Skip to main content

Android NDK Command Line Compilation

Android NDK Command Line Compilation


Configuration and Compilation:

# > $ ndk-build // Build Targets, etc, but not necessary for Ant
> $ android update project --path . --subprojects --target 9

Ant Build:

# ant debug // for debug:
> $ ant release

Installing to the Device:

# List Attached Devices:

> $ adb devices
List of devices attached
emulator-5554 device
emulator-5555 device

# Install to Device:
# -s, (use to select one of multiple devices).
# -r, (use to reinstall)
# Native Activity is a C++ only, (no Java), Android Sample App.

> $ adb -s emulator-5554 install -r NativeActivity.apk

Popular posts from this blog

EncFS Hints

EncFS Hints Contents:What is EncFS?Using EncFS and Cloud StorageTermsEncFS CommandsEncFS Tools cmp.20141209 1. What is EncFS? EncFS is a "Virtual Filesystem" ... of sorts.  Encrypted files are placed individually within a folder, on top of an existing filesystem.
With special software, the folder containing the encrypted files is "Mounted"  as another drive letter, ( Z: drive), or as another mountpoint in a Linux/Unix system, (i.e. /mount/shdw). 2. EncFS Best PracticesWhen mounting/decrypting encrypted files, mount in RAM/Memory, or decrypt to a secure partition.Encrypt your swap drive, (Linux/Unix).Use EncFS to encrypt home folders, auto-decrypting on login.Use EncFS to encrypt files synchronized to cloud storage or with BitTorrent Sync.Use a "shdw" prefix/folder root, for mounted secure folders, or even secure source repositorie, (i.e., /mnt/shdw/dropbox-encfs, /mnt/shdw/luks-drive/source/apache-source, etc). 3. Using EncFS and Cloud Storage EncFS is i…



Heavy tattered curtains smothered the living room window; a heavy gust slammed the screen door against the mountain cabin. Hiding from the lightning, a small boy huddled in the corner, wondering when the daylight would be taken by the storm. I'm not afraid of the lightning, he tried.He closed his eyes at the thunder and then faded into nothingness as his page was thrown away. 
A black, cold iron wood stove stood isolated in its corner; a small ash bucket and a spilled wood cradle spotted the bare wooden floor. A young man watched from his stool, peering between the curtains with a rifle in his hand. What will run here from the storm, he wondered.  He slid a round into the rifle's chamber, turned, and then closed the bolt.  As he waited for what was to come, lightning tore through the mountain top, sundering soul from body—a page torn in half; the clouds crumpled, and then he was gone.

A few framed oil paintings, among a dozen unfinished, hung on the cabin's only inte…

Meta Security & Theosophy

Meta Security & Theosophy ContentsWhen Technical Debates Become ReligiousEquivocation in Technology: Meta DataEquivocation in Theology: Six Days of CreationThe Value of Accepting Ideas, "As Is"Conclusion cmp.20140704
e.s. kohen
1. Where Technical Debates Become Religious How do you know when Meta Data become real Data?  The answer is the same as asking: How do you know when an Electron will change state?  By observing it.

Slashdot vs, the NSA and Meta Data has yet another community mash-up regarding Meta Data.  As always, "Tin Foil Hat" conspiracies abound--but in this case justifiably.

From a Philosophical point of view--namely Epistemology, (even Memetics), for that matter, the International Community has completely failed to "Grok" the idea that "Meta" is a completely relative term.

When any scientific debate is abruptly thrown into the context of the Politics or Theology, the entire planet seems to devolve into manipulati…