After more than a month, I finally finished writing the code of the mobile phone security guard. Although the interface is ugly, the core code is correct and all are source code. Here is the sharing download link:
Http://download.csdn.net/detail/jinlong_lou/4222073
Android enthusiasts are also welcomed to join the group 228249802 for common development and progress.
Project features:
1. the overall project adopts the MVC Framework and is a comprehensive application of Android knowledge points. The technologies used include activity, service, broadcast, content provider, notification, database, custom title, and custom control, custom toast, widgets, aidl inter-process communication, and mutual calls between JavaScript and Java)
2. introduced the optimization techniques of listview, gridview and other controls to improve the efficiency of the software.
3. interspersed with skills such as Bug management in enterprise development, Mantis usage, automated testing of robotium, log management, software packaging, obfuscation, decompilation, and third-party advertising.
This project mainly covers the following functions:
Mobile phone theft:
Determine whether the mobile phone is stolen Based on the preset parameters, and send the SIM card information and mobile phone location information to the security number based on the custom protocol. you can customize special numbers and quickly enter the mobile phone anti-theft function by dialing. You can remotely use text message commands to set a screen Lock password for the mobile phone, remotely lock the mobile phone screen, remotely format the mobile phone SD card, and restore factory settings, this greatly protects users' privacy and security. The admin device is registered through aidl. Generally, users Cannot uninstall this program.
Communication GUARD:
The incoming call number is displayed at the location where the incoming call is located, and the management of the incoming call blacklist/SMS blacklist. the backup and restoration of the phone and SMS are used to protect the data and communication security of the mobile phone.
Software management:
System software and local software can display software details, start and delete applications, and connect to obtain software scoring information on the server. The program lock can specify the program to be protected. You must enter a password before entering the program to be protected.
Task Management:
Displays the information of processes running on the current system. The system memory information is displayed. It can kill a process and kill processes in batches. The desktop widget displays the current memory status of the user's mobile phone in real time.
Internet management:
Displays the upload and download traffic for each program WiFi and 3G/2G Access, helping you understand the traffic generated by the program. roaming management. when you check that your phone is roaming, a message is displayed.
Mobile Anti-Virus: download the latest virus database from the server, identify the virus based on the package name and digital signature of the program, and prompt the user to scan and kill the virus. malware is nowhere to hide the Trojan.
System Optimization:
Clear cell phone cache, improve cell phone performance, and optimize battery management
Advanced tools:
Automatic IP dial-up, mobile phone number attribution query, change the location of the attribution location, commonly used number query.
Security Topics:
1. Use Cases such as uploading and downloading data with 0 permissions and restarting the mobile phone to explain in depth the android sandbox, security mechanism, and permission model.
2. Analyze the Privilege Escalation Vulnerability of malicious code to explain how to maintain system security.
3. the Linux keyboard driver case is used to explain the Principle and Implementation of the Trojan horse.
4. The speed of malware development is indeed rapid, and security software must keep pace with the times. The mobile phone viruses in the world already have the function of killing security software. multi-process mutual protection cases are used, describes how to implement self-protection of security software.
Project: