As president, Ronald Reagan always had a welcoming jar of jelly beans on his desktop and there was never any doubt that the President enjoyed the nostalgia that these candies brought to his mind. This type of desktop offering is already available to those of us who use Google’s popular Jelly Bean operating system. However, as mentioned in a recent article by Eddie Ringle, Google is in the process of updating its current Jelly Bean operating system from version 4.1.2 to version 4.2. The major addition to this new version will be the inclusion of Bouncer, a software solution aimed at protecting the Android-based operating system.
Why? This is a logical question for you to ask, since hackers only used to target Windows platforms. In the good ol’ days, it was only Windows users who had to struggle with keeping their systems bug free. In order to accomplish this almost impossible feat, we paid overzealous security firms a small fortune for protection. Of course, choosing from a vast array of outlandish claims as to why its protection was always the best made our job that much more difficult. However, until recently, we in the Apple community and those using Android products had been basically immune from attack. This changed with the introduction of the Apple iPad and other tablets. In fact, it seems that the introduction of these products actually enticed the hacking community to expand its hacking abilities to include both Apple and Android products.
In response to these new challenges by hackers, the Google Nexus 10 comes with the new security-laced operating system preinstalled. Unfortunately, however, this new protection is not going to be available for Google’s Nexus 7 until some unknown date in the future.
How will this new version work? The most important feature of the new Jelly Bean 4.2 operating system is that the software will scan all third-party software in order to determine if the application is safe, and without bugs. In other words, it is designed to work like Lookout, and other current protections, but takes its protection one step higher. It is this higher level of protection that makes Google’s operating system unique. To make this claim, Google has devised a method in which it compares the software you wish to download to its database of known good applications and from there determines if that application has been tampered with.
In addition, Jelly Bean 4.2 has also incorporated a built-in SMS confirmation feature. This added feature alerts the user that an unauthorized message is waiting to be sent. The user can then determine whether the message is legitimate and if they wish for it to be sent out.
I believe that these two features are proactive and that Google should be commended for taking the necessary steps to try and protect its devices from hackers. However, I am not naive enough to believe that this system will be hacker proof because, as with any protection, hackers will eventually find a way around the security measures. I hope that the majority of us will be protected and find that Google’s new Jelly Bean 4.2 will help us to remain bug free.
Comments are welcome.
Source: Tech Source
CC licensed Flickr photo above shared by samsungtomorrow