scholarly journals SIMULASI PENGENDALIAN ROUTER MIKROTIK MENGGUNAKAN ANDROID

Compiler ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Moh Risaldi ◽  
Astika Ayuningtyas

Userman is a tool in mikrotic that serves as a network user. Userman's tools are only accessible by admin and can only be accessed via a computer device. Utilization of handheld or mobile phone device at this time the usual thing because cellular phone or handphone is as companion in carrying out everyday activities. That's what makes Hanphone is very commonplace for some people. This is because some Mobile already has the function and ability more than just the basic function. Android as an operating system that can be embedded in mobile devices have the ability to be installed applications required by the user. In this final project, the mikrotik application can be used to manage the admin that has been in the menu of user management and mikrotik application can also be successful to monitor network traffic and limit the bandwidth to the connected user.

Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


2021 ◽  
Vol 51 (2) ◽  
pp. 2-9
Author(s):  
Rachee Singh ◽  
Muqeet Mukhtar ◽  
Ashay Krishna ◽  
Aniruddha Parkhi ◽  
Jitendra Padhye ◽  
...  

Switch failures can hamper access to client services, cause link congestion and blackhole network traffic. In this study, we examine the nature of switch failures in the datacenters of a large commercial cloud provider through the lens of survival theory. We study a cohort of over 180,000 switches with a variety of hardware and software configurations and find that datacenter switches have a 98% likelihood of functioning uninterrupted for over 3 months since deployment in production. However, there is significant heterogeneity in switch survival rates with respect to their hardware and software: the switches of one vendor are twice as likely to fail compared to the others. We attribute the majority of switch failures to hardware impairments and unplanned power losses. We find that the in-house switch operating system, SONiC, boosts the survival likelihood of switches in datacenters by 1% by eliminating switch failures caused by software bugs in vendor switch OSes.


Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


2022 ◽  
Vol 18 (2) ◽  
pp. 1-28
Author(s):  
Xiaoyu Ji ◽  
Yushi Cheng ◽  
Juchuan Zhang ◽  
Yuehan Chi ◽  
Wenyuan Xu ◽  
...  

With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally measured device fingerprints, such as device ID, software or hardware-based characteristics. In this article, we propose DeMiCPU , a stimulation-response-based device fingerprinting technique that relies on externally measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power-supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.7% precision and recall on average, and 99.8% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6~s. The performance can be further improved to 99.9% with multi-round fingerprinting. In addition, we implement a prototype of DeMiCPU docker, which can effectively reduce the requirement of test points and enlarge the fingerprinting area.


Author(s):  
Ewa Janczukowicz ◽  
Ahmed Bouabdallah ◽  
Arnaud Braud ◽  
Stéphane Tuffin ◽  
Jean-Marie Bonnin

Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and furthermore, it wants to redefine the way payments work for mobile applications. Firefox OS is not directly competing with Android and iOS, although it has some common target markets with Android. It could be an opportunity to weaken the iOS and Android duopoly. For now it targets users that don't have smartphones yet and is mostly used on low-end devices. The biggest challenge of Firefox OS is to assure a stable position in the mobile OS ecosystem and to get a large volume of users. Mozilla has an ambition to improve the web and make the web the platform. However developing the Firefox OS and ensuring its important place on the market is difficult because of technological and business limits that will be discussed in this chapter.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2012 ◽  
pp. 189-198
Author(s):  
Jeongyoon Lee ◽  
R. Karl Rethemeyer

The recent boom in the use of smartphones has led to an expansion of the concept of cyber behavior to include nearly perpetual virtual contact through mobile devices. This chapter addresses the issue of mobile cyber behavior by identifying key dimensions of virtual interactions through smartphones. While most prior studies focused on mobile technology from a technical perspective, this article takes a sociotechnical perspective, focusing on aspects of human behavior in the context of a new technical system (i.e., smartphones). The authors’ review of this literature suggests that mobile phone cyber behavior develops along three primary dimensions – the “3Cs” of: contextualization, customization, and convenience.


2010 ◽  
Vol 2 (3) ◽  
pp. 15-30 ◽  
Author(s):  
Andrew Greaves ◽  
Enrico Rukzio

Co-present viewing and sharing of images on mobile devices is a popular but very cumbersome activity. Firstly, it is difficult to show a picture to a group of friends due to the small mobile phone screen and secondly it is difficult to share media between multiple friends, e.g., when considering Bluetooth usage and technical limitations, limited input and repeated user interactions. This paper introduces the View & Share system which allows mobile phone users to spontaneously form a group and engage in the viewing and sharing of images. A member of the group has a personal projector (e.g., projector phone) which is used to view pictures collaboratively. View & Share supports sharing with a single user, multiple users or all users, allows members to borrow the projected display and provides a private viewing mode between co-located users. This paper reports on the View & Share system, its implementation and an explorative user study with 12 participants showing the advantages of our system and user feedback.


Author(s):  
Daniel C. Doolan ◽  
Sabin Tabirca ◽  
Laurence T. Yang

Ever since the discovery of the Mandelbrot set, the use of computers to visualise fractal images have been an essential component. We are looking at the dawn of a new age, the age of ubiquitous computing. With many countries having near 100% mobile phone usage, there is clearly a potentially huge computation resource becoming available. In the past years there have been a few applications developed to generate fractal images on mobile phones. This chapter discusses three possible methodologies whereby such images can be visualised on mobile devices. These methods include: the generation of an image on a phone, the use of a server to generate the image and finally the use of a network of phones to distribute the processing task.


Sign in / Sign up

Export Citation Format

Share Document