Mobile Security Guard-virus detection and removal, and security guard virus detection and removal
Public classAntivirusActivityExtends Activity {TextView TV _init_virus; ProgressBar pb; Message msg; ImageView iv_scanning; LinearLayout ll_content; protected void onCreate (Bundle savedInstanceState) {// TODO Auto-generat
broadcast-a android.intent.action.BATTERY_CHANGED--ei "level" 3--ei "scale" 100Differences in the use of ADB push and adb install in Android Dreamtale2014-03-10 23:41:44This article is submitted by Yingchun Shi (@ three vulgar little Women). Reprint please specify the original address.In the actual development of Android, the ADB command is often used, and the installation application can use ADB push or a
The Antiy vulnerability can cause virus-free or mistaken removal of legitimate software.
The android version of Antiy avl pro has a vulnerability. If used by viruses or Trojans, the vulnerability can be detected by avl scans.
After avl pro detects and removes mobile phones, the results are saved in the db first, and then the scan information is read and displayed
;
21}
Application scenarios of APK signature comparison
After the above discussion, we must have understood the principles of signature comparison and my implementation methods. So when can we use signature comparison to ensure the security of Android APK software?
I personally think there are three main scenarios:
1. program self-detecti
1. Generate the android APK package signature certificate1) switch to the JDK bin directory in DocCd c: \ Program Files \ Java \ jdk1.6.0 _ 18 \ bin2) run the following commandKeytool-genkey-alias android123.keystore-keyalg RSA-validity 20000-keystore android123.keystore/* Explanation: keytool is a built-in certificate tool of Java JDK.-Genkey parameter: generate a certificate (security certificate for copy
is a Java bytecode file generated after Java source code compilation. Dex is the full name of Dalvik VM executes, that is, the android Dalvik execution program, not the Java me bytecode but the Dalvik bytecode.• Resources. ARSCThe compiled binary resource file.• META-INF catalogThe META-INF directory stores signature information to ensure the integrity of the APK package and system security. When eclipse c
package to a directory. Example: D: \ Android-SDK-WindowsThen add the full path D: \ Android-SDK-Windows \ tools to the system PATH variable (this step is mainly used for convenient calling when the APK software is installed in the future)My computer> right-click Properties> advanced> Environment Variables
Note:Add;No.
3. Configure the
obtaining an APK package, if you want to replace an image, a piece of code, or a piece of copyright information, it is basically impossible to directly decompress, replace, and re-package the package. This increases the difficulty of virus infection and malicious modification, and helps protect the security of the system.
Classes. Dex File
Classes. Dex is a Java bytecode file generated after Java source co
In many APK applications on the Internet, the author adds ads to free versions, and a large number of de-advertising versions appear on the Internet. In addition, there are some software that will pop up at startup, either useless prompts or suggestions for registration. Android enthusiasts are keen to download these Android software without ad-free pop-up window
Android dynamic reverse analysis tool ZjDroid -- shell Removal
Prerequisites:
1. Root mobile phone 1
2. Xposed Framework needs to be installed through Xposed installer (http://dl.xposed.info/latest.apk;
I. Introduction to ZjDroid
ZjDroid is a dynamic reverse analysis module based on Xposed Framewrok. The reverse analyzer can do the following through ZjDroid:
1. DEX File Memory dump
2. Memory BackSmali bas
Android dynamic reverse analysis tool ZjDroid -- shell removal, androidzjdroid --
Project address:Https://github.com/BaiduSecurityLabs/ZjDroid
Prerequisites:
1. Root mobile phone 1
2. Xposed Framework needs to be installed through Xposed installer (http://dl.xposed.info/latest.apk;
I. Introduction to ZjDroid
ZjDroid is a dynamic reverse analysis module based on Xposed Framewrok. The reverse analyzer can
of Dalvik VM executes, that is, the android Dalvik execution program, not the Java me bytecode but the Dalvik bytecode.• Resources. ARSCThe compiled binary resource file.• META-INF catalogThe META-INF directory stores signature information to ensure the integrity of the APK package and system security. When eclipse compiles an APK package, it will do a verificat
In many Apk applications on the Internet, the author adds ads to free versions, and a large number of de-advertising versions appear on the Internet. In addition, there are some software that will pop up at startup, either useless prompts or suggestions for registration. Android enthusiasts are keen to download these Android software without ad-free pop-up window
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.