Today I will show you how to benefit from Handlers in Android 🙂
First of all, Handlers aren’t some new concept, they were there long ago. How long? Well, from API level 1. Still, I always felt Android developers don’t use them enough, me included.
When I’ve discover the brilliance of Handlers, I was surprised how handy they are and how easy is to use them.
So, what does a Handler do? A few things, really.
Continue reading Tutorial: How to use a Handler?
Today I want to present you a new JSON-parsing library – LoganSquare, written by BlueLine Labs. It is told to be the fasted available and quite easy to use, so I couldn’t miss it 😉 Below you will find an example Android project, which serializes and parses some objects.
Also, I have run Logan’s Benchmark project myself and indeed, the results are good. Not as good, as on their GitHub’s page, but still. Just to make everything clear, I have used Nexus 5 running Android 6.0.1 (ART).
As you can see, LoganSquare wins in every category. Lets check how we can use it in our project, shall we?
Continue reading Tutorial: Parse JSON with LoganSquare
Today’s tutorial will be about SQLCipher and its integration in Android (with the means of Android Studio). Just to give some introduction, SQLCipher is used for a full database encryption. What full means is that the DB file is entirely encrypted, not only separate rows or tables. Zetetic, the company behind SQLCipher, provides Community and Commercial edition. You can use the former for commercial projects, though, just have to provide license doc in your app. Also, SQLCipher is not for Android only, it can be used on various platforms.
Regarding security features, SQLCipher uses 256-bit AES in CBC mode by default, with 1kB page size, and it derives the key data using PBKDF2 function. The difference in API that you instantly notice is the passphrase argument in
getWritableDatabase() methods. Now, this passphrase should never be stored in the application, otherwise the whole point of encryption is wasted. One thing to keep in mind, is that the passphrase is not a key! Yes, the DB is encrypted using the key, but it is generated based on the passphrase (~ password) and also can be re-set using PRAGMA rekey command.
Continue reading Tutorial: Add SQLCipher to your Android app
This tutorial demonstrates greenDAO 2.x integration. Since greenDAO 3.x was released, its integration differs from 2.x. Now, you can either have a generation project or everything in one app’s project. There is a build-in encryption (SQLCipher underneath) which you can use if you want. There are now annotations and the package name has been changed to
org.greenrobot.greendao. Here is a good article if you want to migrate to greenDAO 3.x – Updating to greenDAO 3 and annotations and here are some Code examples.
Today I want to present you my new tutorial about greenDAO integration. For those who haven’t heard, this is a great open source Android ORM solution which enables you to forget about SQLite low-level stuff and concentrate on the database’s overall lifecycle, models and how do they relate. You don’t actually need to bother how to populate the database and how the relations work, because greenDAO handles it for you. All you need to know is what you want to keep in your DB.
Sounds great, huh? But what about performance? Continue reading Tutorial: How to easily integrate greenDAO into your Android project