The board of International Journal of Computer Applications (IJCA) published my research paper in IJCA July 2016 Edition.
Manuscript Title : Android-based Augmented Reality to Enhance Education System
Digital Library URI :http://www.ijcaonline.org/archives/volume146/number6/25402-2016910790
ISBN : 973-93-80893-82-6
One more Realistic game with improved Graphic and VR headset Supported Break The castle 2.
Top Websites Using Audio Fingerprinting to Secretly Track Web Users
Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting
This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even decrypting the traffic.
Researchers at Princeton University have conducted a massive privacy survey and discovered that Google, through its multiple domains, is tracking users on nearly 80 percent of all Top 1 Million Domains using the variety of tracking and identification techniques.
Out of them, the newest tracking technology unearthed by the researchers is the one based on fingerprinting a machine’s audio stack through the AudioContext API
The AudioContext API is not collecting audio played or recorded on a machine, but rather harvesting the audio signals of the each machine that is then using it to reveal unique browser and device combinations.
The method has nothing to do with the device’s microphone, as it relies on the way a signal is processed.
A third-party tracker uses the AudioContext API to send low-frequency sounds to a user’s computer and then measures how the computer processes the data, creating a unique fingerprint based on the hardware and software capabilities of the user’s computer.
A new bug has been discovered in the Messages app, allowing a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash after being opened. The bug, which requires a specific string of symbols and Arabic characters to be sent, was first noticed on reddit earlier this afternoon and has been spreading around the Internet since then.
Sending the string of characters to an iPhone results in an immediate respring, causing an iPhone to crash and quickly reboot. From there, if the Messages app was opened at a list view, the Messages app crashes automatically when you try to open it. If it was opened to the conversation where you received the message, the app will open, but attempting to go to another conversation causes Messages to crash.
If you receive one of these messages, there are a few possible fixes that have worked for us and for other people who have encountered the bug. If the Messages app was opened to the conversation with the person who sent the offending message, the Messages app can be reopened to this conversation. Sending a reply message fixes the problem.
If Messages was opened to the conversation list view, the app will crash when you attempt to open it. You can fix this by having someone send you a message or by sending a message to yourself. There are several options for sending a message to yourself, including sending yourself a message via Siri or through the Share sheet in any app.
To send yourself a message in Siri, tell Siri to “Send a message to myself.” Siri will open up a dialogue where you can give her a quick message like “Fix” that’ll be sent to your iPhone to clear away the malicious message.
Alternatively, you can open an app like Notes, craft a quick note, and use the Share option (the little document with an arrow) to message it to yourself. Sending yourself something though the share sheet of an app opens a new messages window where you can enter your own contact information.