12/25/17

Membuat Popup Box Fanspage Facebook Responsive 100% di Blog #Anti Gagal

Mungkin kamu sedang mencari cara membuat popup 100% responsive, dan saya pikir banyak sekali bertebaran tutorial tutorial cara membuat popup box fanspage Facebook kamu. Namun kamu belum menemukan yang cocok untuk diterapkan di blog kamu. Dan kamu putuskan sendiri, menurut saya pribadi bahwa penggunaan popup ini sangat mengganggu para pembaca blog kamu. Tapi jika kamu ingin meningkatkan like Facebook ini cocok dipakai.

cara-membuat-popup-fanspage-facebook-responsive
Popup box responsive

Pada postingan ini saya akan share bagaimana cara membuat popup box untuk fanspage Facebook sukses 100% responsive di segala ukuran devices. Anda akan melihat demontrasinya yang sudah saya terapkan pada blog-blog saya. Tapi saya kasih contoh satu saja ya ... heeeee...
Sudah lihat demo nya... Nah sekarang ikuti step by step tutorial buat popup responsive nya.
Pertama silahkan kamu buka blog kamu blogger.com
Kemudian pilih "TEMA" atau dalam bahasa inggris "THEME"
Pilih "HTML"
Catatatan: Sebelum anda membuka tema editor ada baiknya kamu backup dahulu tema kamu sebelumnya.

Cari dan simpan code CSS dibawah ini diatas  </head>
#aink-back{display:none;background:rgba(0,0,0,.8);width:100%;height:100%;position:fixed;top:0;left:0;z-index:99999}#aink-exit{width:100%;height:100%}.aink-box-inner{width:266px;position:relative;aink_gandaria:block;padding:20px 0 0;margin:0 auto;text-align:center}#aink-close{cursor:pointer;position:absolute;top:1px;right:-17px;font-size:18px;font-weight:700;color:#000;z-index:99999;aink_gandaria:inline-block;line-height:18px;height:18px;width:18px}#aink-close:hover{color:#06c}#aink-box{min-width:310px;min-height:240px;position:absolute;top:50%;left:50%;margin:-220px 0 0 -170px;-webkit-box-shadow:0 0 16px #000;-moz-box-shadow:0 0 16px #000;box-shadow:0 0 16px #000;-webkit-border-radius:8px;-moz-border-radius:8px;border-radius:8px;background:#fff;max-height:253px}@media (max-width:380px){.aink_gandaria{position:fixed;top:50%;left:50%}#aink-box{min-width:310px;min-height:240px;transform:scale(.67);-webkit-transform:scale(.67);-o-transform:scale(.67);-ms-transform:scale(.67);-moz-transform:scale(.67)}.aink-box-inner{width:266px}#aink-close{right:-17px}}#aink-back iframe{transform:scale(.92);-webkit-transform:scale(.92);-o-transform:scale(.92);-ms-transform:scale(.92);-moz-transform:scale(.92);transform-origin:top left;-webkit-transform-origin:top left;-o-transform-origin:top left;-ms-transform-origin:top left;-moz-transform-origin:top left}
Tambahkan tag <style>.........code css........</style>

Kemudian simpan code dibawah ini diatas tag </head> juga
<script type='text/javascript'>
       //<![CDATA[
       if (typeof(jQuery) == 'undefined') {document.write("<scr" + "ipt type=\"text/javascript\" src=\"//ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js\"></scr" + "ipt>");}
       //]]>
</script>

Cari dan simpan code dibawah ini letakan diatas </body>
<script type='text/javascript'>
//<![CDATA[
//grab user's browser info and calculates/saves first visit
jQuery.cookie = function (key, value, options) { if (arguments.length > 1 && String(value) !== "[object Object]") { options = jQuery.extend({}, options); if (value === null || value === undefined) { options.expires = -1; }
if (typeof options.expires === 'number') { var days = options.expires,  t = options.expires = new Date();  t.setDate(t.getDate() + days); } value = String(value); return (document.cookie = [encodeURIComponent(key), '=', options.raw ? value : encodeURIComponent(value), options.expires ? '; expires=' + options.expires.toUTCString() : '', options.path ? '; path=' + options.path : '', options.domain ? '; domain=' + options.domain : '', options.secure ? '; secure' : ''].join('')); }
options = value || {}; var result, decode = options.raw ? function (s) { return s; } : decodeURIComponent; return (result = new RegExp('(?:^|; )' + encodeURIComponent(key) + '=([^;]*)').exec(document.cookie)) ? decode(result[1]) : null; };
// the pop up actions
$(function ($) {
  if ($.cookie('popup_fb') != 'yes') {
    $('#aink-back').delay(400).fadeIn("fast"); // options slow or fast
    $('#aink-close, #aink-exit').click(function () {
      $('#aink-back').stop().fadeOut("fast"); // options slow or fast
    });
 }
//initiate popup function by setting up the cookie expiring time
$.cookie('popup_fb', 'yes', { path: '/', expires: 0 });
});
//]]>
</script>
<div class='aink_gandaria'>
<div id='aink-back'>
  <div id='aink-exit'> </div>
  <div id='aink-box'>
    <div class='aink-box-inner'>
      <div id='aink-close'>
        <img src='https://upload.wikimedia.org/wikipedia/commons/4/44/Curation_bar_icon_close.png'/>
      </div>
      <iframe allowtransparency='true' frameborder='0' scrolling='no' src='//www.facebook.com/plugins/likebox.php?href=https://www.facebook.com/NamaFanspageAnda/&amp;width=290&amp;height=275&amp;colorscheme=light&amp;show_faces=true&amp;border_color=%23ffffff&amp;stream=false&amp;header=false' style='border: 0 none; overflow: hidden; width: 290px; height: 270px;text-align:center;margin:0 auto;'/>
    </div>
  </div>
</div>
</div>
Kemudian ganti huruf NamaFanspageAnda dengan Fanspage kamu.

Klik Simpan.

Dan coba lihat hasilnya.

Cukup mudah kan membuat popup box responsive di blogger. Jika ada pertanyaan silahkan tinggalkan di kolom komentar. Salam.....
Kamu suka cari blog-blog zombie, ini saya berikan cara mencari blog zombie dengan mudah.
Read more

Nonton Video YouTube Gratis Tanpa Kuota #Mode Airplane

Cara nonton video youtube tanpa kuota dengan menggunakan mode Airplane, Cara ini tidak work untuk semua Merk dan Type smartphone android, ada yang bisa menggunakan mode airplane untuk menonton Youtube, ada juga yang tidak bisa.

Pada tutorial ini saya akan berikan video tutorialnya bagaimana cara nonton video gratis atau cara buka youtube dengan gratis tanpa kuota data. Yaitu dengan menggunakan mode airplane. Kok, Bisa menggunakan mode airplane untuk menonton Youtube?!!! Tentu bisa, tapi seperti yang saya bilang tadi, tidak semua jenis merk dan type handphone android bisa melakukannya.

Karena tutorial ini untuk menonton video Youtube secara gratis, maka sobat sebaiknya punya aplikasi youtube

Berikut langkah-langkahnya..
Silahkan Sobat pilih dahulu mode Airplane (modus Terbang)

Setelah handphone Android and pada posisi modus terbang, sekarang anda silhkan masuk ke Network dengan ketikan *#*#4636#*#*  . Jika smartphone android anda tidak bisa masuk ke dalam network saat mengetik code untuk membuka network diatas. silahkan kamu download Network nya di Playstore atau kamu bisa download aplikasi network disini


Read more

12/23/17

Phasing out legacy recommendations on Android TV








Posted by Bejamin Baxter, Developer Programs Engineer


At Google I/O 2017, we href="https://android-developers.googleblog.com/2017/05/welcome-to-your-new-home-on-android-tv.html">announced
a redesign of the Android TV's home screen. We expanded the recommendation row
concept so that each app can have its own row (or multiple rows) of content on
the home screen. Since the release of the new home screen, we have seen
increased adoption of the new recommendation channels for Android Oreo in a wide
variety of apps.



With more and more apps surfacing high-quality recommendations using the new
channels, the href="https://developer.android.com/training/tv/discovery/recommendations-row.html">legacy
recommendation row in the new home screen on Android O will be phased out
over the next year.



Currently, when an app creates recommendations with the href="https://developer.android.com/training/tv/discovery/recommendations-row.html#build">legacy
notification based API the content is added to a channel for that app. The
channel may already exist if there was recommended content for it when you
upgraded from Android N (or below). If the there is no channel for the app, it
will be automatically generated for you. In either case, the user can't add or
remove programs from the channel, but they can move, hide, and show the channel.
When an app starts to use the new API to add its own channels, the system
removes the auto-generated channel and the app takes over control of the display
of their content.



Over the next year, we will phase out the automatic generation of channels.
Instead of generating multiple channels, one for each app's legacy
recommendations, we will insert one channel for all legacy
recommendations. This channel will appear at the bottom of the channel list.
Users can move or remove it. When a user upgrades to Android O, the previous
recommendation row from Android N (and below) becomes a channel at the bottom of
the home screen.




If you have not updated your app to post content to the new channels on the home
screen, take a look at our href="https://developer.android.com/training/tv/discovery/recommendations-channel.html">documentation,
href="https://codelabs.developers.google.com/codelabs/tv-channels-programs/index.html">codelab,
and href="https://github.com/googlesamples/leanback-homescreen-channels">sample
to get started.



We look forward to more and more apps taking advantage of the new changes in the
home screen. We love to hear your feedback, so please visit the href="https://plus.google.com/communities/112881895888889393129">Android TV
Developer Community on G+ to share your thoughts and ideas.

Read more

12/21/17

Double Stuffed Security in Android Oreo








Posted by Gian G Spicuzza, Android Security team


Android Oreo is stuffed full of security enhancements. Over the past few months,
we've covered how we've improved the security of the Android platform and its
applications: from href="https://android-developers.googleblog.com/2017/08/making-it-safer-to-get-apps-on-android-o.html">making
it safer to get apps, dropping href="https://android-developers.googleblog.com/2017/04/android-o-to-drop-insecure-tls-version.html">insecure
network protocols, providing more href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">user
control over identifiers, href="https://android-developers.googleblog.com/2017/08/hardening-kernel-in-android-oreo.html">hardening
the kernel, href="https://android-developers.googleblog.com/2017/07/shut-hal-up.html">making
Android easier to update, all the way to href="https://android-developers.googleblog.com/2017/06/2017-android-security-rewards.html">doubling
the Android Security Rewards payouts. Now that Oreo is out the door, let's
take a look at all the goodness inside.


Expanding support for hardware security



Android already supports href="https://source.android.com/security/verifiedboot/">Verified Boot,
which is designed to prevent devices from booting up with software that has been
tampered with. In Android Oreo, we added a reference implementation for Verified
Boot running with href="https://source.android.com/devices/architecture/treble">Project
Treble, called Android Verified Boot 2.0 (AVB). AVB has a couple of cool
features to make updates easier and more secure, such as a common footer format
and rollback protection. Rollback protection is designed to prevent a device to
boot if downgraded to an older OS version, which could be vulnerable to an
exploit. To do this, the devices save the OS version using either special
hardware or by having the Trusted Execution Environment (TEE) sign the data.
Pixel 2 and Pixel 2 XL come with this protection and we recommend all device
manufacturers add this feature to their new devices.



Oreo also includes the new href="https://android-review.googlesource.com/#/c/platform/hardware/interfaces/+/527086/-1..1/oemlock/1.0/IOemLock.hal">OEM
Lock Hardware Abstraction Layer (HAL) that gives device manufacturers more
flexibility for how they protect whether a device is locked, unlocked, or
unlockable. For example, the new Pixel phones use this HAL to pass commands to
the bootloader. The bootloader analyzes these commands the next time the device
boots and determines if changes to the locks, which are securely stored in
Replay Protected Memory Block (RPMB), should happen. If your device is stolen,
these safeguards are designed to prevent your device from being reset and to
keep your data secure. This new HAL even supports moving the lock state to
dedicated hardware.



Speaking of hardware, we've invested support in tamper-resistant hardware, such
as the href="https://android-developers.googleblog.com/2017/11/how-pixel-2s-security-module-delivers.html">security
module found in every Pixel 2 and Pixel 2 XL. This physical chip prevents
many software and hardware attacks and is also resistant to physical penetration
attacks. The security module prevents deriving the encryption key without the
device's passcode and limits the rate of unlock attempts, which makes many
attacks infeasible due to time restrictions.



While the new Pixel devices have the special security module, all new href="https://www.android.com/gms/">GMS devices shipping with Android Oreo
are required to implement href="https://android-developers.googleblog.com/2017/09/keystore-key-attestation.html">key
attestation. This provides a mechanism for strongly href="https://source.android.com/security/keystore/attestation#id-attestation">attesting
IDs such as hardware identifiers.



We added new features for enterprise-managed devices as well. In work profiles,
encryption keys are now ejected from RAM when the profile is off or when your
company's admin remotely locks the profile. This helps secure enterprise data at
rest.


Platform hardening and process isolation



As part of href="https://android-developers.googleblog.com/2017/05/here-comes-treble-modular-base-for.html">Project
Treble, the Android framework was re-architected to make updates easier and
less costly for device manufacturers. This separation of platform and
vendor-code was also designed to improve security. Following the href="https://en.wikipedia.org/wiki/Principle_of_least_privilege">principle of
least privilege, these HALs run in their href="https://android-developers.googleblog.com/2017/07/shut-hal-up.html">own
sandbox and only have access to the drivers and permissions that are
absolutely necessary.



Continuing with the href="https://android-developers.googleblog.com/2016/05/hardening-media-stack.html">media
stack hardening in Android Nougat, most direct hardware access has been
removed from the media frameworks in Oreo resulting in better isolation.
Furthermore, we've enabled Control Flow Integrity (CFI) across all media
components. Most vulnerabilities today are exploited by subverting the normal
control flow of an application, instead changing them to perform arbitrary
malicious activities with all the privileges of the exploited application. CFI
is a robust security mechanism that disallows arbitrary changes to the original
control flow graph of a compiled binary, making it significantly harder to
perform such attacks.



In addition to these architecture changes and CFI, Android Oreo comes with a
feast of other tasty platform security enhancements:


  • href="https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html">Seccomp
    filtering
    : makes some unused syscalls unavailable to apps so that
    they can't be exploited by potentially harmful apps.
  • Hardened
    usercopy
    : A recent href="https://events.linuxfoundation.org/sites/events/files/slides/Android-%20protecting%20the%20kernel.pdf">survey
    of security bugs on Android
    revealed that invalid or missing bounds checking was seen in approximately 45%
    of kernel vulnerabilities. We've backported a bounds checking feature to Android
    kernels 3.18 and above, which makes exploitation harder while also helping
    developers spot issues and fix bugs in their code.
  • Privileged Access Never (PAN) emulation: Also backported to
    3.18 kernels and above, this feature prohibits the kernel from accessing user
    space directly and ensures developers utilize the hardened functions to access
    user space.
  • Kernel Address Space Layout Randomization (KASLR):
    Although Android has supported userspace Address Space Layout Randomization
    (ASLR) for years, we've backported KASLR to help mitigate vulnerabilities on
    Android kernels 4.4 and newer. KASLR works by randomizing the location where
    kernel code is loaded on each boot, making code reuse attacks probabilistic and
    therefore more difficult to carry out, especially remotely.

App security and device identifier changes



Android
Instant Apps
run in a restricted sandbox which limits permissions and
capabilities such as reading the on-device app list or transmitting cleartext
traffic. Although introduced during the Android Oreo release, Instant Apps
supports devices running href="https://www.android.com/versions/lollipop-5-0/">Android Lollipop and
later.



In order to handle untrusted content more safely, we've href="https://android-developers.googleblog.com/2017/06/whats-new-in-webview-security.html">isolated
WebView by splitting the rendering engine into a separate process and
running it within an isolated sandbox that restricts its resources. WebView also
supports Safe Browsing to protect
against potentially dangerous sites.



Lastly, we've made href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">significant
changes to device identifiers to give users more control, including:


  • Moving the static Android ID and Widevine values to an
    app-specific value, which helps limit the use of device-scoped non-resettable
    IDs.
  • In accordance with href="https://tools.ietf.org/html/rfc7844#section-3.7">IETF RFC 7844
    anonymity profile, net.hostname is now empty and the DHCP client no
    longer sends a hostname.
  • For apps that require a device ID, we've built a Build.getSerial()
    API
    and protected it behind a permission.
  • Alongside security researchers1, we designed a robust MAC address
    randomization for Wi-Fi scan traffic in various chipsets firmware.


Android Oreo brings in all of these improvements, and href="https://www.android.com/versions/oreo-8-0/">many more. As always, we
appreciate feedback and welcome suggestions for how we can improve Android.
Contact us at security@android.com.



_____________________________________________________________________



1: Glenn Wilkinson and team at Sensepost, UK, CĂ©lestin Matte, Mathieu Cunche:
University of Lyon, INSA-Lyon, CITI Lab, Inria Privatics, Mathy Vanhoef, KU
Leuven

Read more
loading...