Guoshi studio released: commercial software based on the smartphone Android platform-mobile guard software development practices

Source: Internet
Author: User

Guoshi studio is a technical team dedicated to enterprise-level application development on the Android platform. It is committed to the best Android Application in China.ProgramDevelopment institutions provide the best Android enterprise application development training services.

Official contact information for Enterprise Training and Development Cooperation:

Tel: 18610086859

Email: hiheartfirst@gmail.com

QQ: 1740415547

QQ: 148325348

Guoshi studio is better for you!

L this document references and uses free images and content on the Internet, and is released in a free and open manner, hoping to contribute to the mobile Internet and the smart phone age! This document can be reproduced at will, but cannot be used for profit.

L if you have any questions or suggestions about this document, go to the official blog

Http://www.cnblogs.com/guoshiandroid/ (with the following contact information), we will carefully refer to your suggestions and modify this document as needed to benefit more developers!

L The latest and complete content of "big talk design mode" will be regularly updated on the official blog of guoshi studio. Please visit the blog of guoshi studio.

Http://www.cnblogs.com/guoshiandroid/get more updates.

 

This course is different from any android tutorial in the market. It is a course that really originated from commercial projects and has already had two training experiences. It originated from the market and was tested by trainees, eventually you become a must-have course.
The core of this course is a mobile phone security and monitoring software, which involves all aspects of Android program development. The basic introduction is as follows (from the original text in the classroom, without modification ):
I. Brief introduction to the Android mobile patron saint Software
1. This is a mobile phone anti-theft software: When a mobile phone is lost, you can send a text message via a backup number to obtain the location information of the mobile phone; you can enable remote automatic start and shutdown; you can send an alarm;
2. parse the Information Protocol sent from the backup number: Back up the text message, phone number, and image, and delete the text message, phone number, and image to prevent information leakage; it can also transmit user data such as text messages, phone numbers, and images to the specified location on the network and obtain geographical location information; you can customize the alarm sound recording and play the alarm sound when the alarm sound is enabled in the Protocol;
3. After the SIM card is changed, the system automatically sends a text message to the backup mobile phone number to inform the other mobile phone that the phone number has been lost, and can automatically send the previously set backup information to the specified location;
4. If my mobile phone is lost, but my mobile phone number is set to my target mobile phone number in the mobile phone patron saint software installed on my mobile phone, a friend can send an SMS to send an alarm; you can also send text messages or emails (write your own email to capture Code ) To obtain the location information. If the mobile phone is already in a remote location (for example, from Beijing to Sichuan ), you can send an email or text message to back up and delete the text message, phone number, call information, images, and videos on your mobile phone, and then upload them to the network (via email or Web Server)
5. Lock mobile phones, upload important information and files, destroy related information through custom protocols, and avoid leakage of trade secrets
6. prevent loss: the bluetooth device needs to communicate with the sensor at a distance from the mobile phone. However, when the mobile phone leaves itself for two meters, the alarm sound is played and the alarm is reported. If the phone is at home, you can use GPS to locate the range and set no alarm.
7. Remote Control: You can enable the call transfer function through the mobile phone software to transfer the text message or phone number sent to the lost mobile phone to another mobile phone to prevent information leakage, text messages can be intercepted by the mobile phone patron saint (by setting the SMS receiver priority in the software, you can intercept the text message, and the text message can be viewed by the person who lost the mobile phone;
8. Personal Protection: You can use JNI programming to send an alarm when the user presses a key;
Summary: first, we will demonstrate the software, and then demonstrate or describe the software's functions step by step based on daily life problems. The features should be highlighted, including: Data Security
Ii. Technical points:
1. Solve the memory overflow problem: View tree concept, dynamic addition and deletion views, and efficient memory utilization;
2. Good system scalability: the data in the database uses the key-Value Method to correspond to the map in Android programming. Each key is a function point, and information function points can be added, it provides excellent settings and scalability. With the weak coupling of the Android system architecture, You can monitor different events and make corresponding services, so as to achieve system expansion;
3. The above uses gallery and responds to its items to dynamically add, delete, and extend the displayed view tree;
4. Implement text message monitoring, target mobile phone number monitoring, and if the target mobile phone number is used, the text message content will be parsed and actions will be performed according to the Protocol sent in the content, back up data and upload it to the network;
5. The interface is cool, the scrolling effect is good, and the scalability is good;
6. Implement the "rogue software" function and use services to call each other so that the system will never kill the software;
7. User Data Security: small data can be uploaded to the network, and large files can be encrypted to prevent information leakage.
8. Implement custom protocols
9. dynamically update the view tree to replace tabhost and save resources;
10. Resolve the custom protocol in the text message to achieve remote control and operation of software, and then operate the mobile phone;
11. You can customize the protocol based on the latest custom operations;
12. Communication between the mobile client and the server is performed through HTTP or TCP/IP protocol to prevent theft of the mobile phone from discovering that the monitoring software has been installed;
13. resumable upload of large files
14. All operations of the software are based on the protocol. You can simply encrypt the Protocol through the password to achieve safer communication operations;
15. JNI is used to enable remote host switch.
16. When dynamically updating the view tree, because of the dual-buffering technology, the memory object rendering and interface updating are automatically performed during addview () and removeview, if setcontentview () is also used, all view objects will be destroyed and a space identical to the destroyed object will be re-drawn. This is a waste of resources for the memory and processor, it also consumes battery resources;
17. The software implements comprehensive application of four components, network communication, GPS, MAP, sensor, and security technology;
18. Very secure. Data is encrypted without a network.
19. On the basis of excellent architecture, the software itself can be easily reconstructed to continuously improve. In addition, the knowledge of Android software development can be accumulated;
20. Set the security level based on the user: the data type protected and the degree of protection
The video course teacher has trained the students twice. Below are some feedback from the students after class:
"I have heard of your lessons yesterday. I was so excited that I didn't fall asleep until four o'clock in the morning. I was so excited that I didn't want to go to bed at all, it feels great, and I have never heard of any android courses that make me excited, "said one company's engineer, who gave me a monthly salary of twelve thousand in lunar January and was not dug up;
"This is the happiest, most rewarding, most serious, and most interesting Android course I have ever heard of. You have the urge to follow you after class !" -------- A trainee said excitedly after the two-day course;
"Teacher, students are driving you back. Your android course is amazing. You just want to hear more about it." ----- A student said after hearing this lesson;

 

Specific course address: http://www.ibeifeng.com/goods.php? Id = 118

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.