Page 1 of 1

ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 5:35 pm
by brianzion
brys snap ‎19 ‎January ‎2011 17h32m25s.png
this works very well on the scroll :) http://www.appbrain.com/app/netqin-anti ... ivirusgm20

Re: ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 5:47 pm
by Fonefixer
I used that when I first got the Scroll, but it seemed to throw a few errors so was removed.

Re: ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 6:06 pm
by Matthew
when you take your screenshots how do u give them a shadow lol?
looks good though :D

Re: ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 7:15 pm
by Diego
There is no real need for an anti-virus on a Linux system which isn't a phone tbh

Re: ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 9:56 pm
by Warpedflash
I like lookout... :) use it on my phone as well

Re: ANTIVIRUS NetQin Antivirus Free

PostPosted: January 19th, 2011, 10:03 pm
by barrelockingnut
Sorry folks
Anyone thinking that there is some kind of dreamland virus free linux applications is deluded. There are Linux based vector virus signatures which are aimed at linux based OS . Just google "Linux Virus"

VIRUS in TABLETS ? Who says Linux was safe

PostPosted: January 20th, 2011, 1:23 am
by barrelockingnut
Feeling a little sick? According to Lookout, the makers of an Android Security and anti-virus application called myLookout there is a new Trojan that apparently is affecting Android devices in China called "Geinimi." This virus spreads by hiding in known legitimate apps, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010, and infects your tablet when you install an app that has it. More on this later in this post.

According to Lookout, “…The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five-minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes http://www.widifu.com, http://www.udaore.com, http://www.frijd.com, http://www.islpast.com and http://www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server…”

While the good folks over at Android Central and Droid Life point out that this is probably not going to ruin most Android users days as the majority of their applications installed come from the main Android Market, since a lot of the tablets we love come direct from China, and due to the fact that we are having to do a lot of hacks and workarounds to get things on our devices, we may need to be more diligent than the phone users. In order to get this Trojan you have to download and sideload an infected app through Chinese app stores. So unless you're doing that, you should be cool.

The solution? After “a much higher level of effort than usually required” Lookout has analyzed the threat and updated their app to take care of this malware. Download and install their application from either the Market or directly from them at Lookout and you should be fine.

(sources - Android Central, Android Life, Lookout, Wikipedia)