Fetching Address Book Info of iPhone OS

2011 ◽  
Vol 204-210 ◽  
pp. 1266-1269 ◽  
Author(s):  
Zhi Feng Luo ◽  
Chao Sun ◽  
Shun Xiang Wu

With the rapid development of mobile technology, the mobile phones has gradually become an indispensable part in everybody’s life, and it is replacing the computer’s position step by step. The iPhone is a smart phone made of Apple Company, which opens a new era of software for mobile devices. At the same time, iOS(iPhone’s operating system) has become one of most competitive mobile communications operating systems. The Apple’s protection for security makes the iPhone owners hardly control their phone through the root (highest authority). It is so difficult to manage the information effetely with iPhone, such as contacts’ information or SMS. The paper introduced two approaches to get the contacts’ information in iPhone and restore them with vCard. At last, we managed the output file on MAC.

2012 ◽  
Vol 246-247 ◽  
pp. 57-61
Author(s):  
Lin Li ◽  
Chan Ji Shan ◽  
Jun Luo ◽  
Nan Xu

With the development of linux and μC/O dual-core embedded operating system, its research areas have been broadened wider and wider. This paper aims to illustrate its importance in engineering practice on the basis of its application in the technological process of injection molding machines and numerical control machines to arrive at its natural conclusion that dual-core system has a brighter and wider prospect by using Linux and μC /OS to solve the problems of Linux because it is more and more widely applied in engineering, mechanical control systems and many other fields such as mobile communications as well as digitalized network, and now is becoming more and more demanded with the rapid development of scientific technology.


2020 ◽  
Vol 4 (2) ◽  
pp. 41-51
Author(s):  
Wisnu Sanjaya ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

The rapid development of the IT world has covered all aspects of life and among IT technology products is the creation of Operating Systems and Web browser applications. Privacy in the use of IT in the open era is now highly expected, therefore now widely developed Operating Systems and Web browser applications that have facilities to protect user privacy. Linux and TOR Browser is a combination that is widely used in the field of security, but unfortunately many are misused by the person in a crime. The motivation to use both is to eliminate or minimize the digital footprint of the browsing activity so that it will complicate the search of digital evidence in a crime. This research proposes a framework of stages for TOR Browser analysis in Linux Operating System which aims to provide solution in forensic investigation using offline forensic method. The use of offline forensic methods to obtain detailed information from a digital proof on a computer in a off state


2022 ◽  
Vol 11 (2) ◽  
pp. 1-22
Author(s):  
Abha Jain ◽  
Ankita Bansal

The need of the customers to be connected to the network at all times has led to the evolution of mobile technology. Operating systems play a vitol role when we talk of technology. Nowadays, Android is one of the popularly used operating system in mobile phones. Authors have analysed three stable versions of Android, 6.0, 7.0 and 8.0. Incorporating a change in the version after it is released requires a lot of rework and thus huge amount of costs are incurred. In this paper, the aim is to reduce this rework by identifying certain parts of a version during early phase of development which need careful attention. Machine learning prediction models are developed to identify the parts which are more prone to changes. The accuracy of such models should be high as the developers heavily rely on them. The high dimensionality of the dataset may hamper the accuracy of the models. Thus, the authors explore four dimensionality reduction techniques, which are unexplored in the field of network and communication. The results concluded that the accuracy improves after reducing the features.


2014 ◽  
Vol 919-921 ◽  
pp. 1599-1602
Author(s):  
Huan Zhang ◽  
Ming Liu ◽  
Ding Jun Hu

As the rapid development of network communication and multimedia technology,demand of integrated civil monitoring system is increasing. In this paper, an integrated civil monitoring system based on POSA(Pluggable Objects and Services Architecture) is presented. The proposed integrated civil monitoring system can be run on multiple hardware, platforms and operating systems to support distributed computing, to provide cross-network interaction. It also supports standard protocols and quickly access various device interface.What is more, our system can provide transparency applicable or service interaction in different hardware, platforms and operating system.


Author(s):  
Parul Bhanarkar ◽  
Nikhil Jha

Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus it is important to utilize the space occupied by SMS files in phone’s memory, which take maximum space. The objective involved is designing a semantic dictionary based on Intelligent Dictionary Based Encoding (IDBE) which provides a high text compression ratio to utilize the space in phone’s memory. When SMS file will be received, English words present in the text will be replaced by the respective short words in the designed semantic dictionary. Thus replacing English words by the respective short forms reduces the space occupied by the SMS file. The paper describes the IDBE Compression Techniques for SMS Text Compression.


2021 ◽  
Vol 2021 (3) ◽  
pp. 164-181
Author(s):  
Ellis Fenske ◽  
Dane Brown ◽  
Jeremy Martin ◽  
Travis Mayberry ◽  
Peter Ryan ◽  
...  

Abstract Mobile device manufacturers and operating system developers increasingly deploy MAC address randomization to protect user privacy and prevent adversaries from tracking persistent hardware identifiers. Early MAC address randomization implementations suffered from logic bugs and information leakages that defeated the privacy benefits realized by using temporary, random addresses, allowing devices and users to be tracked in the wild. Recent work either assumes these implementation flaws continue to exist in modern MAC address randomization implementations, or considers only dated software or small numbers of devices. In this work, we revisit MAC address randomization by performing a cross-sectional study of 160 models of mobile phones, including modern devices released subsequent to previous studies. We tested each of these phones in a lab setting to determine whether it uses randomization, under what conditions it randomizes its MAC address, and whether it mitigates known tracking vulnerabilities. Our results show that, although very new phones with updated operating systems generally provide a high degree of privacy to their users, there are still many phones in wide use today that do not effectively prevent tracking.


2014 ◽  
Vol 651-653 ◽  
pp. 2008-2012
Author(s):  
Chun Yang Shi

The smart home is a kind of brand-new life concept, with the development of science and technology, people’s pursuit of quality of life is more and more high. The living concept "Safe and comfort, health and environmental protection, natural and harmony, people-oriented, efficient and convenient, personalized" has been received by most. With the rapid development of 4G networks, the Internet access technology based on mobile terminal and the family high-speed broadband network connectivity built a high-speed communication platform for the control and application of intelligent household life, and the high-speed platform created the condition for developing the richer remote intelligent household control application. Smart phones carry-on become bonds connecting smart home system and high-speed mobile communications platform, and remote control for smart phone will bring our life into a new field.


2008 ◽  
pp. 3548-3570
Author(s):  
Nikhilesh Dholakia ◽  
Ruby Roy Dholakia ◽  
Mark Lehrer ◽  
Nir Kshetri

Mobile phones, mobile Internet access, and mobile commerce (m-commerce) are growing much faster than their fixed counterparts. Several characteristics of mobile networks make them more attractive than fixed networks for less-developed countries and for those countries that want to “leapfrog” the leading IT nations. To exploit the new mobile communications infrastructures, companies from developed as well as developing countries are rapidly integrating m-commerce technology into their business models. Countries around the world, however, exhibit considerable heterogeneity in their adoption of mobile phones and m-commerce technology. Examined in this chapter is the current stage of mobile technology and m-commerce diffusion across the world, and analyzed are factors influencing the diffusion process. In this chapter, the ways in which the m-commerce landscape of a nation—defined by the penetration rate of mobile phones, the specific combinations of different generations of mobile technology, and the blending of various standards within a given generation—is shaped by politicoeconomic, sociocultural, and policy-related factors are reviewed.


Author(s):  
Nikhilesh Dholakia ◽  
Ruby Roy Dholakia ◽  
Mark Lehrer ◽  
Nir Kshetri

Mobile phones, mobile Internet access, and mobile commerce (m-commerce) are growing much faster than their fixed counterparts. Several characteristics of mobile networks make them more attractive than fixed networks for less-developed countries and for those countries that want to “leapfrog” the leading IT nations. To exploit the new mobile communications infrastructures, companies from developed as well as developing countries are rapidly integrating m-commerce technology into their business models. Countries around the world, however, exhibit considerable heterogeneity in their adoption of mobile phones and m-commerce technology. Examined in this chapter is the current stage of mobile technology and m-commerce diffusion across the world, and analyzed are factors influencing the diffusion process. In this chapter, the ways in which the m-commerce landscape of a nation—defined by the penetration rate of mobile phones, the specific combinations of different generations of mobile technology, and the blending of various standards within a given generation—is shaped by politicoeconomic, sociocultural, and policy-related factors are reviewed.


2020 ◽  
Vol 12 (1) ◽  
pp. 62-66
Author(s):  
Hanun Asrohah ◽  
Milad Khusnu ◽  
Wibowo Teguh ◽  
Rhofita Ika

This research discussed the use of SPA-based mobile applications for academic activities at universities. This technology works using asynchronous JavaScript, which can be run by mobile devices and is not limited by the operating system used by mobile phones such as Android, iOS, and others. This way could be reduced the workload of the server because the data sent by a server is not significant compared with a web-based application.


Sign in / Sign up

Export Citation Format

Share Document