Mobile Application Development: Synchronization With a Server - Online Courses, Schools, and Other External Resour

A big part of modern applications for mobile platforms (iOS, Android, etc.) has a server part. An application with out-of-date data loses its usefulness. It is important to provide a constant data update between server and device. Situation is the same for offline applications that also need to work without internet. Completely online applications don’t work (or are useless) without internet (i.e. Foursquare, Facebook). There are their own specifics, which go beyond the current article.
More >>

As per the your problem concern I would like to say that you might want to visit Openxcell Technolabs Pvt ltd. I sure that you will get the perfect solution from experienced team.

Related

Permissions management noob trying to understand android permissions better

Hi I am trying to understand permissions management a bit better, primarily what all the different things you can block etc are. Some of the things such as Call logs, Calendar, SMS etc are self explanatory, but other things (what they are and implications of access to) such as:
Device ID
Subscriber ID
SIM serial
Phone and mailbox number
Incoming call number
Outgoing call number
Network location
List of accounts
Account auth tokens
SIM info
Network info
Is there an FAQ/Guide that explains these things in detail that someone could point me to?
Thanks,
-Gaiko
Make phone calls
Services that cost you money
This permission is of moderate to high importance. This could let an application call a 1-900 number and charge you money. However, this is not as common a way to cheat people in today's world as it used to be. Legitimate applications that use this include: Google Voice and Google Maps.
Another important point to note here is that any app can launch the phone screen and pre-fill a number for you. However, in order to make the call, you would need to press [Send] or [Call] yourself. The difference with this permission is that an app could make the entire process automatic and hidden.
Send SMS or MMS
Services that cost you money
This permission is of moderate to high importance. This could let an application send an SMS on your behalf, and much like the phone call permission, it could cost you money by sending SMS to for-pay numbers. Certain SMS numbers work much like 1-900 numbers and automatically charge your phone company money when you send them an SMS.
Modify/delete SD card contents
Storage
This permission is of high importance. This will allow applications to read, write, and delete anything stored on your phone's SD card. This includes pictures, videos, mp3s, documents and even data written to your SD card by other applications. However, there are many legitimate uses for this permission. Many people want their applications to store data on the SD card, and any application that stores information on the SD card will need this permission. You will have to use your own judgment and be cautious with this permission knowing it is very powerful but very, very commonly used by legitimate applications. Applications that typically need this permission include (but are not limited to) camera applications, audio/video applications, document applications
WARNING: Any app targeting Android 1.5 or below (possibly 1.6 as well) will be granted this permission BY DEFAULT and you may not ever be warned about it. It is important to pay attention to what version of Android an app is targeting to know if this permission is being granted. You can see this on the Market website in the right hand column.
Read contact data, write contact data
Your personal information
This permission is of high importance. Unless an app explicitly states a specific feature that it would use your contact list for, there isn't much of a reason to give an application this permission. Legitimate exceptions include typing or note taking applications, quick-dial type applications and possibly social networking apps. Some might require your contact information to help make suggestions to you as you type. Typical applications that require this permission include: social networking apps, typing/note taking apps, SMS replacement apps, contact management apps.
Read calendar data, write calendar data
Your personal information
This permission is of moderate to high importance. While most people would consider their calendar information slightly less important than their list of contacts and friends, this permission should still be treated with care when allowing applications access. Additionally, it's good to keep in mind that calendar events can, and often do contain contact information.
Read/write Browser history and bookmarks
Your personal information
This permission is of medium-high importance. Browsing habits are often tracked through regular computers, but with this permission you'd be giving access to more than just browsing habits. There are also legitimate uses for this permission such as apps that sync or backup your data, and possibly certain social apps.
Read logs / Read sensitive logs
Your personal information / Development Tools
This permission is of very high importance. This allows the application to read what any other applications have written as debugging/logging code. This can reveal some very sensitive information. There are almost no reasons an applications needs this permission. The only apps I might grant this permission to would be Google apps. The name of this permission recently changed as it came to light how important and dangerous this permission can be. Both the old name and category and the new name and category are listed above.
Read phone state and identity
Phone calls
This permission is of moderate to high importance. Unfortunately this permission seems to be a bit of a mixed bag. While it's perfectly normal for an application to want to know if you are on the phone or getting a call, this permission also gives an application access to 2 unique numbers that can identify your phone. The numbers are the IMEI, and IMSI. Many software developers legitimately use these numbers as a means of tracking piracy though. This permission also gives an application to the phone numbers for incoming and outgoing calls.
WARNING: Any app targeting Android 1.5 or below (possibly 1.6 as well) will be granted this permission BY DEFAULT. And you may not ever be warned about it. It is important to pay attention to what version of Android an app is targeting to know if this permission is being granted. You can see this on the Market website in the right hand column.
(see image above)
Fine (GPS) location
Your location
While not a danger for stealing any of your personal information, this will allow an application to track where you are. Typical applications that might need this include (but are not limited to) restaurant directories, movie theater finders, and mapping applications. This can sometimes be used for location based services and advertising.
Coarse (network-based) location
Your location
This setting is almost identical to the above GPS location permission, except that it is slightly less precise when tracking your location. This can sometimes be used for location based services and advertising.
Create Bluetooth connection
Network Communication
Bluetooth (Wikipedia: Bluetooth) is a technology that lets your phone communicate wirelessly over short distances. It is similar to Wi-Fi in many ways. It itself is not a danger to your phone, but it does enable a way for an application to send and receive data from other devices. Typical applications that would need bluetooth access include: Sharing applications, file transfer apps, apps that connect to headset out wireless speakers.
Full internet access
Network Communication
This is probably the most important permission you will want to pay attention to. Many apps will request this but not all need it. For any malware to truly be effective it needs a means by which to transfer data off of your phone; this is one of the settings it would definitely have to ask for.
However, in this day and age of cloud computing and always-on internet connectivity, many, many legitimate applications also request this.
You will have to be very careful with this setting and use your judgment. It should always pique your interest to think about whether your application needs this permission. Typical applications that would use this include but are not limited to: web browsers, social networking applications, internet radio, cloud computing applications, weather widgets, and many, many more. This permission can also be used to serve Advertising, and to validate that your app is licensed. (Wikipedia article on DRM).
View network state / Wi-Fi state
Network communication
This permission is of low importance as it will only allow an application to tell if you are connected to the internet via 3G or Wi-Fi
Discover Known Accounts
Your accounts
This permission is of moderate-high importance. This allows the application to read what accounts you have and the usernames associated with them. It allows the app to interact with permission related to that account. An example would be an app that was restoring your contact, would discover your Google account then send you to Google's login screen. It doesn't actually get to see your password, but it gets to work with the account. This is also legitimately used by applications to add contacts to your accounts, such as dialer replacements and contact managers/backup/sync/etc.
Manage Accounts
Your accounts
This permission is of high importance. This allows the application to manage the accounts on your phone. For instance it would be used by a service like Facebook to add an account to your accounts list. It seems at this time unclear if this permission allows an app to delete accounts.
Use Credentials
Your accounts
This permission is of high importance. This will allow an application authorization to use your accounts. They do this typically by giving what's called an AuthToken depending on what account you use (Google/Facebook/Yahoo/Last.fm/Microsoft/etc.). It's not as scary as it sounds however, it does typically protect your password from being seen by the application. However, it's still a very important permission you should give only with great caution.
Read/modify Gmail
Your messages
This permission is of high importance. Few apps should need access to your Gmail or email account. Email is also a prime method for managing accounts with other companies and services. For example, someone with control over your email could request a new password from your bank. While this is the worst case scenario, and there are various legitimate uses for this permission, it's still best to treat all email related permissions with extreme care.
Install Packages
System tools
This permission is of critical importance. This allows an application to install other applications on your system. This can be exploited by virus writers to install adware and malware on your system without your knowledge. It is a very, very dangerous permission and should almost NEVER be granted to a typical app. The only legitimate uses for this permission are for Market-like apps such as the Amazon AppStore or the Android Market.
Prevent phone from sleeping
System tools
This is almost always harmless. Sometimes an application doesn't expect the user to interact with the phone directly, and therefore may need to keep the phone from going to sleep. Many applications will often request this permission. Typical applications that use this are: Video players, e-readers, alarm clock 'dock' views and many more.
Modify global system settings
System tools
This permission is pretty important but only has the possibility of moderate impact. Global settings are pretty much anything you would find under Android's main 'settings' window. However, a lot of these settings may be perfectly reasonable for an application to change. Typical applications that use this include: volume control widgets, notification widgets, settings widgets, Wi-Fi utilities, or GPS utilities. Most apps needing this permission will fall under the "widget" or "utility" categories/types.
Read sync settings
System tools
This permission is of low impact. It merely allows the application to know if you have background data sync (such as for Facebook or Gmail) turned on or off.
Restart other applications
System tools
This permission is of low to moderate impact. It will allow an application to tell Android to 'kill' the process of another application. However, any app that is killed will likely get restarted by the Android OS itself.
Retrieve running applications
System tools
This permission is of moderate impact. It will allow an application to find out what other applications are running on your phone. While not a danger in and of itself, it would be a useful tool for someone trying to steal your data. Typical legitimate applications that require this permission include: task killers and battery history widgets.
Control Vibrator
Hardware controls
This permission is of low importance. As it states, it lets an app control the vibrate function on your phone. This includes for incoming calls and other events.
Take Pictures & Video
Hardware controls
This permission is of moderate importance. As it states, it lets an app control the camera function on your phone. In theory this could be used maliciously to snap unsuspecting photos, but it would be unlikely and difficult to get a worthwhile picture or video. However, it is not impossible to make malicious use of cameras.
wow, thats perfect thanx!

What is difference between the Web application testing and Client Server testing?

Testing the application in intranet (without browser) is an example for client -server.(The company firewalls for the server are not open to outside world. Outside people cannot access the application.)So there will be limited number of people using that application.
Testing an application in internet (using browser) is called web testing. The application which is accessible by numerous numbers around the world (World Wide Web.)
So testing web application, apart from the above said two testing’s there are many other testing’s to be done depending on the type of web application we are testing.
If it is a secured application (like banking site- we go for security testing etc.)
If it is an ecommerce testing application we go for Usability etc. Testing’s.

[Q] Can I stop Twitter from doing this?

1st things 1st - My device: Verizon S4 Root/Safestrap/Eclipse/Titanium Pro
Is there a way to not allow this to be done without uninstalling the TweetCaster app? I checked in the app's settings and I don't see any way to stop or not allow updates. I do have Google Play's settings at "Do not auto-update apps" - would this be sufficient? Or may Twitter go behind everyone's back and do this independently through their app and bypass Google Play? I do not want Twitter to be able to identify what apps I have or otherwise have access to my S4 to "target ads" to me.
Please note I Do Not have the Twitter app, I have TweetCaster (if it's different than the Twitter app? I don't know?) I heard facebook was doing this same BS & people deleted the app (I Do Not use FB) and am looking for a way to not allow Twitter to do this (if there is a way to). Thanks (I don't believe the last line below)
>>From Wired.com, Nov 26th<<
Twitter Plans to Peek at Your Apps to Serve You Targeted Ads
Twitter will soon identify the other apps on your phone in an effort to personalize your experience on its service—i.e. serve you targeted ads.
The company discusses the move on its website, and according to the news site Re/code, this sort of tracking will begin with a new version of its iPhone app, set to roll out on Wednesday. A new Android version that works in much the same way will roll out over the next week.
Now a public company, Twitter is exploring many different ways to boost its revenue, and one method is through better targeted ads. The company already has some personal information about those using its service—what they type into their Twitter profiles and the tweets they post—but now, it wants more. “To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in,” the company says.
In this way, it’s following the lead of Facebook and Google and so many others that seek to target ads. The difference is that Twitter doesn’t have access to nearly as much personal data as Facebook, which inherently encourages users to provide information about themselves, or Google, which operates a wide range of services atop its own mobile OS. So Twitter is reaching out into other parts of the phone, something that is easy to do. The Apple/Google mobile OSes provide ready access to information like this & many apps take advantage of this—some going much further than others.
Twitter says it will point users to its new data policy, via an in-app notification, before it starts collecting any personal information. But the new update is opt-out, which means that in order for the company to stop gathering data on your account, you must explicitly turn this data collection off. But few users are likely to do so.
Source
http://www.wired.com/2014/11/twitter-targeted-ads/?mbid=social_twitter
Lane W. said:
1st things 1st - My device: Verizon S4 Root/Safestrap/Eclipse/Titanium Pro
Is there a way to not allow this to be done without uninstalling the TweetCaster app? I checked in the app's settings and I don't see any way to stop or not allow updates. I do have Google Play's settings at "Do not auto-update apps" - would this be sufficient? Or may Twitter go behind everyone's back and do this independently through their app and bypass Google Play? I do not want Twitter to be able to identify what apps I have or otherwise have access to my S4 to "target ads" to me.
Please note I Do Not have the Twitter app, I have TweetCaster (if it's different than the Twitter app? I don't know?) I heard facebook was doing this same BS & people deleted the app (I Do Not use FB) and am looking for a way to not allow Twitter to do this (if there is a way to). Thanks (I don't believe the last line below)
>>From Wired.com, Nov 26th<<
Twitter Plans to Peek at Your Apps to Serve You Targeted Ads
Twitter will soon identify the other apps on your phone in an effort to personalize your experience on its service—i.e. serve you targeted ads.
The company discusses the move on its website, and according to the news site Re/code, this sort of tracking will begin with a new version of its iPhone app, set to roll out on Wednesday. A new Android version that works in much the same way will roll out over the next week.
Now a public company, Twitter is exploring many different ways to boost its revenue, and one method is through better targeted ads. The company already has some personal information about those using its service—what they type into their Twitter profiles and the tweets they post—but now, it wants more. “To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in,” the company says.
In this way, it’s following the lead of Facebook and Google and so many others that seek to target ads. The difference is that Twitter doesn’t have access to nearly as much personal data as Facebook, which inherently encourages users to provide information about themselves, or Google, which operates a wide range of services atop its own mobile OS. So Twitter is reaching out into other parts of the phone, something that is easy to do. The Apple/Google mobile OSes provide ready access to information like this & many apps take advantage of this—some going much further than others.
Twitter says it will point users to its new data policy, via an in-app notification, before it starts collecting any personal information. But the new update is opt-out, which means that in order for the company to stop gathering data on your account, you must explicitly turn this data collection off. But few users are likely to do so.
Source
http://www.wired.com/2014/11/twitter-targeted-ads/?mbid=social_twitter
Click to expand...
Click to collapse
I think Tweetcaster is a third party application just like Falcon doesn't have anything to do with the default twitter app. .Or you can just see if that option is listed their within the Tweetcaster application to opt out of it.

NoRoot Firewall

Disclaimer: I know nothing on how to configure firewalls except for adding apps to the whitelist/blacklist.
Tried using NRFW and I noticed a few things:
1. I've consumed 12.54GB and 9.77GB was by NRFW. What's happening please.
2. I've tagged some apps that can only connect when I'm on wifi, yet I'm still getting notifications when I'm on mobile data. For example, the Facebook app and some games.
3. How do I determine which IP address should be allowed or blocked? For example, I see IP addresses pointing to Akamai and my ISP.
4. Is it a good idea to turn off background data? I restricted it on mobile data and allowed it when on wifi but some apps would not load properly even when I'm connected to a wifi network.
Thanks in advance! And please excuse me if I posted this in the wrong forum.
EDIT: I'm referring to Grey Shirt's NoRoot Firewall.
I read up a bit and learned that 1e100.net are Google's servers. I understand that these point to ads too. I also noticed my ISP's name shows up under these.
Do I allow these or do I block them?
First of all: sorry for answering so late ;-) ...:
- in my opinion, your traffic from internet is being redirected through this NoRoot Personal Firewall unto your smartphone
- so, the 9.77GB you mentioned were 'routed/directed' through the NRPFW - the rest was not (? - maybe for Android-Updates or anything?)
- as you could most probably see, all of these 9.77GB were allowed to pass through from the internet servers (akamai or google or microsoft or ibm or yahoo or many more..) to your smartphone ('s apps / system apps)
- notifications about your mobile connection(s) MAY simply be wrong (as i found out) - seemingly a bug in the NRPFW-app (?)
- akamai is one of the " intermediate servers" or main server for a couple of websites:
for example, when you open the 'WashingtonPost'-website on your smartphone, (all) contents from their website are upon an akamai-server, because 'WashingtonPost' does not have a server on its own inside their office building maybe big enough to handle all traffic from their website to all readers in the world
- your Internet Service Provider has intermediate servers for (any) web content, too - so, you might want to allow their internet addresses
- furthermore, background data is transferred when you have an email-app and this app (gmail or yahoo-app, e.g.) is transferring data even if you had closed the email-app (so you cannot see it anymore on your launcher) or it's even running in background and checking if there's new mail when auto-started while your smartphone is booting.

Windows11: 21 services you can safely turn off

FAX — As its name suggests, this is a service needed only if you want to send and receive faxes. If you’re not going to use, which may be the case for most people, disable it.
AllJoyn Router Service — This is a service that lets you connect Windows to the Internet of Things and communicate with devices such as smart TVs, refrigerators, light bulbs, thermostats, etc. If you’re not using these or don’t connect Windows to them, go ahead and turn it off.
Secondary logon — This service lets you log on to a standard account with admin privileges and run specific applications. It is triggered to start when a program is set to ‘Run as different user’ from the extended context menu. But if you are the sole user of your PC, then go ahead and disable this.
Connected User Experiences and Telemetry — If you’re concerned with privacy and don’t want to send usage data to Microsoft for analysis, then this service is one to go. Though some would say that such assessment of data is important to improve Windows on the whole, disabling it doesn’t affect normal usage and, frankly, one less data bundle wouldn’t bring the house down.
Program Compatibility Assistant Service — Unless you’re still using legacy software on your Windows 11 PC, you can easily turn off this service. This service lets you detect software incompatibility issues for old games and software. But if you’re using programs and apps built for Windows 10 or 11, go ahead and disable it.
Device Management Wireless Application Protocol (WAP) Push message Routing Service — This service is another service that helps to collect and send user data to Microsoft. Strengthen your privacy by disabling it, it is recommended that you do so.
Windows Mobile Hotspot Service — As the name suggests, this service is needed if you’re sharing your mobile’s internet connection with your PC. But if you don’t remember the last time you connected to a mobile hotspot service, you may look to disable it entirely.
Remote Desktop Configuration and Remote Desktop Services — These two services let you connect to other PCs in the vicinity. If you don’t need remote connectivity, disable these two services.
Remote Registry — This service lets any user access and modify the Windows registry. It is highly recommended that you disable this service for security purposes. Your ability to edit the registry locally (or as admin) won’t be affected.
Touch Keyboard and Handwriting Panel Service — As the name tells, this service facilitates touch keyboard and handwriting input for touch-enabled screens. So unless you have one of those, go ahead and disable it.
Windows Insider Service — Disable this service only if you’re not in the Windows Insider program. Currently, as Windows 11 is only available through it, you shouldn’t disable it. But if you’re on the final and stable version of Windows and are not testing upcoming features, disabling it shouldn’t be a problem.
Windows Image Acquisition — This service is important for people who connect scanners and digital cameras to their PC. But if you don’t have one of those, or are never planning on getting one, disable it by all means.
Windows Connect Now — This service is mainly meant for laptops and computers that need to connect to wireless networks and devices (camera, printers, and other PCs). But if you have a desktop setup without a wireless card, you won’t need this service and can disable it safely.
Windows Defender — This may raise some eyebrows, but we’re only recommending turning this off only and only if you have an antivirus that’s protecting your system. If that’s the case, Windows Defender would virtually be inactive anyway, as the third-party antivirus would act as your primary threat protection. Disabling Windows Defender at that point would help you free up valuable resources, without compromising the security of your device.
Downloaded Maps Manager — Do you use Bing Maps? Chances are that most of you rely on Google Maps built within your favorite browser and can’t care for Bing Maps. So find this unnecessary service and make sure that it’s disabled.
Parental Control — Again, the name says it all – this service allows parents to put restrictions on what their kids are accessing on the internet. But, as with many things brought with Vista, this is obsolete if you know how to filter content for your kids on the browser itself. Also, if you don’t have any kids around, that’s an obvious reason to keep this service disabled.
Xbox Services — Do you use the Xbox app to play games? If not, then you don’t need any of the Xbox services. These include the ‘Xbox Accessory Management Service’, ‘Xbox Live Auth Manager’, ‘Xbox Live Game Save’, and ‘Xbox Live Networking Service’. These won’t affect your daily use unless you do use the Xbox app on your PC. In that case, don’t touch these.
Security Center — This is another one of those services that only advanced users should turn off. The functionalities of this service are crucial – it scans the system for issues and keeps you posted about the system’s health, including pending updates, whether or not an antivirus is installed, UAC notifications, and other such messages you receive in the system tray. If you know how to check for these issues on your own, you can disable the service without any problems. If, however, you’re not sure how to check your system’s health, leave this one alone.
Print Spooler — Connected to the printer in the past few months? If not, then this service is useless to you. Go ahead and disable it if you’re not planning on using a printer anytime soon.
Portable Device Enumerator Service — This service is needed for making group policy changes for removable drives and to synchronize content for applications like Windows Media Player and Image Import Wizard on the removable drive. If these don’t mean anything to you, go ahead and disable it. Rest assured, it won’t affect your regular thumb drive use.
Retail Demo Service — Finally, this service is only meant for vendors and retailers who have to showcase the PC and Windows features for customers. Of course, a regular user would never need to use such a service, and so can disable it without any consequences.
Complete article here
jwoegerbauer said:
FAX — As its name suggests, this is a service needed only if you want to send and receive faxes. If you’re not going to use, which may be the case for most people, disable it.
AllJoyn Router Service — This is a service that lets you connect Windows to the Internet of Things and communicate with devices such as smart TVs, refrigerators, light bulbs, thermostats, etc. If you’re not using these or don’t connect Windows to them, go ahead and turn it off.
Secondary logon — This service lets you log on to a standard account with admin privileges and run specific applications. It is triggered to start when a program is set to ‘Run as different user’ from the extended context menu. But if you are the sole user of your PC, then go ahead and disable this.
Connected User Experiences and Telemetry — If you’re concerned with privacy and don’t want to send usage data to Microsoft for analysis, then this service is one to go. Though some would say that such assessment of data is important to improve Windows on the whole, disabling it doesn’t affect normal usage and, frankly, one less data bundle wouldn’t bring the house down.
Program Compatibility Assistant Service — Unless you’re still using legacy software on your Windows 11 PC, you can easily turn off this service. This service lets you detect software incompatibility issues for old games and software. But if you’re using programs and apps built for Windows 10 or 11, go ahead and disable it.
Device Management Wireless Application Protocol (WAP) Push message Routing Service — This service is another service that helps to collect and send user data to Microsoft. Strengthen your privacy by disabling it, it is recommended that you do so.
Windows Mobile Hotspot Service — As the name suggests, this service is needed if you’re sharing your mobile’s internet connection with your PC. But if you don’t remember the last time you connected to a mobile hotspot service, you may look to disable it entirely.
Remote Desktop Configuration and Remote Desktop Services — These two services let you connect to other PCs in the vicinity. If you don’t need remote connectivity, disable these two services.
Remote Registry — This service lets any user access and modify the Windows registry. It is highly recommended that you disable this service for security purposes. Your ability to edit the registry locally (or as admin) won’t be affected.
Touch Keyboard and Handwriting Panel Service — As the name tells, this service facilitates touch keyboard and handwriting input for touch-enabled screens. So unless you have one of those, go ahead and disable it.
Windows Insider Service — Disable this service only if you’re not in the Windows Insider program. Currently, as Windows 11 is only available through it, you shouldn’t disable it. But if you’re on the final and stable version of Windows and are not testing upcoming features, disabling it shouldn’t be a problem.
Windows Image Acquisition — This service is important for people who connect scanners and digital cameras to their PC. But if you don’t have one of those, or are never planning on getting one, disable it by all means.
Windows Connect Now — This service is mainly meant for laptops and computers that need to connect to wireless networks and devices (camera, printers, and other PCs). But if you have a desktop setup without a wireless card, you won’t need this service and can disable it safely.
Windows Defender — This may raise some eyebrows, but we’re only recommending turning this off only and only if you have an antivirus that’s protecting your system. If that’s the case, Windows Defender would virtually be inactive anyway, as the third-party antivirus would act as your primary threat protection. Disabling Windows Defender at that point would help you free up valuable resources, without compromising the security of your device.
Downloaded Maps Manager — Do you use Bing Maps? Chances are that most of you rely on Google Maps built within your favorite browser and can’t care for Bing Maps. So find this unnecessary service and make sure that it’s disabled.
Parental Control — Again, the name says it all – this service allows parents to put restrictions on what their kids are accessing on the internet. But, as with many things brought with Vista, this is obsolete if you know how to filter content for your kids on the browser itself. Also, if you don’t have any kids around, that’s an obvious reason to keep this service disabled.
Xbox Services — Do you use the Xbox app to play games? If not, then you don’t need any of the Xbox services. These include the ‘Xbox Accessory Management Service’, ‘Xbox Live Auth Manager’, ‘Xbox Live Game Save’, and ‘Xbox Live Networking Service’. These won’t affect your daily use unless you do use the Xbox app on your PC. In that case, don’t touch these.
Security Center — This is another one of those services that only advanced users should turn off. The functionalities of this service are crucial – it scans the system for issues and keeps you posted about the system’s health, including pending updates, whether or not an antivirus is installed, UAC notifications, and other such messages you receive in the system tray. If you know how to check for these issues on your own, you can disable the service without any problems. If, however, you’re not sure how to check your system’s health, leave this one alone.
Print Spooler — Connected to the printer in the past few months? If not, then this service is useless to you. Go ahead and disable it if you’re not planning on using a printer anytime soon.
Portable Device Enumerator Service — This service is needed for making group policy changes for removable drives and to synchronize content for applications like Windows Media Player and Image Import Wizard on the removable drive. If these don’t mean anything to you, go ahead and disable it. Rest assured, it won’t affect your regular thumb drive use.
Retail Demo Service — Finally, this service is only meant for vendors and retailers who have to showcase the PC and Windows features for customers. Of course, a regular user would never need to use such a service, and so can disable it without any consequences.
Complete article here
Click to expand...
Click to collapse
You can also use Black Viper's recommendations as well as the script even thought it pertains to Windows 10.

Categories

Resources