Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Leaderboard


Popular Content

Showing most liked content on 04/10/2011 in all areas

  1. 2 points
    Near Field Communication NFC or Near Field Communication, is an emerging technology you will start hearing more about in the coming months. NFC is a standards-based, short-range wireless connectivity technology that enables simple and safe two-way interactions between electronic devices. NFC technology allows consumers to perform contactless transactions, access digital content and connect devices with the simplicity of a single touch. NFC technology provides global interoperability of contactless identification and interconnection technologies. You can use an NFC-enabled phone to make fast, convenient purchases, or as an alternative to a travel card. You can also get information such as news or travel updates by touching your phone to an RFID tag embedded in a "smart" poster – or swap electronic business cards with a new contact simply by touching your phones together. NFC phones are usually equipped with a smart chip to keep confidential information such as your credit card details or travel card information secure. You can also use your NFC phone to load blank RFID tags with information and mobile phone services that others can access by touching their phones to them. Nokia, Sony, and Royal Philips Electronics founded the NFC Forum in 2004 in order to promote the short-range wireless connectivity technology. Samsung, Motorola, Microsoft and more than 140 other organizations all joined the party shortly after. Specifications NFC utilizes the frequency band 13.56 MHz. The data transfer rate is 424 kbps, but it can be set at 106 kbps or 212 kbps. There are 3 primary ways NFC can be used on mobile devices: Card Emulation Mode Reader Mode P2P Mode (peer-to-peer mode) In card emulation mode, NFC devices can function as credit cards, debit cards, badges or tickets. This is the mode that would enable the "mobile wallet." In reader mode, NFC devices can read tags. This is most similar to how barcode scanning works today. For example, you can scan a barcode with an app on your mobile phone to access additional information. Eventually, NFC will displace barcode reading as the technology becomes more widespread. In P2P mode, NFC devices can exchange information with each other. For example, two NFC phones could exchange contact info, similar to the way apps like Bump for iPhone and Android allows for contact exchange today, but via a different technology. What could you use NFC for? There are a lot of creative ways to use NFC, but a basic example of how mobile NFC-based payments--the thing most of us will use the technology for--will work is this: You go shopping for shoes. When you find the perfect pair and head up to the cash register, instead of whipping out your wallet and fishing around for a credit card, you just wave your phone over a payment terminal on the counter near the cash register. The catch is you need a phone with NFC chips inside. That phone will need software that enables mobile payments, and the retailer will need to have a point of sale terminal that accepts NFC payments. The purchase will show up on your monthly credit card bill. But let's say this store doesn't have your size? This is where having a smartphone equipped with NFC beats an NFC-equipped debit card: you could potentially wave your phone at a tag on that pair of shoes, and up on your phone's screen would pop places to buy those shoes in the right size online and have them shipped to you. And what if you shop at this particular department store often? Your phone could also keep track of your points or rewards from the store and you could be sent mobile coupons that you'd use your phone to redeem. NFC in Action A remarkably diverse and ever-expanding universe of NFC use cases is being explored and brought to market all around the world. Today, both research organizations and commercial enterprises are putting NFC to work in widely diverse areas. See these NFC uses cases in action by visiting NFC Forum on Youtube A Day in the Life NFC technology has the power to bring new simplicity and convenience to many aspects of a typical person's daily life, as this example illustrates: How does NFC work? Let’s start with the basics. NFC is a short range high frequency wireless connectivity technology, which allows electronic devices, in close proximity, to communicate. NFC enabled devices can connect and communicate with other devices without any physical contact. In many ways it’s similar to Bluetooth, but instead of manually configuring two devices to work together, the devices establish a connection automatically when they are close enough. NFC operates at the 13.56MHz radio frequency band, which is unregulated and universally available, so that there are no licenses required to operate at this frequency. The data is transferred at a speed of up to 424Kbps and the distance is usually between 4cm to 10cm. When devices are brought within this range, the electromagnetic radio fields of both devices interact and magnetic inductive coupling takes place that facilitates communication between the devices. There are two types of NFC devices—an initiator that initiates the communication and controls the data exchange, and a receiver (or the target device) that responds to the requests from the initiator. NFC has active and passive modes of operation—active, where both devices generate an RF signal to exchange data, and passive, where only one NFC device generates an RF field and the second device or target transfers the data back to the initiator via load modulation technique. Although the NFC data transfer rate is lower than Bluetooth and Wi-Fi, the connection is secured and far more trustworthy due to the short transmission range. NFC connection is also more reliable compared to a physical connection as the connection won’t degrade due to contact wear, corrosion and dirt. NFC technology follows several standards such as ISO (18092), ECMA (340) and ETSI in addition to being compatible to Philips' MIFARE (ISO 14443 A) and Sony's FeliCa smart card protocols. NFC in Mobile: 3 Ways It's Implemented on Phones In mobile phones, there are three different ways that NFC can be implemented : Fully Integrated into the handset - NFC, especially in newer devices, can be fully integrated into the handset. That means that the NFC controller (the piece that does the actual communication) and the secure element (the secure storage area connected to the NFC controller) are both integrated into the handset itself. One example of a fully integrated NFC handset is the Google Nexus S, Google's latest flagship phone built in partnership with Samsung. On a SIM card - Alternately, NFC can be integrated into a SIM card - the card that identifies a mobile subscriber on an operator's cellular network. On a memory card - NFC technology can also be integrated on a microSD card, which is a removable storage card that uses flash memory. Many mobile phone owners use microSD cards to store photos, videos, apps and other files in order to save storage space on the phone itself. For phones that don't have a microSD card slot, accessories like cases or "sleeves" can be used instead. For example, Visa introduced a case for the iPhone which contains a microSD card manufactured by Device Fidelity to bring NFC technology to iPhone users. Security aspects Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of meters. Also, eavesdropping is extremely affected by the communication mode. A passive device that does not generate its own RF field is much harder to eavesdrop on than an active device. One Open source device that is able to eavesdrop on passive and active NFC communications is the Proxmark instrument. Data Corruption Instead of just listening an attacker can also try to modify the data which is transmitted via the NFC interface. In the simplest case the attacker just wants to disturb the communication such that the receiver is not able to understand the data sent by the other device. Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if the attacker has a good understanding of the used modulation scheme and coding. This attack is not too complicated, but it does not allow the attacker to manipulate the actual data. It is basically a Denial of Service attack. Data Modification In data modification the attacker wants the receiving device to actually receive some valid, but manipulated data. This is very different from just data corruption. The feasibility of this attack highly depends on the applied strength of the amplitude modulation. This is because the decoding of the signal is different for 100% and 10% modulation. Data Insertion This means that the attacker inserts messages into the data exchange between two devices. But this is only possible, in case the answering device needs a very long time to answer. The attacker could then send his data earlier than the valid receiver. The insertion will be successful, only, if the inserted data can be transmitted, before the original device starts with the answer. If both data streams overlap, the data will be corrupted. Relay attack Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC. For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim’s smart card. Recommended Solutions Secure Channel for NFC Establishing a secure channel between two NFC devices is clearly the best approach to protect against eavesdropping and any kind of data modification attack. Due to the inherent protection of NFC against Man-in-the-Middle-Attacks it is rather easy and straightforward to setup a secure channel. A standard key agreement protocol like Diffie-Hellmann based on RSA [4] or Elliptic Curves could be applied to establish a shared secret between two devices. Because Man-in-the-Middle is no threat, the standard, unauthenticated version of Diffie-Hellman works perfectly. The shared secret can then be used to derive a symmetric key like 3DES or AES, which is then used for the secure channel providing confidentiality, integrity, and authenticity of the transmitted data. Various modes of operation for 3DES and AES could be used for such a secure channel. Does Your Phone Have NFC? If you're not sure if your phone has NFC (or if you're thinking of buying one that does), NFC World has a great list of current, planned and rumored handsets that support the technology. You can see that list here. Some notable phones available now that offer NFC capabilities include, as mentioned above, the Google Nexus S, as well as the Samsung Galaxy II (select models), Nokia C7, Nokia C7-00 and the Samsung Wave 578. Also Apple is rumoured to be adding NFC chips to the next version of the iPhone. In India, Tata Docomo has signed an agreement with US-based Xius to test NFC solution in Hyderabad. On which Kesav got a dedicated thread going here Initially on offer will be operator based services like mobile phone top-up (expectedly), as well as content like ringtones and wallpapers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reference : cnet, readwriteweb, shanzai.com, nokia.uk, nfc-forum.org, Graz University of Technology Edit : Updated post with Security aspects of NFC
  2. 2 points
    Importance of Regular Data Backup can never be emphasised more... But majority of normal users don't do it regularly and then one fine day when disaster strikes... It's a hard battle... What if there is a very very easy to use software with the power of Normal, High End Backup Softwares? There is One & it is Called Second Copy... I have been using it since ages on Desktop, Laptop & even on large Local Area Networks & has been a life saver many times.... Highly Recommended.. Why? Very Small Size. Just 2.11MB Simple & Easy To Configure. Still has all the options of leading backup softwares THE BEST PART- It Keeps the backup data in Normal Windows readable Folders & not a file which only this software can read... So when the disaster strikes... You don't need to First Install the Backup Software & then retrieve data.... Simply COPY Back in Windows. Incremental File Backups. After the initial full copy, can backup just the changed files... Keeps an exact mirror of the folders you choose... Works across Media... Internal Hard Drives... External Hard Drives... Pen Drives.... Even with Local Area Networks... Setup... Choose the folders to be backed up... Choose Destination (Has to be a Different Drive than Source For Safety..)... Type of Backup & Time Interval... That's it... You Just got a FREE DATA INSURANCE!!! Download & Use sc7.exe
  3. 2 points
    i have been using this tool since long time - One stop solution for all Win OS's - it does not involve unnecessary manual steps all GUI - best of all its free to use http://wintoflash.com/download/en/ Win to flash
  4. 1 point
    After posting few lines in India against corruption thread regarding gender biased laws of India like (Read more here http://en.wikipedia.org/wiki/Dowry_law_in_India , there are links to main articles from here) kind words and concern of Racoon and Digitalvirvana gave courage to me to post this and I decided to post this thread to create necessary awareness amongst rimwebians. My story in brief http://www.498a.dreamhosters.com/forum/viewtopic.php?f=1&t=6181 (I have not posted any post marital issues in very much in detail) I am not posting my view points as every one has right to make judgment based on own understanding. i. The Dowry Prohibition Act , 1961 ii. The Immoral Traffic (Prevention) Act , 1956 iii. The Indecent Representation of Women (Prohibition) Act , 1986 iv. The Commission of Sati (Prevention) Act , 1987 v. The National Commission for Women Act , 1990 vi. The Protection of Women from Domestic Violence Act , 2005. vii. THE PROTECTION OF WOMEN AGAINST SEXUAL HARASSEMENT AT WORKPLACE (Read act here http://wcd.nic.in/protshbill2007.htm and see definition of sexual harassment and imagine what woman can do to male employee) If one goes thru all these laws it appears that they are designed to provide better environment to women in our society, however the fact is that these laws are misused more than used. Reason is very simple corrupt law enforcing machinery and greed of women. Legally men is responsible to maintain well earning, well settled women. Once men gets married means he is suppose to fulfill all needs of women. I have come across very funny DV act cases like husband refused to take wife to restaurant for dinner and made comment that "SLEEP HUNGRY" means cruelty to woman. Statistically there are very small numbers of cases filed every year. However if one look at the number of people harassed viz a viz number of people convicted, there is clear cut indication that there is some thing wrong with either law enforcing machinery or law drafting machinery or probably our understanding of family. Read statistics here http://data.498a.org/ IMO Matrimonial disputes are ideally civil type of disputes - except where death has taken place. Legally dowry is prohibited. Means giving or taking dowry is crime, then why only takers are prosecuted? There has been no incidence (atleast in my knowledge) where dowry giver is ever prosecuted. Law also should take customary exchange of gifts, money and articles exchanged in marriages into consideration. There has to be consideration of economical, educational and social back ground of women while awarding any relief to woman. Further suggested readings http://www.mynation.net Discussion forum http://forum.498a.org/ Right now Government of India has posted Consultation Paper-cum-Questionnaire regarding Section 498-A of Indian Penal Code http://lawcommissionofindia.nic.in/reports/cp-s498.doc Where they have asked suggestions regarding draconian IPC 498A, kindly read and send them email or letters by post. I am uploading reply I made them for reference. Reason for posting this letter is obvious that unless one do not go thru' legal hassles its very difficult to understand meanings of each sentences and words used. draft reply to law comission.doc
  5. 1 point
    Friends - inspired by iDEA of Rajan i had in mind to post solutions that are ready made and may be useful to many - although there are various places to get info lets keep this one for our forum, i shall post Complete Solutions and request members to also post theirs, if they want to contribute. I shall list Topics here: 1) Maintain Address Book 2) Automated Regular Data Backup for PC - By Rajan Mehata 3) Sync Address book from Android device 4) Sync Palm Device 5) Convert to NTFS without FORMAT 6) Import Facebook Friends to Google Plus 7) Moving out of google 8) Temp hidden mail - private use 9) Sync LinkedIn, Facebook, Outlook, CRM and iPhone Connections to Google Contacts (including the Profile Photo) 10) Remove +91 preceding any number and adding 0 for Android and for iOs 11) Share any File / Folder from DropBox via direct link
  6. 1 point
    How to install windows 7 from USB? its easy and very simple. You not need any software or expertise. a simple utility, win7 DVD and little knowledge of using computer. you do not need HP utility that was earlier required to make USB drive bootable or any 3rd party software. please make sure you have following items before proceeding: 1. Windows7 installer (bootable) DVD through which you are currently installing windows. 2. min 4GB USB drive. it works on any external USB drive of any capacity. BACKUP DATA FROM THE USB DRIVE B4 PROCEEDING. THE DRIVE WILL BE FORMATTED & DATA WILL BE LOST. 3. Diskpart utility from Microsoft. If you are using windows7, it is inbuilt. for others, Download directly from here.. Steps to make your USB drive bootable 1. install and run diskpart that you downloaded from above step 3. For win7, open command prompt and type "diskpart" (without quotes) and press enter. when diskpart is started follow these steps 2. List Disk (it will show all the disks on your PC - including hdd and USBs) 3. Select Disk 1 (Replace 1 with number reflecting your USB Drive. no shown from step 2) 4. clean (this command will delete everything from your disk) 5. creat partition primary 6. active 7. format fs=fat32 quick (here we are formating drive with FAT32 files system and quick. qucik is faster and advisable) 8. assign Letter=F (this will assign drive letter 'F' to your drive. you can assign any free drive letter). 9. copy your entire win7 DVD to USB drive. 10. connect USB drive to PC on which you want to install win7 and boot it through USB. I am using this method for quite some time and its working fine. no problem at all. this is very useful for netbooks where you do not have optical drive. It can be used on any PC/laptop that meets hardware requirements of win7. It is much faster from installing through DVD. My engineer has made 1 USB pen drive active and just load win7 files whenever he need to install win7. otherwise, he uses it as normal pen drive with active partition. Mods/Admin: i had searched whether anybody has posted this before or not. i could not find it, however it is already there, you can delete this post.
  7. 1 point
    digitalnirvana is now: dipanlahiri drali2 is now: drali ram999001 is now: GouthamA
  8. 1 point
    Good informative post thanks, especially with NFC becoming a more mainstream technology. If possible please also add the security aspect, because with wireless communication eavesdropping is a threat like bluejacking for BT etc.
  9. 1 point
    postpaid guys are cheated by reliance with 950 silver you get 5GB on HSD speeds + Unlimited free Usage on 1x speeds 30 Days...for perpaid you pay only 800 for same plan..why 150 rupees more....cheating by reliance.
  10. 1 point
    ::Maintain Address Book:: Its one of the most important asset in Phone and now a days Smart phone no only have entries for multiple phone but have searchable data of various personal and Business related information. There are 2 ways to do it 1) Desktop - Unarguably Outlook 2010 stands out among the list of Personal Information Manager (PIM) apps available out there. Apart from sending and receiving emails, it provides list of tools and features which lets user manage and organize task, emails, calendars and contacts under one hood. Here is a default list of fields separated by comas used in Outlook contact they are self explanatory - go through them: "Title","First Name","Middle Name","Last Name","Suffix","Company","Department","Job Title","Business Street","Business Street 2","Business Street 3","Business City","Business State","Business Postal Code","Business Country/Region","Home Street","Home Street 2","Home Street 3","Home City","Home State","Home Postal Code","Home Country/Region","Other Street","Other Street 2","Other Street 3","Other City","Other State","Other Postal Code","Other Country/Region","Assistant's Phone","Business Fax","Business Phone","Business Phone 2","Callback","Car Phone","Company Main Phone","Home Fax","Home Phone","Home Phone 2","ISDN","Mobile Phone","Other Fax","Other Phone","Pager","Primary Phone","Radio Phone","TTY/TDD Phone","Telex","Account","Anniversary","Assistant's Name","Billing Information","Birthday","Business Address PO Box","Categories","Children","Directory Server","E-mail Address","E-mail Type","E-mail Display Name","E-mail 2 Address","E-mail 2 Type","E-mail 2 Display Name","E-mail 3 Address","E-mail 3 Type","E-mail 3 Display Name","Gender","Government ID Number","Hobby","Home Address PO Box","Initials","Internet Free Busy","Keywords","Language","Location","Manager's Name","Mileage","Notes","Office Location","Organizational ID Number","Other Address PO Box","Priority","Private","Profession","Referred By","Sensitivity","Spouse","User 1","User 2","User 3","User 4","Web Page" I am considering outlook as a center of all so i would like you to use only one field at one time - many dumb phones like Nokia there is a option of add field and they have 4-5 mobile field where as in outlook there is only one so you choose alternate field like Home or Home Fax or Pager so when you sync it docent mess up. The above Fields are common between Most Smartphones - tried in Palm, Samsung (galaxy), Sony n BB - it matches 100% with Windows Mobile though. rest can have few fields missing. The idea to show you this is that when you are backing up a mobile or syncing it than these fields are Mapped to one another for data transfer, so Mobile goes to Mobile Name to Name, if you have wrong information fed then it wont recognize and will be transferred as it is. The most troublesome is Field "other" in phone contact if the Phone does not have any field it places in other and there can be many other - but once you transfer it you will loose it, between cloud too. Nokia does this most commonly Those who use the outlook can export file in CSV format and edit it depending upon fields and import it back its one time investment of time. 2) Cloud - Gmail Remains the King in cloud for your needs - i shall call it Outlook of Cloud, after Respected Android all the choice of other are gone (DK Ji happy!!) Contact structure in Gmail is different from that of outlook it some thing like this: Name,Given Name,Additional Name,Family Name,Yomi Name,Given Name Yomi,Additional Name Yomi,Family Name Yomi,Name Prefix,Name Suffix,Initials,Nickname,Short Name,Maiden Name,Birthday,Gender,Location,Billing Information,Directory Server,Mileage,Occupation,Hobby,Sensitivity,Priority,Subject,Notes,Group Membership,E-mail 1 - Type,E-mail 1 - Value,Phone 1 - Type,Phone 1 - Value,Phone 2 - Type,Phone 2 - Value,Phone 3 - Type,Phone 3 - Value,Phone 4 - Type,Phone 4 - Value,Phone 5 - Type,Phone 5 - Value,Phone 6 - Type,Phone 6 - Value,Address 1 - Type,Address 1 - Formatted,Address 1 - Street,Address 1 - City,Address 1 - PO Box,Address 1 - Region,Address 1 - Postal Code,Address 1 - Country,Address 1 - Extended Address,Address 2 - Type,Address 2 - Formatted,Address 2 - Street,Address 2 - City,Address 2 - PO Box,Address 2 - Region,Address 2 - Postal Code,Address 2 - Country,Address 2 - Extended Address,Organization 1 - Type,Organization 1 - Name,Organization 1 - Yomi Name,Organization 1 - Title,Organization 1 - Department,Organization 1 - Symbol,Organization 1 - Location,Organization 1 - Job Description,Relation 1 - Type,Relation 1 - Value,Relation 2 - Type,Relation 2 - Value,Website 1 - Type,Website 1 - Value,Event 1 - Type,Event 1 - Value,Custom Field 1 - Type,Custom Field 1 - Value its comma separated default format too, now you will know that why you loose information when you Sync the two. You need to keep Mapping tight Whats Missing in both is Contact Photo, it is not exported and has to by synced by 3rd party between them - although from phone to outlook or cloud to phone its synced. When you Import or Export contact from any application you need to specify the target application so the mapping of that is adapted to export or import addresses. Hope You will have Idea of Contact in both the prime applications Further: Once you have Address book in place which is proper formatted you need to put it in other you you can restore from there in your device and can be used for future backups and transfer in new devices. here are guide For editing/creating CSV using EXCEL and importing in Gmail Contact and outlook Editing CSV Importing CSV Address Book to Gmail Export contacts from Gmail Export CSV from Outlook Add Life to your Contact: Sync Facebook Photos Most of android sets do it but its limited to just jinking the contact its like just superimposing 2 info over another it docent really sync, here are solution that offers Hardcore integration of photos not just linking. Sync FB profile photos to Outlook tools -FoneBook -Outsync Sync FB Profile Pic with Gmail Directly -GoogleFacebook Sync Shall update more later...
×