Skip to main content

Top 7 Must Have Applications after you Root your Android phone


Here is a list of 7 Must Have applications to install on your Android phone after you have rooted your Android phone. After reading this post you are going to wonder how did you manage to live without these applications installed on your rooted Android.
  1. Wireless Tether for Root Users : Install this application to create a WiFi adhoc network or a Bluetooth Hotspot on your Android phone to share your 3G or 2G network with your devices such as your Laptop / Netbook  or iPod Touch . It provides functionality which Mi-fi provides.screen1 200x300 Top 7 Must Have Applications after you Root your Android phone Wireless Tether Webkey Titanium Backup SQLite Editor SetCPU Rooted Root Explorer Root RomManager Phone Overclock Widget Mobile Market Enabler install CacheMate Applications Android
  2. Titanium Backup ★ root : Install this application to take backup of your installed free / paid applications, and its data, settings etc. to your SD card. It is quite useful if you have experienced the pain of installing all your applications again and over. You can also easily transfer all your applications  to a new phone with the help of  Titanium Backup.screen2 168x300 Top 7 Must Have Applications after you Root your Android phone Wireless Tether Webkey Titanium Backup SQLite Editor SetCPU Rooted Root Explorer Root RomManager Phone Overclock Widget Mobile Market Enabler install CacheMate Applications Android
  3. CacheMate for Root Users Free : Installing this application will help you clear all the cache of applications from your rooted Android phone, thus freeing up space and deleting some erroneous cache that may build up over time.screen3 200x300 Top 7 Must Have Applications after you Root your Android phone Wireless Tether Webkey Titanium Backup SQLite Editor SetCPU Rooted Root Explorer Root RomManager Phone Overclock Widget Mobile Market Enabler install CacheMate Applications Android
  4. SetCPU for Root Users or Overclock Widget : These applications can overclock or underclock your rooted phones. You can also set governor (like ondemand, powersaver, userspace, performance etc.) which will govern how frequency switching takes place. It can help you in optimizing your phone for battery life or increased speed and performance for CPU intensive tasks like Angry Birds !device4 200x300 Top 7 Must Have Applications after you Root your Android phone Wireless Tether Webkey Titanium Backup SQLite Editor SetCPU Rooted Root Explorer Root RomManager Phone Overclock Widget Mobile Market Enabler install CacheMate Applications Android
  5. Webkey (ROOT REQUIRED) : Install this application and use this app to control your Android phone from your PC or a web browser on any device(iPad, iPod, another phone, Tablet, PS3 etc.). You can do anything to your phone remotely from the web browser. You can perform tasks such as click and type on phone, get / save screenshots, download/ upload files, get GPS location, read and write SMS, export contacts, messages, call list, notify SMS /calls, terminal emulator etc.screen5 200x300 Top 7 Must Have Applications after you Root your Android phone Wireless Tether Webkey Titanium Backup SQLite Editor SetCPU Rooted Root Explorer Root RomManager Phone Overclock Widget Mobile Market Enabler install CacheMate Applications Android
  6. Market Enabler : Install this application to gain access to markets of other service providers. Like if you are in UK you can access market of T-Mobile USA using this application. Applications restricted to certain countries/ service providers can beaccessed this way. This app fakes the SIM data and gets reset with a phone restart.
  7. Root Explorer (File Manager) : Root Explorer is the ultimate file manager for root users. Access the whole of android’s file system (including the elusive data folder!). Have a look at all those mysterious files inside data folder and ability to modify them. You can use Root Explorer to delete system apps, modify system files, SQLite viewer is also included to explore the databases.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principl...

10 Steps to Become a Top Information Security Professional: A Comprehensive Guide

In 2024, the demand for skilled information security professionals is higher than ever. As cyber threats continue to evolve, organizations around the globe are in desperate need of experts who can safeguard their critical data and systems. If you're aspiring to become one of the best in the field, you're in the right place. This comprehensive guide outlines ten essential steps to help you build a successful career in information security. From foundational education to advanced certifications, hands-on experience, and continuous learning, we'll cover everything you need to know to excel and stand out in this dynamic industry. Let's embark on your journey to becoming a top-tier information security professional. 1. Foundation in Computer Science Degree : Obtain a degree in computer science, information technology, or a related field. This will provide you with a strong foundational knowledge. Programming : Learn multiple programming languages such as Python, C++, Java, a...

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત...