วันอังคารที่ 15 มกราคม พ.ศ. 2556

Android too slow, even on quad-core? XDA developer releases a patch "miraculous"

Found and resolved the cause that causes lag and slowdowns more or less evident on all Android devices released in the last 6 years, even the most recenti.Pronti to put the turbo robot green?

Android too slow, even on quad-core? XDA developer releases a patch

The users who use Thunderbird as your email program on your computer are now many. Some of them also make use of the book, maybe that is the same as Gmail kept up to date by synchronizing.

Well, some time ago I received a call from a friend who complains about the presence of a long series of addresses in his address book. After a series of questions to understand the problem, I discovered that he was referring to the collected addresses which can be accessed from the Address book.

What are

Addresses collected Thunderbird, along the lines of those of Gmail, Thunderbird are all those who took part because we used them as recipients of our emails or have received emails from senders not listed in the phone book and chose to view remote images.

These are the two cases where Thunderbird saves an address in this list, independent of our personal address book. If neglected, this list may become very extensive, as shown by the arrows in the image above.

How to get rid of

Avoid this unwanted rescue of the address is simple. Let us go through the options button in the upper right. We click and then click Composition and then the Addresses.

We click on the Automatically add outgoing e-mail recipient to so that there is no check mark.

After you have done this and confirmed with Ok, we can proceed to the manual emptying the list of addresses collected, but we're not done.

Disfiamocene forever

In fact, the process is not yet complete. First, in fact, as I pointed out are two circumstances in which the addresses are automatically added to the list. One is the outgoing, the other is made from images. To ensure that images are always loaded and the address is not added to the directory, we need to make a change to the advanced configuration of Thunderbird. Let's move on the Advanced and click on Configuration Editor.

We confirm the will to void the warranty and try remote_image in the text field.

At this point, double-click on the only result of this work will take the value from true to false.

It should be noted, however, that with this method the images of emails from recipients in the address book will always be shown. In this case, therefore, if you usually receive numerous phishing emails, you should not enable this configuration because of the risk you take in automatically upload images which may contain malicious code.

Also if you decide to proceed, this change will complete the process and from now on you will not have to worry about the addresses collected Thunderbird.

The users who use Thunderbird as your email program on your computer are now many. Some of them also make use of the book, maybe that is the same as Gmail kept up to date by synchronizing.

Well, some time ago I received a call from a friend who complains about the presence of a long series of addresses in his address book. After a series of questions to understand the problem, I discovered that he was referring to the collected addresses which can be accessed from the Address book.

What are

Addresses collected Thunderbird, along the lines of those of Gmail, Thunderbird are all those who took part because we used them as recipients of our emails or have received emails from senders not listed in the phone book and chose to view remote images.

These are the two cases where Thunderbird saves an address in this list, independent of our personal address book. If neglected, this list may become very extensive, as shown by the arrows in the image above.

How to get rid of

Avoid this unwanted rescue of the address is simple. Let us go through the options button in the upper right. We click and then click Composition and then the Addresses.

We click on the Automatically add outgoing e-mail recipient to so that there is no check mark.

After you have done this and confirmed with Ok, we can proceed to the manual emptying the list of addresses collected, but we're not done.

Disfiamocene forever

In fact, the process is not yet complete. First, in fact, as I pointed out are two circumstances in which the addresses are automatically added to the list. One is the outgoing, the other is made from images. To ensure that images are always loaded and the address is not added to the directory, we need to make a change to the advanced configuration of Thunderbird. Let's move on the Advanced and click on Configuration Editor.

We confirm the will to void the warranty and try remote_image in the text field.

At this point, double-click on the only result of this work will take the value from true to false.

It should be noted, however, that with this method the images of emails from recipients in the address book will always be shown. In this case, therefore, if you usually receive numerous phishing emails, you should not enable this configuration because of the risk you take in automatically upload images which may contain malicious code.

Also if you decide to proceed, this change will complete the process and from now on you will not have to worry about the addresses collected Thunderbird.

Some time ago, MegaLab.it dealt Execution automatic as possible to start programs with the computers when they do not have the right to do so themselves.

This procedure, however, requires the creation of a link (even within the same directory Autorun) application we are interested in because you can not "copy" the application directly involved (unless is a standalone application).

In addition, there is no way to set the start "once" because the program will continue to start at the same time every time you turn on your computer. Finally, users will see the files directly into the startup folder "Startup" in the Start menu.

These reasons lead me to desist: copy a file to make it run automatically start with the computer, in my opinion, is not always the best solution.

Before proceeding, I should like to point out that the above reasons should not force you to not use this method if you know a priori that the file that you want to start automatically weigh the benefits if you do not want (or can not) use the register, copy the link into autorun is surely preferable to the proceedings. As below is more suitable for those who prefer to work with the registry rather than creating application links in folders.

Then introduce the method with the system registry, which varies depending on the behavior you want to achieve.

Open the registry

Now you know who is the protagonist, so with the keyboard shortcut Win + R will open the window Run where data typed regedit followed by Sending.

The method, in my opinion, best to complete this procedure is to ask questions.

The current user or all users?

Especially in a business setting where you use the multi-user must know where to act:

[Tt1] for all users HKEY_CURRENT_USER for the current user

Once you have established the intervention area and open the key on, open the keys until you get to SOFTWARE Microsoft Windows CurrentVersion. For the moment, let's stop here.

Start at one time or forever?

At this point we must understand if we want to do is to always or only once. If, on your home computer, this thing seems quite insignificant (the answer is obviously "always") within the company the issue might be different. Think for example, system administrators who, after making major changes, they need to run a command file to the next authentication. In this case, they have an interest that the file is executed once and then "forgot".

When we set this too, we will open:

The key Run if the file must be sent to each authentication The key RunOnce if the file should start once

Once you have a route in the form HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Run (which would start as a permanent program for the current user), we are ready to proceed and to create value.

The users who use Thunderbird as your email program on your computer are now many. Some of them also make use of the book, maybe that is the same as Gmail kept up to date by synchronizing.

Well, some time ago I received a call from a friend who complains about the presence of a long series of addresses in his address book. After a series of questions to understand the problem, I discovered that he was referring to the collected addresses which can be accessed from the Address book.

What are

Addresses collected Thunderbird, along the lines of those of Gmail, Thunderbird are all those who took part because we used them as recipients of our emails or have received emails from senders not listed in the phone book and chose to view remote images.

These are the two cases where Thunderbird saves an address in this list, independent of our personal address book. If neglected, this list may become very extensive, as shown by the arrows in the image above.

How to get rid of

Avoid this unwanted rescue of the address is simple. Let us go through the options button in the upper right. We click and then click Composition and then the Addresses.

We click on the Automatically add outgoing e-mail recipient to so that there is no check mark.

After you have done this and confirmed with Ok, we can proceed to the manual emptying the list of addresses collected, but we're not done.

Disfiamocene forever

In fact, the process is not yet complete. First, in fact, as I pointed out are two circumstances in which the addresses are automatically added to the list. One is the outgoing, the other is made from images. To ensure that images are always loaded and the address is not added to the directory, we need to make a change to the advanced configuration of Thunderbird. Let's move on the Advanced and click on Configuration Editor.

We confirm the will to void the warranty and try remote_image in the text field.

At this point, double-click on the only result of this work will take the value from true to false.

It should be noted, however, that with this method the images of emails from recipients in the address book will always be shown. In this case, therefore, if you usually receive numerous phishing emails, you should not enable this configuration because of the risk you take in automatically upload images which may contain malicious code.

Also if you decide to proceed, this change will complete the process and from now on you will not have to worry about the addresses collected Thunderbird.

Some time ago, MegaLab.it dealt Execution automatic as possible to start programs with the computers when they do not have the right to do so themselves.

This procedure, however, requires the creation of a link (even within the same directory Autorun) application we are interested in because you can not "copy" the application directly involved (unless is a standalone application).

In addition, there is no way to set the start "once" because the program will continue to start at the same time every time you turn on your computer. Finally, users will see the files directly into the startup folder "Startup" in the Start menu.

These reasons lead me to desist: copy a file to make it run automatically start with the computer, in my opinion, is not always the best solution.

Before proceeding, I should like to point out that the above reasons should not force you to not use this method if you know a priori that the file that you want to start automatically weigh the benefits if you do not want (or can not) use the register, copy the link into autorun is surely preferable to the proceedings. As below is more suitable for those who prefer to work with the registry rather than creating application links in folders.

Then introduce the method with the system registry, which varies depending on the behavior you want to achieve.

Open the registry

Now you know who is the protagonist, so with the keyboard shortcut Win + R will open the window Run where data typed regedit followed by Sending.

The method, in my opinion, best to complete this procedure is to ask questions.

The current user or all users?

Especially in a business setting where you use the multi-user must know where to act:

[Tt1] for all users HKEY_CURRENT_USER for the current user

Once you have established the intervention area and open the key on, open the keys until you get to SOFTWARE Microsoft Windows CurrentVersion. For the moment, let's stop here.

Start at one time or forever?

At this point we must understand if we want to do is to always or only once. If, on your home computer, this thing seems quite insignificant (the answer is obviously "always") within the company the issue might be different. Think for example, system administrators who, after making major changes, they need to run a command file to the next authentication. In this case, they have an interest that the file is executed once and then "forgot".

When we set this too, we will open:

The key Run if the file must be sent to each authentication The key RunOnce if the file should start once

Once you have a route in the form HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Run (which would start as a permanent program for the current user), we are ready to proceed and to create value.

Except Nexus targati Google, on the other Android device seems very little optimized, especially in versions customized by manufacturers (almost a counter sense, since that should be maximized to fit any smartphone).

Had not previously been found the cause of these perennial "slow" and "lag" the UI or app, very apparent even on high-end devices: Samsung Galaxy SIII see a slow down after the expenditure for it is not , a satisfying experience.

Monstrous quad-core CPU, lots of RAM, GPU worthy of a PC .... totally ruined by poor optimization software side of Android!

The situation is even more tragic on devices with older or limited hardware, where only the use of custom ROM and custom kernel can make it less frustrating loss of performance of their devices.

But what is the cause of these sudden slowdowns?

Until now it was not known, but a skilled programmer XDA Developers forum has "ransacked" between the code of Android and its components, finding the culprit is the Java Virtual Machine (JVM) that runs many graphical elements (or not) of 'interface and app.

Here is the official technical explanation:

"So, I was experiencing significant lag as we all do from time to time, and Decided I was going to get to the bottom of it.After tracing and debugging for hours, I discovered the source of 90% of Android's lag. In a word, entropy (or lack thereof). Google's JVM, like Sun's, reads from / dev / random. For all random date. Yes, the / dev / random That uses a very limited entropy pool.Random date is used for all kinds of stuff .. UUID generation, session keys, SSL .. When we run out of entropy, the process blocks. That manifests itself as lag. The process can not continue until the kernel more December Generates high quality random data.So, I cross-compiled rngd, and used it to feed / dev / urandom into / dev / random at 1 second intervals.Result? I have never used an Android device this fast. "

In other words, the Java Virtual Machine this on our devices use an amount of data generated randomly, which are stored in the / Dev / random: these values ​​produced randomly (just called entropy pool) are often the operating system and are used by almost every app, widget or whatever runs on Android.

Such data is deleted after a certain period of time.

Any app or Android element that requires such data must "ricrearseli" from scratch, precisely because it is no longer available: this generates a "lag" more or less visible.

This bug affects Android from birth, and can be found on any device product into circulation, even on the Nexus (where, however, the high optimizations made by Google masking the problem very well).

It does not count the RAM or the number of available cores in the CPU with 20 cores and 6GB of RAM, the Android system on time will slow down in a conspicuous in some circumstances (many apps that require simultaneous access to the data in / Dev / random and, not finding them, clogging the system.)

What is the solution found by the developer?

He rebuilt the daemon rngd (random number generator) to Android to make sure that ripopoli through high entropy, / Dev / random at intervals of one second, compared to several seconds required with the default settings.

In this way the folder is always full of data, ready to be used (in reality is however emptied, but remains empty for a few fractions of a second).

The apps (as well as anything else that runs on Android) are already all the data that needed, without "having to do for itself," an astonishing way in improving the responsiveness of the system.

The developer has released the APK his seeder entropy for free download from its reference topic. (I recommend to take the version 1.4.0, the last release).

The application must always be active, so that efficace.Consigliata activation dell'autorun.

NOTE: The application requires root permissions to run correctly.

NOTE 2: Some users report an increase (albeit minimal) in battery consumption with the app running permanently.

NOTE 3: Some users, security experts point out the inherent danger of getting the folder / Dev / random always full of data. The risk of exploitable and 0day exploits targeted increases in a concrete way (although at the moment there is no threat that can exploit the amount of data).

But does it really? It is the classic miraculous app that actually creates a "placebo effect"?

Here's my personal experience:

I was very skeptical about this latest app, having tried pretty much everything to make usable my low-profile smartphone, the Motorola Defy +.

I had already installed CyanogenMod 7.2 and custom kernel, hoping that the situation would improve .... there have been improvements, but the lag was always and everywhere present, even in the menus and opening contacts and messages.

Now I have (had) used to it.

Always with great skepticism, I decided to try this app.

After clearing antivirals (you never know!), I decided to install it, setting it in autostart and start the generator of entropy.

Aware of changes made to decide to restart.

From that moment my old smartphone is reborn!

Fluidity crazy menus and scrolling, app that open to the air, voluntarily fill the RAM but no noticeable lag, even open 6-7 applications at a time and leave them in the background .... the system remains very usable.

I saw a fluidity that I have found only on the Nexus, with very different hardware.

I could not try the app on high-end devices, but the results will almost certainly spectacular (always with the proper proportions, a high-end device will be more quickly and smoothly low-profile device, regardless of whether the patch or not).

The app seems to get the best results right on the device in need of a "push".

Do a test and enter your feedback in the comments field.

See Pictures and Read more : Android too slow, even on quad-core? XDA developer releases a patch "miraculous"

ไม่มีความคิดเห็น:

แสดงความคิดเห็น