Skip to main content

How to turn your smartphone into an Android Go device!!

Android Go is Google's latest venture to provide a smooth operating system to smartphones that are equipped with cheaper hardware. It's the successor to Android One, and is trying to succeed where its predecessor failed. More and more Android Go devices have recently been introduced in various markets around the globe, and now you can get Android Go installed on pretty much any device that currently runs on Android. 

This is a patch that turns on low RAM mode on your Android, the low-RAM Property Patcher, which makes more RAM available so that the system becomes more fluid. In addition, the Play Store recognizes your Android as the Go version and offers apps like YouTube, Gboard and others in lighter versions.
You can download some of the Android Go apps directly from the Play Store. I applied the patch on my smartphone, a Moto G3 that has 1 GB of RAM, and the system started out consuming only 390 MB, which leaves you with a greater amount of RAM. This enables the system to perform better. Before starting the tutorial, I should make it clear that neither I nor AndroidPIT are liable for any damages to your smartphone. Do it at your own risk, and don’t forget to create a backup beforehand.
1.Download these two files on your phone (one is called android_lowram_enabler, which enables low RAM mode, and the other one is called android_lowram_disabler, which disables the feature if you do not like it).
2. After downloading, turn off your device and reconnect it in recovery mode. After it starts in recovery mode, select the Install option and find the downloaded file. Usually it is in the download folder. Select the file android_lowram_enabler and install it.
3. Once installed, reboot your device and you're done. Your Android will already be running in low RAM mode, just like Android Go. To revert the process, redo the procedure using the android_lowram_disabler file, which will also be in the downloads folder.
Remember that this patch works on any version of Android from KitKat 4.4. You also need to have recovery mode on your smartphone. Try it out for yourself and leave your feedback in the comments.

Comments

Popular posts from this blog

Powerbeats Pro review: The best-sounding wireless beat headphones .

As always I will not bore you with all those technical specifications, you are smart enough to do that on the internet. I will straight away let you know the pros and the cons of this device that I honestly felt without any fancy technical terms. So let us start with the PROS: The battery life is just flawless. The sound quality has improved a lot as compared to other beat products. The controls are amazing. Water resistant. Secure fit and sleek design. Bold and vibrant sound. Enough of the cons now lemme tell u the downside of this device i.e the CONS: The huge charging case feels a bit like a burden. The treble becomes overbearing at higher volumes. The hook design is not comfortable for everyone. There is no basic battery gauge. Let us wrap up the review with my final verdict.  Beats took its time building a true wireless option for its headphone line, but the wait was mostly worth it. The Powerbeats Pro is a great all-around option for workout headphon

How to protect your PC from ransomware!

Ransomware is a particularly nasty kind of malware which encrypts your files and holds them ransom until you make a payment. In this article, we explain what ransomware is, how it works and which software can help you protect against it best. What is ransomware and why should you protect against it? Ransomware is a kind of malware which locks you out of your device or encrypts files on it, preventing access until a sum of money is paid. This tricky malware can be delivered via Trojan, which a user may download by accident thinking it is another file, or it can spread without any user action, as in the case of WannaCry. WannaCry spread very quickly and was perhaps the most high profile recent example of ransomware. It affected 300,000 computers in over 150 countries by taking advantage of a vulnerability in Windows which was leaked from the NSA. Another example of ransomware is Cerber, which infects your system via Trojan horse, then encrypts your files and asks for payment.