Speed up the Alexa app on Android – no more sluggishness

You know how it is: you open the Alexa app on your Android smartphone, click through the menus—and every “click” feels like it’s in slow motion. Whether you’re controlling smart home devices or looking for a simple setting, instead of a quick response, using the app becomes a test of patience.
I had exactly this problem. And the solution is as simple as it is curious.

The culprit: Contacts permission

In most cases, the cause of performance issues is not your smartphone or your internet connection, but rather an app permission. More specifically: access to your contacts.
In my case, the app apparently tried to scan through my 1,000+ contacts every time I changed pages. On a second smartphone with fewer contacts, it worked much faster. The fact is, as long as the permission was active, the app became a test of patience.

The solution: revoke authorization

Here’s how it works:

Open the settings on your Android […]

Set up Namecheap.com DDNS in Synology DSM

namecheap-ddns-synology-dsm-en

Today’s article is about how to update DNS entries for domains from Namecheap.com via the Synology DSM function DDNS (Dynamic DNS). Since Namecheap.com is neither available as a provider in Synology DSM, nor do the formerly common intermediary services work, this is only possible with a small workaround. And this is exactly what I would like to show you today.

You need the following things for today’s tutorial:

A domain at Namecheap.comA Synology NAS (or a custom NAS with XPEnology)A webserver with PHP support

In the next paragraph we will outline the actual problem again in detail. If you are only interested in the solution, you can skip the following paragraph…

What is the problem with Synology DSN and Namecheap?

Namecheap provides a url/web service that you can call to set a DNS […]

Crash course VPN: PrivadoVPN in test

Over the last few years, the topic of VPNs has become more and more important. At least that is my personal feeling. Whether for daily surfing or as a sponsor for almost every second YouTuber – VPN providers are now continuously running across our path. Reason enough to test one of these providers again.

Today’s article is about Privado. First of all, to pay tribute to the idea of transparency: I received the account used for the test from Privado free of charge for 30 days. I did not receive any further compensation. Before we start with the actual test, let’s take a quick look at the topic “VPN”. If you already know what a VPN is for and what advantages/disadvantages it has, you can skip the following paragraph.

Why VPN?

First, let’s look at a definition. Wikipedia says…

A virtual private network (VPN) extends a private network across a public network and enables users to send and […]

AJAX, jQuery & how to bypass the same-origin policy

AJAX und Cross-DomainToday’s post is intended to give a brief introduction to the topic of AJAX with jQuery, as well as to cover the topic of cross domain (policy) and to show how you can use small tricks to send AJAX requests across multiple domains. Before we start, however, we will give you a quick introduction to the topic. If you are already familiar with the topic and are only interested in the AJAX cross-domain workaround, you can safely skip the first part of the article.
What is AJAX and how does it work in jQuery?
AJAX is an abbreviation and stands for “Asynchronous JavaScript And XML”. Contrary to the opinion of some people on the Internet, it is not a programming language, but rather a pattern, i.e. a way of programming something. By means of AJAX web content can be retrieved via Javascript, […]

Steganography with PHP – Hide files in images

Steganographie mit PHPIn this article we want to deal with the topic of steganography and implement a small example in PHP. Because PHP is not “only” used to create web pages or to implement forms, as any experienced PHP programmer of larger web agencies will surely confirm.
Besides functions for text processing, PHP also provides methods for image processing as well as for manipulation on bit and byte level. And these are the ones we want to use today. But before we start coding, we will have a short introduction to the topic of steganography.
Steganography is not shorthand
As the title already announced, today’s topic is steganography, the art of hiding information or knowledge in a carrier medium. Wikipedia defines steganography as follows:
Steganography (/ˌstɛɡəˈnɒɡrəfi/) is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, […]