Joke Collection Website - Blessing messages - Test whether the mobile phone is monitored by SMS.
Test whether the mobile phone is monitored by SMS.
To obtain network information, you need to add the corresponding permissions in the AndroidManifest.xml file.
Connectivity Manager has four main tasks:
Monitor the network status of mobile phones (including GPRS, WIFI, UMTS, etc.). ).
Send a broadcast when the state of the mobile phone changes.
Failover occurs when the network connection fails.
Provide applications with high precision and rough status of available networks.
When we want to monitor the network status in the program, we only need to take a few steps:
Define a receiver to overload the onReceive function, and complete the required functions in it, such as changing the appearance of the space according to whether WIFI and GPRS are disconnected.
Register the receiver in the appropriate place, you can register in the program and call the following function in onCreate.
Cancel the registration of the receiver at an appropriate time, which can be cancelled in the program. Just call the following function in onDestroye.
Anti-monitoring suggestions:
If you are worried about being implanted with monitoring software by others, you can check the running software in your mobile phone to see if there are any unfamiliar programs. Even if such software is hidden, it can be found in the system, just in disguise.
To guard against this kind of embedded positioning software, you can turn off the suspected or unfamiliar software positioning permission and turn off the automatic start permission at the same time. If you are worried about being positioned by other methods, then don't click on the links sent by social software such as SMS sent by anyone. Even if you do, you will be prompted for location information. Just click Reject.
There is also positioning by mobile phone number, but this method should only be authorized by the public security department. Even illegal individuals can do it, and the cost is very expensive, usually very small.
News report: On June 5th, the British newspaper The Guardian dropped the first public opinion bomb: The National Security Agency of the United States had a secret project code-named "Prism", requiring telecom giant Verizon to hand in the phone records of millions of users every day.
On June 6th, Washington post immediately dropped the second bomb. In the past six years, the National Security Agency and the Federal Bureau of Investigation have accessed the servers of nine Internet giants, including Microsoft, Google, Apple and Yahoo, to monitor secret information such as emails, chats, videos and photos of American citizens.
- Previous article:Why does my agricultural bank card always deduct money? I am bound to my mobile phone, and I send a message every time I have less money. During this time, I always get a message saying that I have to
- Next article:Bank of Guangzhou launched self-service signing SMS. How to turn it off?
- Related articles
- Is Joe's first driver's license information accurate?
- Where can I complain about JD.COM White Stripe Explosion Address Book?
- How to check the records of four stops in Guangzhou
- How to set Huawei mate 7 not to accept SMS?
- What is the short message center number of Guangdong province number?
- Listen to frogs in the middle of the night. Tell me about the sentence that expresses the frog's cry in the middle of the night.
- When the 2s traffic correction function of telecom contract machine corrects the traffic, it is found that the short message matching failed. What is this? What should I do?
- Can I take the civil service exam after graduating from junior high school?
- A passage describing a girl's innocence and loveliness.
- Why can't my mobile phone receive the verification code sent from the Internet? When you call and answer the phone, you can receive the messages sent by others.