I had the need to detect if a system was running 32 or 64 bit, I ended out with a solution much like the one shown below; Just create two subdirectories called X86/X64 (X86 version in X86 and X64 in X64) and then create a install.cmd in each to install either the x86 or x64 version.
----<batchfile.cmd>---------------
@Echo off
if defined ProgramFiles(x86) goto INS64
goto INS32
:INS32
Echo 32 bit installing
call x86\install.cmd
goto END
:INS64
Echo 64 bit installing
call x64\install.cmd
goto END
:END

As an addition to my previous post about the “Gemini” Android virus, here is a link to a supposedly free Android Antivirus software.

Please note, I have not checked this out personally yet so I can not vouch for it nor its effectiveness however it seems legit and professional (it is released by the folks that published news about the “Gemini” Trojan).

http://apps.talkandroid.com/apps/communication/2098-com+lookout/
https://www.mylookout.com/

UPDATE; I installed the software and ran a few basic tests, it seem to function as advertised, sadly I did not succeed in downloading the eicar test virus file so I could verify the antivirus part of the software 😐  but it does indeed scan new software installed on the phone and the locate phone also works as advertised.

Well it was just a matter of time before this happened 🙂 a trojan for Android, well I am sure that other threats exist out there for Android phones but this sounds like one of the more ‘professional’ ones.

—- from talkandroid.com —-

Today, mobile security company Lookout released some information regarding a new virus found in the wild, and it’s targeting Android phones. The virus comes to us by way of China, and has been dubbed “Gemini”. The app attaches itself to legitimate applications, such as:

  • Monkey Jump 2
  • Sex Positions
  • President vs. Aliens
  • City Defrense
  • Baseball Superstars 2010

According to Lookout:

The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five-minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server.

We will say this, however… this isn’t a giant threat. In order to get infected, you would have to install an sideload app from a 3rd party or Chinese Market, meaning the trojan doesn’t come to your phone by way of the official Android Market. So be careful out there, users, and always make sure your apps are coming from a legal, legit source. Lookout Mobile Security, however, has been updated to protect against the malware, so be sure to get it here if you aren’t already using it.

http://www.talkandroid.com/24949-new-android-trojan-virus-discovered-dubbed-gemini/