Just installed the Wizzed Bean Rom (http://forum.xda-developers.com/showthread.php?t=2011601) for the Motorola Razr phone.
Everything works fine but I looked up Codename Android within Firefox, running the addon WOT ( web of Trust), it has listed the main website www.codenameandroid.com as dangerous?
Any ideas why?
Because they brick your Phone when you don't read the Instructions
Sent from my XT910
Eighthourblink said:
Just installed the Wizzed Bean Rom (http://forum.xda-developers.com/showthread.php?t=2011601) for the Motorola Razr phone.
Everything works fine but I looked up Codename Android within Firefox, running the addon WOT ( web of Trust), it has listed the main website www.codenameandroid.com as dangerous?
Any ideas why?
Click to expand...
Click to collapse
Wow.
Chrome alerted me too.
When I clicked on advanced I get this:
Safe Browsing
Diagnostic page for codenameandroid.com
What is the current listing status for codenameandroid.com?
Site is listed as suspicious - visiting this web site may harm your computer.
Part of this site was listed for suspicious activity 6 time(s) over the past 90 days.
What happened when Google visited this site?
Of the 68 pages we tested on the site over the past 90 days, 8 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2012-12-09, and the last time suspicious content was found on this site was on 2012-12-09.
Malicious software includes 18 trojan(s), 7 exploit(s).
Malicious software is hosted on 1 domain(s), including mleysfj.mysecondarydns.com/.
This site was hosted on 2 network(s) including AS26496 (PAH), AS15169 (Google Internet Backbone).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, codenameandroid.com appeared to function as an intermediary for the infection of 1 site(s) including htcmania.com/.
Has this site hosted malware?
Yes, this site has hosted malicious software over the past 90 days. It infected 2 domain(s), including bit.ly/, htcmania.com/.
How did this happen?
In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message.
Next steps:
Return to the previous page.
If you are the owner of this web site, you can request a review of your site using Google Webmaster Tools. More information about the review process is available in Google's Webmaster Help Center.
Click to expand...
Click to collapse
I have successfully built CNA roms from source for the droid razr and have had many people use this rom. I believe it is just as safe as any other out there
He is talking about their Web site. FYI still showing as malicious site by Google.
Sent from my Kindle Fire running CM10
Another thing I have noticed
Another thing I have noticed is, there is two instances of Android Keyboard installed.
Android Keyboard - 428KB - version 4.0.3-eng-root.20120308.075356
Android Keyboard - 628 KB - version 4.2-517167
Any reason for this ?
Eighthourblink said:
Another thing I have noticed is, there is two instances of Android Keyboard installed.
Android Keyboard - 428KB - version 4.0.3-eng-root.20120308.075356
Android Keyboard - 628 KB - version 4.2-517167
Any reason for this ?
Click to expand...
Click to collapse
Wrong thread. LOL
Related
Not to sure if anyone has heard of Hexxeh before but here is a short wiki descript regarding Chromium OS builds: "By May 2010, compiled versions of the work-in-progress source code had been downloaded from the Internet more than a million times. The most popular version was created by Liam McLoughlin, a 17-year-old college student in Manchester, England, posting under the name "Hexxeh". McLoughlin's builds boot from a USB memory stick and included features that Google engineers had not yet implemented, such as support for the Java programming language"
Anyhow several Google videos show that he has successfully managed to boot one of his Chromium OS builds called "Flow" on a tablet. And was wondering if anyone has thought about doing this.
His main website: http://chromeos.hexxeh.net/
I've used Flow on a laptop. Not very useful on a tablet - it's basically just a back end for a web browser, with no (well, minimal) apps. Useful for giving to the kids to play web games without breaking your system. However, using the Android OS built for tablets you get access to all the apps.
Looks like someone is working on it!
http://www.geek.com/articles/mobile/chrome-os-tablet-from-acer-outed-by-bug-reports-20110428/
Website of Cyanogenmod.com is infected by malware!!!!
What happened when Google visited this site?
Of the 4 pages we tested on the site over the past 90 days, 2 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2011-11-17, and the last time suspicious content was found on this site was on 2011-11-17.Malicious software includes 2 exploit(s). Successful infection resulted in an average of 4 new process(es) on the target machine.
Malicious software is hosted on 1 domain(s), including blameincise.org/.
This site was hosted on 1 network(s) including AS13335 (CLOUDFLARENET).
look here for more info:
http://safebrowsing.clients.google....hl=en&site=http://www.cyanogenmod.com/devices
Chill down dude, the file has been deleted. And btw, why do you post this in the development section?
Sent from my GT-S5830 using XDA App
Hey all,
I'm the proud owner of a Samsung Nexus S (sadly the i9020a model, though). I was forced against my will at gun point by someone named Jealousy to install ICS (4.0.4) on my i9020a when it was released for all other Nexus S devices except for the US AT&T version of the phone.
Anyway, love the ICS and absolutely love the ROM I'm using (Brainmaster's stock ICS, w/ Supercharger V6 and a number of other goodies). But I was a bit confused today when I opened my phone and noticed a recently downloaded APK called "update.apk". Looking at it's info, it's name is "com.android.fixed.update" with no author, developer, and minimum version of 0. It weighs roughly 40kb and is not associated with the market, so I'm going to have to disable my "Market-only" settings in order to install it, otherwise it was about to install itself.
I was wonder what it might be. With no other information, I'm a bit hesitant to install it. The only permissions it asks for is Network Access and Start on Boot.
I thought just maybe it was an OTA from a developer (maybe even Brainmaster) but I wasn't exactly sure what kind of access or ability non-service providers had to OTA functionality and what not. (I suppose, if it can probably be modified with some effort, seeing as the source is available...)
Anyway, hoping to hear your thoughts on it. Google showed ONE result for "com.android.fixed.update" and that's it. Thanks for your input in advance!
We also got the same file on our Moto Xoom, I believe its a virus so do not install it. The file was downloaded at biandroid (dot) info which is definitely not associated with android.com
http://anonhq.com/notcompatible-back-market/
that is the explanation
Back in 2012 malware called Not Compatible was haunting android devices. Now more powerful than ever the latest version of NotCompatible.C has its own self protected encryption. Thus making this program difficult to find and delete.
Lookout Inc, a mobile security firm says that this version of the malware is a threat on a massive scale. Once in it has the tendency to control and hack data. It is an advance form of malware that can be seen on a PC a botnet so powerful that it has a server design architecture, P2P communications and as previously said encryption capabilities.
The programming of the malware is one of the hardest to kill malware that we have observed. Once the malware is installed it does not appear on the android operating system as it keeps itself in the background. It only works when the device is unlocked by the user or if it is restarted.
view
Source: Imgur
The only way you can find out is through Manage Applications>Settings. This will show you that an application by the long name of (com.andriod.fixed.update) is running. All you need to do is simply uninstall it.
Hi.
Just scanned my SGS3s ports any there is only one opened - port number 12345. I made some research and it can be netbus backdoor trojan or italk chat system? I scanned my android with avast, avg and lookout, no threats found. But I also dont have any app called iTalk Chat System.
Any clues what is this, how to trace it and close it?
Running SGS3 International, UK stock firmware 4.1.2 with root.
isillo said:
Hi.
Just scanned my SGS3s ports any there is only one opened - port number 12345. I made some research and it can be netbus backdoor trojan or italk chat system? I scanned my android with avast, avg and lookout, no threats found. But I also dont have any app called iTalk Chat System.
Any clues what is this, how to trace it and close it?
Running SGS3 International, UK stock firmware 4.1.2 with root.
Click to expand...
Click to collapse
If you Google "iTalk chat system" there's a ton of information about it, leave you to do the reading
slaphead20 said:
If you Google "iTalk chat system" there's a ton of information about it, leave you to do the reading
Click to expand...
Click to collapse
Yeaj I have done reading about it before posted, but still no clue. Google says various thing - or its a unix chat server or something with voice text to speech or VOIP. Never had installed anything like that. Is this somehow connected to genuine Android/Samsung TTS apps?
Hi friends,
I need advice on a pressing issue I am facing right now about an android app I got developed through a freelancer.
I am webmaster of a website for numerology enthusiasts. On this website, we were offering a numerology calculator (basically a combination of html pages with some javascript embeded - all compiled in an .exe format) Later, on some suggestions, we decided to prepare an Android version of this tiny program by hiring a programmer of South India. It was 2011 and the Gingerbread was the prevalent Android platform. The programmer created the App and we published it on Android Market where it is still available on playstore (search for com.namecalculator.lite on playstore and the first result 'Your Lucky Name' is the app in question.)
The problem is that this was an app which was not compatible with the later version of Android. As such, after sometimes, when the ICS version of Android was launched, the app stopped working for ICS devices. As of now, except for some old Android devices, this App is useless.
When I contacted the guy who originally developed this App, he told that the source file of the Apps were not saved by him and as such, he expressed his inability to do anything about it. He told me that if I again wanted him to develop the app for later versions of Android (like ICS, Jellybean etc), I will have to pay him the full development fee as he will have to start again from scratch.
Since my website is only a hobbyist website with negligible revenue, it was not possible for me to again hire this programmer just to develop an upgraded version of the app.
As of now, a very popular part of my website (the app) has become unavailable for its intended users. In this background, I want guidance on the following:-
(1) If an App is already built for an earlier Android version, does making it compatible with future/latest version of Android require the same amount of energy and effort which was needed when the app was developed the first time?
(2) Since the App in question is basically a compilation of html files with some javascript embeded in some pages, will it be really difficult to reconstruct the app if the source file of earlier app has been lost ?(I still have the raw html pages with me)
(3) I am not a programmer but have experience of web-designing, creating blogs etc. Can I self taught myself to create the above mentioned app by reading and following the online tutorials ? If yes, what in your opinion is the expected time an average learner (with no programming background) can do it? Also kindly point me to some good tutorials.
(4) Any other advice on the above issue some of you might be having ?
Regards
Eklavya