SlideShare a Scribd company logo
1 of 18
Hello Friends….
Hacking
Web Designing
Android
Topics
Android
Android Inc. was founded in Palo Alto, California in
October 2003 by Andy Rubin, Rich Miner, Nick Sears, and
Chris White.
Android is a mobile operating system developed
by Google, based on the Linux kernel and designed
primarily for Touch Screen mobile devices such as Smart
Phones and Tablets.
Versions of Android
1. Alpha (Astro)
2. Beta (Blender)
3. Cupcake
4. Donut
5. Éclair
6. Froyo
7. Ginger Bread
8. Honey Comb
9. Ice-Cream Sandwich
10.Jelly Bean
11.KitKat
12.Lollipop
13.Marshmallow
14.Nougat
15.Oreo
Features of Android
 Messaging
 Web browser
 Voice-based features
 Multi-touch
 Multitasking
 Screen capture
 TV recording
 Video calling
 Multiple language support
 Accessibility, etc
Advantages:
 The Permission for Everyone to customize the Google Android Platform.
 It gives you better notification.
 It lets you choose your Hardware
 It supports all Google Services.
Advantages & Disadvantages
Disadvantages:
 Android Market is less control of the Manager, sometimes there are
malwares.
 Battery drains faster because, OS supports lot of Background
Processes.
 Very Unstable and often Hang or Crash.
 Lifetime is less than a normal Mobile phone.
Hacking
There are number of Definitions for Hacking but the
following will be easier to understand:
 Hacking is the Unauthorized access to a Computer or a
Network without the knowledge of User.
 Hacking is a process to hack a network using some
computer
commands or software for a Legal or Illegal Action.
Who are Hackers ??
“Hackers” are those guys who use some Special Commands, Tricks,
Coding, software, etc to hack or to gain access to an Network.
Can anyone guess Why do People do Hacking?
For Revenge…
For Fun…
For Showoff….
For Warning…
Etc….etc….
Warning ….sounds weird…??
Have you Guys Heard About Anonymous Hackers…??
Anonymous
We are Anonymous. We are Legion. We
do not Forgive. We do not Forget.
Expect Us.
Who are Anonymous..??
On the Road of becoming a HACKER it would be
hard not to come across the name “Anonymous”
that is, The “Anonymous Hacktivist
Group/Organization”.
Anonymous is a Global Hacktivist Network
consist of Teenage Hacker to Cyber Security
Expert.
They are mainly known for their “Criminal
Activities” like organizing DDOS Attacks,
Leaking Confidential Information, etc.
Types of Hackers
 Script Kiddies: Script Kiddies means the People, usually
teenagers/Students who tries to perform Hacking
Activities by the information provided by the Google. Don’t
be one of them.
 Black Hat Hackers: Black Hat Hackers are those
Hackers who commits Illegal Activities.
 White Hat Hackers: White Hat Hackers are the
Authorized Hackers means, they are Cyber Security
Experts who works for the Government or Company to
Protect the Information from the Black Hat Hackers.
 Grey Hat Hackers: Grey Hat Hackers are those who
Works Legally and Illegally too, depending upon the
situation.
 Hacktivists: They are the Hackers who use their
Hacking Skills for Protesting against injustice.
Internet Of Things
Internet of Things (IoT) is an ecosystem of connected physical
objects that are accessible through the internet. The ‘thing’ in IoT
could be a person with a heart monitor or an automobile with built-
in-sensors, i.e. objects that have been assigned an IP address and
have the ability to collect and transfer data over a network without
manual assistance or intervention.
Applications of Internet Of Things
 TrafficMonitoring
 Health
 Security
 TransportandLogistics
 DailyLifeandDomotics
 SmartHomes
 SmartPhones
 Wi-Fi,etc
Advantages & Disadvantages
Advantages
 Communication: Machine-to-Machine (M2M) communication.
 Automation and Control: Without human intervention, the machines are
able to communicate with each other leading to faster and timely output.
 Efficient and Saves Time: The machine-to-machine interaction provides
better efficiency, hence; accurate results can be obtained fast. This results in
saving valuable time.
Disadvantages
 Compatibility: Currently, there is no international standard of compatibility for
the tagging and monitoring equipment. E.g. Bluetooth, USB, etc.
 Privacy/ Security: With all of this IoT data being transmitted, the risk of
losing privacy increases.
 Safety: Imagine if a notorious hacker changes your prescription. Safety is
ultimately in the hands of the consumer to verify any and all automation.
Web Designing
“Web design” encompasses many different skills
and disciplines in the production and maintenance
of websites.
Web Designing Languages and
Software Tools
Web Designing Languages:
 HTML / DHTML / XHTML
 Java
 VBScripts, JavaScript
 Cascading Style Sheets
 XML, etc
Web Designing Tools:
 FrontPage
 Dreamweaver, etc
Any Questions ?
By:-
Mandar
Mithilesh
Saharsh
Prem
Prajyot

More Related Content

What's hot

Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Робоэтика. Сочи 2014. Д. Тетерюков
Робоэтика. Сочи 2014. Д. ТетерюковРобоэтика. Сочи 2014. Д. Тетерюков
Робоэтика. Сочи 2014. Д. ТетерюковAlbert Yefimov
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
Online security for citizen journalists
Online security for citizen journalistsOnline security for citizen journalists
Online security for citizen journalistsMoses Ngeth
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athiraathiravm
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 

What's hot (20)

Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Робоэтика. Сочи 2014. Д. Тетерюков
Робоэтика. Сочи 2014. Д. ТетерюковРобоэтика. Сочи 2014. Д. Тетерюков
Робоэтика. Сочи 2014. Д. Тетерюков
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Hacking
HackingHacking
Hacking
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Online security for citizen journalists
Online security for citizen journalistsOnline security for citizen journalists
Online security for citizen journalists
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 

Similar to Intro to Android, IOT, Hacking & Web Designinng

World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 

Similar to Intro to Android, IOT, Hacking & Web Designinng (20)

World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Hamza
HamzaHamza
Hamza
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Intro to Android, IOT, Hacking & Web Designinng

  • 3. Android Android Inc. was founded in Palo Alto, California in October 2003 by Andy Rubin, Rich Miner, Nick Sears, and Chris White. Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for Touch Screen mobile devices such as Smart Phones and Tablets.
  • 4. Versions of Android 1. Alpha (Astro) 2. Beta (Blender) 3. Cupcake 4. Donut 5. Éclair 6. Froyo 7. Ginger Bread 8. Honey Comb 9. Ice-Cream Sandwich 10.Jelly Bean 11.KitKat 12.Lollipop 13.Marshmallow 14.Nougat 15.Oreo
  • 5. Features of Android  Messaging  Web browser  Voice-based features  Multi-touch  Multitasking  Screen capture  TV recording  Video calling  Multiple language support  Accessibility, etc
  • 6. Advantages:  The Permission for Everyone to customize the Google Android Platform.  It gives you better notification.  It lets you choose your Hardware  It supports all Google Services. Advantages & Disadvantages Disadvantages:  Android Market is less control of the Manager, sometimes there are malwares.  Battery drains faster because, OS supports lot of Background Processes.  Very Unstable and often Hang or Crash.  Lifetime is less than a normal Mobile phone.
  • 7. Hacking There are number of Definitions for Hacking but the following will be easier to understand:  Hacking is the Unauthorized access to a Computer or a Network without the knowledge of User.  Hacking is a process to hack a network using some computer commands or software for a Legal or Illegal Action.
  • 8. Who are Hackers ?? “Hackers” are those guys who use some Special Commands, Tricks, Coding, software, etc to hack or to gain access to an Network. Can anyone guess Why do People do Hacking? For Revenge… For Fun… For Showoff…. For Warning… Etc….etc…. Warning ….sounds weird…?? Have you Guys Heard About Anonymous Hackers…??
  • 9. Anonymous We are Anonymous. We are Legion. We do not Forgive. We do not Forget. Expect Us.
  • 10. Who are Anonymous..?? On the Road of becoming a HACKER it would be hard not to come across the name “Anonymous” that is, The “Anonymous Hacktivist Group/Organization”. Anonymous is a Global Hacktivist Network consist of Teenage Hacker to Cyber Security Expert. They are mainly known for their “Criminal Activities” like organizing DDOS Attacks, Leaking Confidential Information, etc.
  • 11. Types of Hackers  Script Kiddies: Script Kiddies means the People, usually teenagers/Students who tries to perform Hacking Activities by the information provided by the Google. Don’t be one of them.  Black Hat Hackers: Black Hat Hackers are those Hackers who commits Illegal Activities.  White Hat Hackers: White Hat Hackers are the Authorized Hackers means, they are Cyber Security Experts who works for the Government or Company to Protect the Information from the Black Hat Hackers.  Grey Hat Hackers: Grey Hat Hackers are those who Works Legally and Illegally too, depending upon the situation.  Hacktivists: They are the Hackers who use their Hacking Skills for Protesting against injustice.
  • 12. Internet Of Things Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. The ‘thing’ in IoT could be a person with a heart monitor or an automobile with built- in-sensors, i.e. objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention.
  • 13. Applications of Internet Of Things  TrafficMonitoring  Health  Security  TransportandLogistics  DailyLifeandDomotics  SmartHomes  SmartPhones  Wi-Fi,etc
  • 14. Advantages & Disadvantages Advantages  Communication: Machine-to-Machine (M2M) communication.  Automation and Control: Without human intervention, the machines are able to communicate with each other leading to faster and timely output.  Efficient and Saves Time: The machine-to-machine interaction provides better efficiency, hence; accurate results can be obtained fast. This results in saving valuable time. Disadvantages  Compatibility: Currently, there is no international standard of compatibility for the tagging and monitoring equipment. E.g. Bluetooth, USB, etc.  Privacy/ Security: With all of this IoT data being transmitted, the risk of losing privacy increases.  Safety: Imagine if a notorious hacker changes your prescription. Safety is ultimately in the hands of the consumer to verify any and all automation.
  • 15. Web Designing “Web design” encompasses many different skills and disciplines in the production and maintenance of websites.
  • 16. Web Designing Languages and Software Tools Web Designing Languages:  HTML / DHTML / XHTML  Java  VBScripts, JavaScript  Cascading Style Sheets  XML, etc Web Designing Tools:  FrontPage  Dreamweaver, etc