Subject: Software Upgrade

wife-uncovered.jpg

Dear Tech Support:

Last year I upgraded from Girlfriend 7.0 to Wife 1.0. I soon noticed that the new program began unexpected child processing that took up a lot of space and valuable resources. In addition, Wife 1.0 installed itself into all other programs and now monitors all other system activity. Applications such as Poker Night 10.3Football 5.0Hunting and Fishing 7.5 and NASCAR Racing 3.6.

I can’t seem to keep Wife 1.0 in the background while attempting to run my favorite applications. I’m thinking about going back to Girlfriend 7.0, but the uninstall feature doesn’t seem to work on Wife 1.0. Please help!!

Thanks,
A Troubled User

Tech Support Answer:

Dear troubled user:

This is a very common problem that men complain about. Many people upgrade from Girlfriend 7.0 to Wife 1.0 thinking that it is just a Utilities and Entertainment program. Wife 1.0 is an OPERATING SYSTEM and is designed by its Creator to run EVERYTHING!!! It is also impossible to delete Wife 1.0 and return to Girlfriend 7.0. It is impossible to uninstall, or purge the program files from the system once installed.

You cannot go back to Girlfriend 7.0 because Wife 1.0 is designed to not allow this. Look in your Wife 1.0 manual under Warnings: Alimony & Child Support. I recommend that you keep Wife 1.0 and work on improving the situation. I suggest installing the background operation “Yes Dear 1.2” to alleviate software argumentation.

The best course of action is to enter the command C:\ APOLOGIZE because ultimately you will have to give the APOLOGIZE command before the system will return to normal anyway. Wife 1.0 is a great program, but it tends to be very high maintenance. Wife 1.0 comes with several support programs, such as Clean and Sweep 3.0Cook It 5.0, and Do Bills 4.2.

However, be be very careful how you use these programs. Improper use will only cause the system to launch the program Nag Nag 9.5. Once this happens, the only way to improve the performance of Wife 1.0 is to purchase additional software. I recommend Flowers 2.1 and Diamonds 5.0! WARNING!!! DO NOT, under any circumstances, install Secretary With Short Skirt 3.3. This application is not supported by Wife 1.0 and will cause irreversible damage to the operating system.

So before upgrading from Girlfriend 5.0 to Wife 1.0 please read first all the documentations especially the terms and conditions, this won’t clear up all the confusion but will help you adapt to the new upgrades which are hidden and bundled to Wife 1.0 such as Hergirlfriends 11.9 and it’s upgraded version from old GirlFriend 5.0 plugins such as Gossip 8.7.4 and Activitymonitoring 3.5  a hidden network sniffer, listener and tracker.

Best of luck,
Tech support

80% Of All Android Phones Are At Risk

_20140808_200944

Recently a well-known and recommended security research organization found a vulnerability in the legitimate certificate validation of the Android system. Hackers can create malicious apps to imitate trusted Android system apps such as Adobe Flash Plug-in, 3LM, etc. Malicious applications will then operate stealthily in user’s mobile devices, secretly stealing account numbers, passwords and other private information, making it a huge threat to all users.

How hackers forge trusted apps

Every Android application has its own certificate which serves as a unique identifier in the Android system, like an ID card. The Android system verifies the authenticity of an app only by referring to this ID. Once the ID is trusted, the app can carry out its operations as requested by users. Apps continue to be authenticated as long as they keep the same ID. In the real world, if one person holds the ID card of another, they can spoof that person’s identity and carry out certain transactions.

Impact of the Fake ID vulnerability

Currently the vulnerability affects devices running Android system versions from 2.1 to 4.3, which encompasses over 80% of Android users, or 100 million people worldwide.

As the Android system reports the malware as having a trusted ID, it’s difficult for the user to detect. For example, once a fake Adobe Flash ID malicious application has been verified by the system and installed on a device, it will be automatically loaded along with a browser and can then steal account credentials for online banking or social networking sites. Android will not know anything is wrong, as it thinks a trusted app is running.

Google and security vendors actively responded to Fake ID

Google published patch as soon as they discovered the vulnerability, and communicated to Samsung, HTC and other partners. At the same time they updated the Google Play app store to prevent applications that exploit the vulnerability from being added.

Users who can not update the system or install the Google Play Store are still at risk. For users who are part of this category, the CM Security Research Lab has developed a warning module and integrated it into CM Browser, Clean Master and CM Security, to provide instant protection and defense against this issue. Install Clean Master or CM Security immediately to ensure your device’s safety in real-time. As the same time surfing the web with CM Browser to prevent malicious plugins.

_20140808_200922

CM Security Researcher Lab tips:

1. Update your mobile versions to Android 4.4 and above as soon as possible.
2. Download apps from the official Google Play Store to prevent malware infection.
3. Install a reliable antivirus and keep it updated. We recommend using apps Clean Master and CM Security, which were recently awarded title of No.1 antivirus by AV-TEST for the sixth consecutive time.
4. Surfing with a secure browser .

References:

[1] http://bluebox.com/blog/technical/android-fake-id-vulnerability/
[2] https://android.googlesource.com/platform/libcore/+/android-cts-4.1_r4%5E%21/

Posted From Scorpion Sting’s Motorola Droid Maxx!