Forum topic
Can you give me some Java sample code on how to use the MX "AccessManager" profile to grant "All Dangerous Permissions" to our application - or atleast some permissions? Which permission names can…
Blog entry
Intro: These SendTo shortcuts provide a convenient and easy way to auto-generate a lockdown configuration for Zebra Android 11 (and later) devices. The lockdown is performed via Mx XML documents…
SendTo
Forum topic
HI, I Would like to do an entire backup of a TC52x with adb :   I used this :   adb devices adb backup -apk -shared -nosystem -all -f backup.adb adb restore  backup.adb…
Forum topic
People, I need help. Somebody knows How can I resolve this error Crypto ID mismatch? I have an AirDefense model SV-4250 and when I try to put a license occour an error Crypto ID mismatch.
Forum topic
One WS2000 is working with AP300 in a network  being used for internet browsing, but WHEN THE USER DO A CLICK ON A LINK IT RETURNS THE "INTERNET EXPLORAR CANNOT DISPLAY THE WEB PAGE" however if…
Forum topic
We are testing AP6511 in some stores of a chained cafe for hotspots application. If no encryption / authentication are used, everything works ok, but when encryption / authentication are used, an…
Forum topic
Cisco's Rogue Detection is lame.  We should never lose.  We think it's full of false positives, but from Cisco's perspective... What do you mean with false positive ?A rogue AP is an AP in…
Forum topic
Client side Phishing is the huge flaw in BYOD security.  Ok, I'll say it, as a security professional, I don't like BYOD.  It extends the attack surface, with very little if any…
Forum topic
Hi All, Just wondering if anyone has run across any Motorola collateral discussing Android security with Samsung SAFE (vs. our Mx Extensions or the capabilities of our MDMs)? Thanks, Mike
Forum topic
We have to migrate 350 MC40s from Gingerbread to Jellybean.  However, the SD card is encrypted, and on an MC40, it is a 'virtual SD card' so it cannot be physically removed.  Since the SD…