This document discusses Freebase on the iPhone. It introduces the Freebase.framework, which includes a static library and asynchronous API access. It also discusses PhotoBase, a sample app that allows users to take or choose a photo, select a Freebase topic, and upload the photo to Freebase while tagging it with the topic. The document provides code examples for using the Freebase APIs and widgets within iPhone applications and outlines future enhancements planned for PhotoBase.
This document discusses techniques for geolocation and reverse geocoding on iPhone using the CoreLocation and MapKit frameworks. It provides code examples for getting the user's current location using CoreLocation, performing reverse geocoding to get placemark details like address from coordinates using MKReverseGeocoder, and displaying user location and annotations on a map using MapKit. It also demonstrates integrating with the AddressBook framework to get address details of the user to display.
The document discusses iPod and iPhone forensics. It provides information on what criminals can do with iPods and iPhones, including spreading viruses, storing child pornography, and theft of personal data. It also outlines the types of evidence that can be retrieved from iPods and iPhones during forensic investigations, such as text messages, photos, call logs, and location history. The document emphasizes that iPod and iPhone forensics helps law enforcement trace criminals and prosecute cases where these devices have been used in crimes.
Sumedt Jitpukdebodin explains paper hacking, which involves creating malicious QR codes that, when scanned, exploit vulnerabilities on mobile devices. The process involves:
1. Creating evil websites that exploit Android and iPhone vulnerabilities or perform phishing.
2. Mapping the evil sites online using services like DyDNS and NoIP.
3. Generating QR codes linked to the evil sites using free online or mobile apps.
4. Socially engineering people into scanning the QR codes, such as at events or on social media.
5. When scanned, the QR codes redirect devices to the evil sites to carry out exploits or phishing depending on the device type. The goal is
This module discusses computer forensics laws and legal issues. It covers privacy issues involved in investigations, legal issues in seizing computer equipment, and laws in different countries. It also examines organizations that investigate computer crimes like the FBI, as well as US laws related to intellectual property, copyright, trademarks, trade secrets, and computer fraud and abuse. The goal is to familiarize students with the legal aspects of computer forensics investigations.
(31 July 2013) iOS Basic Development Day 2 Human interface design Eakapong Kattiya
The document outlines a training course on iOS basic development. It discusses day 2 which focuses on human interface design. Key principles of interface design discussed include focusing on the primary task, making usage easy and obvious, using consistent UI elements, and subtle animation to communicate. The document also provides information on the course instructor and links to additional resources.
This document provides steps for implementing a navigation drawer in an Android application using the ActionBarSherlock library. It includes adding the library, applying the Sherlock theme, setting up the drawer layout in the activity_main XML, populating the drawer list, handling item clicks, and displaying planet details in fragments. Code samples are provided for custom array adapters, fragments, and using nine-patch images for shadows. The navigation drawer is implemented using fragments to display planet details when items are selected from the drawer list.
This document discusses Freebase on the iPhone. It introduces the Freebase.framework, which includes a static library and asynchronous API access. It also discusses PhotoBase, a sample app that allows users to take or choose a photo, select a Freebase topic, and upload the photo to Freebase while tagging it with the topic. The document provides code examples for using the Freebase APIs and widgets within iPhone applications and outlines future enhancements planned for PhotoBase.
This document discusses techniques for geolocation and reverse geocoding on iPhone using the CoreLocation and MapKit frameworks. It provides code examples for getting the user's current location using CoreLocation, performing reverse geocoding to get placemark details like address from coordinates using MKReverseGeocoder, and displaying user location and annotations on a map using MapKit. It also demonstrates integrating with the AddressBook framework to get address details of the user to display.
The document discusses iPod and iPhone forensics. It provides information on what criminals can do with iPods and iPhones, including spreading viruses, storing child pornography, and theft of personal data. It also outlines the types of evidence that can be retrieved from iPods and iPhones during forensic investigations, such as text messages, photos, call logs, and location history. The document emphasizes that iPod and iPhone forensics helps law enforcement trace criminals and prosecute cases where these devices have been used in crimes.
Sumedt Jitpukdebodin explains paper hacking, which involves creating malicious QR codes that, when scanned, exploit vulnerabilities on mobile devices. The process involves:
1. Creating evil websites that exploit Android and iPhone vulnerabilities or perform phishing.
2. Mapping the evil sites online using services like DyDNS and NoIP.
3. Generating QR codes linked to the evil sites using free online or mobile apps.
4. Socially engineering people into scanning the QR codes, such as at events or on social media.
5. When scanned, the QR codes redirect devices to the evil sites to carry out exploits or phishing depending on the device type. The goal is
This module discusses computer forensics laws and legal issues. It covers privacy issues involved in investigations, legal issues in seizing computer equipment, and laws in different countries. It also examines organizations that investigate computer crimes like the FBI, as well as US laws related to intellectual property, copyright, trademarks, trade secrets, and computer fraud and abuse. The goal is to familiarize students with the legal aspects of computer forensics investigations.
(31 July 2013) iOS Basic Development Day 2 Human interface design Eakapong Kattiya
The document outlines a training course on iOS basic development. It discusses day 2 which focuses on human interface design. Key principles of interface design discussed include focusing on the primary task, making usage easy and obvious, using consistent UI elements, and subtle animation to communicate. The document also provides information on the course instructor and links to additional resources.
This document provides steps for implementing a navigation drawer in an Android application using the ActionBarSherlock library. It includes adding the library, applying the Sherlock theme, setting up the drawer layout in the activity_main XML, populating the drawer list, handling item clicks, and displaying planet details in fragments. Code samples are provided for custom array adapters, fragments, and using nine-patch images for shadows. The navigation drawer is implemented using fragments to display planet details when items are selected from the drawer list.
The document discusses different types of tabs and how to implement them in Android, including fixed tabs, scrollable tabs, stacked tabs, and using TabHost. It also covers using intents to launch activities, make phone calls, send SMS, take photos and more. ListViews with different row types are demonstrated along with backward compatible tab implementations.
The document discusses various types of dialogs and user input options in Android programming, including:
- Toasts, alerts, buttons, text fields, switches, pickers, preferences, and gestures that can be used to prompt for and accept user input.
- Examples of implementing alerts, prompts, single and multi-choice dialogs, preferences, and popups are provided using AlertDialog.Builder.
- Techniques for detecting shake gestures and responding to touch events like taps, swipes and long presses are demonstrated using GestureDetector and a ShakeListener class.
This document describes a social diary application that allows users to create shared diaries for events and experiences with others. Users can create diaries for occasions like weddings, birthdays, trips, and holidays. They can then invite other participants to contribute photos, videos, comments and more to the diary over time. The application also includes features for monetization like selling diary themes to users, corporations and event planners.
The document discusses different types of tabs and how to implement them in Android, including fixed tabs, scrollable tabs, stacked tabs, and using TabHost. It also covers using intents to launch activities, make phone calls, send SMS, take photos and more. ListViews with different row types are demonstrated along with backward compatible tab implementations.
The document discusses various types of dialogs and user input options in Android programming, including:
- Toasts, alerts, buttons, text fields, switches, pickers, preferences, and gestures that can be used to prompt for and accept user input.
- Examples of implementing alerts, prompts, single and multi-choice dialogs, preferences, and popups are provided using AlertDialog.Builder.
- Techniques for detecting shake gestures and responding to touch events like taps, swipes and long presses are demonstrated using GestureDetector and a ShakeListener class.
This document describes a social diary application that allows users to create shared diaries for events and experiences with others. Users can create diaries for occasions like weddings, birthdays, trips, and holidays. They can then invite other participants to contribute photos, videos, comments and more to the diary over time. The application also includes features for monetization like selling diary themes to users, corporations and event planners.