This document provides information on various topics related to Android, hacking, and web design. It discusses:
- The history and development of Android by Google as an open-source mobile operating system based on Linux.
- Features of Android like messaging, web browsing, multitasking and various versions from Alpha to Oreo.
- Advantages of Android like customization and support for Google services, and disadvantages like potential for malware and battery drain.
- Different types of hackers like script kiddies, black hats, white hats, and hacktivists who use hacking for protests.
- The Internet of Things ecosystem and applications in areas like traffic monitoring, health, security, and smart homes
3. Android
Android Inc. was founded in Palo Alto, California in
October 2003 by Andy Rubin, Rich Miner, Nick Sears, and
Chris White.
Android is a mobile operating system developed
by Google, based on the Linux kernel and designed
primarily for Touch Screen mobile devices such as Smart
Phones and Tablets.
5. Features of Android
Messaging
Web browser
Voice-based features
Multi-touch
Multitasking
Screen capture
TV recording
Video calling
Multiple language support
Accessibility, etc
6. Advantages:
The Permission for Everyone to customize the Google Android Platform.
It gives you better notification.
It lets you choose your Hardware
It supports all Google Services.
Advantages & Disadvantages
Disadvantages:
Android Market is less control of the Manager, sometimes there are
malwares.
Battery drains faster because, OS supports lot of Background
Processes.
Very Unstable and often Hang or Crash.
Lifetime is less than a normal Mobile phone.
7. Hacking
There are number of Definitions for Hacking but the
following will be easier to understand:
Hacking is the Unauthorized access to a Computer or a
Network without the knowledge of User.
Hacking is a process to hack a network using some
computer
commands or software for a Legal or Illegal Action.
8. Who are Hackers ??
“Hackers” are those guys who use some Special Commands, Tricks,
Coding, software, etc to hack or to gain access to an Network.
Can anyone guess Why do People do Hacking?
For Revenge…
For Fun…
For Showoff….
For Warning…
Etc….etc….
Warning ….sounds weird…??
Have you Guys Heard About Anonymous Hackers…??
10. Who are Anonymous..??
On the Road of becoming a HACKER it would be
hard not to come across the name “Anonymous”
that is, The “Anonymous Hacktivist
Group/Organization”.
Anonymous is a Global Hacktivist Network
consist of Teenage Hacker to Cyber Security
Expert.
They are mainly known for their “Criminal
Activities” like organizing DDOS Attacks,
Leaking Confidential Information, etc.
11. Types of Hackers
Script Kiddies: Script Kiddies means the People, usually
teenagers/Students who tries to perform Hacking
Activities by the information provided by the Google. Don’t
be one of them.
Black Hat Hackers: Black Hat Hackers are those
Hackers who commits Illegal Activities.
White Hat Hackers: White Hat Hackers are the
Authorized Hackers means, they are Cyber Security
Experts who works for the Government or Company to
Protect the Information from the Black Hat Hackers.
Grey Hat Hackers: Grey Hat Hackers are those who
Works Legally and Illegally too, depending upon the
situation.
Hacktivists: They are the Hackers who use their
Hacking Skills for Protesting against injustice.
12. Internet Of Things
Internet of Things (IoT) is an ecosystem of connected physical
objects that are accessible through the internet. The ‘thing’ in IoT
could be a person with a heart monitor or an automobile with built-
in-sensors, i.e. objects that have been assigned an IP address and
have the ability to collect and transfer data over a network without
manual assistance or intervention.
13. Applications of Internet Of Things
TrafficMonitoring
Health
Security
TransportandLogistics
DailyLifeandDomotics
SmartHomes
SmartPhones
Wi-Fi,etc
14. Advantages & Disadvantages
Advantages
Communication: Machine-to-Machine (M2M) communication.
Automation and Control: Without human intervention, the machines are
able to communicate with each other leading to faster and timely output.
Efficient and Saves Time: The machine-to-machine interaction provides
better efficiency, hence; accurate results can be obtained fast. This results in
saving valuable time.
Disadvantages
Compatibility: Currently, there is no international standard of compatibility for
the tagging and monitoring equipment. E.g. Bluetooth, USB, etc.
Privacy/ Security: With all of this IoT data being transmitted, the risk of
losing privacy increases.
Safety: Imagine if a notorious hacker changes your prescription. Safety is
ultimately in the hands of the consumer to verify any and all automation.
15. Web Designing
“Web design” encompasses many different skills
and disciplines in the production and maintenance
of websites.
16. Web Designing Languages and
Software Tools
Web Designing Languages:
HTML / DHTML / XHTML
Java
VBScripts, JavaScript
Cascading Style Sheets
XML, etc
Web Designing Tools:
FrontPage
Dreamweaver, etc