Deep dive into Android Multidex

The 65k reference limit of a DEX file is a problem that any developer might face sooner or later while working on an Android project and at some degree we had to deal with it at Sysmosoft as well. In the community, it has been discussed many times how to deal with it so, in this article, after briefly explaining … Continue reading Deep dive into Android Multidex

MissingTranslation issue for release builds

Using the default Lint configuration, while building the release version of our application, we could face the MissingTranslation error: Error:(3) Error: “pick_color_array” is not translated in “ru” (Russian) [MissingTranslation] <string-array name=”pick_color_array”> … 1 errors, 0 warnings Error:Execution failed for task ‘:android-rgb-tool:lintVitalRelease’. > Lint found fatal errors while assembling a release target. This happens when more than one … Continue reading MissingTranslation issue for release builds

Gradle bits for beginners

The following tips are meant especially for who is quite new to Android Studio and Android application development in general. Gradle Version Any project in Android Studio can set to use the Gradle Wrapper or the local Gradle distribution. The latter is actually stored within Android Studio and it gets updated along with the IDE. There … Continue reading Gradle bits for beginners

Android Reverse Engineering 101 – Part 5

In our introduction journey in the Android reverse engineering world, so far we’ve seen what is an APK and its format, how we can extract useful information about an application using aapt, which is provided by the Android SDK, how we can convert the DEX bytecode to a more readable and easily editable format and how we can … Continue reading Android Reverse Engineering 101 – Part 5

Android Reverse Engineering 101 – Part 4

In this introduction series to Android application reverse engineering, after having talked about the APK format, aapt and dex2jar, the next thing we’re going to turn our attention to is Apktool. As we have seen, resources in an APK are compressed and stored in binary format and neither aapt nor dex2jar can help us to view and edit them: the former is … Continue reading Android Reverse Engineering 101 – Part 4

Android Reverse Engineering 101 – Part 3

In the first two articles of the series, I wrote about the APK format and the aapt tool. In this post I will focus on dex2jar, a tool to work with Android  .dex and Java .class files: there are few mirrors, but you can point here for the official website. The core feature of this tool is, as you would … Continue reading Android Reverse Engineering 101 – Part 3

Android Reverse Engineering 101 – Part 2

In the first article of this series I have explained the format of APK and AAR bundles. As already mentioned, applications available on Google Play Store (or more generally any application installed on a device) are packaged in a file with the APK extension. In this second part, I will show you how you can get … Continue reading Android Reverse Engineering 101 – Part 2

Android Reverse Engineering 101 – Part 1

This is the first in a series of articles about reverse engineering Android applications. In this series I will cover the anatomy of the APK and AAR package formats and few tools commonly used to reverse engineering or inspecting applications: aapt, dex2jar, apktool and Androguard. Part 1 – APK and AAR format Part 2 – aapt Part … Continue reading Android Reverse Engineering 101 – Part 1

Translucent Activity window background is displayed as black

This is an issue I had to deal with while I was working on one of our applications at Sysmosoft. The use case is not so common, but it’s not also impossible that you will face this problem while developing your application: starting two activities one after the other, with the second one (which will be … Continue reading Translucent Activity window background is displayed as black