Ask Sawal

Discussion Forum
Notification Icon1
Write Answer Icon
Add Question Icon

What is zpub.res android?

3 Answer(s) Available
Answer # 1 #

The best defense against any of your gadgets becoming flooded with malware has always been personal vigilance. Beware, there are dangerous apps hiding on Google Play Store. android framework res zpub failed to install.

[30]
Edit
Query
Report
Sai Anand
Title Examiner
Answer # 2 #

Here's what you need to know about stalkerware and how you can protect yourself from it.

Stalkerware refers to invasive programs installed on your computer or mobile device that enable the installer to spy on your online behaviors without your knowledge. A parent spying on their kid is the mildest form, but when it’s done secretly, without your child’s knowledge, it can erode trust and cause your kid to feel violated. The creepiest form it takes is with jealous exes, suspicious spouses or even your employer tracking everything you do.

Stalkerware can run secretly in the background on computers, phones and other handheld devices, collecting a slew of data for the spy to peruse. FlexiSPY (https://www.flexispy.com/) is the most common spy software, but it's certainly not the only one.

Think about how much you do on your phone: Texting, pictures, web searches, health and fitness tracking, etc. GPS location services on your phone can even allow a program like this to track where you are at all times. Scary stuff.

One reassuring note is that it's relatively difficult to install this sneaky software on someone's device. It typically requires physical access to the computer, phone or handheld device. While there are some rare cases where the software can be installed through a virus, like an infected link you click on in an email or on a website, this is a much less common infection method.

Despite the fact that stalkerware transmission via email or weblink is rare, you should be suspicious of links you receive through email or social media. We recommend never clicking on unsolicited links.

Think you may be infected? Here are some things to consider:

1. Has someone like a jealous ex, employer or suspicious spouse had un-monitored access to your phone or computer?

2. Have you noticed performance issues such as unusual slowness, crashes, programs glitching or your battery draining faster than usual?

On your computer, look for applications running in the background that you don't recognize. Windows users, right-click on the taskbar and choose Task Manager to see the list of programs currently running. Mac users, launch Activity Monitor from Spotlight. If you find any programs in the list that you don't recognize, do some research on what they are before you disable them, so you don't deactivate something that's critical to your computer's function.

Lock down any program accessing your webcam without your explicit permission. Windows users can go into Settings under Privacy and Camera and toggle off anything you don't approve of. Mac users can install a program called Oversight (https://objective-see.com/products/oversight.html). With it, you'll be notified whenever your Mac's microphone is activated and when any program accesses your webcam.

If you think it's possible that your mobile phone has been infected, there are a few things you can check. For iPhone users, most secret monitoring requires your phone to be “jailbroken.” Check your phone for an application called Cydia. If your iPhone is running an old version of iOS that cannot be updated, that could be an indication that your phone has been compromised.

Android users may have apps from unknown sources enabled. Under Settings --> Security, you can see whether  "unknown devices" has been toggled on.

To get rid of cell phone monitoring, the easiest way is to perform a factory reset on your phone. This will overwrite any jailbreak programs and reset all your security settings back to their original configuration. Just be aware that you'll lose all the data on your phone too, so make sure you back up your pictures and contacts before you do it.

On your computer, FlexiSPY can be eliminated using the FlexiKiller Tool (https://ops.securitywithoutborders.org/flexispy/). The website has explicit instructions about how to detect and remove it for both Windows and Mac users, so follow the directions carefully.

As always, you should be running up-to-date antivirus and anti-malware scanners. Windows users can utilize Microsoft Safety Scanner (https://www.microsoft.com/en-us/wdsi/products/scanner) to find and remove malware. It only scans when manually triggered, so install and run it if you think you may be infected.

More common than stalkerware is someone logging into your email or social media profiles without your permission. If you suspect this is happening, change your passwords immediately. Also change any accounts with the same password. Enable multi-factor authentication wherever it's available so that you will be automatically notified when someone tries to access your account from an unknown device.

Google users can see which computers and phones have recently accessed their Gmail account under Device Activity and Notifications here: https://myaccount.google.com/. Facebook users can check their active Facebook sessions under Settings at https://www.facebook.com/settings. Click on Security and Login at the upper left-hand corner of your screen. Once you see the list of "Where you're logged in," click on "See More" to see historical logins on your account. Click on the ... and log out of any active sessions that you don't recognize.

[3]
Edit
Query
Report
zvqomb Henry
FUR CUTTER
Answer # 3 #

Pub/Sub notifications provide a way for you to receive alerts about newly enrolled devices, device reports, and recently issued commands.

To set up Pub/Sub notifications, you need to enable the Pub/Sub API and create a topic. To receive messages published to a topic, create a subscription to that topic. The subscription connects the topic to a subscriber application that receives and processes messages published to the topic. After you create a subscription, you need to grant Android Device Policy permission to publish to your topic.

For instructions on how to enable the Pub/Sub API, see the console quickstart guide. Ensure that you select the same project that the Android Management API is enabled for.

After enabling the API, you need to create a topic that Android Device Policy can publish notifications to. There are two ways to create a topic:

a. Manually in the Google Cloud Platform Console. b. Using the Pub/Sub API (see create topicmethod).

After creating a topic, take note of the topic name.

A subscription captures the stream of messages published to a given topic. There are two ways to create a subscription:

a. Manually in the Google Cloud Platform Console. b. Using the Pub/Sub API (see create subscription method).

You need to give android-cloud-policy@system.gserviceaccount.com permission to publish to your topic. There are two ways to grant publishing rights:

a. Manually in the Google Cloud Platform Console.

b. Using the Pub/Sub API (see Access Control via the Google Cloud Pub/Sub IAM API)

To connect notifications about an enterprise to the topic you created, call enterprises.patch and specify the following parameters:

A subscription can use either the push or pull mechanism for message delivery. Guidelines and directions on how to receive notifications through both of these mechanisms are available in the Pub/Sub Subscriber Guide.

Messages take the form of a PubsubMessage. The attributes field of the message contains an attribute with key notificationType and value set to the notification type that triggered the message (e.g. ENROLLMENT). The data field of the message contains the JSON representation of the resource that was updated, encoded as a UTF-8 string. The notifications and their corresponding resource types are as follows:

When setting the pubsubTopic on an Enterprise, an initial message will be published with notificationType set to test. This message is sent to verify Android Device Policy has the publish permission on the topic and should be ignored.

[2]
Edit
Query
Report
Nisha zvjwnsok
TRUST VAULT CLERK