mobile device configuration - ahm ilps · mobile device configuration en. ... •android 2.0 &...

55
Mobile Device Configuration En. Abdul Hak Bin Mahat Bahagian Teknologi Komputer Sistem Institut Latihan Perindustrian Selandar, Melaka. ahm80.wordpress.com

Upload: hoangkhuong

Post on 22-Jul-2019

243 views

Category:

Documents


0 download

TRANSCRIPT

Mobile Device Configuration

En. Abdul Hak Bin Mahat

Bahagian Teknologi Komputer Sistem

Institut Latihan Perindustrian Selandar, Melaka.

ahm80.wordpress.com

What is mobile device?

• A mobile device is a small computing device, typically small enough to be handheld, having a display screen with touch input and/or a miniature keyboard and weighing less than 2 pounds (0.91 kg).

• Samsung, Sony, HTC, LG, Motorola Mobility and Apple are just a few examples of the many manufacturers that produce these types of devices.

• https://en.wikipedia.org/wiki/Mobile_device

ahm80.wordpress.com

I define mobile devices as having:

• is small computing device (lightweight and is less than 12" )

• handheld & portable

• allow you to do many of the same things you can do with a desktop or laptop computer (offers multiple functionalities)

ahm80.wordpress.com

Devices that are "mobile devices":

• smartphone (and some feature phones)

• tablets

• personal digital assistant (e.g. iPod Touch)

• GPS navigation device (e.g. car or personal navigation device)

• netbooks and ultraportable laptop

ahm80.wordpress.com

ALL Phone Manufacturers

ahm80.wordpress.com

Personal Digital Assistant (PDA)

• Sometimes called pocket computers

• PDAs are handheld devices that combine elements of computing, telephone/fax, Internet and networking in a single device.

• A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer.

• most PDAs began as pen-based, using a stylus rather than a keyboard for input.

• Examples of PDA Devices: Palm Pilot, Revo, Sony Clie, Hewlett-Packard Jornado, Casio Cassiopedia, Compaq iPaq, Toshiba Pocket PC.

ahm80.wordpress.com

Palm PDA

ahm80.wordpress.com

Smartphones

• Smartphone combine both mobile phone and handheld computers into a single device.

• touchscreens and operating systems similar to those used by tablet computers.

• allow users to store information (e.g., e-mail), install programs, along with using a mobile phone in one device.

• a smartphone could be a mobile phone with some PDA functions integrated into the device.

ahm80.wordpress.com

Smartphones

• Internet access is an important feature of smartphones. Generally, you will need to purchase a 3G, 4G, or LTE data plan in addition to normal cell service.

• Smartphones can also connect to Wi-Fi when it is available; this allows you to use the Internet without using up your monthly data allotment.

• Examples of Smartphones: Samsung Galaxy S6, Lenovo A880, LG G4, HTC One (M8), Apple iPhone 6 Plus, Sony Xperia Z2, Nexus 6, Blackberry Passport, Nokia Lumia Icon, Huawei Honor 3X, etc.

• http://smartphones.specout.com/

ahm80.wordpress.com

Internet Service Provider

• 3G, 4G, and LTE—sometimes called 4G LTE—are different types of networks for cell phones.

• 3G is the slowest of the three networks, but it is also the most widely used.

• 4G has the potential to be much faster than 3G, but most phones are not yet equipped to use it.

• 4G networks are also not available everywhere—you're more likely to be able to use one if you live in a big city.

• As more phones become 4G compatible, the number of people who use 4G and LTE networks will likely grow.

• LTE = Long-Term Evolutionahm80.wordpress.com

Samsung Smartphones

ahm80.wordpress.com

Smartphone Spesification

ahm80.wordpress.com

Tablet PC

• Tablet PCs are a type of notebook computer that has an LCD screen on which you can write using a stylus.

• The handwriting is digitized and can be converted to standard text through handwriting recognition, or it can remain as handwritten text.

• Tablet PCs also typically have a keyboard and/or a mouse for input.

• Examples of Table PCs: Samsung Galaxy Tab 4, HP Slate S7, Acer Iconia Tab 8, Lenovo Tab 2 A10, Apple iPad mini

ahm80.wordpress.com

Samsung Tablets

ahm80.wordpress.com

Mobile Operating Systems (Mobile OS)

• a mobile operating system is the software platform on top of which other programs run.

• the manufacturer will have chosen the operating system for that specific device when you purchase a mobile device.

ahm80.wordpress.com

Mobile Operating Systems (Mobile OS)

(1)

(2)

(3)

(4)

(5) ahm80.wordpress.com

Android (based on the Linux Kernel) is from Google Inc.

• Android 1.1 (Alpha)

• Android 1.2 (Beta)

• Android 1.5 (Cupcake)

• Android 1.6 (Donut)

• Android 2.0 & 2.1 (Éclair)

• Android 2.2.x (Frozen Yogurt - Froyo)

• Android 2.3.x (Gingerbread)

• Android 3.0.x (Honeycomb)

• Android 4.0.x (Ice Cream Sandwich)

• Android 4.1.x, 4.2.x & 4.3.x (Jelly Bean)

• Android 4.4.4 (KitKat)

• Android 5.0.1, 5.1.x (Lollipop)

ahm80.wordpress.com

Apple iOS (previously known as iPhone OS) is from Apple Inc.

• iPhone OS 1.x

• iPhone OS 2.x

• iPhone OS 3.x

• Apple iOS 4.x

• Apple iOS 5.x

• Apple iOS 6.x

• Apple iOS 7.x

• Apple iOS 8.x

• Apple iOS 9

ahm80.wordpress.com

Windows Phone is from Microsoft

• Windows Phone 7

• Windows Phone 7.5

• Windows Phone 7.8

• Windows Phone 8 (GDR1, GDR2 & GDR3)

• Windows Phone 8.1 (GDR1 & GDR2)

ahm80.wordpress.com

BlackBerry 10 (based on the QNX OS) is from BlackBerry

• BlackBerry 10.0

• BlackBerry 10.1

• BlackBerry 10.2

• BlackBerry 10.3

With BlackBerry 10 OS,

version 10.3.2, your privacy

and security are fortified

even further with the anti-

theft protection feature.

ahm80.wordpress.com

Practical

• Please check your mobile device operating system version.

ahm80.wordpress.com

9 Common Smartphone Mistakes That Expose Security Risks

1. Not Locking That Phone - The best type of screen lock is a PIN or

password.

- Avoid screen lock patterns which can easily

be hacked.

- Set the phone to lock the screen after one

minute of being idle.

ahm80.wordpress.com

Practical

• Setup Phone Security

Setting > Security > Screen lock – select screen lock

(swipe, pattern, PIN or password) > Test your

phone security.

• Setup SIM card lock

Setting > Security > setup SIM card lock > key in

your PIN > Test SIM card lock security.

ahm80.wordpress.com

2. Joining Public Wi-Fi Networks

• Don’t use public Wi-Fi network, connect to the internet using a VPN.

• Hackers can easily steal your information and remotely access your device.

• Otherwise, use your mobile data network.

ahm80.wordpress.com

Practical

• Setup Access Point

• Join your smartphone to access point by using WiFi, connect to internet.

• Test the functionality.

1. Open Settings on your smartphone.

2. Tap on Wireless and Networks option.

3. Tap More settings.

ahm80.wordpress.com

ahm80.wordpress.com

Practical

• Setup your Personal Hotspot

Setting > More..> Tethering and portable hotspot > tick personal hotspot > choose Use WLAN Connection

SSID : ?

Security : ?

Password : ?

- You can make your own security setting and number of user.

ahm80.wordpress.com

3. Not Using An Antivirus & Other Security Software

• Many people don’t realize that a smartphone is actually a computer - malware risks.

• According to the Journal of Information Systems Technology and Planning, over 96% of smartphones do not have pre-installed security software.

• Some good free antivirus software for Android phones include; Bitdefender, AVG and Avast.

• Apple says their iPhones are practically impermeable to malware but only time will tell.

• you also avoid transferring a virus to your computer via USB which is a common problem these days.

ahm80.wordpress.com

Install antitheft software• In addition to that, it is also a good idea to install antitheft

software that prevents access to your phone after it has been stolen. An application such as Prey wipes your data remotely if your phone is stolen.

• To track your phone using GPS, you can also install an app such as Where’s My Droid for Android or Find My iPhone for iPhones.

ahm80.wordpress.com

Practical

• Using Play Store, download application : Prey

• In Device Manager : it’s show you your locaton.

ahm80.wordpress.com

4. Forgetting To Install Those Updates• Smartphone manufacturers and app developers regularly issue

software updates to improve functionality and to patch security gaps.

• In general, you should accept updates to your phone’s operating system as soon as you are notified.

• The same goes with apps running on your phone.

• Make it a habit to regularly update the software running on your smartphone.

ahm80.wordpress.com

5. Not Verifying Your Apps• Few people verify apps before they download and install them.

• By verify, I mean checking to see the developer’s history, prior products, reviews and going online to carry out some basic research before installing an app.

• Many smartphone users download and install apps that come packaged with malware that gives a remote hacker root access.

• The problem is mainly with Android phones due to the relaxed rules required to host an app in the Play Store.

ahm80.wordpress.com

6. Simply Tapping On Links• According to RSA’s cyber security experts, smartphone users

are more susceptible to phishing attacks than desktop users.

• They tend to be less vigilant about security.

• It is harder to spot a fake login page on a smartphone than on a computer.

• Further, shortened URLs make it harder to detect illegitimate addresses.

• The best defense is to avoid clicking on links sent via SMS or instant messaging apps.

• Also, always open email links using your computer.

ahm80.wordpress.com

7. Not Switching Off Bluetooth

• Have you heard of the terms bluejacking, bluebugging or bluesnarfing?

• These all describe a situation where a hacker gains access to your phone using your Bluetooth connection.

• Using this technique, the hacker only needs to be at least 30 feet away from you and you’ll never know what hit you.

• Within seconds, a Bluesnarfer can steal data such as confidential information and even login data to various sites.

• So, unless you are transferring or receiving a file, switch off your Bluetooth connection.

ahm80.wordpress.com

Practical

• Turn On Bluetooth

• Scan for devices

• Paired Bluetooth device

• Send a file / image.

• Turn Off Bluetooth.

ahm80.wordpress.com

8. Forgetting To Log Out

• If you are always logged into Maybank2u, trivago, PayPal, eBay and other sensitive sites where your finances are within easy reach, you might as well leave your credit card /debit card lying on the table at your local eatery.

- Don’t keep your phone permanently logged into such websites.

- Don’t check the box in the app that asks to save your username and

password.

• It is convenient not to have to log into the app every time but it exposes you to considerable financial risk.

• If your phone were to be stolen, a thief would have unrestricted access to your finances and you could end up with a massive bill for things you never bought.

• The same goes for a browser. If you log into sensitive sites, do not give the browser permission to save your username and password.

• Also, make sure you clear your browser history after surfing for sensitive material.

ahm80.wordpress.com

9. Storing Sensitive Data On Your Phone

• I have never quite understood why some people insecurely store credit card PINs, bank online passwords, social security numbers and other such sensitive data on their phones.

• In the event your phone is stolen, it wouldn’t take a genius to figure out that a four digit number stored as a phone contact is a PIN to one of your accounts.

• With a bit more digging, a clever crook can mess up your life.

ahm80.wordpress.com

What are Junk Files?

• Your hard disk is the storage device that holds the entire Windows operating system and all of your important files and data.

• Through normal use of your computer, your hard disk will become cluttered with hundreds or even thousands of Junk Files.

• These junk files are created by Windows and other programs that writes temporary files, during installation and when running, to your hard disk which they need to do in order to work.

• The problem is often that these junk files are not removed from your hard disk, even after they are no longer needed, and waste important disk space for your computer to run optimal.

ahm80.wordpress.com

Please Delete Your Junk Files ……

• A hard drive has a limited amount of space. If you run out of hard drive space, your computer may lockup, crash, or even fail to start-up.

• The more files you have on your hard drive, the more time it can take to access files while using the computer, the more data you have on your hard drive, the performance is much slower.

• Removing the garbage files from your system can regain megabytes or even gigabytes of valuable disk space on your hard drive.

• This will give you more hard drive space for new programs as well as data files like pictures, movies or other important files and helps avoid possible computer issues caused by low disk space.ahm80.wordpress.com

Practical

• Download Clean Master on your Smartphone

- Run Phone Boost

- Delete Junk File

- Run Antivirus

- Clean browser history

- Check CPU temperature

ahm80.wordpress.com

ahm80.wordpress.com

ahm80.wordpress.com

5 Tips for Backing Up Your Smartphone

1. Use Automatic Back Up Capabilities

2. Test Your Back Up System

3. Back Up Selectively

4. Timing Your Backups – before reset

5. Upgrade Your Memory Card

ahm80.wordpress.com

Practical

1. Setup back up and automatic restore

at your mobile phone.

2. You can try to download 3rd party

back up application.

3. Back up pictures and video to computer

or other external storage.

ahm80.wordpress.com

ahm80.wordpress.com

Tip to improve your smartphone performance

1. Delete junk files.

2. Manage your internal storage.

3. Delete unnecessary video files, picture files and other file.

4. Transfer video file from internal memory to external memory.

5. Transfer video file to your computer.

ahm80.wordpress.com

Q & A

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com

iOS vs Android http://money.cnn.com/interactive/technology/iphone-

android-comparison/

ahm80.wordpress.com