Here’s what you need to make controlling the tracking units from Back2me a doddle! Using the App simplifies tasks such as arming/disarming your protected assets or vehicles against unauthorised movement or creating a ‘Geofenced’ area that if ...Read more
Here’s what you need to make controlling the tracking units from Back2me a doddle!
Using the App simplifies tasks such as arming/disarming your protected assets or vehicles against unauthorised movement or creating a ‘Geofenced’ area that if crossed gives you an alert and position of the tracker. Over-speed alerts and other useful functions are supported too.
Tracking units and further information at www.back2me.com
Do you have a question about this app?
UPDATED ON: Jun 14, 2013
INSTALLATIONS: 50 - 100
LATEST VERSION: 1.4
REQUIRED ANDROID VERSION: 2.3.3 and up
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
full Internet access
Allows an application to create network sockets.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
precise (GPS) location
Access precise location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
discover known accounts
Allows an application to get the list of accounts known by the phone.
use account authentication credentials
Allows an application to request authentication tokens.