Open BAR a New Approach to Mobile Backup and Restore

Total Page:16

File Type:pdf, Size:1020Kb

Open BAR a New Approach to Mobile Backup and Restore Universit`adegli Studi di Roma “Tor Vergata” Facolt`adi Ingegneria Dottorato di Ricerca in Informatica ed Ingegneria dell’Automazione Ciclo XXIII Open BAR A New Approach to Mobile Backup And Restore Vittorio Ottaviani A.A. 2010/2011 Docente Guida/Tutor: Prof. Giuseppe F. Italiano Coordinatore: Prof. Daniel P. Bovet to my parents because an example is worth a thousand words Abstract Smartphone owners use to save always more information, and more impor- tant data into the internal memory of their devices. Mobile devices are prone to be lost, stolen or broken; this causes the loss of all the information contained in it if these data are not backed up. While many solutions for making back- ups and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the plethora of devices, vendors, oper- ating systems and versions available in the mobile market. In this thesis, we propose a new backup and restores approach for mobile devices, which helps to reduce the effort in saving and restoring personal data and migrate from a device to another. Our approach is platform independent: in particular, we present some prototypes based on different mobile operating systems: Google Android, Windows Mobile 5 and 6 and Symbian S60. The approach grants the security of the information backed up and restored using novel cryptographic techniques optimized for mobile. Another feature of our approach lies in the capability of offering additional services to the final user or to administrator of the system. As an example, for users, we provide a service enabling the shar- ing of information in mobile devices among a group of selected persons. This can be useful in many situations e.g., in creating a mobile business network among a group of people. For administrators we offer a social network extrac- tor which, starting from information contained into the smartphone and data publicly available on the web generates a social graph of the backup network. This can be useful in situations like creating teams into an enterprise. i Acknowledgements During the years of my PhD several persons have passed into my life, some of these persons have leaved a sign that will never be deleted. First of all I want to thank Pino: your way to approach things, always search- ing for the best, inspires me everyday; I learned some of the most important sessions of my life thanks to you. I want to thank all the colleagues and friends who believed in me during hard times and who enjoyed with me successes; Emanuele, Cristina, Danilo and Paolo thank you guys for the support and for sharing with me your experience. Special thanks go to Fabio and to Ermanno. I will not write another thesis to explain this thanks: each one of you knows. Thanks to my family for your unconditioned love and trust in me. Words can- not fully express how important you are to me. Finally thank you Ramona, you are my love, my best friend and the reason why every morning I wake up and do my best to be a better person. iii Table of Contents 1 Introduction 1 1.1 Motivation . .1 1.1.1 How much does data loss cost? . .2 1.1.2 Focusing on mobile . .5 1.2 Our solution . .9 1.3 Contributions . 10 1.4 Thesis Outline . 11 2 Backup & restore in the third millennium 13 2.1 Backup features . 14 2.1.1 Full backup . 15 2.1.2 Incremental backup . 15 2.1.3 Differential backup . 16 2.1.4 File-based vs. device-based . 17 2.1.5 Scheduled backup vs continuous data protection . 18 2.1.6 Local backup vs. remote backup . 19 2.2 Mobile . 21 2.3 Local backup for mobile device . 21 2.4 Remote backup for mobile device . 22 3 Our approach to backup 25 3.1 A new approach to backup & restore . 26 3.1.1 Server . 28 3.1.2 Client . 29 v TABLE OF CONTENTS 3.2 Sharing backup data . 31 3.3 Social network analysis . 32 3.4 Security . 33 4 Data extraction 35 4.1 Forensic Style Approach . 37 4.1.1 Our methodology . 38 4.1.2 Symbian implementation . 39 4.1.3 Windows Mobile implementation . 41 4.1.4 Some remarks on this approach . 47 4.2 Selection of interesting data . 49 4.2.1 Symbian . 51 4.2.2 Android . 52 4.3 Performances . 53 4.4 Concluding remarks . 53 5 Data elaboration 55 5.1 Remote elaboration . 57 5.2 Our step-by-step Methodology . 59 5.2.1 Stage 0: Choice of the objective . 62 5.2.2 Stage 1: Files of interest identification . 62 5.2.3 Stage 2: Data hypotheses and entities injection . 64 5.2.4 Stage 3: Sequences similarity discovery . 67 5.2.5 Stage 4: Data interpretation . 68 5.2.6 Stage 5: Meta-format building . 70 5.2.7 Stage 6: Error correction . 72 5.2.8 Stage 7: Parser building . 74 vi TABLE OF CONTENTS 5.2.9 Stage 8: Testing and debugging . 74 5.3 Remote elaboration results . 75 5.4 Local elaboration . 77 6 Protecting saved data 81 6.1 Key agreement algorithm . 82 6.1.1 Mathematical setting: key agreement protocol . 83 6.1.2 J2ME implementation . 85 6.1.3 Performance testing methodology . 87 6.1.4 Performance evaluation . 89 6.1.5 Experimental results . 91 6.1.6 Concluding remarks . 93 6.2 Encryption algorithm . 93 6.2.1 Performances . 94 6.2.2 Statistically testing QP-DYN and RC4 . 98 6.3 Protecting inter process communication . 100 6.3.1 State of the art . 101 6.3.2 The framework . 103 6.3.3 The framework implementation . 108 6.3.4 On a real device . 112 7 Value added services on backup data 115 7.1 Sharing backup data with closed groups . 116 7.1.1 Social backup in business environment . 116 7.1.2 Sharing conference data . 117 7.1.3 Shared backup for smartphone . 118 7.1.4 Running the application . 119 vii TABLE OF CONTENTS 7.2 Extracting social network . 120 7.2.1 Introduction . 121 7.2.2 Related work . 122 7.2.3 Smartphone Data Analysis (SDA) . 124 7.2.4 Web Data Analysis (WDA) . 126 7.2.5 Clustering Analysis (CA) . 129 7.2.6 The Final Result: The Social Network . 132 7.3 Conclusions . 133 8 Conclusions and Future Work 135 A The Symbian S60 format 139 A.1 Address book . 139 A.2 Calendar . 141 A.3 Events log . 147 A.4 SMS . 150 B The Backup communication protocol 157 B.1 Backup item . 157 B.2 Contact item . 158 B.3 Calendar item . 159 B.4 Message item . 160 B.5 Generic file item . 161 B.6 Setting item . 162 B.7 List methods . 162 B.8 Restore . 164 B.8.1 Listing items on the server . 164 viii TABLE OF CONTENTS B.8.2 Choosing data to be restored . 164 C The Sharing communication protocol 167 C.1 Sharing methods . 167 C.1.1 Item listing . 167 C.1.2 Share a item . 168 C.1.3 Location based sharing . 169 C.1.4 Listing shared data . 170 C.2 Groups methods . 172 C.2.1 Creating group . 172 C.2.2 Listing groups . 172 C.2.3 Handling invitations . 173 Bibliography 189 ix List of Figures 1.1 Costs of data loss per industry sector (values are in million $ per year) . .3 1.2 Smartphone and PC sales prevision in Million of units . .5 1.3 2007 - 2010 trend mobile operating systems market share. .6 1.4 Mobile cellular, subscriptions per 100 people, 2009. .7 3.1 Backup and Restore system architecture. 27 3.2 Example of data model for a contact. 28 3.3 Example of a request of a contact. 29 3.4 Example of client server interactions. 30 4.1 Data collection workflow . 39 4.2 Windows Mobile 5.0 memory architecture. 42 4.3 (a) Symbian S60 tool’s screenshot, (b) Windows Mobile tool’s screenshot. 48 5.1 The methodology flow . 59 5.2 The format of the Ω operations sequence. In this figure is shown an example with contacts discovery as objective . 64 5.3 These figures show an example of a DBMS binary file before and after the Stage 3. In (a) the sample file after making pairs of calls of the same duration (Stage 2). In (b) equal sequences highlighted. In (c) the formatted file Φ^0 ............... 68 5.4 This three figures depict an example of the application of Stage 5 on a file containing the phone’s address book. 71 xi LIST OF FIGURES 5.5.
Recommended publications
  • HTC SPV MDA G1 Zdalny Unlock Kodem Po IMEI - Również DESIRE
    GSM-Support ul. Bitschana 2/38, 31-420 Kraków mobile +48 608107455, NIP PL9451852164 REGON: 120203925 www.gsm-support.net HTC SPV MDA G1 zdalny unlock kodem po IMEI - również DESIRE Jest to usługa pozwalająca na zdjęcie simlocka z telefonów HTC / SPV / QTEK / MDA / G1-Google / Xperia poprzez kod - łącznie z najnowszą bazą! Kod podawany jest na podstawie numeru IMEI, modelu oraz sieci, w której jest simlock. Numer IMEI można sprawdzić w telefonie poprzez wybranie na klawiaturze *#06#. Do każdego numeru IMEI przyporządkowany jest jeden kod. W polu na komentarz prosimy podać model, IMEI oraz kraj i nazwę sieci, w której jest załozony simlock. Czas oczekiwania na kod to średnio 2h. Nie zdejmujemy simlocków kodem z HTC Touch HD z sieci Play, HTC Touch Pro z Orange Polska i innych, które wyraźnie są wymienione na samym dole opisu! Usługa obejmuje modele: DOPOD 310 (HTC Oxygen) DOPOD 535 (HTC Voyager) DOPOD 565 (HTC Typhoon) DOPOD 566 (HTC Hurricane) DOPOD 575 (HTC Feeler) DOPOD 577W (HTC Tornado) DOPOD 585 (HTC Amadeus) DOPOD 586 (HTC Hurricane) DOPOD 586W (HTC Tornado) DOPOD 595 (HTC Breeze) DOPOD 686 (HTC Wallaby) DOPOD 696 (HTC Himalaya) DOPOD 696i (HTC Himalaya) DOPOD 699 (HTC Alpine) DOPOD 700 (HTC Blueangel) DOPOD 710 (HTC Startrek) DOPOD 710+ (HTC Startrek) DOPOD 818 (HTC Magician) DOPOD 818 Pro (HTC Prophet) DOPOD 818C (HTC Wave) DOPOD 828 (HTC Magician) DOPOD 828+ (HTC Magician) DOPOD 830 (HTC Prophet) DOPOD 838 (HTC Wizard) DOPOD 838 Pro (HTC Hermes) DOPOD 900 (HTC Universal) DOPOD C500 (HTC Vox) DOPOD C720 (HTC Excalibur) DOPOD C720W
    [Show full text]
  • LNCS 5101, Pp
    Database Prebuffering as a Way to Create a Mobile Control and Information System with Better Response Time Ondrej Krejcar and Jindrich Cernohorsky VSB Technical University of Ostrava, Center of Applied Cybernetics, Department of measurement and control, 17. Listopadu 15, 70833 Ostrava Poruba, Czech Republic {Ondrej.Krejcar,Jindrich.Cernohorsky}@vsb.cz Abstract. Location-aware services can benefit from indoor location tracking. The widespread adoption of Wi-Fi as the network infrastructure creates the opportunity of deploying WiFi-based location services with no additional hardware costs. Additionally, the ability to let a mobile device determine its location in an indoor environment supports the creation of a new range of mobile control system applications. Main area of interest is in a model of a radio-frequency based system enhancement for locating and tracking users of our control system inside the buildings. The developed framework as it is described here joins the concepts of location and user tracking as an extension for a new control system. The experimental framework prototype uses a WiFi network infrastructure to let a mobile device determine its indoor position. User location is used for data pre-buffering and pushing information from server to user’s PDA. All server data is saved as artifacts (together) with its position information in building. Keywords: prebuffering; localization; framework; Wi-Fi; 802.11x; PDA. 1 Introduction The usage of various wireless technologies has been increased dramatically and would be growing in the following years. This will lead to the rise of new application domains each with their own specific features and needs. Also these new domains will undoubtedly apply and reuse existing (software) paradigms, components and applications.
    [Show full text]
  • Backup4all Take Full Control of Your Backup
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2016 Softland Backup4all User Manual for Backup4all version 6 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line Parameters.......................................................................................................................................................... 11 4 Features
    [Show full text]
  • Brightstor Arcserve Backup for Linux Administrator Guide
    BrightStor® ARCserve® Backup for Linux Administrator Guide r11.5 D01211-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. ("CA") at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
    [Show full text]
  • Cumulus: Filesystem Backup to the Cloud
    Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract uitous broadband now provides sufficient bandwidth re- In this paper we describe Cumulus, a system for effi- sources to offload the application. For small to mid-sized ciently implementing filesystem backups over the Inter- businesses, backup is rarely part of critical business pro- net. Cumulus is specifically designed under a thin cloud cesses and yet is sufficiently complex to “get right” that it assumption—that the remote datacenter storing the back- can consume significant IT resources. Finally, larger en- ups does not provide any special backup services, but terprises benefit from backing up to the cloud to provide only provides a least-common-denominator storage in- a business continuity hedge against site disasters. terface (i.e., get and put of complete files). Cumulus However, to price cloud-based backup services attrac- aggregates data from small files for remote storage, and tively requires minimizing the capital costs of data cen- uses LFS-inspired segment cleaning to maintain storage ter storage and the operational bandwidth costs of ship- efficiency. Cumulus also efficiently represents incremen- ping the data there and back. To this end, most exist- tal changes, including edits to large files. While Cumulus ing cloud-based backup services (e.g., Mozy, Carbonite, can use virtually any storage service, we show that its ef- Symantec’s Protection Network) implement integrated ficiency is comparable to integrated approaches. solutions that include backup-specific software hosted on both the client and at the data center (usually using 1 Introduction servers owned by the provider).
    [Show full text]
  • Tanium™ Appliance Deployment Guide
    Tanium™ Appliance Deployment Guide Version 1.6.2 October 16, 2020 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium.
    [Show full text]
  • 3G Investigations
    22. Chaos Communication Congress 2005 3G Investigations Achim ‘ahzf’ Friedland / Daniel ‘btk’ Kirstenpfad <[email protected]> / <[email protected]> http://www.ahzf.de/itstuff/VoE/22C3_3GInvestigations.pdf 29. December 2005 Sometime in the past… … we dreamed of “ubiquitous communication” and radio technologies should help us... 22C3 – 3G Investigations page 2 <[email protected], [email protected]> Sometime in the past… … we dreamed of “ubiquitous communication” and radio technologies should help us... but we had some difficulties with congestion control of the Transmission Control Protocol and the bursty nature of failures on radio/wlan links... 22C3 – 3G Investigations page 3 <[email protected], [email protected]> Sometime in the past… … we dreamed of “ubiquitous communication” and radio technologies should help us... but we had some difficulties with congestion control of the Transmission Control Protocol and the bursty nature of failures on radio/wlan links... After some thinking people of earth found a solution: TCP with Selective Acknowledgments (TCP SACK, rfc 2018) 22C3 – 3G Investigations page 4 <[email protected], [email protected]> Some billion euros later... … we dreamed of “ubiquitous communication” with our new 3G/UMTS cellular phone... 22C3 – 3G Investigations page 5 <[email protected], [email protected]> Some billion euros later... … we dreamed of “ubiquitous communication” with our new 3G/UMTS cellular phone... but again mother nature isn’t very nice to us. We have to suffer of strange delays, obscure packet losses and nobody seems to know why... ;) 22C3 – 3G Investigations page 6 <[email protected], [email protected]> Some billion euros later..
    [Show full text]
  • Backup4all User Manual
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2017 Softland Backup4all User Manual for Backup4all version 7 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line.......................................................................................................................................................... Parameters 12 4 Features
    [Show full text]
  • Enabling Wireless Technologies for Green Pervasive Computing
    EURASIP Journal on Wireless Communications and Networking Enabling Wireless Technologies for Green Pervasive Computing Guest Editors: Naveen Chilamkurti, Sherali Zeadally, Abbas Jamalipour, and Sajal k. Das Enabling Wireless Technologies for Green Pervasive Computing EURASIP Journal on Wireless Communications and Networking Enabling Wireless Technologies for Green Pervasive Computing Guest Editors: Naveen Chilamkurti, Sherali Zeadally, Abbas Jamalipour, and Sajal k. Das Copyright © 2009 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in volume 2009 of “EURASIP Journal on Wireless Communications and Networking.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Editor-in-Chief Luc Vandendorpe, Universite´ catholique de Louvain, Belgium Associate Editors Thushara Abhayapala, Australia Zabih F. Ghassemlooy, UK Marc Moonen, Belgium Mohamed H. Ahmed, Canada Christian Hartmann, Germany Eric Moulines, France Farid Ahmed, USA Stefan Kaiser, Germany Sayandev Mukherjee, USA Carles Anton-Haro,´ Spain George K. Karagiannidis, Greece Kameswara Rao Namuduri, USA Anthony C. Boucouvalas, Greece Chi Chung Ko, Singapore AmiyaNayak,Canada Lin Cai, Canada Visa Koivunen, Finland Claude Oestges, Belgium Yuh-Shyan Chen, Taiwan Nicholas Kolokotronis, Greece A. Pandharipande, The Netherlands Pascal Chevalier, France Richard Kozick, USA Phillip Regalia, France Chia-Chin Chong, South Korea Sangarapillai Lambotharan, UK A. Lee Swindlehurst, USA Soura Dasgupta, USA Vincent Lau, Hong Kong George S. Tombras, Greece Ibrahim Develi, Turkey DavidI.Laurenson,UK Lang Tong, USA Petar M. Djuric,´ USA Tho Le-Ngoc, Canada Athanasios Vasilakos, Greece Mischa Dohler, Spain Wei Li, USA Ping Wang, Canada Abraham O.
    [Show full text]
  • Artoolkitplus for Pose Tracking on Mobile Devices
    Computer Vision Winter Workshop 2007, Michael Grabner, Helmut Grabner (eds.) St. Lambrecht, Austria, February 6–8 Graz Technical University ARToolKitPlus for Pose Tracking on Mobile Devices Daniel Wagner and Dieter Schmalstieg Institute for Computer Graphics and Vision, Graz University of Technology { wagner, schmalstieg } @ icg.tu-graz.ac.at Abstract In this paper we present ARToolKitPlus, a fiducial markers is undesirable, the deployment of black- successor to the popular ARToolKit pose tracking library. and-white printed markers is inexpensive and quicker than ARToolKitPlus has been optimized and extended for the accurate off-line surveying of the natural environment. By usage on mobile devices such as smartphones, PDAs and encoding unique identifiers in the marker, a large number Ultra Mobile PCs (UMPCs). We explain the need and of unique locations or objects can be tagged efficiently. specific requirements of pose tracking on mobile devices These fundamental advantages have lead to a proliferation and how we met those requirements. To prove the of marker-based pose tracking despite significant advances applicability we performed an extensive benchmark series in pose tracking from natural features. on a broad range of off-the-shelf handhelds. In this paper we focus on ARToolKitPlus, an open source marker tracking library designed as a successor to 1 Introduction the extremely popular open source library ARToolKit [4]. ARToolKitPlus is unique in that it performs extremely Augmented Reality (AR) and Virtual Reality (VR) require well across a wide range of inexpensive devices, in real-time and accurate 6DOF pose tracking of devices such particular ultra-mobile PCs (UMPCs), personal digital as head-mounted displays, tangible interface objects, etc.
    [Show full text]
  • Hitachi Data Ingestor
    Hitachi Data Ingestor 6.4.7 Cluster Administrator's Guide This manual describes how to operate a Hitachi Data Ingestor (HDI) system in a cluster configuration. MK-90HDI038-30 July 2019 © 2017- 2019 Hitachi Vantara Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1.
    [Show full text]
  • Kinh Nghiem Uprom Dong May HTC V.07.10.07
    Kinh nghi ệm uprom dòng máy HTC: b ắt ñầu t ừ ñâu? Mở ñầu: Sau khi mua máy Pocket PC phone, ñiều ñầu tiên là tôi lao vào các di ễn ñàn ñể tìm thông tin, m ột m ặt là tìm hi ểu v ề ph ần m ềm dùng trên PPC m ặc khác là tìm hi ểu v ề chuy ện UPROM nó ra làm sao?. Tuy nhiên, sau khi ñọc m ột lo ạt các thông tin, tôi b ắt ñầu th ấy có 2 ñiều ñáng s ợ. 1. Sợ là vì b ỏ ti ền ra mua máy khoảng 10-12 tri ệu ñồng nh ưng sau khi ham vui UPROM xong thì máy thành “c ục g ạch” ch ặn gi ấy ñen ngòm mà không bi ết ph ải làm sao? Vậy mà sau khi ki ếm ñủ thông tin thì tôi v ẫn còn s ợ. 2. Cái s ợ th ứ 2: là ñã có ñủ thông tin, nh ưng ña s ố bài vi ết ch ỉ mô t ả b ằng ch ữ là chính mà không có hình ảnh. Cái này nó gi ống nh ư là h ọc sinh ti ểu h ọc nghe th ầy giáo mô t ả “con trâu” nh ưng ch ưa bao gi ờ th ấy con trâu ra làm sao?. ðiều này th ật s ự ñáng s ợ. Tuy nhiên sau m ột h ồi tìm ki ếm, thì c ũng có m ột s ố di ễn ñàn h ọ mô t ả vi ệc upROM b ằng hình ảnh, ñiều này th ật s ự h ữu ích cho nh ững ng ười m ới b ắt ñầu.
    [Show full text]