Is Happiness Good for Your Personality?

Big Five with Subjective Well-Being People with different personality traits tend to experience different degrees of subjective well-being. Specifically, in terms of the Big Five trait dimensions—Extraversion, Agreeableness, Conscientiousness, Neuroticism (vs. Emotional Stability), and Openness to Experience—individuals who are more extroverted, agreeable, conscientious, and emotionally stable tend to experience greater satisfaction with life, more frequent…

Snap Chat Marketing A Beginner’s Guide

5 Things about Snapchat every Marketer should know of The picture exchanging app that hit the Indian markets in the year 2011-12. This year marked the conceptualization and initial launch all over the world. The app saw a spark of popularity in the Indian market but it didn’t last for long. With a two-year long…

Android Emulator

Android emulator In our lab, the Android emulator is Android Virtual Devices (AVDs) which based on Android Software Development Kit (Android SDK) and Eclipse IDE. The brief steps will be described in the following (For more detail, check the reference in the end of this instruction or google online). your computer is already installed eclipse,…

 Setup your Smartphone proxy

A)  Android smartphone a) Setup proxy in the advanced WiFi settings. (If the UMD-Wireless or UMD-Secure cannot work, please do this experiment in the other WiFi environment.) Connect to the desired network (access point) if not already. Select “Modify network” config: In the opened dialog, mark “Show advanced options” check box: Scroll to proxy settings,…

Set up the malicious proxy server

  Set up the malicious proxy server The malicious proxy server mitmproxy runs in the Linux environment. So the first step is to set up a virtual Linux environment. (Ignore this setp if you use Linux as your primary OS.) Download VirtualBox  and then install it. Download a distribution of Linux. Recommend Lubuntu, which has…

SSL implantation Vulnerability Lab

Objectives SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. However, SSL certificate validation has been shown completely broken in many security-applications and libraries. Flawed certificate validation renders these software vulnerable to man-in-the-middle attack. On the smartphone app market, apps are developed by developers with various level of security knowledge and…