Tag Archives: Mobile operating system

Get Bluetooth Connectivity With iPhone Controlled Paper Airplane

24 Jan


Flying paper planes is not a fun. The most recent product by Powerup Toys’ gives you a chance to include one more product of intelligence i.e. paper plane by connecting an electric storage device fueled propeller and rudder, which might be utilize an iPhone application by means of Bluetooth. It is controlled by powerup 3.0 Smartphone Controlled Paper Airplane Kit.

The Paper Airplane Kit is the company’s third generation of this device; most of the previous models fail to offer with application. The way it works is really basic: First, fold a paper plane utilizing the model gave. Next, connect the Powerup module to the plane, and link it with your phone.

 Paper Airplane With Propeller Power


 The electric cell inside the Powerup 3.0 airplane will give about 10 minutes of flying time, and recharge through microUSB in about 15 minutes. The application itself is really smart. Possible that pilots guide the plane by tilting the iPhone left or right, and app also shows you at what level the plane is with respect to the horizon/skyline. A throttle in the center gives you a chance to change the speed of the propeller, and three checks indicate the power output, battery life remaining, and signal quality between the plane and your phone.

On the other hand, the plane was exceptionally alert; it flew past us in the blink of an eye. Powerup says you’ll have the ability to control the plane to a range of about 60 yards. When it’s released in May, we’re positively anticipating taking it for a flight or two.

Posted By: Pooja Runija


Why Windows Phone Is The Safest Platform Among All?

20 Dec

windows phone

According to software security company F-Secure security Chief Mikko Hypponen, Microsoft’s Windows Phone platform is the safest mobile operating system available to businesses, he further told Windows Phone 8 is presently the safest mobile operating system here.

Although Apple’s iOS is also commonly known as being safe, exactly as safe as BlackBerry for business use, while Android remains a haven for cyber criminals. It seems that F-Secure is giving the “safest” award to Windows Phone 8 at the moment.

At the moment Windows Phone is the safest, there are­­­ thousands of malware for Blackberry and more malware for the iPhone and without a doubt progressively on Android. Interestingly, Hypponen anticipated that “Windows Phone is safest mobile operating system; due to its restrictive development policy should protect it from criminals for the foreseeable future. We’ve seen no malware at all targeting the platform. You want a safe & secure phone? Purchase a Windows Phone.”

Meanwhile, Android receives a bashing for being the most unsafe; firstly, because of amount of malicious Android installation files, it’s almost just double after every quarter. Secondly, because of 3rd party app stores with much has less security features as the official one, Google Play. Although, Google is said to address some of the issues with 3rd party apps/stores in the new version of Android 4.2 taste as jelly bean.

“Windows Phone’s security model inside is somehow prohibitive, I think it’s aimed to take a while before we see Windows Phone being seriously targeted.

In case of Windows Phone 8, it is quite safe at the moment, probably because of not much people are using Windows Phone 8 device. If/when Windows Phone 8 takes off; it might be become a much bigger target for malware. But still my hunch says it will stay the safest.

Posted By: Pooja Runija

Boot –To- Gecko (B2G) Attack, Probability of Facing by Firefox OS with HTML5

27 Sep

firefox_os_The Firefox OS, another competitor in mobile operating systems, will probably see HTML5-identified strike and attacks on a vital operating system process. Firefox OS is assembled around HTML5; the most recent form of the open standard web programming language that is intended to be more intuitive and multimedia neighborly. Some mobile phone operators are now delivering devices with the Firefox OS, which originates from Mozilla, the charitable association behind the Firefox desktop program.

 Mozilla’s Firefox OS looks to test the strength of Google and Apple’s, Android and iOS operating systems. Firefox OS is designed for high-execution, minimal effort phones running apps utilizing the HTML5 web modifying language.

Firefox OS acquires much from the Firefox mobile browser and Gecko application model, which is utilized to render Web pages and show applications. The platform that support Firefox OS, called Boot to Gecko (B2G), gets 95 percent of its code from the mobile browser and Gecko, as per Mozilla.

 The mobile OS utilizes a Linux kernel, which then bangs into the Gecko run time. The highest layer of the technology stack, called Gaia, produces the interface seen by clients. As additional individuals utilize smartphones, attackers and hackers are progressively searching for approaches to endeavor mobile units.

hack“Despite the fact that the Firefox OS may not enjoy the business sector of the Android OS, the utilization of HTML5 is step by step picking up traction around clients (Amazon likewise acknowledges HTML5 for its apps),”. “Subsequently, paying little mind to OS, we can want that as additional applications and sites will utilize HTML5, we can anticipate that such assaults will expand in the future.

B2G holds a methodology inside the OS that authorizes authorizations conceded to applications and counteracts unapproved demands by those applications. A few applications can solicit more authorization; however those appeals must be checked and marked by an app store. The B2G process has high benefits and vets those petition. Mozilla has affirmed B2G is a conceivable attack vector.

“Provided that this process is misused, an attacker can acquire abnormal amount benefits (like root access)”.

A powerlessness discovered a month ago, which was really altered sometime during repairing an alternate blemish in June 2013, made the B2G process to crash. It could have permitted an attacker to run discretionary code on a device with the same high benefits as the B2G process.


By Pooja Runija