--%>

Platform security of S60 third Edition application

How do I know that platform security abilities my S60 3rd Edition application needs?

E

Expert

Verified

The Help documentation within the S60 3rd Edition SDKs gives general guidance on that platform security abilities are needed for different APIs. The abilities that an application needs can be confirmed into the S60 emulator. While the option "Enable EPOCWIND, OUT Logging" is chosen in the emulator and the PlatSecDiagnostics is put ON in epoc.ini, a log file is formed in the Windows "temp" folder termed as epocwind.out that has information about the abilities required. The information is a warning message signified that a capability is required.

   Related Questions in Programming Languages

  • Q : Define the term New operator Define the

    Define the term New operator: The operator employed to generate instances {instance} of a class.

  • Q : Explain Fully qualified class name

    Fully qualified class name: The name of a class, comprising any package name and including class name. The class outline is as follows:     package oddments;    class Outer

  • Q : Define Unbounded repetition Unbounded

    Unbounded repetition: The repetition where statements in a loop's body are executed an arbitrary number of times, according to the consequences of the statements in the loop's body. All of the loop control structures in the Java offer for unbounded re

  • Q : What is an Operand Operand : An operand

    Operand: An operand is an argument of the operator. Expressions comprise combinations of operands and operators. The value of an expression is determined by exerting the operation stated by each and every operator to the value of its operands.

  • Q : Define Interpretational inner class

    Interpretational inner class: It is an inner class whose role is to give a view or interpretation of data belongs to its enclosing class, however independent of the data's real representation.

  • Q : Define Context Normal 0 false false

    Normal 0 false false

  • Q : What is Datagram Datagram : It is a

    Datagram: It is a packet of information passed between the two communicating procedures across a network. Both the Transmission Control Protocol (abbreviated as TCP) and the User Datagram Protocol (abbreviated as UDP) are indirectly comprised in sendi

  • Q : Explain Counters Counter variables are

    Counter variables are commonly used in many computer applications for different purposes. Here is a typical example where a variable is used to measures the progress of some activity of interest:

    Q : What is Filter stream Filter stream :

    Filter stream: It is an input-output class which filters or manipulates its stream of input- or output-data in some manner. Two illustrations are: DataInputStream and DataOutputStream.

  • Q : Business Process Management Describe

    Describe what is Business Process Management (or BPM) in brief.