best virus protection for android

Alibabacloud.com offers a wide variety of articles about best virus protection for android, easily find your best virus protection for android information here online.

Android APK self-protection technology-integrity check

();MessageDigest msgDigest = null;try {msgDigest = MessageDigest.getInstance("SHA-1");byte[] bytes = new byte[1024];int byteCount;FileInputStream fis = new FileInputStream(new File(apkPath)); while ((byteCount = fis.read(bytes)) > 0){msgDigest.update(bytes, 0, byteCount);} BigInteger bi = new BigInteger(1, msgDigest.digest());String sha = bi.toString(16);fis.close();//这里添加从服务器中获取哈希值然后进行对比校验} catch (Exception e) {e.printStackTrace();}}} (2) Use the Linux sha1sum command to calculate the h

Verification of signature information and protection of sensitive information for Android applications using JNI technology

information obtained by the above code is actually a long string, which can be MD5 encrypted and encrypted into a 32-bit string format for more efficient signature information. In addition, I see in the process of information, I saw some of the data mentioned in the package signed Hashcode value to do the comparison, this way is simpler, but I did not use this way, I always feel that this way may not be accurate, just a person feel that interested students can read more relevant information. It

Android Four Components acitivity (2) Save Activity Status (Field protection)

Activity Site Protection @Override protectedvoid onsaveinstancestate (Bundle outstate) { // Save Data Super . Onsaveinstancestate (outstate); } @Override protectedvoid onrestoreinstancestate (Bundle savedinstancestate) { // Recovering data Super . Onrestoreinstancestate (savedinstancestate); }Note: because Onsaveinstancestate () is not guaranteed to be called every time, you should only use it to recor

Rogue software, virus and Trojan Horse mounted to Android platform

startup greatly reduce the startup speed, In addition, You Cannot uninstall the system software. This situation cannot be attributed to malware, Of course, you can't just lick your face and say it's for the sake of users. As a result, some rogue software is quietly connected to the Internet in the background, and a large number of users complain that their mobile phones will inevitably increase a large amount of Internet fees. However, system applications Cannot uninstall these software, result

Code Analysis for two Android virus applications

In contrast to Android, the outlook is good, but it seems to me that the market is a bit messy. Applications that are good, almost, or even self-interested are all mixed in the Android app market, recently, I saw on the Internet Lenovo app security detection and research team expose the virus code analysis for the two Android

Android resource protection-Exploration

Address: http://blog.csdn.net/you_and_me12/article/details/7959349 2012-09-09 The APK file uses the decompression tool to view resources such as drawable, but some images in the game cannot be seen. This issue has been explored for a long time ...... [1] image resources are not placed under the drawable file and placed in assets (but the image resources can also be seen when decompressing the APK). The following describes how to use the image resources. Analysis: I) when the image resources are

Code-level analysis reveals the fact that android ad SDK is virus-driven

a conclusion at the beginning: the numerous domesticAndroid advertising allianceSDKAlready virus-infected,Push AdvertisementAnd collect the user's mobile phone number, wireless network card, and geographical location information.Personal privacy, AndMobile phone traffic and powerResulting in sustained consumption. Literacy: What is an advertisement SDK? The so-called advertisement SDK is familiar to Android

Android platform discovers new mobile phone virus Rootsmart

Some professors from North Carolina University pointed out that even if the Android Market has a new security mechanism Bouncer protection, hackers still have a way to bypass detection and steal infected mobile phone user information.The professor's team of researchers recently discovered a malware named Rootsmart, which is very mean-free and does not contain any malicious code, making Bouncer difficult to

The [Android] adb command dumpsys activity to see activity in a task. (uninstall virus)

/Com.google.android.launcher.GEL T1} Stack #1: Task ID #47taskrecord{42f32108 #A=COM.BAIDU.DFC u=0 Sz=1} Intent {Act=android.intent.action.main Cat=[android.intent.category.launcher] flg=0x10200000 cmp=com.baidu.dfc/. Module.mainhome.activity.HomeActivity bnds=[279,751][540,1071]} Hist #0:ACTIVITYRECORD{4310E1A0 u0 com.baidu.dfc/. Module.mainhome.activity.HomeActivity t47} Intent {Act=android.intent.action.main Cat=[android.intent.category.launcher] flg=0x10200000 cmp=com.baidu.dfc/. Module.main

Total Pages: 3 1 2 3 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.