On Mon, Dec 05, 2011 at 10:05:19AM -0500, [email protected] wrote: > On Mon, Dec 05, 2011 at 09:26:57AM -0500, Joseph Apuzzo wrote: > > Just a simple request of the must have apps for Android 2.2 > > > > I know of one which is .juicedefender <http://www.juicedefender.com/>, but > > what are the 5-8 must have apps? > > Yes new Android phone is now charging up this morning. > > > > Usually those appkillers/battery extenders aren't worth the effort.
Another $0.02 of rant: Rooting your phone is fun, I guess, but before you do so, decide what you want to do with it, and why. I've rooted phones primarily to retain the ability to do so in the future. The android community model for rooted devices is to install a 'su' binary which is suidroot, which raises a call to an android app which presents a choice - allow, or not. This is pretty nice. Now the not so nice: There are lots of apps in the market which require root, to do stuff like set up vpn, or tune the cpu, or whatever. Yeah, you can't do this without root. Consider, however, exactly what you're talking about here: You're granting random code, written by "someone", to run as root on a device with no real administrator tools, which holds all your phone numbers and email accounts, and can directly cause you to lose money (ie, a premium-txt dialing trojan). It's totally possible for a root app from the market to install undetectable crap in your phone, and it can be nearly impossible to get RID of that crap later. Root enables everything up to kernel modules and from that point the sky is the limit. I haven't HEARD about anything which is out there doing evil in the market this way, but be warned and be aware. Mini rant #2: Beware of where you get the app, regardless of root. There's been a lot of flap about malware on android. It exists. Most of it exists on sketchy third-party markets where someone pirates a commercial app, unpacks it, repacks it with malware, and posts it back to the market. Occasionally it shows up on the legit market, but don't be stupid about what you install and you're probably fine. Remember that any exploit which gets you root on the phone... *is a root exploit to the phone*. A malware app could just as easily exploit it w/ a native component and lift itself up to root & above the security model. Don't install crap you don't know the provenance of. -m --
pgp2RiA9vjuCU.pgp
Description: PGP signature
_______________________________________________ Mid-Hudson Valley Linux Users Group http://mhvlug.org http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug Upcoming Meetings (6pm - 8pm) MHVLS Auditorium Dec 7 - An Intro to Chef Jan 4 - Recovering the Brownfield: Revitalizing Open Source Projects Feb 1 - Home Networking Made Simple with Amahi Home Server
