Frequently we are faced with this when browsing the web on Android: Do we set a default browser to always use when following links, or should we never set a default and just choose which one we want every single time? Either choice has pitfalls for privacy, history tracking or specific web site feature.
By using jurl as your default browser it will offer you both options. It queries Android for all the installed web browsers and shows them to you in a list to choose from with the ability to set a time-out period before launching a default browser. As a bonus you get to see the URL you are following above this list to make a more informed decision on what browser you'd like to use.
In addition to being a browser target, jurl is also a SEND target. This allows you to avoid the task of copying the URL, launching a new browser, and pasting that URL into the address bar. From one browser you can send that web page to any other browser on your Android device by using the browsers standard share feature and choosing (Switch with jurl).
Some specific use cases jurl was created for:
* Managing browser history: I like to track everything I do for development in Chrome, but for personal items I may want to use Firefox, Dolphin, or Opera.
* Adobe® Flash®: Encountering a web page in browser that doesn't support it isn't always the most user-friendly, so send it to another browser where it is: like Firefox.
* App to browser: Sending an applications view of web-based information, such as the IMDB app, to a web browser. If the sent data contains a valid URL jurl will extract it and let you open it in a browser of your choice.
What's on the table for the next release?
* URL Expanding: Take shortened URLs and display the actual target in the URL text.
* Customized Browser List: Choose from the default alphanumeric sorting, sort by frequency of use, or custom ordering.
Stop worrying about web pages wiping your phone, check them out with LinkBuster first!
"The web is a nasty place. Plenty of folks want to make things miserable for others, and we have to be on guard against it. Tools like LinkBuster can help. It's free, so give it a try!" -androidcentral
- Expose shortened links
- Works with all URL shortener services
- Gives a security report on non-shortened URLs as well
- Open LinkBuster when clicking a link
- Manual link entry
- Full Web of Trust security report
- Open the web page directly from LinkBuster after you verify it's safety
Expand Urls, Expose, Lengthen, Long, tinyurl, bitly, goo.gl, security, safety, malware protection, Link, Buster
ShortLink shortens your links and returns a URL which have been shortened by one of it's supported services. It also generates a QR code which you can share with your friends if need be. With this app you can easily pass links/URL's from other apps into this app, shorten in, and quickly share them through other apps such as facebook, twitter, email etc.
Stores the shortened link history on your phone for easy access. If need be, it can also be cleared.
Currently supports the following providers:
Do you miss a provider? Let me know and I'll see what i can do.
* Log in to the providers which supports it
* Click statistics
* Loads of other nifty stuff
Easily shorten and share those hideously long URL's that are found all over the Web.
As an added bonus now you can expand those shady looking URL's before you dive head first into unknown worlds.
Powered by Google's Goo.gl URL shortener.
ShrtnR is a work in progress, and more features are being added.
Google+ Community: https://plus.google.com/u/0/communities/113684862589120580510
As of May 2013, Google has discontinued its SMS service.
Support queries for Search, Web Snippets, Local, Airports, Area Codes, Calculator, Currency Conversion, Directions, Flights, Glossary, METAR, Maps, Movies, Products, Q&A, Sports, Stocks, Translation, Weather and Zip Codes.
NoUSSD will intercept all USSD codes and give you the choice to not dial them. Regular phone numbers will be sent automatically to your favorite dialer.
Please visit this test page on your device:
If it causes your device's dialer application to display *#06# then you are NOT vulnerable and there is no need to install NoUSSD.
For more information, please read:
NoUSSD requires no special permissions and is open source.