Misplaced Pages

Atrix

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

CAN: March 17, 2011 KOR: April 3, 2011

#778221

29-421: Atrix may refer to: Atrix (game) , a South Korea online action game Motorola Atrix 4G , a smartphone made by Motorola The Atrix (band) , an Irish new wave/powerpop band Topics referred to by the same term [REDACTED] This disambiguation page lists articles associated with the title Atrix . If an internal link led you here, you may wish to change

58-407: A Unix-like system, usually called init , runs with root privileges. It spawns all other processes directly or indirectly, which inherit their parents' privileges. Only a process running as root is allowed to change its user ID to that of another user; once it has done so, there is no way back. Doing so is sometimes called dropping root privileges and is often done as a security measure to limit

87-470: A fingerprint sensor, and a quarter-HD PenTile display with 24-bit graphics. It is also the second dual-core smartphone after the LG Optimus 2X . The Atrix 4G was one of the first Motorola devices to ship with its Webtop platform. When the phone is placed into its HD Multimedia Dock or Laptop Dock accessories, the user can access an Ubuntu -based desktop featuring access to the phone and its applications via

116-579: A little.". As for the kernel, it is being made "with ported code derived from a combination of sources." In August 2014, a release of CyanogenMod 11 (based on Android 4.4 "KitKat") was made available. The Motorola Atrix 2 was released in late 2011 for AT&T. This was followed by the Motorola Atrix HD in 2012. A variant called Motorola Atrix TV was released in some markets including Brazil, featuring an antenna for digital television. Other phones with Tegra 2 SoC: Superuser In computing,

145-469: A number of reasons, the sudo approach is now generally preferred – for example it leaves an audit trail of who has used the command and what administrative operations they performed. Some OSes, such as macOS and some Linux distributions (most notably Ubuntu ), automatically give the initial user created the ability to run as root via sudo – but this is configured to ask them for their password before doing administrative actions. In some cases

174-400: A process with elevated privileges. This poses a security risk that led to the development of UAC. Users can set a process to run with elevated privileges from standard accounts by setting the process to "run as administrator" or using the runas command and authenticating the prompt with credentials (username and password) of an administrator account. Much of the benefit of authenticating from

203-448: A prompt will appear to authenticate running a process with elevated privileges. Usually, no user credentials are required to authenticate the UAC prompt in administrator accounts but authenticating the UAC prompt requires entering the username and password of an administrator in standard user accounts. In Windows XP (and earlier systems) administrator accounts, authentication is not required to run

232-559: A standard account is negated if the administrator account's credentials being used has a blank password (as in the built-in administrator account in Windows XP and earlier systems), hence why it is recommended to set a password for the built-in administrator account. In Windows NT , 2000 and higher, the root user is the Administrator account. In Novell NetWare , the superuser was called "supervisor", later "admin". In OpenVMS, "SYSTEM"

261-464: Is a built-in administrator account that remains hidden when a user administrator-equivalent account exists. This built-in administrator account is created with a blank password. This poses security risks as local users would be able to access the computer via the built-in administrator account if the password is left blank, so the account is disabled by default in Windows Vista and later systems due to

290-504: Is the conventional name of the user who has all rights or permissions (to all files and programs) in all modes (single- or multi-user). Alternative names include baron in BeOS and avatar on some Unix variants. BSD often provides a toor ("root" written backward) account in addition to a root account. Regardless of the name, the superuser always has a user ID of 0. The root user can do many things an ordinary user cannot, such as changing

319-469: Is the superuser account for the OS. On many older OSes on computers intended for personal and home use, anyone using the system had full privileges. Many such systems, such as DOS , did not have the concept of multiple accounts, and although others such as Windows 95 did allow multiple accounts, this was only so that each could have its own preferences profile – all users still had full administrative control over

SECTION 10

#1732854667779

348-598: The MB860 , ME860 in Asia, or MB861 in Korea) is an Android -based smartphone developed by Motorola , introduced at CES 2011 along with the Motorola Xoom , Motorola Droid Bionic , and Motorola Cliq 2 on January 5, 2011. It was made available in the first quarter of 2011. The Atrix 4G uses a NVIDIA Tegra 2 processor, and was the first Android smartphone with 1 gigabyte of RAM,

377-413: The superuser is a special user account used for system administration . Depending on the operating system (OS), the actual name of this account might be root , administrator , admin or supervisor . In some cases, the actual name of the account is not the determining factor; on Unix-like systems, for example, the user with a user identifier (UID) of zero is the superuser [i.e., uid=0], regardless of

406-622: The Atrix 4G a 9 out of 10, commenting on its sound quality and high-resolution display. CNET gave it a 4 out of 5 stars for its sleek design and 5 megapixel camera. It won the CNET Best of CES 2011 Award in the Smartphone category, the CTIA Emerging Technology (E-Tech) award, and several other awards. When the Atrix was shipped to AT&T, root access was available, but Motorola locked

435-479: The Atrix would receive ICS. However, eventually the page was updated stating that the Atrix would not receive the ICS update, meaning that development would be extremely difficult to move forward. Eventually, developers were able to get a testing version of the incomplete AT&T ICS ROM, leading some to believe that ICS progress would move forward again. However, that build drained battery power rapidly and did not come with

464-645: The Mobile View application, integration of Android notifications into the desktop, multimedia playback through Entertainment Center, file management through Nautilus , and the Firefox web browser (along with support for Prism for the site-specific browsers used on Webtop mode). In September 2011, Motorola released the source code of the Webtop software on SourceForge . Atrix accessories announced as of October 2011 include: In June 2011 Motorola and Sprint announced

493-706: The actual root account is disabled by default, so it can't be directly used. In mobile platform-oriented OSs such as Apple iOS and Android , superuser access is inaccessible by design, but generally the security system can be exploited in order to obtain it. In a few systems, such as Plan 9 , there is no superuser at all. In Windows NT and later systems derived from it (such as Windows 2000 , Windows XP , Windows Server 2003 , and Windows Vista / 7 / 8 / 10 / 11 ), there must be at least one administrator account (Windows XP and earlier) or one able to elevate privileges to superuser (Windows Vista/7/8/10/11 via User Account Control ). In Windows XP and earlier systems, there

522-408: The bootloader by request of AT&T, meaning that custom versions of Android (ROMs) were not able to be installed. Only pseudo-roms (Not fully modified versions of Android) were available, since the kernel could not be overwritten. Many customers wrote to Motorola, including on their Facebook page, and eventually a method to unlock the bootloader was released. People began to create custom ROMs for

551-400: The damage from possible contamination of the process. Another case is login and other programs that ask users for credentials and in case of successful authentication allow them to run programs with privileges of their accounts. It is often recommended that root is never used as a normal user account, since simple typographical errors in entering commands can cause major damage to

580-642: The introduction of User Account Control (UAC). Remote users are unable to access the built-in administrator account. A Windows administrator account is not an exact analogue of the Unix root account – Administrator, the built-in administrator account, and a user administrator account have the same level of privileges. The default user account created in Windows systems is an administrator account. Unlike macOS, Linux, and Windows Vista/7/8/10 administrator accounts, administrator accounts in Windows systems without UAC do not insulate

609-467: The kernel source, meaning that it could not be used for stable development purposes. Some developers eventually developed a Jelly Bean ROM from the leak with minimal bugs. Developers then decided to build their kernel based on the Nvidia Linux 3.1 kernel. According to kernel developer Krystian, "Motorola helped the team, and give them a little boost. We cannot say they played fair, but at least they help

SECTION 20

#1732854667779

638-437: The link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=Atrix&oldid=932700176 " Category : Disambiguation pages Hidden categories: Short description is different from Wikidata All article disambiguation pages All disambiguation pages Motorola Atrix 4G Talk time Standby time The Motorola Atrix 4G (also known as

667-482: The name of that account; and in systems which implement a role-based security model, any user with the role of superuser (or its synonyms) can carry out all actions of the superuser account. The principle of least privilege recommends that most users and applications run under an ordinary account to perform their work, as a superuser account is capable of making unrestricted, potentially adverse, system-wide changes. In Unix-like computer OSes (such as Linux ), root

696-499: The ownership of files and binding to network ports numbered below 1024. The name root may have originated because root is the only user account with permission to modify the root directory of a Unix system. This directory was originally considered to be root's home directory , but the UNIX Filesystem Hierarchy Standard now recommends that root's home be at /root . The first process bootstrapped in

725-419: The phone, and eventually it gained official CyanogenMod 7 support. However, CyanogenMod support was more difficult to gain than for other phones because the Atrix shipped with uncommon features, such as WebTop support and a fingerprint reader . After CyanogenMod 7 was finished, Motorola's support pages stated that the latest version (at the time) of Android, 4.0 Ice Cream Sandwich (ICS), would be released to

754-404: The phone. This would be important for the development of CyanogenMod 9, since the existing kernel of the Atrix (based on Linux 2.6) was incompatible with Ice Cream Sandwich drivers. Though ROMs based on Ice Cream Sandwich could still be used, important features such as hardware acceleration did not work. Motorola Mobility was then acquired by Google, and the online support page still claimed that

783-589: The release on July 31 of the Motorola Photon 4G , which has a 4.3-inch (110 mm) quarter-HD multi-touch display and a 1 GHz dual-core NVIDIA Tegra 2 processor. It has an 8-megapixel rear-facing camera with 720p recording capabilities, a VGA front-facing camera for video chat and self-portrait pictures, and the Sprint ID customization app. FCC ID: IHDP56LS1 Approved January 20, 2011 The Atrix 4G received largely positive reviews from critics. Engadget gave

812-449: The system from most of the pitfalls of full root access. One of these pitfalls includes decreased resilience to malware infections. To avoid this and maintain optimal system security on pre-UAC Windows systems, it is recommended to simply authenticate when necessary from a standard user account, either via a password set to the built-in administrator account, or another administrator account. In Windows Vista/7/8/10/11 administrator accounts,

841-448: The system. Instead, a normal user account should be used, and then either the su (substitute user) or sudo (substitute user do) command is used. The su approach requires the user to know the root password, while the sudo method requires that the user be set up with the power to run "as root" within the /etc/sudoers file, typically indirectly by being made a member of the wheel , adm , admin , or sudo group. For

#778221