Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Karthik R

RIM Guru
  • Content count

    1,541
  • Joined

  • Last visited

  • Days Won

    15

Everything posted by Karthik R

  1. Android Serves Up Its Ice Cream Sandwich

    Off topic @ Kanaga Are you using GSM with your Photon?
  2. iPhone 4S Launched!

    Just to keep the records straight - Fragmentation is becoming less of a issue with android. Now 38.7 % of the devices runs on 2.3.x Gingerbread and 2.2 Froyo on 45.3%. And fragmentation exists in iOS too.
  3. Android Serves Up Its Ice Cream Sandwich

    ^ ^ ^ Since the Galaxy Nexus is the first ICS device, rumored to go on sale sometime in the beginning to mid November, we shouldn't expect the source code to be publicized until about that time either.
  4. ^ ^ ^ those handsets have been available in the market for some time now and the offers too aren't new.
  5. BIRTHDAY WISHES!

    happy B'day M.S.Rao a.k.a nlr2334481
  6. Android Serves Up Its Ice Cream Sandwich

    Motorola must have felt a little left out yesterday when it launched its slick-looking Droid Razr smartphone because Samsung launched an even bigger phone with the newest version of Android, Ice Cream Sandwich, later the same day. Not unexpectedly, Motorola said it has plans in place to update the Razr to Android 4.0 by early 2012.
  7. Android Serves Up Its Ice Cream Sandwich

    Control over network data Mobile devices make extensive use of network data for streaming content, synchronizing data, downloading apps, and more. To meet the needs of users with tiered or metered data plans, Android 4.0 adds new controls for managing network data usage. In the Settings app, colorful charts show the total data usage on each network type (mobile or Wi-Fi), as well as amount of data used by each running application. Based on their data plans, users can optionally set warning levels or hard limits on data usage or disable mobile data altogether. Users can also manage the background data used by individual applications as needed. Data usage controls let you monitor total usage by network type and application and then set limits if needed.
  8. The company will migrate all Tata Indicom customers to Tata DOCOMO. The migration is nothing but rebranding and any Tata Indicom subscribers need not to anything to move to Tata DOCOMO. Mr Deepak Gulati, Executive President, Mobility Business, Tata Teleservices Limited, said, “These are exciting times at TTL and mark the Company’s evolution from being just an access provider to a multi-platform telecom applications and solutions organization, with one single brand—Tata DOCOMO—for customer connect, ease and delight. This is the birth of Telecom 2.0. Our new strategy will unify our brands and unlock the synergies across the CDMA, GSM & 3G platforms. We are pleased to welcome our Tata Indicom customers into the Tata DOCOMO family, offering them a new world of telecom and lifestyle-impacting experiences.” As a result of this unified branding now all the products of Tata Teleservices will be available through a single retail network. Along with this TTL also announced that it will upgrade CDMA network to unlock next level of data usage. The company will also come up with new CDMA phones, including smartphones. VIA : Mobigyann
  9. HTC’s Sensation Xl

    The Bad No expandable memory Single Core
  10. Internet Service Provider Name / Type : Tata Docomo 3G Plan : Prepaid. 1Gb / Rs.601 Location : Trivandrum Comments : The signal completely disappears on my phone for 5-10secs (and then reappears) when downloading. Gets on my nerves
  11. Motorola Photon OTA Update Problem

    The update brings a few bug fixes and one notable feature : Google Talk with Video support. Other than that, it's a pretty bland update - 1. Lapdock support 2. Enhancements to image appearance when pictures are taken in panorama mode 3. Forwarded messages are properly identified as being forwarded 4. Improved audio quality with car speakers when connected to a car charger and audio 5. Introduction of international roaming 3G UMTS hotspot functionality for a single Wi-Fi enabled
  12. BIRTHDAY WISHES!

    Age is strictly a case of mind over matter. If you don't mind, it doesn't matter. Happy B'Day Vinay bhai. Have a great year ahead.
  13. Why do online shoppers have to take special precautions? The internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else. How do attackers target online shoppers? There are three common ways that attackers can take advantage of online shoppers: Targeting vulnerable computers - If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases. Creating fraudulent sites and email messages - Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites that appear to be legitimate or email messages that appear to have been sent from a legitimate source. Charities may also be misrepresented in this way, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information. Intercepting insecure transactions - If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted. How can you protect yourself? Shop from a Secure PC - Public computers in internet cafes, libraries or any other public place may be compromised and others would have access to the same computer. You will not be able to know if the network is secure and the computers may be set up to remember the login details automatically. Use and maintain anti-virus software, a firewall, and anti-spyware software - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. Make sure to keep your virus definitions up to date. Spyware or adware hidden in software programs may also give attackers access to your data, so use a legitimate anti-spyware program to scan your computer and remove any of these files. Keep software, particularly your web browser, up to date - Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it. Do business with reputable vendors - Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information. Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the "issued to" information. Locate and note phone numbers and physical addresses of vendors in case there is a problem with your transaction or your bill. Take advantage of security features - Passwords and other security features add layers of protection if used appropriately. Be wary of emails requesting information - Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email, and use caution when clicking on links in email messages. Check privacy policies - Before providing personal or financial information, check the website's privacy policy. Make sure you understand how your information will be stored and used. Make sure your information is being encrypted - Many sites use SSL, or secure sockets layer, to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a padlock icon . If the padlock is closed, the information is encrypted. The location of the icon varies by browser; for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser. Use a credit card - There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection for your debit card. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can further minimize damage by using a single credit card with a low credit line for all of your online purchases. Keep a paper trail - Print and save records of your online transactions, including the product description and price, the online receipt, and copies of every email you send or receive from the seller. Check your statements - Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately. Sourced part of the info from US-CERT
  14. iPhone 4S Launched!

    iDon't and Droid Does
  15. Motorola Photon OTA Update Problem

    @Mujeeb you are on 4.5.1A-1_SUN-154_MR-1 and need to perform three updates to get to the latest version mentioned by Kshah. First is a 19Mb update then 7Mb at last a sizable 56Mb one. Settings > About Phone > System Updates > Update Motorola Software.
  16. EV stands for EVDO (high speed internet access) For more info on EVDO check this link.
  17. Near Field Communication NFC or Near Field Communication, is an emerging technology you will start hearing more about in the coming months. NFC is a standards-based, short-range wireless connectivity technology that enables simple and safe two-way interactions between electronic devices. NFC technology allows consumers to perform contactless transactions, access digital content and connect devices with the simplicity of a single touch. NFC technology provides global interoperability of contactless identification and interconnection technologies. You can use an NFC-enabled phone to make fast, convenient purchases, or as an alternative to a travel card. You can also get information such as news or travel updates by touching your phone to an RFID tag embedded in a "smart" poster – or swap electronic business cards with a new contact simply by touching your phones together. NFC phones are usually equipped with a smart chip to keep confidential information such as your credit card details or travel card information secure. You can also use your NFC phone to load blank RFID tags with information and mobile phone services that others can access by touching their phones to them. Nokia, Sony, and Royal Philips Electronics founded the NFC Forum in 2004 in order to promote the short-range wireless connectivity technology. Samsung, Motorola, Microsoft and more than 140 other organizations all joined the party shortly after. Specifications NFC utilizes the frequency band 13.56 MHz. The data transfer rate is 424 kbps, but it can be set at 106 kbps or 212 kbps. There are 3 primary ways NFC can be used on mobile devices: Card Emulation Mode Reader Mode P2P Mode (peer-to-peer mode) In card emulation mode, NFC devices can function as credit cards, debit cards, badges or tickets. This is the mode that would enable the "mobile wallet." In reader mode, NFC devices can read tags. This is most similar to how barcode scanning works today. For example, you can scan a barcode with an app on your mobile phone to access additional information. Eventually, NFC will displace barcode reading as the technology becomes more widespread. In P2P mode, NFC devices can exchange information with each other. For example, two NFC phones could exchange contact info, similar to the way apps like Bump for iPhone and Android allows for contact exchange today, but via a different technology. What could you use NFC for? There are a lot of creative ways to use NFC, but a basic example of how mobile NFC-based payments--the thing most of us will use the technology for--will work is this: You go shopping for shoes. When you find the perfect pair and head up to the cash register, instead of whipping out your wallet and fishing around for a credit card, you just wave your phone over a payment terminal on the counter near the cash register. The catch is you need a phone with NFC chips inside. That phone will need software that enables mobile payments, and the retailer will need to have a point of sale terminal that accepts NFC payments. The purchase will show up on your monthly credit card bill. But let's say this store doesn't have your size? This is where having a smartphone equipped with NFC beats an NFC-equipped debit card: you could potentially wave your phone at a tag on that pair of shoes, and up on your phone's screen would pop places to buy those shoes in the right size online and have them shipped to you. And what if you shop at this particular department store often? Your phone could also keep track of your points or rewards from the store and you could be sent mobile coupons that you'd use your phone to redeem. NFC in Action A remarkably diverse and ever-expanding universe of NFC use cases is being explored and brought to market all around the world. Today, both research organizations and commercial enterprises are putting NFC to work in widely diverse areas. See these NFC uses cases in action by visiting NFC Forum on Youtube A Day in the Life NFC technology has the power to bring new simplicity and convenience to many aspects of a typical person's daily life, as this example illustrates: How does NFC work? Let’s start with the basics. NFC is a short range high frequency wireless connectivity technology, which allows electronic devices, in close proximity, to communicate. NFC enabled devices can connect and communicate with other devices without any physical contact. In many ways it’s similar to Bluetooth, but instead of manually configuring two devices to work together, the devices establish a connection automatically when they are close enough. NFC operates at the 13.56MHz radio frequency band, which is unregulated and universally available, so that there are no licenses required to operate at this frequency. The data is transferred at a speed of up to 424Kbps and the distance is usually between 4cm to 10cm. When devices are brought within this range, the electromagnetic radio fields of both devices interact and magnetic inductive coupling takes place that facilitates communication between the devices. There are two types of NFC devices—an initiator that initiates the communication and controls the data exchange, and a receiver (or the target device) that responds to the requests from the initiator. NFC has active and passive modes of operation—active, where both devices generate an RF signal to exchange data, and passive, where only one NFC device generates an RF field and the second device or target transfers the data back to the initiator via load modulation technique. Although the NFC data transfer rate is lower than Bluetooth and Wi-Fi, the connection is secured and far more trustworthy due to the short transmission range. NFC connection is also more reliable compared to a physical connection as the connection won’t degrade due to contact wear, corrosion and dirt. NFC technology follows several standards such as ISO (18092), ECMA (340) and ETSI in addition to being compatible to Philips' MIFARE (ISO 14443 A) and Sony's FeliCa smart card protocols. NFC in Mobile: 3 Ways It's Implemented on Phones In mobile phones, there are three different ways that NFC can be implemented : Fully Integrated into the handset - NFC, especially in newer devices, can be fully integrated into the handset. That means that the NFC controller (the piece that does the actual communication) and the secure element (the secure storage area connected to the NFC controller) are both integrated into the handset itself. One example of a fully integrated NFC handset is the Google Nexus S, Google's latest flagship phone built in partnership with Samsung. On a SIM card - Alternately, NFC can be integrated into a SIM card - the card that identifies a mobile subscriber on an operator's cellular network. On a memory card - NFC technology can also be integrated on a microSD card, which is a removable storage card that uses flash memory. Many mobile phone owners use microSD cards to store photos, videos, apps and other files in order to save storage space on the phone itself. For phones that don't have a microSD card slot, accessories like cases or "sleeves" can be used instead. For example, Visa introduced a case for the iPhone which contains a microSD card manufactured by Device Fidelity to bring NFC technology to iPhone users. Security aspects Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of meters. Also, eavesdropping is extremely affected by the communication mode. A passive device that does not generate its own RF field is much harder to eavesdrop on than an active device. One Open source device that is able to eavesdrop on passive and active NFC communications is the Proxmark instrument. Data Corruption Instead of just listening an attacker can also try to modify the data which is transmitted via the NFC interface. In the simplest case the attacker just wants to disturb the communication such that the receiver is not able to understand the data sent by the other device. Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if the attacker has a good understanding of the used modulation scheme and coding. This attack is not too complicated, but it does not allow the attacker to manipulate the actual data. It is basically a Denial of Service attack. Data Modification In data modification the attacker wants the receiving device to actually receive some valid, but manipulated data. This is very different from just data corruption. The feasibility of this attack highly depends on the applied strength of the amplitude modulation. This is because the decoding of the signal is different for 100% and 10% modulation. Data Insertion This means that the attacker inserts messages into the data exchange between two devices. But this is only possible, in case the answering device needs a very long time to answer. The attacker could then send his data earlier than the valid receiver. The insertion will be successful, only, if the inserted data can be transmitted, before the original device starts with the answer. If both data streams overlap, the data will be corrupted. Relay attack Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC. For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim’s smart card. Recommended Solutions Secure Channel for NFC Establishing a secure channel between two NFC devices is clearly the best approach to protect against eavesdropping and any kind of data modification attack. Due to the inherent protection of NFC against Man-in-the-Middle-Attacks it is rather easy and straightforward to setup a secure channel. A standard key agreement protocol like Diffie-Hellmann based on RSA [4] or Elliptic Curves could be applied to establish a shared secret between two devices. Because Man-in-the-Middle is no threat, the standard, unauthenticated version of Diffie-Hellman works perfectly. The shared secret can then be used to derive a symmetric key like 3DES or AES, which is then used for the secure channel providing confidentiality, integrity, and authenticity of the transmitted data. Various modes of operation for 3DES and AES could be used for such a secure channel. Does Your Phone Have NFC? If you're not sure if your phone has NFC (or if you're thinking of buying one that does), NFC World has a great list of current, planned and rumored handsets that support the technology. You can see that list here. Some notable phones available now that offer NFC capabilities include, as mentioned above, the Google Nexus S, as well as the Samsung Galaxy II (select models), Nokia C7, Nokia C7-00 and the Samsung Wave 578. Also Apple is rumoured to be adding NFC chips to the next version of the iPhone. In India, Tata Docomo has signed an agreement with US-based Xius to test NFC solution in Hyderabad. On which Kesav got a dedicated thread going here Initially on offer will be operator based services like mobile phone top-up (expectedly), as well as content like ringtones and wallpapers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Reference : cnet, readwriteweb, shanzai.com, nokia.uk, nfc-forum.org, Graz University of Technology Edit : Updated post with Security aspects of NFC
  18. Near Field Communication (Nfc)

    RIM introduces NFC-powered Blackberry Tag BlackBerry Tag will come as part of the next BlackBerry 7 update. The idea is that you can share photos, documents, URLs, and contact information by just tapping your BlackBerry devices together — not unlike the Bump application on iOS and Android. The only difference is that the Bump app employed Bluetooth connectivity while BlackBerry Tag uses NFC technology.
  19. Qwerty vs Touch

    Sent from my MB855 using Tapatalk One more Photon user in the forum! Kshah ji why haven't you posted your views / experience with the device yet.
  20. iPhone 4S Launched!

    According to Apple, first-day preorders of the iPhone 4S hit 1 million, easily besting the previous single-day preorder record of 600,000 set last year by the iPhone 4.
  21. BIRTHDAY WISHES!

    Happy Birthday Amit Kumar a.k.a amit.shippie !
  22. Yep. Airtel has nationwide presence and offers mobile services in all 22 telecom circles in India.
  23. Qwerty vs Touch

    I feel more comfortable typing on the on-screen multi touch keyboard of my Photon than on the physical qwerty one of BB 9650. Bigger, capacitive screen (4.3 inches) is a blessing!
  24. No Firmware Updates For Samsung Galaxy POP CDMA

    The specs under the hood of Samsung Galaxy Pop (like 600 Mhz CPU, low internal memory) is not sufficient to support the smooth functioning of the Gingerbread update.
×