will you keep root w/ICS?

I did the root thing there are a few updates, but am not really sure if this helped. true, I have to disable apps that I do not like SocialTouch or whatever his name, but performance and autonomy are still pretty bad. In addition, Netflix has stopped working once I anchored.

so, I think jumping the Voodoo Rootkeeper when is the update for the CSI and just go with what Lenovo gives me. any ideas on that?

You don't need to keep root iff all you want to do is disable applications. ICS will allow you to disable almost anything on the slate OS: http://blogs.computerworld.com/19435/disable_system_apps_android_ice_cream_sandwich/

Tags: ThinkPad Tablets

Similar Questions

  • How do you keep users from creating directories deeper than 260 characters of the root of the drive?

    In Windows, it seems impossible to create/join the files with a path longer than 260 characters.

    Well, not completely: you can create these files if you create a shortcut or point a reader shared inside the path, but that's exactly how this problem gets so bad: a user creates a share X: pointing to \\myserver\longdirname\evenlongerdirname\verylongdirname\etc\verylongfilename

    then it creates a file in X:\evenlongerdirnamethanYouHaveEverSeen\SuperLongDirNameJustLongEnoughToBe260FromTheRoot

    Note: the names of directories must be long, you can also create a shorter longer string of names of directories (a\b\c\d\e\f\g...)

    now, someone trying to open this file of \\myserver fail miserable. In fact, windows behaves a bit ridiculous and sometimes silently ignores files. I've seen this happen when people copy a folder of installation deep inside a fileshare: the installation program is a DVD or CD and a subscription contains 1000 directories, some are more than 260 tank when opened from the root. Then you get really weird behaviour: files ignored!

    As 260 characters was probably very well when the disks were<10GB but="" if="" you="" have="" 1="" tb="" drive,="" it's="" not="" too="" hard="" to="" end="" up="" with="" directories="" that="" are="" way="" deeper="" than="" 260="" characters.="" so="" i="" predict="" that="" there="" will="" be="" a="" time="" soon="" where="" ntfs="" needs="" to="" be="" adapted="" to="" be="" able="" to="" use="" large="" disks="" decently.="" this="" is="" also="" made="" worse="" because="" people="" create="" files="" with="" really="" bad="" names="" (e.g.="" a="" outlook="" msg="" files="" will="" be="" called="" the="" same="" as="" its="" subject="" line,="" fun="">

    Don't tell people don't do that, I see it in my everyday environment, and it breaks a lot of programs (and then the bad programmer is blamed for drawback of Windows: "you can't even open a file named a.txt")

    Question: How do you keep the users to create a file that is > 260 characters if we take into account the root of the drive, rather than a part under?

    Hi PM3.141592
     
    Your question of Windows is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public.
     

    Please ask your question in the Forums Pro Windows XP IT.

  • Update to ICS will remove my root?

    I have the 4.0.2.A.0.62 roots and I thought to check how is the Xperia ICS. I have so been woondering, upgrade to 4.1.B.0.431 will remove my root? I'm going to udate via PC Companion.

    Yes it will remove root access

    However, there is a method to the root 4.0.4 as well

  • Can you kindly stop my subscription? you keep charging me against my will, I will make official complain if you do not stop the order it.my number is the number of order AD013049762.

    Can you kindly stop my subscription? you keep charging me against my will, I will make official complain if you do not stop the order it.my number is the number of order AD013049762.

    I use PC and the accession of purchases on July 5, 2014. PLEASE STOP CHARGING ME!

    To cancel the Member please contact our support team via: http://helpx.adobe.com/in/contact.html?step=CCSN_adobe-id-signing-in_stillNeedHelp

    If you cannot use the chat nicely option, try the steps mentioned below.

    • Try a different browser.
    • Clear cookies and cache

    If you are still not able to discuss, good response with the below mentioned information.

    • OS version:
    • Browser version:

    You can also try: http://helpx.adobe.com/x-productkb/global/phone-support-orders.html

    For more information on the cancellation: https://helpx.adobe.com/x-productkb/policy-pricing/cancel-membership-subscription.html

    Atul_Saini

  • I've updated to Firefox 8, now, it will not keep Me connected to all the sites!

    Everything was beautiful and brilliant. Then I updated to Firefox 8. Now any website I want to (Amazon, Facebook, Twitter, etc.) will not keep me connected when I check the box to do so. As soon as I close Firefox and reopen it, I have to log in again, even if on some sites it's to remember my username and password (just do not keep me logged).

    I tried to delete all cookies and history and still nothing.

    Does anyone else have this problem?

    In the privacy section of the Firefox options, make sure that Firefox is configured to accept cookies and that it is not set to clear history of Firefox closing.

    (If you use the default "Remember history" then it should work fine. If you use the "customized for the history settings" setting, and then make sure that "Accept cookies" is checked and "clear history of Firefox closing is not checked.)

  • How do detect you if a person spying on your computer. How do you keep it

    I have 2 pc. You can detect if 2 pc spy remotely on pc1. If so how do you keep it

    Hi Traci,

    I can't provide technical and tactical spy, hacking methods, or how to use malware to infect a computer with programs or also in a forum dedicated to protection against such things - I don't know if it would be a violatiion of the forum (more likely) COC, but it would be a violation of my ethical principles.  There are countless methods.  I will go this far just to give you an idea (and this is more or less a "sanctioned" method used by employers and parents to monitor the activity of employees or children and not the most sophisticated hacking methods)- and I'm not recommending or suggesting this program (I almost never recommend paid software when I can usually find free options that work almost as well and I don't know anything about and) just a quick did search to find one to use as an example), but just use it as an example of what can be installed, see: http://spysoftware.com/spyagent.html which is even more powerful with a direct administrative access to your computer.

    If someone has administrative access to your computer, then it is extraordinarily difficult for anyone to detect it or prevent espionage (if done correctly).  I don't know yet I could do (detect-not necessarily in place - according to the way it was done - well well, I might be able to do it if I knew it was going on and worked on the problem until I found the culprit, but that could take days or more and some very sophisticated and software procedures may be special) , and I'm very concerned about security.  With direct access, it is just too easy to do it in a way that will be almost impossible to detect.  Depending on your operating system and how much effort you want to put into it, there are steps to take to minimize the problem.  If you are allowed to block the person who has access, it becomes even better.  If the question concerns only protect against certain types of espionage (as opposed to any type), then it becomes easier again - but even in this case, there are some guarantees if they have the same level of access (or access) and direct access to your computer.

    In some cases, using spyware on yourself (that you install to spy on your own computer) can detect other spyware activity or activities (I used successfully this particular thing before) - but there is no guarantee (as it can potentially be bypassed if anyone knows there or by using techniques that do not trigger to detect activity) - but it has sometimes proved effective (note it does not - it CAN help to) detect if things and knowing that and possibly how it is done you can take improved or maybe even effective preventive measures until the inability to spy is detected and then they would just adapt to overcome or escape from your preventive measures).

    The honest answer is that, to get the protection you want, you need to block to have this level of access to your computer (after a format and a clean install in order to eliminate what they've already done).  Once they are blocked, then the methods to use normally appear more ordinary procedures, if you knew what to look for.

    If you allow me, why you allow him to have access to your computer?  If you are trying to overcome parental control, then I will not help you and you should reconsider what you're trying to do (and even if it works, they will know that you have done and can eventually impose restrictions that greatly limit your activities and who are far worse than the spy was in the first place - that is how I would react as a parent).  If you try to overcome the employer monitoring, efforts to work around could have consequences job that you do not want to happen.  If it isn't, then why are you allowing this access and what are the rules for your ability to restrict this access somehow?   Also, is there a specific business type that you are specifically concerned about or is this activity?

    As Robert has said, it is better, if this is done in a separate thread, but if you want me to participate, at least after the link to this new thread here as an answer I cannot not otherwise it exists and it will almost certainly miss myself (although others can certainly help you as well).

    I hope this helps.

    Good luck!

    PS Instead of creating another post for your other question, see the following for an explanation of the features of keylogger: http://en.wikipedia.org/wiki/Hardware_keylogger (NOTE: it's hardware, not software since you said "peripheral").  Keylogging can be done using software as well.  For more information about keylogging devices and make sure that not all of these sites are safe (as with any general research), see the general Bing following research: http://www.bing.com/search?q=keylogger+device&PC=BB07&QS=n&first=11&FORM=PERE.

  • How do you keep a message from Inbox disappear on your laptop after you read that on the desk?

    Original title: messages received

    How do you keep a message miscare disappear at the top of a tower, after you read the desktop

    You must leave a copy of messages on the server on both machines so that both can access the messages.  Generally, a machine will delete messages after they are downloaded.  You can prevent this, but we need to know what e-mail program, you use to be able to tell you were the parameters is.  In OE and WinMail in Vista, you define which under Tools | Accounts | Mail | Properties | Advanced, but it will be in a different place for different programs.

    Steve

  • Computer XP will only keep a window active/program

    Hope I can explain it properly. My computer will only keep an active window/program. No matter if I use Word or a web browser after a minute or less my computer is switch off everything I use, the task bar will light blue and me can not enter or sroll until I click on the window with a mouse. Help, please! It's so frustrating (happened 7 times while I typed this)

    Hi SherriPilgrim,
     
    -Remember to make changes to your computer after that this problem started to happen?
     
    Increase the duration of stay in the foreground. Follow the steps to do the same thing.
     
    Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems can occur if you modify the registry incorrectly. Therefore, make sure that you proceed with caution. For added protection, back up the registry before you edit it. Then you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click on the number below to view the article in the Microsoft Knowledge Base:

    How to back up and restore the registry in Windows

    a. Click Start. Click Run, type regedit.exe and press ENTER.

    b. navigate to the following location: HKEY_CURRENT_USER\Control Panel\Desktop

    c. double-click the key "ForegroundLockTimeout. Replace the decimal notation.

    d. the default must be 200000 millisecond in decimal or 200 seconds. Click OK.

    e. restart your computer and check if the problem persists.

    For more information, see:

    ForegroundLockTimeout

  • Do you keep the updates of the years even if they are repeated

    Do you keep the updates for years even if they repeat that they are too much space.

    Updates will have only the space they need and remove only you will leave vulnerable and you will be prompted to update again anyway.

    However, you can use disk cleanup-

    Vista-

    http://Windows.Microsoft.com/en-us/Windows-Vista/delete-files-using-disk-cleanup

    This article on cleanup after the Vista SP2 may also interest you.

    http://www.Winhelponline.com/blog/free-up-disk-space-after-Vista-SP2-compcln/

  • Clock will not keep in good time

    Since the installation of windows 8 Pro (more pre-release) my clock will not keep accurate time. It's annoying because updates are not installed at the right time, but are delayed.

    Haven't tried other thing that check every time I turn it on and reset for this session.

    Help

    Thank you

    Mike

    Hi Dominic

    My apologies for the late reply to thank you.

    I finally got around to replace the mother board battery, there is no adverse reaction, somehow and we are now a very happy Bunny.

    Thank you very much.

    Mike

  • Mail application will not keep email deleted out of my Inbox

    The Mail app will not keep email deleted out of my Inbox. I remove a bunch of old email, and then it reappears in my Inbox, next time I open the Mail application.  This happens in the Mail application on all my devices: mobile phone of Nokia Surface, computer,.  The web version (Outlook.com) works correctly.  I uninstalled and reinstalled the Mail app Ant it does not solve the problem.

    Hello

    This could be a problem with the e-mail application on the computer that could request an update.

    You permanently delete emails or they are stored in the folder to be deleted?

    If the mails that remove you are not important, I suggest trying to permanently delete and check if you still find in the Inbox when you start Mail app next time.

    In mail application Windows 8 to remove the mass once emails at a time, you must hold down the ctrl key and right click on the email you want to delete. Move delete the folder and delete the emails from here too. Close the application and restart it to see if it returns back. If so, you can proceed with the following methods:

    Method 1:

    Download and run the troubleshooter modern UI App and check. Check out the link:

    http://download.Microsoft.com/download/F/2/4/F24D0C03-4181-4E5B-A23B-5C3A6B5974E3/apps.diagcab

    Method 2:

    See the help article and check that it helps.

    What to do if you have problems with a soft

    http://Windows.Microsoft.com/en-us/Windows-8/what-troubleshoot-problems-app

    Please let us know about the status of this issue.

  • How do you keep the references to lose their links in PDF files that results when they are moved?

    How do you keep references (made in InDesign) lose their links in their PDF documents resulting when PDF files are moved (i.e., posted on the web)?

    I guess that you are referring to cross-references to other documents or external files, because everything within the document will always work. You can't prevent it. It's like a link to a file or a folder on your drive HARD or on a network.

    As soon as the file or folder is changed (moved, renamed), the link is broken and useless.

  • How do you keep the projection browser title?

    How do you keep the projection browser title in the output? I did once but may not know how!

    Thanks in advance,
    Rosie

    Will do, thanks!

  • With multi tabs open I'm going to close Firefox 5.0 and it will not keep the tabs closes all tabs

    With multi tabs open I'm going to close Firefox 5.0 and it will not keep the tabs it closes all tabs so when I restart I have to reopen the tabs. I was using firefox 3.6 and had the opportunity to close, but keep the tabs so they would open when I restarted firefox.

    upgrade your browser Firefox 8 and check

  • Should you keep bluetooth on transfer work?

    I finally got discount to (sorta) work for my iPhone 6 s and my MacBook Air. What should I keep Bluetooth on for that it works, or can I disable?

    You keep BlueTooth transfer to work. But why do you want to turn off? He does use no power and does not compromise the safety of the MBA or the phone.

Maybe you are looking for