android Augmented Reality?


You can use AndAR. It is a GNU General Public License. This means you can freely use it in any of your projects, as long as you license them under the same license, this means the GPL. Download the code and try by yourself.


You can also use Wikitude Android SDK and Sony’s Camera Add-on API
Download and install the Wikitude Android SDK (sign-up required). It provides you with tools and samples to set up an augmented reality cam in just a few minutes.

There is also The Catchoom Augmented Reality and Image Recognition SD it is branded mobile application with the CraftAR service in the cloud.


Other Library


ARLab - http://www.arlab.com/
ARmsk - http://armsk.org/
ARToolKit - http://sourceforge.net/projects/... (Supports many devices)
Moodstocks - http://moodstocks.com/
popcode - http://www.popcode.info/demos (Supports Android and iPhone)
QCAR - Qualcomm Augmented Reality SDK - https://ar.qualcomm.com/qdevnet/sdk (Android & iOS)
SATCH - http://satch.jp/ ( powered by Total Immersion - http://www.t-immersion.com/ )


 


Good luck.



NewImage


Updated: 2014-08-06 (The text of CVE-2014-3502 was changed after this post was released, to better explain the cope of the issue and the ways to mitigate the problem)


Security issues were discovered in the Android platform of Cordova. We are releasing version 3.5.1 of Cordova Android to address these security issues. We recommend that all Android applications built using Cordova be upgraded to use version 3.5.1 of Cordova Android. Other Cordova platforms such as iOS are unaffected, and do not have an update.


When using the Cordova CLI, the command to use 3.5.1 of Cordova Android is:


cordova platform add android@3.5.1 --usenpm

The security issues are CVE-2014-3500, CVE-2014-3501, and CVE-2014-3502.


For your convenience, the text of these CVEs is included here.




CVE-2014-3500: Cordova cross-application scripting via Android intent URLs


Severity: High


Vendor: The Apache Software Foundation


Versions Affected: Cordova Android versions up to 3.5.0


Description: Android applications built with the Cordova framework can be launched through a special intent URL. A specially-crafted URL could cause the Cordova-based application to start up with a different start page than the developer intended, including other HTML content stored on the Android device. This has been the case in all released versions of Cordova up to 3.5.0, and has been fixed in the latest release (3.5.1). We recommend affected projects update their applications to the latest release.


Upgrade path: Developers who are concerned about this should rebuild their applications with Cordova Android 3.5.1.


Credit: This issue was discovered by David Kaplan and Roee Hay of IBM Security Systems.




CVE-2014-3501: Cordova whitelist bypass for non-HTTP URLs


Severity: Medium


Vendor: The Apache Software Foundation


Versions Affected: All released Cordova Android versions


Description: Android applications built with the Cordova framework use a WebView component to display content. Cordova applications can specify a whitelist of URLs which the application will be allowed to display, or to communicate with via XMLHttpRequest. This whitelist, however, is not used by the WebView component when it is directed via JavaScript to communicate over non-http channels.


Specifically, it can be possible to open a WebSocket connection from the application JavaScript which will connect to any reachable server on the Internet. If an attacker is able to execute arbitrary JavaScript within the application, then that attacker can cause a connection to be opened to any server, bypassing the HTTP whitelist.


This is a limitation of the hybrid app architecture on Android in general, and not specific to Apache Cordova.


It is possible to mitigate this attack vector by adding a CSP meta tag to all HTML pages in the application, to allow connections only to trusted sources. App developers should also upgrade to Cordova Android 3.5.1, to reduce the risk of XAS attacks against their applications, which could then use this mechanism to reach unintended servers. See CVE-2014-3500 for more information on a possible XAS vulnerability.


Upgrade path: Developers who are concerned about this should rebuild their applications with Cordova Android 3.5.1, and consider adding CSP meta tags to their application HTML.


Credit: This issue was discovered by David Kaplan and Roee Hay of IBM Security Systems.




CVE-2014-3502: Cordova apps can potentially leak data to other apps via URL loading


Severity: Medium


Vendor: The Apache Software Foundation


Versions Affected: Cordova Android versions up to 3.5.0


Description: Android applications built with the Cordova framework can launch other applications through the use of anchor tags, or by redirecting the webview to an Android intent URL. An attacker who can manipulate the HTML content of a Cordova application can create links which open other applications and send arbitrary data to those applications. An attacker who can run arbitrary JavaScript code within the context of the Cordova application can also set the document location to such a URL. By using this in concert with a second, vulnerable application, an attacker might be able to use this method to send data from the Cordova application to the network.


The latest release of Cordova Android takes steps to block explicit Android intent urls, so that they can no longer be used to start arbitrary applications on the device.


Implicit intents, including URLs with schemes such as “tel”, “geo”, and “sms” can still be used to open external applications by default, but this behaviour can be overridden by plugins.


Upgrade path: Developers who are concerned about this should rebuild their applications with Cordova Android 3.5.1.


Credit: This issue was discovered by David Kaplan and Roee Hay of IBM Security Systems.


(This notice originally read as follows:)


CVE-2014-3502: Cordova apps can potentially leak data to other apps via Android intent URLs


Severity: Medium


Vendor: The Apache Software Foundation


Versions Affected: Cordova Android versions up to 3.5.0


Description: Android applications built with the Cordova framework can launch other applications through the use of anchor tags, or by redirecting the webview to an Android intent URL. An attacker who can manipulate the HTML content of a Cordova application can create links which open other applications and send arbitrary data to those applications. An attacker who can run arbitrary JavaScript code within the context of the Cordova application can also set the document location to such a URL. By using this in concert with a second, vulnerable application, an attacker might be able to use this method to send data from the Cordova application to the network.


The latest release of Cordova Android takes steps to block explicit Android intent urls, so that they can no longer be used to start arbitrary applications on the device.


Upgrade path: Developers who are concerned about this should rebuild their applications with Cordova Android 3.5.1.


Credit: This issue was discovered by David Kaplan and Roee Hay of IBM Security Systems.




It is possible to install windows 95 on Android wear. You need to be familiar with adb. You need to install dos emulator adosbox app on android wear. On your android phone enable the usb debugging and on android wear enable the usb debugging on bluetooth. Install the dos emulator via adb and install windows 95 on it. You probably cannot run any application in it because of not enough memory but it will look cool on it.

IMG_2373.PNGFor more detail how to install apk via adb watch the following video. https://www.youtube.com/watch?v=xdR4VVHHU-8