The password used by characters, images or string can be limited lose important data or unauthorized access to, but not necessarily absolute security.
Lock screen on Android phones.
The smart phones today are not merely listening devices called or entertainment but also a repository of data or important images. Therefore, the security device always with you always been more interested consumers. The easiest way is to create layers of protection in the lock screen to avoid unauthorized access.
The Android phones are sold largely turned on the lock screen mode. Once open the machine, the owner will have to add a slide action icon to open the machine direction. Setting default no security because it only has anti-press the wrong number calls or Open software is not as desired as to the pocket or the pocket as well as the power button is pressed accidentally right.
The way lock screen
An Android normally offers 4 types of security screen including face unlock, key figures, PINs and passwords. Users can select by going to Settings (Settings) / Security (Security) / Screen Lock (lock screen).
Unlock by 9 points in the figure (right) are used most commonly.
Unlock by face (Face Unlock) is the way in which the machine will use the front camera to identify the user (before installing the machine will require identification before). This is the type of security that users associate with the most advanced technology, but the reality is most insecure.For those trying to gain unauthorized access, just a clear photograph of the owner's computer can open easily. Moreover, in low-light conditions, the open air sometimes impossible. Therefore, the Face Unlock normally used ... for fun.
Privacy graphically (Pattern) is using your finger to slide on a network of 9 points on the screen in a certain way previously selected. This is how fast, convenient way to unlock, the only default on Android but not the best kind of security. The drawing can be easily guessed by leaving the screen fingerprint continuously drawn by a certain direction.
Face Recognition does not guarantee security.
Also, someone can easily guess that the only way the owner can draw within one to two seconds.Moreover, with minimum limits as to use 4 points, draw lines do not touch a point twice the amount of style that's not too much security as password characters. However, the fact remains that this is the way most people use for its simplicity, ease of use.
PIN is a traditional way and have the same whiff of default on the iPhone . This number must be at least 4 characters and digits must be. The disadvantage is that when you have finished typing the sequence must then click the OK button to open up the machine rather inconvenient.However, the PIN is more secure than Face Unlock or patern.
Password locks with full character left and with Pin code with the right number.
Use passwords quite similar but different PINs are possible using a combination of numbers, letters, uppercase or lowercase arbitrary. This is the most secure way, but the fact is rarely used because of its cumbersome because of a lot of time to open the machine and perform multiple tasks over again. However, it is ideal if the user wants the security of important data inside the machine.
In the absence of code memory installed, the machine will allow the account to log ingoogle (which is using the machine to sync data). If you do not enter this account previously disabled this way. Conversely, if the user to reveal password google account on the machine using the security despite any type of 4 on the way will be opened easily.
Where not remember the password can open the machine with your Google account.
Set multiple password protection can not be machine
In USA,China..., there are not many people use as a place to store important documents. Moreover, little is recorded of machine theft case because inside information assets that is largely because the value of the machine. Therefore, after the theft or machine picked up, these people are usually sold or manipulated format (put the machine back to its original state) to use.
Without wishing to see the inside information, the way to reinstall the entire machine (lose all data on the status of products sold as new) is not difficult. Just download a ROM (aka you install the operating system) from the original manufacturer and follow the steps that can later use.
Another topic on how to remove password on Android share on Xda-Developers forum.
In the case of the thief to access the device without the security code, this can sometimes be. On XDA-Developer forums are now posting some type of way to break security pattern drawings. The key to this approach is the machine to turn on USB Debugging mode so if not really necessary, users should disable this feature to prevent the worst case. Can manipulate the Settings / Options Developer with 4 or more computers running Android or Settings / Application / Development with older machines.
However, at a certain point, the new ways can be exploited to gain unauthorized access better equipment. But it can be stated that most of them are difficult to implement and may not be successful if the device does not contain important data, users can temporarily reassured.
The way of security only works with machines to help prevent unauthorized access to the online content nature as mail accounts, Facebook , Yahoo, Skype ... With content such as photos, video of the machine, then close as the machine can not use an external memory card and stored on them can be drawn due to plug another computer easily. The machine uses the memory in this case would be safer.
Post a Comment
Message from admin:
Thank you for your interest in our article.
We will proceed to consider and answer your questions
---Android Software Development Team---