Can you give me some Java sample code on how to use the MX "AccessManager" profile to grant "All Dangerous Permissions" to our application - or atleast some permissions?
Which permission names can…
Intro:
These SendTo shortcuts provide a convenient and easy way to auto-generate a lockdown configuration for Zebra Android 11 (and later) devices. The lockdown is performed via Mx XML documents…
HI,
I Would like to do an entire backup of a TC52x with adb :
I used this :
adb devices
adb backup -apk -shared -nosystem -all -f backup.adb
adb restore backup.adb
other backup…
People, I need help. Somebody knows How can I resolve this error Crypto ID mismatch? I have an AirDefense model SV-4250 and when I try to put a license occour an error Crypto ID mismatch.
One WS2000 is working with AP300 in a network being used for internet browsing, but WHEN THE USER DO A CLICK ON A LINK IT RETURNS THE "INTERNET EXPLORAR CANNOT DISPLAY THE WEB PAGE" however if the…
We are testing AP6511 in some stores of a chained cafe for hotspots application. If no encryption / authentication are used, everything works ok, but when encryption / authentication are used, an…
Cisco's Rogue Detection is lame. We should never lose. We think it's full of false positives, but from Cisco's perspective... What do you mean with false positive ?A rogue AP is an AP in your…
Client side Phishing is the huge flaw in BYOD security. Ok, I'll say it, as a security professional, I don't like BYOD. It extends the attack surface, with very little if any real value. But we…
Hi All, Just wondering if anyone has run across any Motorola collateral discussing Android security with Samsung SAFE (vs. our Mx Extensions or the capabilities of our MDMs)? Thanks, Mike
We have to migrate 350 MC40s from Gingerbread to Jellybean. However, the SD card is encrypted, and on an MC40, it is a 'virtual SD card' so it cannot be physically removed. Since the SD card is…