send/receive mobile location information by SMS. if you are boss, you can easy kown your employee's location information. if you are parents, you can easy kown your outdoors children's location info. Functions: Send SMS Configuration. ...Read more
send/receive mobile location information by SMS.
if you are boss, you can easy kown your employee's location information.
if you are parents, you can easy kown your outdoors children's location info.
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
approximate (network-based) location
Access location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
full Internet access
Allows an application to create network sockets.
modify/delete SD card contents
Allows an application to write to the SD card.
control vibration alert
Allows the application to control the vibration alert.