When the phone lost and the information contained in it, or contract price is so very painful, I'm sure. So when I lost my phone a little bit is meant to help you create apps. 'I need to find naehyudaeponeul' application of the friends on their cell phone has determined their specific words, including the location of their mobile phones when you were sending letters being received, who learned to master the phone easy to dial the ability to get me to pop up. ex) request to send a message - $ start $ retransmitted or used - Y $ END $ resend the message to stop transmission cycle - if you've put one above to register. $ Start $ words, when receiving the letter containing the requested information to people so you can see the location, google search URL will send latitude and longitude. This is a retransmission minutes, $ END $ containing the letter when received and retransmitted to stop, $ start $ daneogapohamdoen the moment of receiving letters and phone calls, the caller can do is create a popup window. Juwoosin phone minutes, pop-up phone call by pressing the OK button is connected. * Evil, or to turn it off to have a cell phone, USIM chips to subtract 'naehyudaeponchatahjwo' application does not mean that you are using. * This application uses the GPS feature of the handset. Therefore, the exact location inside the building may not be received. * For this application, "naehyudaeponchatahjwo" applications where the transmission of the light version is limited to three circuits.
Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
mock location sources for testing
Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers.
view network state
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.