MackDroid - An Android based Application to monitor devices

Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.

2020 ◽  
Vol 14 ◽  
Author(s):  
Shefali Singhal ◽  
Poonam Tanwar

Abstract:: Now-a-days when everything is going digitalized, internet and web plays a vital role in everyone’s life. When one has to ask something or has any online task to perform, one has to use internet to access relevant web-pages throughout. These web-pages are mainly designed for large screen terminals. But due to mobility, handy and economic reasons most of the persons are using small screen terminals (SST) like mobile phone, palmtop, pagers, tablet computers and many more. Reading a web page which is actually designed for large screen terminal on a small screen is time consuming and cumbersome task because there are many irrelevant content parts which are to be scrolled or there are advertisements, etc. Here main concern is e-business users. To overcome such issues the source code of a web page is organized in tree data-structure. In this paper we are arranging each and every main heading as a root node and all the content of this heading as a child node of the logical structure. Using this structure, we regenerate a web-page automatically according to SST size. Background:: DOM and VIPS algorithms are the main background techniques which are supporting the current research. Objective:: To restructure a web page in a more user friendly and content presenting format. Method Backtracking:: Method Backtracking: Results:: web page heading queue generation. Conclusion:: Concept of logical structure supports every SST.


2017 ◽  
Vol 11 (3) ◽  
pp. 15-28 ◽  
Author(s):  
Anjali Kumawat ◽  
Anil Kumar Sharma ◽  
Sunita Kumawat

Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly. So the authors have proposed the “Identification of cryptographic vulnerability and malware detection in Android” system. They have designed a user friendly android application, through which user and developer can easily test the application whether it is benign or vulnerable. The application will be tested firstly using static analysis and then the dynamic analysis will be carried out. The authors have implemented static and dynamic analysis of android application for vulnerable and malicious app detection. They have also created a web page. User can either use the application or the web page.


Author(s):  
Anjali Kumawat ◽  
Anil Kumar Sharma ◽  
Sunita Kumawat

Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly. So the authors have proposed the “Identification of cryptographic vulnerability and malware detection in Android” system. They have designed a user friendly android application, through which user and developer can easily test the application whether it is benign or vulnerable. The application will be tested firstly using static analysis and then the dynamic analysis will be carried out. The authors have implemented static and dynamic analysis of android application for vulnerable and malicious app detection. They have also created a web page. User can either use the application or the web page.


2014 ◽  
Vol 60 (1) ◽  
pp. 85-100 ◽  
Author(s):  
Juraj Varga ◽  
Peter Muska

Abstract The emergence of Android as a leading Operating System in terms of market coverage induced the rapid emergence of many mobile applications. A lot of these applications are prone to misuse because of their design. This paper deals with a new method of informing user whether applications installed on his device are potentially harmful or not. The introductory part provides some insight into security mechanisms used in Android. The main part deals with research we based our work on, proposal of our own methodology based on permission model and its implementation in application for real-time offline analysis of installed applications on device running Android. The last part of this paper deals with the evaluation of achievements reached by our methodology implemented in standalone application


2019 ◽  
Vol 5 (1) ◽  
pp. 77-86
Author(s):  
Meirina Suci Ridha ◽  
Hani Harafani

Color blindness is one of the decreasing diseases which is very difficult to determine its deterioration, whether a family member will suffer from color blindness or not, especially with the prediction of color blindness which has been using manual methods by calculating the inheritance formula. Genetic Algorithms have advantages over other traditional optimization algorithms. To implement a computerized method in predicting color blindness that can be used by many people, it is necessary to have a user-friendly operating system like the Android operating system. The test results show that the implementation of genetic algorithms in applications to predict color blindness produces more optimal predictions and their application to Android makes the application a user friendly application. Keywords: Heredity, Color Blindness, Genetic Algorithms, Android Application, Color Blindness Predictions


2020 ◽  
Vol 9 (1) ◽  
pp. 1523-1531

Commercially, innumerable consignments of valuable freight are moved across India every day. On certain routes, there is always a lurking threat to the security of the freight and finding good food is also problematic for the truckers. Truck drivers have a high rate of occupation-related injury and the highest rate of on-job fatality. This project aims to develop an android application for android operating system (OS) platform which helps drivers to get help from their passersby or forthcoming trucks and send alert to their owners if there is any threat in their routes. The Owners can monitor the movement of their trucks and the threats as well. This ensures better communication with drivers on the fleet on the same route under a single corridor. This app is developed using the platform Android Studio which is a free and open-source software.


2019 ◽  
Author(s):  
Anil S. Thanki ◽  
Xingdong Bian ◽  
Robert P. Davey

Genome browsers play a vital role to provide visualisation for genomic data. It is often the case that bespoke genome browser customisations are required between different research groups, with an obvious necessity to update, upgrade and tailor tracks and features on a potentially frequent basis. However, most of the current genome browsers require highly curated data held in public repositories. Besides, these genome browsers often rely on particular dependencies, where writing plug-in or modifying existing code can be troublesome and resource expensive.We present TGAC Browser, a new open-source web-based genome browser designed to overcome shortcomings in available approaches. It uses a locally installed Ensembl Core Database schema and is also able to visualise data from well-known NGS data formats. We also added simple analysis functionality to perform BLAST searches within TGAC Browser. TGAC Browser also allows uploading your genomic data. TGAC Browser is an open-source, easy to set up, and user-friendly genome browser with minimal, lightweight configuration details.


2021 ◽  
Author(s):  
Nivedha K ◽  
Indra Gandhi K ◽  
Shibi S ◽  
Nithesh V ◽  
Ashwin M

Android is a widely distributed mobile operating system developed especially for mobile devices with touch screens. It is an open source, Google-distributed Linux-based mobile operating system. Since Android is open source, it enables Android devices to be targeted effectively by malware developers. Third-party markets do not search for malicious applications in their databases, so installing Android Application Packages (APKs) from these uncontrolled market places is often risky. Without user’s notice, these malware infected applications gain access to private user data, send text messages that costs the user, or hide malware apk file inside another application. The total number of new samples of Android malware amounted to 482,579 per month as of March 2020. In this paper deep learning approach that focuses on malware detection in android apps to protect data on user devices. We use different static features that are present in an Android application for the implementation of the proposed system. The system extracts various static features and gives them to the classifier for deep learning and shows the results. This proposed system will assist users in checking applications that are not downloaded from the official market.


2018 ◽  
Vol 17 (2) ◽  
pp. 1-8 ◽  
Author(s):  
Zoltan Siki

The development of the GeoEasy program started in 1997. Twenty years later in 2017 it became free software under GPL license, version 3.0.0 is freely available for everybody. The core development of GeoEasy is made on Linux operating system, using Tcl/Tk script language, thanks to the Tcl/Tk ports to other operating systems, the program can be run on Linux, Windows, Android and OSX machines. Objectives of the development are to create user friendly graphical user interface (GUI) for surveying calculations in a modular structure with flexible, open connections to other programs. Both educational and professional usages are supported.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Sign in / Sign up

Export Citation Format

Share Document