Category Archives: My Blog

Android can keep a track on you too.

The hidden Devil.

Just before you recover from the shock of iOS tracking your location, and planning to move on to a more secure Android device (as it uses Linux and its supposed to be more secure, or coz the US Army now use it as standard issued smartphone.) You may be surprised to know that the cute little green Android also likes to keep your track and also likes the saved file to send it to Google(Come on Google, you already know everything, no one will make fun of you if you don’t know where your Android users currently are) It has been found out by some researchers that in Android 2.3 files cache.cell and cache.wifi located at /data/data/ which stores the locations of your movements.

So, you think Google is a nice guy and they won’t do any mischief with all your tracks on your every move? Well imagine this, Google’s server gets hacked and a mischievous hackers steals all the location data? Your Android is already synced with your Gmail account so the hacker also has a basic idea of who you are, and now he also knows where you are, and its only left to his evil imagination what trouble he can cause. You may also think, what?? No one can hack Google they are very good. Then think this it is very much possible that someone may steal your Android device, so that person not only steals your phone but that person also gets to know where you have been last night? You may think that you have never been to any places that you would hide from other person from knowing. Then think this the thief may analyze the location data of your’s and determine where you live (by noting where the phone usually stays at night) and it will also be easy to find out when do you stay out from your house most of the time. Then something more valuable than your phone might be stolen. Well possibilities are endless some people are saying that it’s nothing to panic about, but I feel it has got everything to panic about.

Personally I am worried about God knows what other devices are tracking our movies WP7? Bada? Who knows may be someday we will see headlines like “Your old monochrome handset has been tracking your moves since your teenage days!”

As usual do share your thoughts in comments.

Source: The Wall Street Journal.

Apple has its i on You.

iOS4 tracks and record your every movement.

It has been proved by two UK researchers that,iPhone running iOS4 tracks and records your movement. iOS4 stores a db (database file) in both iPhone and the computer that you use to sync your iPhone with.and this file consolidated.db is an unencrypted file, that means you can read this file easily. The file location on a Mac is /Users/<your user name>/Library/Application Support/MobileSync/Backups/ on Windows it may be somewhere C:Documents and SettingsUserNameApplication DataApple ComputerMobileSyncBackup (note: i can not tell for sure as i don’t have an iPhone) They also made an software to plot the locations in a map. But alas this desktop app is only for Mac. If you are a lucky Mac user get the desktop app from here.


So why does Apple stores the file? People are saying its for the new background location service introduced in iOS4 but if that is the case why the file is just stored there, in unprotected file? I can see next Hollywood flicks including this in their story, may be the evil guy using this to track the lead actress of the movie? what are your thoughts about this? And if any windows user have an iPhone running iOS4 please confirm the file location.And any one with iPad (3G version which got GPS) can confirm does that device too stores this location data?

Source: iPhoneTracker

iPad2 coming soon…

Apple will be launching iPad2 on 11th March price starting from $499. Steve Jobs made this announcement.

“With more than 15 million iPads sold, iPad has defined an entirely new category of mobile devices,” said Steve Jobs, Apple’s CEO. “While others have been scrambling to copy the first generation iPad, we’re launching iPad 2, which moves the bar far ahead of the competition and will likely cause them to go back to the drawing boards yet again.”


The features are as follows

  • Its thinner and lighter
  • 9x faster graphics
  • Dual A5 chip (2x faster processing power)
  • 10hrs long battery life
  • Dual camera (front and rear) so it got FaceTime
  • Available in two colors white and black bezel

Details specifications.

Available Models: Wi-Fi only and Wi-Fi+3G

Dimension: Height 9.5 inches, Width 7.31 inches Depth 0.34 inches Weight 601gm (Wi-Fi model) , 613gm (Wi-Fi+3G model) 607gm (Wi-Fi+3G CDMA model)

Memory: 16GB, 32 GB, 64GB

Connectivity: Wi-Fi (802.11a/b/g/n), Bluetooth2.1 +ERD Technology, UMTS/HSDPA/HSUPA (850, 900, 1900, 2100 MHz); GSM/EDGE (850, 900, 1800, 1900 MHz),CDMA EV-DO Rev. A (800, 1900 MHz)

Operators on which its available: at&t , verizon.

Display: 9.7inch LEDbacklit glossy widescreen Multi-touch display along with IPS Technology. Resoloution of 1024×768 (132 pixels/inch), Fingerprint-resistant oleophobic coating,

Processor: 1GHz dual-core Apple A5 custom-designed, high-performance, low-power system-on-a-chip

Camera: Back camera- Video recording at HD(720p) with 30fps Still pictures at 5x digital zoom, Front Camera- VGA video at 30fps at VGA still photos

Battery: Built-in 25-watt-hour rechargeable lithium-polymer battery, up to 10hrs battery life.

I/O: 30-pin dock connector port,3.5-mm stereo headphone minijack,Built-in speaker,Microphone,Micro-SIM card slot on Wi-Fi+3G models.

Audio: Frequency response: 20Hz to 20,000Hz,Audio formats supported: HE-AAC (V1 and V2), AAC (8 to 320 Kbps), Protected AAC (from iTunes Store), MP3 (8 to 320 Kbps), MP3 VBR, Audible (formats 2, 3, and 4, Audible Enhanced Audio, AAX, and AAX+), Apple Lossless, AIFF, and WAV
User-configurable maximum volume limit,Dolby Digital 5.1 surround sound pass-through with Apple Digital AV Adapter (sold separately)

Video: Video mirroring and video out support: Up to 1080p with Apple Digital AV Adapter or Apple VGA Adapter (cables sold separately),Video out support at 576p and 480p with Apple Component AV Cable; 576i and 480i with Apple Composite AV Cable,Video formats supported: H.264 video up to 720p, 30 frames per second, Main Profile level 3.1 with AAC-LC audio up to 160 Kbps, 48kHz, stereo audio in .m4v, .mp4, and .mov file formats; MPEG-4 video, up to 2.5 Mbps, 640 by 480 pixels, 30 frames per second, Simple Profile with AAC-LC audio up to 160 Kbps per channel, 48kHz, stereo audio in .m4v, .mp4, and .mov file formats; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 by 720 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format

In the pack: iPad,Dock Connector to USB Cable,10W USB Power Adapter,Documentation.

Whats Missing in iPad2

These are the things that i expected to be in iPad2

  • NO Retina Display.
  • NO 128GB Model
  • NO 3D
  • No USB
  • NO SD Card slot.

May be we will be 3rd time lucky with iPad3 🙂

Apple: not “i” but “we”

Apple has always been great in design in both their product and advertisements. Here is one from past when first Mac was launched. Its been told that when the people first saw this add many of them rush to phone(note at there time there were no iPhone their pocket) and ordered a Mac.

See the video for yourself and comment if you like it.


Android Security.

Good App vs Bad App

Mobile phone has become a part of our life rather a part of our body! weather its Facebook, Twitter, IM , or banking  are done by mobile now a days. And day by day mobile are becoming sophisticated as your computers and thus becoming a new window for hackers to make your digital life turn to hell. But there are some security mesures that can be taken to keep your digital life secured. The most popular mobile next to iPhone is Android, we will see what are the recent security issues related to Android and what can be done to protect yourself from such threats.

Android OS has its own security permissions for each of the applications installed in the handset. While you are installing the application from the older version of Android store you are shown with a screen where you select the security preferences of the application, like if you want that application to access your data,or send sms or connect to internet. But recently Android has made a new web based app market where you install apps OTA. In this type of installation we dont see the security preferences options while we are installing the app, most of the users don”t know that there exists such a option, making it more vulnerable to security issues. Recently antivirus giant McAfee has said that there is a rise of mobile virus and mallwares by 46% as most of the people today goes online from mobile rather then from a PC. They also said that the two most attacked mobile OS are Nokia Symbian and Google Android. Generally the iOS platform is considered secured for consumers as the Apple App Store is a closed one (considering you are average user who have not jailbreak your device) and RIM BlackBerry OS is also considered to be safe as its target audience is corporate and business men.

So the very obvious question that comes to your mind is what should general users do to help protect their Android devices?

Follow these simple rules to prevent your Android from getting hacked.

  1. Don”t “Root” your device unless you know what you are doing.
  2. Never get attracted to apps which says “free wallpapers”, “free screensavers”, “free ringtones” most virus and mallware use this kind of apps to disguise them from unsuspecting users. Think for a whle why u need to download an “app” to get u wallpapers? u can use a image to set as your wallpaper. there are millions of sites offering you wallpapers (usual format if jpg) and ringtones (usual format is mp3) to help you personalize your phone. I am not saying all the apps which offers free wallpapers and ringtones are bad, but i am saying that when it gets difficult to choose the right from wrong then go for a safer alternative.
  3. How to know from a good app from a bad app? There are many fake apps in the Android Market. You need to be very careful while you select which app to install. Some of the popular iPhone apps which generally don”t have Android version can also be found on Android Market obviously they are fake. Recently “Cut the rope” a popular iPhone game had not one but many fake apps Christie also seeks a lift in financial support “for other advantageous reasons that best casino gaming was initially approved. on Android Market. To find out a good app from a bad app is not that really hard. Say you want to download one app, a particular app which you have seen in someones else phone or read about or heard about it somewhere. You search for it in App Market and found more than one result! So what do you do? unless you know the name of the original company which you can find out by searching for it in Google. You should read the reviews generally apps which get most reviews and starts is the good app.
  4. Setting the security preferences and understanding them.While setting the security preferences you should know and understand what does it really means and does before clicking all “Accept” and “Yes” and “Next” which you see on the screen [like you do while installing software on Windows PC 🙂 ] Some of the basic security preferences are granting access to your data, you should think before granting this access. what will a game do by access your data? well a media player may access your data the media which it will play is stored on your phone so it may require to access it. But a game will never need to access your data. Again nor any media player or game needs to be given permission to send sms or text, it may happen that one application  may send some premium text which adds to your phone bill and drain your money from your pocket. And you should be really careful while granting access to use internet,GPRS,EDGE,3G or whatever data communication method available in your phone model. As it has been recently seen that an app can transmit all your personal information to someone who is sitting across the globe without your knowledge.

PlayStation 3 Cracked again.

One of the world’s most loved console Sony’s PS3 has been hacked by the famous Wii hacker Youness Alaoui. Sony recently released a firmware update 3.5.6 which was hacked in one day of the release. The patch was pushed to stop the modded or hacked PS3 to stop joining PSN network. .As the latest update has been unpacked and signing keys have been published so that other modders can create a custom firmware which can mimic the PSN network making it thing that the user is having the latest firmware and thus allow access to PSN network.

The most interesting part is that this news spread on the same day when Sony won a case over illegal modding of PS3 by George ‘Geohot’ Hotz he has been given restraining order to take part in any PS3 hacking activities.

Source: Twitter post of Youness Alaoui.

Happy 27th Birthday Apple Mac.

January 24th, 1984 was the day when the world’s most loved computer Mac was reveled by its father Mr Steve Jobs. The first Mac or Macintosh the first ever personal computer to run Apple’s OS was reveled to a crowd of 3000 people! (I wonder how much people r there in current Apple launch day program when Steve address) The operating system which it used to run was not Mac OS X it was called System 1.0. The hardware consisted of 9″ greyscale monitor, 8Mhz Processor, 128KB DRAM, 16bit Bus.

Did any one back then imagined that Mac will be the choice of computer for all the people
who are into graphics design, move editing, animation ?Well at that point of time it was
really a breakthrough in computing world.
All I want to say is Happy Birthday Baby You have come long way.

Here is the video of the event, view it and i am sure u will find striking resemblance with the very recent videos of Steve Jobs when you saw him reveling the iPhone or iPad.


iTunes decompiled to found proof of Qualcomm baseband use in Apple devices.

Italian hacker Zibri decomiled the latest version of iTunes by Apple to found the proof of use of Qualacomm baseband.According to Zibri files “partition.mbn” and “AMSS.MBN,” means Qualacomm baseband.As far as I know till now nothing else have best online casino been said about it, may be some more info will star casino . be found by him. But i must said decompiling Apple software and sharing the information to the world is a great dead.

Here is a part of the code released by him.

Code released by Zibri

For more info visit Zibri”s blog


The Android Story

Recently there has been much trouble for the Android as Oracle sued Google for copyright infringement, as it was found that as much as 43 source files were copied from J2SE to code the Android platform. But Google responded it with many valid points. It is not justified for Oracle to sue Google as because of

  • Sun open-sourced J2SE under the GPL license in the year 2006 and 2007 and it did not had any patent or copyright along with its code.
  • For Android Google had used a subset of Apache Harmony Java implementation.
  • For demonstrating compatibility with the Java specification the only way is to use Sun’s Technology Compatibility Kit, or TCK, and there has been internal strife about the license for the Java TCK, or JCK, for a long time among Sun / Oracle and Apache.
  • The one and only license offered by Sun t Apache is “field of use” which restricts the use in mobile platform only.

Is it that because Android has become so much popular and grown in business the real reason for Oracle to sue it? I did not find any valid reason on which ground did Oracle took such a step.

Read the Full response by Google to the lawsuit, the original document is attached, and decide for yourself. Do comment tour thoughts.

Google answer to Oracle’s lawsuit


Hi, I am Ahit, a boy who loves technology more then himself. A coder, developer, designer. And now a blogger 🙂 I will be using this blog primarily for giving info, news and reviews about the latest technologies and gadgets. Hope you guys like it.