WELCOME TO MY BLOG

WELCOME TO MY BLOG

Friday, 4 May 2012

iOS vs Android




I have read the article about Samsung Galaxy S3 vs Apple iPhone 5 that wrote by Raj Dutta on May 3, 2012. He claims that the buying decision may influence by the hardware or the iOS or Android operating system. Samsung Galaxy S3 has released in London on May 3, 2012 and expected to be available internationally around June while Apple iPhone 5 chose a late release since sales of iPhone 4S are still concern in the market. Click here for the article.


Even though, I am one of the Android users, I am not really bothered the information regarding iOS and Android. Since this issue is highlighted recently, let’s check it out.


What is iOS?
According to Daniel Nations (About.com Guidde, 2012), iOS is Apple's mobile operating system used to run the popular iPhone, iPad and iPod Touch devices. Formerly known as the iPhone OS, there are over 300,000 iOS applications available for download in the Apple app store, the most popular app store of any mobile device. iOS utilizes a multi-touch interface where simple gestures are used to operate the device, like swiping your finger across the screen to move to the next page or pinching your fingers to zoom out.


What is Android?
As stated by Matthew Boltan (http://www.techradar.com, 2011), Android is an operating system for mobile phones and tablets, in much the same way that PCs run Microsoft Windows as their operating system. It's maintained by Google, and comes in a few different versions. At the time of writing, mobile phones run a variant of version 2 of Android, while most new tablets run a variant of version 3. The difference between the 2.x and 3.x versions of Android is mainly in how they use the screen space provided.


The similarities of iOS and Android
Both iOS and Android have:
1. Traditional access control
Password and idle time screen locking to protect the device itself.


2. Isolation
A process’s availability to access sensitive data or system resources is limited from another process.


3. Permission-based access control
Granting each application a set of permissions that limits its access specified device data and system.


4. Limited hardware access
Apps cannot directly access the underlying hardware. The hardware interactions are all controlled exclusively by a number of different layers of software which at as intermediaries between the application and the device itself.


5. Resistance to web-based attack
Both systems have some built in capabilities to resist web-based attacks.


The differences between iOS and Android
1. Method of application distribution
Android has more distribution channels. With Android there are more opportunities and methods to load application.
iOS apps can only be distributed through the Apple app store.


2. Data Encryption available on both devices
There are different levels of encryption, and some of them are device-specific. The OSes provide mechanisms for app to store secret in ciphertext on disc but apps don’t always take advantage of these features.


3. Application security testing
The level of verification on app security isn’t the same between various Android marketplaces and Apple’s App Store. Security and privacy are not thoroughly tested and unauthorized access to sensitive data has already occurred in both the App Store and Android Marketplace.


4. Apple sometimes approve apps then disapproves them
Apple has an approval process to place an application into the iTune store. However, it’s not hard to find examples of apps being removed from the store after they have found to behave badly.


The security features
Android security features
1. Permission-based access control
Android’s access control model is different than iOS’s: inside the application manifest, there is a static list of permissions that the Android application requests up front. The user is presented with list at application installation time.


2. Installing applications
The official Google marketplace allows remote installation of applications to your phone. It prompts the phone to accept the installation, therefore it is not possible to remotely install and run an auto erase or find me type application.


iOS security feature 
1. Permission-based access control
When an application requests the use of a protected feature in iOS at runtime, the OS pops up a dialog box in the middle of the app and asks the user if he/she chooses to allow the application access to the resource. Many apps fail if the user chooses “no”.


2. Geolocation
Locate the phone when it’s lost. This feature is provided by Apple as a feature of its operating system and accompanying online service.


3. Auto Erase
If the phone is lost or stolen, the user can wipe sensitive data from their device. In the event that the phone is returned, the user can restore the information from the backups on the desktop. When the feature is enabled, 10 failed passcode attempts will automatically erase date from the device.


Now, you have the information. Thus, use your smartphone wisely.

Internet Banking: CIMBClicks

What is CIMBClicks?

CIMBClicks is the Internet banking and financial service portal accessible to all CIMB Bank ATM and Credit Cardholders. It is convenient and safe way to do banking on the Internet. CIMBClicks specifically caters to the need of consumer banking clients of CIMB. The service is accessible 24 hours a day, 7 days a week. (Exception of daily downtime at midnight (Malaysia) for maintenance.) and CIMBClicks is accessible from anywhere in the world with Internet access.

The URL address for CIMBClicks is www.cimbclicks.com.my

What are the benefits?

The benefits by signing up CIMBClicks as follows:
Perform transaction easily and conveniently.
Spend much less effort at a lower cost.
The service is offered at no charge.
The user can make transactions after banking hours and from the comfort of the office  or home.
Pay your bills online to respective government agencies, utility companies and subscription services.
Check on Loan/Financing and Foreign Currency Accounts.
View Credit Card statements and transaction history.

CIMB has also promised by continuously adding new services from time to time to meet consumer banking needs.

How to register for this service?

First, create your Internet Banking e-PIN at any CIMB ATM. Then, log on to www.cimbclicks.com.my and register online.

How to create e-PIN at ATM machine?

i. At the CIMB ATM machine, insert ATM card and enter the existing ATM PIN.
ii. Select "Others", then select "Internet e-PIN ".
iii. Key in 6-digit e-PIN of your choice. It must be different from present ATM card PIN.
iv. Confirm e-PIN by keying the same 6-digit number again.
v. If e-PIN creation is successful, the ATM will display the message "Internet e-PIN accepted".

How secure is CIMBClicks?

CIMB has promised the confidentiality and integrity of the transactions performed via CIMBClicks as that all information transmitted over the Internet is encrypted using 128-bit SSL. Strong end-to-end encryption is also adopted. In addition to that CIMB has received a security certification from a prominent security expert for having achieved a greatly enhanced level of security conforming to global best industry practices.

The browsers that are compatible with this service are:
Internet Explorer version 6 & above 
Netscape Communicator V8.1 & above
Firefox V1.5.0.3 & above
SeaMonkey V1.1.8 & above
Apple Safari 2.0 & above

In order to ensure the transactions that have performed cannot be view by an unauthorized person or stored in the cache memory of the computer used, the user is advised to clear the cache memory of the Internet browser. You can follow below instruction according the browser that you have used:

Internet Explorer 6 
* Click "Tools"
* Select "Internet Options" 
* Click "General" 
* Select "Temporary Internet Files" and click "Delete Files" 
* Click "OK" 
* Click "OK" again to close the Internet Options window 

Internet Explorer 7
* Click "Tools"
* Select "Internet Options" 
* Click "General" 
* Under "Browsing History", click "Delete"
* Select "Temporary Internet Files" and click "Delete Files" 
* Click "OK" 
* Click "OK" again to close the Internet Options window

Mozilla Firefox 2
* Click "Tools" 
* Select "Clear Private Data"
* Select "Cache" 
* Click on "Clear Private Data Now"

Opera
* Click "Tools" 
* Select "Delete Private Data"
* Select "Cache" and click "Delete"

Safari
* Open browser and click "Empty Cache"

Thus, let’s start using CIMBClicks together. It is safe and convenient!

References: