Skip to main content

标 题: 给你们科普几个我多年使用的安卓app

 发信人: mengzhisheng (mengzhisheng), 信区: PDA
标  题: 给你们科普几个我多年使用的安卓app
发信站: BBS 未名空间站 (Fri Apr  2 22:06:04 2021, 美东)

非常好用,不少人应该知道,这贴给小白科普。

看图: 快图。这个去找老版的,随便一个国内的应用商店就可以下,google play里面
的新版貌似加了广告。三星自带也不差。但功能不如快图多。

看视频: mx player.性能堪比pc上的任何播放器(pot player能解码的他都可以)。建
议买pro版,非常值。最好视频app没有之一。

上网:kiwi, yandex, 可以下载谷歌插件。三星自带也不错,也有一些插件可以玩。

文件管理:好用的太多了,随便挑一个顺手的就行。

听歌: 做hifi那几家的app免费给你用还没广告:fiio 或者hiby. 在线的话那就是qq和
网易云。需要买会员并且翻墙。听无损首推qq。

看youtube: YouTube vanced。

 发信人: kingoftweaks (捣鼓), 信区: PDA
标  题: Re: 给你们科普几个我多年使用的安卓app
发信站: BBS 未名空间站 (Sat Apr  3 02:03:07 2021, 美东)

文件浏览器还是老板的ES最好。播放手机里的音乐最好的是MortPlayer。听网络电台最
好的是Replaio Radio。看电视直播最好的是HDP直播,唯一的麻烦是每次要把央视和卫
视enable。计算器最好的是RealCalc,可以转换各种度量衡,二进制等。这些都没有广
告。还有Yandex和AquaMail也都是我必须装的。还有微软的RDP,AnyDesk,JuiceSSH,
DroidEdit,出门就是不带电脑心里也不慌。

 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...