Analysis and Design of Browser for Secure Mobile Payments

Total Page:16

File Type:pdf, Size:1020Kb

Analysis and Design of Browser for Secure Mobile Payments A Summer Internship Project Report On Analysis and Design of Browser for secure mobile payments Carried out at the Institute of Development and Research in Banking Technology During 20th May – 20th July 2014 Submitted by: SUHANI GARG Integrated M.Tech 3rd Year Mathematics and Computing 11412EN005 IIT-BHU (Varanasi) Under the Guidance of Dr. V.N.Sastry Professor IDRBT, Hyderabad Date of Submission: 18th July 2014 1 ABSTRACT Mobile banking is easy, saves a lot of effort and time. Losses attributed to financial fraud are alarming. Mobile banking via a mobile browser is similar to home banking. Browsing-based threats for smartphones are just the same as those for computers which mean mobile security is just as important as PC security. Apart from various browsers available in market, there are several proxies which infect web browser by taking advantage of vulnerabilities in browser security, thereby modifying ones transactions and web pages content. Authentication is a technique to identify a person’s identity. Transaction authentication includes id and password, IP address, geolocation, computer hardware, time of day and previous user pattern of behaviour. Geolocation authentication is an important type of transaction authentication. The aim of the project is to make a comparative analysis of the various desktop and mobile browsers available in the market, study their features and to develop a new secure mobile browser especially for banks including a new way of authentication which includes security of mobile transactions. So, in addition to id and password, geolocation tells banks from which place transaction are going to take place. Hence, it helps banks to provide secure transactions. 2 CERTIFICATE This is to certify that the summer internship project report entitled “Analysis and Design of Browser for Secure Mobile Payments” submitted by SUHANI GARG, I.M.D.(MnC) 3rd Year, IIT-BHU(Varanasi) to Institute for Development and Research in Banking Technology (IDRBT), Hyderabad is a record of bonafide work carried out by her under my supervision and guidance during 20th May 2014 to 18th July 2014. (Dr. V.N.Sastry) Professor, IDRBT. Project Guide 3 DECLARATION I SUHANI GARG hereby declare that this Dissertation entitled “ANALYSIS AND DESIGN OF BROWSER FOR SECURE MOBILE PAYMENTS” submitted by me under the guidance and supervision of Dr. V.N. Sastry, Professor, IDRBT, is a bonafide work. I also declare that it has not been submitted previously in part or in full to this University or other University or Institution for the award of any degree or diploma. Date:18/07/2014 Name: SUHANI GARG Signature of the Student 4 ACKNOWLEDGEMENTS First, and foremost I would like to express my sincere gratitude to my project supervisor Dr. V.N.Sastry, Professor, IDRBT, Hyderabad, who guided me all through the project and showed me the right path. His engagement in my project and his stream of ideas have been absolutely essential for my results presented here. I am very thankful that he has spent so much time with me during my project work. My honourable thanks to Shri.B.Sambamurthy, Director, IDRBT for providing excellent labs and library. I would also like to thank IDRBT staff. I thank IDRBT for providing me with necessary infrastructure and technical support that was required for this project. Finally, I express my gratitude to my parents and friends for their valuable suggestions and moral support. SUHANI GARG Integrated M.Tech 3rd year Department of Mathematical Sciences IIT-BHU (Varanasi) Email: [email protected] Ph: +91-7704094623 5 CONTENTS Abstract Acknowledgement Certificate 1. Introduction 1.1 Websites 1.2 Browsers 1.3 Protocols 1.4 Authentication 1.5 Browser Web Development Tools 1.6 Conclusion 2. Analysis and Comparison of Desktop Browsers 2.1 Desktop browser and Mobile browser 2.2 Analysis of various desktop browsers 2.3 Best Browser 2.4 Present usage share and future trend of web browser 2.5 Conclusion 3. Analysis and Comparison of Mobile Browsers 3.1 Analysis of various mobile browsers 3.2 Mobile platforms and Security basis 3.3 Mobile Screen Resolution 3.4 Disadvantages of Mobile Internet 3.5 Mobile Networks and Protocols 3.6 Inter-operability 3.7 Future of Mobile browsers 3.8 Conclusion 6 4. Design and Implementation of Browser for secure Mobile Banking 4.1 Secure mobile banking 4.2 Browser attacks on banking 4.3 Design and Implementation 4.4 Conclusion 5. Conclusions and Future Work References 7 Chapter 1 : Introduction In this chapter, basics about websites, their features, various types of websites available. Browser and their distinguishing features, list of some browsers are presented. Then it describes about various protocols and its layers, authentication and different types of authentication available. Lastly, the various common web development tools i.e. advantages of using HTML, HTML5 and XML are presented. 1.1 Websites Website is the very first thing that we see in a browser. A website is set of web pages hosted on at least one web server. It is accessible via an Internet or local area network through Uniform resource locator. There are various characteristics to make an effective website. 1. Appearance :- A site must be polished, visually appealing and professional outlook. Some guidelines to improve this are meaningful graphics, good use of colour, text easily readable, simplicity and quality photography. 2. Content :- A good site should have relevant and informative substance. Some guidelines to improve this are short and organized copy, speak to visitors, update content regularly, unique content and consider a professional to write and edit. 3. Functionality :- Every component of a website should work correctly and quickly. For this, it should be error free copy. 4. Usability :- Site must be easy to read, understand and navigate. Some guidelines to improve this are fast loading pages, minimal scroll, consistent layout, simplicity, cross platform / browser compatibility and screen resolution. 5. Search Engine Optimized 6. User Friendly 7. Mobile Dominated Web 8. Get on Board with Social Media There are various different types of websites. Some of them are :- 1. Personal websites 2. Writers and Authors websites 3. Photo Sharing websites 4. Community building websites 5. Mobile device websites 6. Blogging websites 7. Directory websites 8. Online Business Brochure/ Catalog websites 9. Informational websites 10. E-Commerce websites 8 1.2 Browsers A web browser is an interface that allows a computer user to gain access to all content that is on Internet as well as hard disk of computer. It allows us to access web pages, images, audio and video files, text documents, etc. We can install multiple browsers in computer. Browsers are developed to access information on World Wide Web. The distinguishing areas of browsers are: Platform : Windows, Mac, BSD, Linux and other Unix Protocols: FTP, SFTP, SAMBA, HTTP, IMAP, etc. Layout Engine: Amaya, Gecko, Trident, KHTML, WebKit Graphical User Interface (GUI) Proprietary HTML5 Support Open Source Mobile Compatibility Some features offered by web browsers include downloads, bookmarks, search engine toolbars password management, spell checking, tabbed browsing, HTML access keys, advertisement filtering and pop-up blocking. Some important web browsers are listed below: Table : Various desktop browsers Browser Release Latest Version Creator URL Year Internet Aug,1995 11.0.9 Microsoft http://microsoft.com/ie Explorer Mozilla Nov,2004 30.0 Mozilla http://mozilla.org/firefox Firefox Google Sep,2008 35.0.1916.153 Google http://www.google.com/chrome Chrome Safari Jan,2003 7.0.5 Apple http://apple.com/safari Netscape Dec,1994 8.1.3. Netscape http://www.netscape.ca/ns/browser Navigator s/7/download/ Opera 1994 22.0.1471.70 Opera http://www.opera.com/ Lynx 1992 2.8.8 Grobe http://lynx.isc.org/ OmniWeb 1995 5.11.2 Omni Group http://www.omnigroup.com/more Konqueror Oct,2000 4.13.1 KDE http://www.konqueror.org/ 9 iCab 1999 5.2 Clauss http://icab.de/ Camino 2002 2.1.2 Apple http://caminobrowser.org/ Maxthon 2003 4.4.1.200 Maxthon http://www.maxthon.com/ Netsurf 2002 3.1 NetSurf http://www.netsurf-browser.org/ 1.3 Protocols A standard set of rules that allow two devices to connect and exchange information across each another is called a protocol. Internet protocols include TCP/IP (Transfer Control Protocol/ Internet Protocol), FTP (File Transfer Protocol), HTTP (Hypertext Transfer Protocol) and SMTP (Simple Mail Transfer Protocol). World’s most famous protocol is internet protocol based on open system, suited for LAN and WAN communications and can communicate to any set of interconnected networks. The two best known are Transmission Control Protocol (TCP) and the Internet Protocol (IP).Internet Protocol Suite provides abstraction of protocols using encapsulation. The four layers are: Application Layer : FTP, DNS, HTTP, SMTP, SNMP, SSH, NTP, SOCKS, SSL, Telnet and more Transport Layer : TCP, UDP, SCTP, RSVP, DCCP and more Internet Layer : IP (IPv4, IPv6), IPsec, ICMP, ECN, ICMPv6 and more Link Layer : DSL, PPP, NDP, ARP and more Internet Protocol version 6 (IPv6) is the current-generation Internet Protocol version designated as the successor to IPv4. IPv6 addresses typically have two parts: a 64-bit network prefix and a 64-bit host address. The IPv6 addressing structure uses hexadecimal notation, normally written as eight groups of four hexadecimal digits, and colons replace the periods used in IPv4. IPv6 has four address types: unicast (one-to-one), anycast (one-to-nearest), multicast (one-to-many), and a reserved class. IPv6 does not support broadcasting. IPv6 runs well in high-performance networks, such as Gigabit Ethernet and ATM networks, and it is also efficient for low- bandwidth networks such as wireless networks. IPv6 offers better security mechanisms, mandating the use of IPsec and IKE. The motivations to bring IPv6 version are fast growing internet and large address space, to provide security feature which is vulnerable as data on internet, to make data prioritization up to date and to make device to have globally unique IP address.
Recommended publications
  • Cache Files Detect and Eliminate Privacy Threats
    Award-Winning Privacy Software for OS X Every time you surf the web or use your computer, bits of Recover Disk Space data containing sensitive information are left behind that Over time, the files generated by web browsers can start could compromise your privacy. PrivacyScan provides to take up a large amount of space on your hard drive, protection by scanning for these threats and offers negatively impacting your computer’s performance. multiple removal options to securely erase them from PrivacyScan can locate and removes these space hogs, your system. freeing up valuable disk space and giving your system a speed boost in the process. PrivacyScan can seek and destroy internet files used for tracking your online whereabouts, including browsing history, cache files, cookies, search history, and more. Secure File Shredding Additionally, PrivacyScan can eliminate Flash Cookies, PrivacyScan utilizes advanced secure delete algorithms which are normally hidden away on your system. that meet and exceed US Department of Defense recommendations to ensure complete removal of Privacy Threat: Cookies sensitive data. Cookies can be used to track your usage of websites, determining which pages you visited and the length Intuitive Interface of time you spent on each page. Advertisers can use PrivacyScan’s award-winning design makes it easy to cookies to track you across multiple sites, building up track down privacy threats that exist on your system and a “profile” of who you are based on your web browsing quickly eliminate them. An integrated setup assistant and habits. tip system provide help every step of the way to make file cleaning a breeze.
    [Show full text]
  • A Taxonomy and Business Analysis for Mobile Web Applications
    A Taxonomy and Business Analysis for Mobile Web Applications Kevin Hao Liu Working Paper CISL# 2009-01 January 2009 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E53-320 Massachusetts Institute of Technology Cambridge, MA 02142 A Taxonomy and Business Analysis for Mobile Web Applications By Kevin Hao Liu Ph.D. Computer Science Victoria University Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management and Engineering At the Massachusetts Institute of Technology February 2009 © 2009 Kevin H Liu. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author Kevin H Liu System Design and Management Program February 2009 Certified by Stuart E Madnick John Norris Maguire Professor of Information Technology Sloan School of Management Professor of Engineering Systems School of Engineering Massachusetts Institute of Technology Thesis Supervisor Certified by Patrick Hale Director System Design & Management Program Massachusetts Institute of Technology A Taxonomy and Business Analysis for Mobile Web Applications By Kevin Hao Liu Submitted to the System Design and Management Program in February 2009 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management and Engineering ABSTRACT Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications by proposing a new taxonomy for mobile web applications, and conducting a business analysis in the field of mobile web applications.
    [Show full text]
  • Effects and Opportunities of Native Code Extensions For
    Effects and Opportunities of Native Code Extensions for Computationally Demanding Web Applications DISSERTATION zur Erlangung des akademischen Grades Dr. Phil. im Fach Bibliotheks- und Informationswissenschaft eingereicht an der Philosophischen Fakultät I Humboldt-Universität zu Berlin von Dipl. Inform. Dennis Jarosch Präsident der Humboldt-Universität zu Berlin: Prof. Dr. Jan-Hendrik Olbertz Dekan der Philosophischen Fakultät I: Prof. Michael Seadle, Ph.D. Gutachter: 1. Prof. Dr. Robert Funk 2. Prof. Michael Seadle, Ph.D. eingereicht am: 28.10.2011 Tag der mündlichen Prüfung: 16.12.2011 Abstract The World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser — turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that fa- cilitate the development of native web applications. Native web applications allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the bene- fits and drawbacks of native web applications. It also addresses the question how the performance of JavaScript web applications compares to that of native appli- cations and native web applications. Four application benchmarks are introduced that focus on different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. A performance analysis is under- taken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications.
    [Show full text]
  • Browser Security Information
    Browser Security Information Customer security is important to us. Our top priority is to protect the privacy of your personal account information and your financial transactions FirstLine Mortgages is leading the way in Internet banking services and uses several layers of robust security technology to help ensure the confidentiality of transactions across the Internet. The first security level begins with your Web browser. When you access FirstLine Mortgages Internet Site , your browser is checked to ensure that it meets our minimum requirements. Additionally, we only allow customers with browsers that use 128-bit encryption (one of the highest levels of browser security available today) to bank on our web site. But, even with this validation, there are other precautions you should follow to maximize your protection. You have a responsibility to ensure your own security. The browser validation will verify the browser type you are using, your browser encryption level, the version of Netscape or Microsoft browser, as well as Javascript and cookies being enabled. To access -FirstLine Mortgages Internet site , you need to use: • a Netscape browser version 4.06 or better with a minimum 128-bit encryption technology • a Microsoft browser version 4.01 SP2 or better with a minimum 128-bit encryption technology • Javascript (please see below for more information about how to check and enable Javascript support) • Cookies (see below) If your browser does not meet all of these requirements, you will need to upgrade your browser to access the FirstLine Internet Site . To upgrade your browser, select the Netscape or Microsoft button below and download the latest browser version.
    [Show full text]
  • Administrator's Guide
    Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft- exchange.aspx Trend Micro, the Trend Micro t-ball logo, Apex Central, eManager, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2020. Trend Micro Incorporated. All rights reserved. Document Part No.: SMEM149028/200709 Release Date: November 2020 Protected by U.S. Patent No.: 5,951,698 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: https://www.trendmicro.com/download/documentation/rating.asp Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations.
    [Show full text]
  • But Were Afraid to Ask!)
    05_576593 ch01.qxd 10/12/04 9:55 PM Page 9 Chapter 1 All You Ever Wanted to Know about JavaScript (But Were Afraid to Ask!) In This Chapter ᮣ Understanding a working definition of JavaScript ᮣ Dispelling common JavaScript misconceptions ᮣ Getting started with JavaScript tools ᮣ Finding information online aybe you’ve surfed to a Web site that incorporates really cool features, Msuch as ߜ Images that change when you move your mouse over them ߜ Slideshow animations ߜ Input forms with pop-up messages that help you fill in fields correctly ߜ Customized messages that welcome repeat visitors By using JavaScript and the book you’re reading right now you can create all these effects and many more! The Web page in Figure 1-1 shows you an example COPYRIGHTEDof the kinds of things that you canMATERIAL look forward to creating for your own site. A lot has changed since the previous edition of JavaScript For Dummies came out. Perhaps the biggest change is the evolution of DHTML, or dynamic HTML. DHTML refers to JavaScript combined with HTML and cascading style sheets, and it’s a powerful combination you can use to create even more breathtak- ingly cool Web sites than ever before. 05_576593 ch01.qxd 10/12/04 9:55 PM Page 10 10 Part I: Building Killer Web Pages for Fun and Profit Figure 1-1: JavaScript lets you add interactive features to your Web site quickly and easily. Along with this increased power comes increased complexity, unfortunately — but that’s where this new, improved, better-tasting edition of JavaScript For Dummies comes in! Even if you’re not a crackerjack programmer, you can use the techniques and sample scripts in this book to create interactive Web pages bursting with animated effects.
    [Show full text]
  • Introducing 2D Game Engine Development with Javascript
    CHAPTER 1 Introducing 2D Game Engine Development with JavaScript Video games are complex, interactive, multimedia software systems. These systems must, in real time, process player input, simulate the interactions of semi-autonomous objects, and generate high-fidelity graphics and audio outputs, all while trying to engage the players. Attempts at building video games can quickly be overwhelmed by the need to be well versed in software development as well as in how to create appealing player experiences. The first challenge can be alleviated with a software library, or game engine, that contains a coherent collection of utilities and objects designed specifically for developing video games. The player engagement goal is typically achieved through careful gameplay design and fine-tuning throughout the video game development process. This book is about the design and development of a game engine; it will focus on implementing and hiding the mundane operations and supporting complex simulations. Through the projects in this book, you will build a practical game engine for developing video games that are accessible across the Internet. A game engine relieves the game developers from simple routine tasks such as decoding specific key presses on the keyboard, designing complex algorithms for common operations such as mimicking shadows in a 2D world, and understanding nuances in implementations such as enforcing accuracy tolerance of a physics simulation. Commercial and well-established game engines such as Unity, Unreal Engine, and Panda3D present their systems through a graphical user interface (GUI). Not only does the friendly GUI simplify some of the tedious processes of game design such as creating and placing objects in a level, but more importantly, it ensures that these game engines are accessible to creative designers with diverse backgrounds who may find software development specifics distracting.
    [Show full text]
  • Apple Has Built a Solution Into Every Mac
    Overview Mac OS X iPhone iPod + iTunes Resources Vision Mac OS X solutions VoiceOver from third parties. Browse the wide variety of To make it easier for the blind and those with low-vision to use a accessibility solutions supported computer, Apple has built a solution into every Mac. Called VoiceOver, by Mac OS X. Learn more it’s reliable, simple to learn, and enjoyable to use. In Depth Device Support Application Support Downloads VoiceOver Application Support VoiceOver. A unique solution for the vision-impaired. Every new Mac comes with Mac OS X and VoiceOver installed and includes a variety of accessible More than 50 reasons to use applications. You can also purchase additional Apple and third-party applications to use with VoiceOver. VoiceOver. Learn more While this page lists a few of the most popular applications, many more are available. If you use an application with VoiceOver that’s not on this list, and you would like to have it added, send email to [email protected]. Unlike traditional screen readers, VoiceOver is integrated into the operating system, so you can start using new accessible applications right away. You don’t need to buy an update to VoiceOver, install a new copy, or add the application to a “white list.” Moreover, VoiceOver commands work the same way in every application, so once you learn how to use them, you’ll be able to apply what you know to any accessible application. Apple provides developers with a Cocoa framework that contains common, reusable application components (such as menus, text fields, buttons, and sliders), so developers don’t have to re-create these elements each time they write a new application.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • The GNOME Desktop Environment
    The GNOME desktop environment Miguel de Icaza ([email protected]) Instituto de Ciencias Nucleares, UNAM Elliot Lee ([email protected]) Federico Mena ([email protected]) Instituto de Ciencias Nucleares, UNAM Tom Tromey ([email protected]) April 27, 1998 Abstract We present an overview of the free GNU Network Object Model Environment (GNOME). GNOME is a suite of X11 GUI applications that provides joy to users and hackers alike. It has been designed for extensibility and automation by using CORBA and scripting languages throughout the code. GNOME is licensed under the terms of the GNU GPL and the GNU LGPL and has been developed on the Internet by a loosely-coupled team of programmers. 1 Motivation Free operating systems1 are excellent at providing server-class services, and so are often the ideal choice for a server machine. However, the lack of a consistent user interface and of consumer-targeted applications has prevented free operating systems from reaching the vast majority of users — the desktop users. As such, the benefits of free software have only been enjoyed by the technically savvy computer user community. Most users are still locked into proprietary solutions for their desktop environments. By using GNOME, free operating systems will have a complete, user-friendly desktop which will provide users with powerful and easy-to-use graphical applications. Many people have suggested that the cause for the lack of free user-oriented appli- cations is that these do not provide enough excitement to hackers, as opposed to system- level programming. Since most of the GNOME code had to be written by hackers, we kept them happy: the magic recipe here is to design GNOME around an adrenaline response by trying to use exciting models and ideas in the applications.
    [Show full text]
  • Web Crawler in Mobile Systems
    International Journal of Machine Learning and Computing, Vol. 2, No. 4, August 2012 Web Crawler in Mobile Systems Pavalam S. M., S. V. Kasmir Raja, Jawahar M., and Felix K. Akorli the crawler, Section 3 discusses the different types of Abstract—With the advent of internet technology, data has crawlers, and Section 4 explores the software used in mobile exploded to a considerable amount. Large volumes of data can phones for crawling purposes with Section 5 discusses the be explored easily through search engines, to extract valuable advantages that crawlers can bring in mobile information. Web crawlers are an indispensible part of search communications and section 6 brings out the summary. engine, which are program (proceeds with the search term) that can traverse through the hyperlinks, indexes them, parses the files and adds new links in to its queue and the mentioned process is done several times until search term vanishes from II. ARCHITECTURE OF A CRAWLER those pages. The web crawler looks for updating the links which Web crawler (also known as Spiders or robots) is software has already been indexed. This paper briefly reviews the concepts of web crawler, its architecture and its different types. that can start with a Uniform Resource Locator (known as It lists the software used by various mobile systems and also seed URL), downloads the pages with associated links and explores the ways of usage of web crawler in mobile systems and looks for the updates and stores them for later use. This reveals the possibility for further research. process is done iteratively.
    [Show full text]
  • Enterprise Desktop at Home with Freeipa and GNOME
    Enterprise desktop at home with FreeIPA and GNOME Alexander Bokovoy ([email protected]) January 30th, 2016 FOSDEM’16 Enterprise? Enterprise desktop at home with FreeIPA and GNOME 2 * almost local office network is not managed by a company’s IT department Enterprise desktop at home with FreeIPA and GNOME 3 * almost company services’ hosting is cloudy there is no one cloud to rule them all Enterprise desktop at home with FreeIPA and GNOME 4 I Home-bound identity to access local resources I Cloud-based (social networking) identities I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I want them to be usable at the same time Enterprise desktop at home with FreeIPA and GNOME 5 I Cloud-based (social networking) identities I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I Home-bound identity to access local resources I want them to be usable at the same time Enterprise desktop at home with FreeIPA and GNOME 6 I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I Home-bound identity to access local resources I Cloud-based (social networking) identities I want them to be usable at the same time Enterprise desktop
    [Show full text]