Requesting and Requiring Permissions


In the late 1990s a wave of viruses spread through the Internet, delivered via email, using contact information culled from Microsoft Outlook. A virus would simply email copies of itself to each of the Outlook contacts that had an email address. This was possible because, at the time, Outlook did not take any steps to protect data from programs using the Outlook API, since that API was designed for ordinary developers, not virus authors.


Content Provider Contact Data Direct Child Permission Rule Intent Receiver 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Mark L. Murphy 2009

Personalised recommendations