MonthApril 2018

7 SCIENTIFIC EVIDENCE THAT VIDEO GAMES ARE GOOD FOR HEALTH

For a long time, I’ve been thinking that playing video games could hurt my health, well, in fact everything in excess can hurt my health, and video games are no different. All our mothers complained about the time we spent playing, but they hardly know that these hours could actually be bringing many benefits to our health.

But is it really that video games can bring so many benefits to health? Several researches and experts say yes, games can improve our vision, logical reasoning and even agility. With that in mind, we have decided to bring you 7 scientific evidence that video games are good for our health, and we hope our readers will share this story with their mothers,

1 – Vision

Action games can help us make our vision sharper, and even cure amblyopia, known as the “lazy eye.” Those who suffer from this condition have the vision of one eye worse than the other, and the treatment is sometimes done with an eye patch. Researchers at the University of Nottingham have discovered that an hour of video game can help improve vision as much as 400 hours of use of eye patch.

Another study by the University of Rochester showed that first-person shooters improve vision by increasing the brain’s ability to attend to multiple events at the same time. So, ready for a game of CS GO?

2 – Motor coordination

Surveys say video games can increase our motor coordination and eye-hand coordination. A study conducted at the University of Iowa in the United States shows that three hours of video games a week can also help surgeons have fewer errors in less invasive procedures. The games can also help doctors do the procedures faster, according to the study.

3 – Balance

The University of Ottawa, Canada, tested the Wii video game in patients with Parkinson’s disease. Six weeks after daily 30-minute workouts with Wii Fit (physical exercise) and 15 minutes of Wii Sports (with sports), the study’s people improved balance meaning. Researchers at the university believe that such training can help decrease the decline in body function in patients with this condition.

4 – Good shape

Some games made the kids happy in the malls, such as “Dance Dance Revolution” and “In The Groove”, with those mats suitable for dancing. Wii Fit allows players to perform physical activities, such as surfing, boxing and dancing without putting their feet outside.

5 – Brain

Some simple games like world of solitaire or Tetris, can increase the efficiency of our brain. Experts from Albuquerque, USA, tested 26 teenage girls who played Tetris for 30 minutes a day for three months. The study found that girls developed a thicker cortex than they did not. But not only that, the areas that got thicker are those that scientists believe are linked to the coordination of visual, tactile and auditory information.

6 – Agility

When we play video games, we need to overcome obstacles, think to find the way out, and sometimes this needs to be done quickly. Not to mention the games that have the time, and are even more efficient to improve our agility.

Studies done at the University of Rochester analyzed the response of many young people to rapid challenges, and experts noted that youths who had the habit of playing action games were 25% faster on average to reach a conclusion and answer questions correctly.

7 – Video game against anxiety and depression

Studies at the University of Pennsylvania have shown that some simple cell phone games, such as Candy Crush, for example, are able to relieve symptoms of depression. In addition, this type of play can improve overall quality of life, and even lessen anxiety. The fact is that these games generate feelings of satisfaction and self-efficacy, which is self-esteem to accomplish tasks and hit goals.

 

 

Is Happiness Good for Your Personality?

Big Five with Subjective Well-Being

People with different personality traits tend to experience different degrees of subjective well-being. Specifically, in terms of the Big Five trait dimensions—Extraversion, Agreeableness, Conscientiousness, Neuroticism (vs. Emotional Stability), and Openness to Experience—individuals who are more extroverted, agreeable, conscientious, and emotionally stable tend to experience greater satisfaction with life, more frequent positive affect, and less frequent negative affect (DeNeve & Cooper, 1998; Steel, Schmidt, & Shultz, 2008). Do such associations between personality traits and well-being aspects indicate that traits influence subjective well-being, that well-being influences traits, or both? The present research was conducted to test these possibilities by examining concurrent and prospective relations of the Big Five with life satisfaction, positive affect, and negative affect, using longitudinal data from a large, nationally representative sample.
Why Might Personality Traits Influence Subjective Well-Being?
Personality traits might influence subjective well-being directly or indirectly. For example, highly extraverted individuals tend to experience higher baseline levels of positive affect, and have stronger affective responses to positive events, than do their introverted peers; similarly, highly neurotic individuals tend to experience more chronic negative affect, and have especially intense reactions to negative events (Bolger & Schilling, 1991; Gross, Sutton, & Ketelaar, 1998; Headey & Wearing, 1989; Luhmann & Eid, 2009). These direct effects of personality traits on positive and negative affect may help explain why extraverted and emotionally stable individuals generally experience greater well-being.
Personality traits may also influence subjective well-being indirectly, by way of behaviors and their resulting outcomes. For example, compared with their disagreeable peers, highly agreeable individuals tend to engage in more prosocial behaviors, such as cooperating with others, expressing compassion and support for others, and treating others with politeness and respect (Graziano & Tobin, 2009). Perhaps as a result, agreeable individuals tend to be better liked by their peers (Jensen-Campbell et al., 2002; Newcomb, Bukowski, & Pattee, 1993) and more successful in establishing stable and satisfying close relationships (Karney & Bradbury, 1995; Robins, Caspi, & Moffitt, 2002). These positive social outcomes may then bolster agreeable individuals’ subjective well-being. Similarly, highly conscientious individuals tend to perform tasks efficiently, thoroughly, and reliably, which leads to success in school and the workplace (Barrick, Mount, & Judge, 2001; Berry, Ones, & Sackett, 2007; Noftle & Robins, 2007). Such success brings material (e.g., income) and psychological (e.g., sense of purpose) rewards, both of which may contribute to the positive association between conscientiousness and subjective well-being.
Why Might Subjective Well-Being Influence Personality Traits?
There are also plausible reasons to suspect that sustained high or low levels of subjective well-being might influence people’s personality traits. For example, suppose that an individual leads a life that consistently generates high levels of life satisfaction and positive effect. Being in a good mood typically leads to sociable, generous, and exploratory behavior (George & Brief, 1992; Isen, 1987; Fredrickson, 1998). Over time, a consistent pattern of such behavior may become integrated into the individual’s self-concept and other psychological systems, thereby leading to enduring increases in Extraversion, Agreeableness, and Openness to Experience. Conversely, life circumstances that consistently produce negative emotions may lead an individual to internalize this unpleasant effect, as well as the pattern of socially withdrawn, self-focused, and cautious behavior that often accompanies negative moods (Loewenstein, Weber, Hsee, & Welch, 2001; Mor & Winquist, 2002; Rubin & Burgess, 2001). In terms of personality traits, this would manifest as an increase in Neuroticism, as well as decreases in Extraversion, Agreeableness, and Openness.
Subjective well-being may also influence personality traits by providing a psychological incentive for certain patterns of behavior. As discussed in the previous section, agreeable behavior generally increases the likelihood of social success, conscientious behavior promotes success in school and the workplace and experiencing either kind of success can at least temporarily boost subjective well-being. The cycle need not end there: the individual’s desire to maintain high well-being may motivate them to continue behaving agreeably and conscientiously in the future, leading to further success and well-being, and so on. If this positive feedback loop sustains itself over an extended period of time (e.g., through investment in an enduring close relationship or successful career; see Roberts & Wood, 2006), the individual may gradually internalize the behavioral pattern, thereby increasing their trait levels of Agreeableness and Conscientiousness.
Testing the Influences of Personality Traits and Subjective Well-Being
How can we determine whether personality traits influence subjective well-being and whether well-being influences personality traits?This study will also let you know how to get ride from Neurotic.Many previous studies have examined concurrent correlations between personality traits and well-being aspects: associations between trait and well-being measures administered at a single time point, or between stable trait and well-being levels estimated using information from multiple time points (DeNeve & Cooper, 1998; Steel et al., 2008). Some longitudinal studies have also reported change correlations: associations of individual-level personality changes with changes in well-being (e.g., Boyce, Wood, & Powdthavee, 2013; Watson & Humrichouse, 2006).

These studies have generally found positive concurrent and change correlations of subjective well-being with Extraversion, Agreeableness, and Conscientiousness, as well as negative correlations with Neuroticism.
Although concurrent and change correlations are often interpreted as evidence that personality traits influence well-being, such correlations are in fact perfectly ambiguous regarding causal direction. Finding a concurrent correlation between a trait and a well-being aspect establishes an empirical association, but does not indicate the causal source of that association: the trait, the well-being aspect, or a third variable. Similarly, finding a change correlation establishes that a trait and a well-being aspect tend to change in unison, but does not indicate whether changes in the trait lead to changes in well-being or vice versa.
Stronger evidence of causal influence would come from testing prospective effects on change. For example, finding a prospective trait effect—that initial levels of a personality trait predict subsequent changes in subjective well-being—would suggest that the personality trait led to change in well-being because the reverse causal pathway (from the later change in well-being to the earlier trait level) is chronologically impossible. Similarly, finding a prospective well-being effect—that initial levels of subjective well-being predict subsequent changes in personality traits—would suggest that well-being led to personality change.
A pair of longitudinal studies has examined whether levels of Extraversion and Neuroticism predict change in positive and negative affect over time (Charles, Reynolds, & Gatz, 2001; Griffin, Mroczek, & Spiro, 2006). Both studies found that highly neurotic individuals tend to increase in negative affect, relative to their emotionally stable peers, and one study (Charles et al., 2001) also found that highly extraverted individuals tend to show relative increases in positive effect. These findings support the hypothesis that personality traits influence affective well-being. However, neither study tested for well-being effects on personality change.
Helping to address this asymmetry, a recent study used personality and life satisfaction data from the German Socio-Economic Panel (SOEP; see Haisken-Denew & Frick, 2005) to estimate both trait and well-being effects (Specht, Egloff, & Schmulke, 2013). Unexpectedly, this study found more evidence for life-satisfaction effects on personality change than for trait effects on change in life satisfaction. Specifically, individuals with higher stable levels of life satisfaction tended to become more agreeable, conscientious, and emotionally stable over time, relative to their dissatisfied peers. Conversely, there was only one significant trait effect: individuals with higher stable levels of Agreeableness tended to become relatively more satisfied over time. Unlike in Charles et al. (2001) and Griffin et al. (2006), neither Extraversion nor Neuroticism levels predicted change in well-being.
Taken together, these three studies suggest that personality traits influence change in subjective well-being (Charles et al., 2001; Griffin et al., 2006) and, surprisingly, that well-being may have an even stronger influence on personality change (Specht et al.., 2013). However, integrating their results is complicated by three issues. First, only one study tested for well-being effects (Specht et al., 2013). Second, each study found a different pattern of trait effects, and only one study assessed all of the Big Five traits (Specht et al., 2013). Third, different studies assessed different aspects of subjective well-being: two examined only positive and negative affect (Charles et al., 2001; Griffin et al., 2006), whereas the third examined only life satisfaction (Specht et al., 2013). Thus, the provocative—but incomplete and inconsistent—pattern of results from these studies highlights the need for longitudinal research that (a) assesses all of the Big Five personality traits, (b) assesses all three core aspects of subjective well-being: life satisfaction, positive affect, and negative affect, and (c) tests for both trait and well-being effects. To our knowledge, no previous study has fulfilled all three of these design criteria.

Snap Chat Marketing A Beginner’s Guide

5 Things about Snapchat every Marketer should know of

The picture exchanging app that hit the Indian markets in the year 2011-12. This year marked the conceptualization and initial launch all over the world. The app saw a spark of popularity in the Indian market but it didn’t last for long. With a two-year long (December 2012- November 2014) development and fundraising, Snapchat hit the markets again with a wider user base.The year 2016 marked the most successful year in the Snapchat’s progress timeline. As a promotional tool, the Snapchat Marketing team made use of the Video Marketing technique to capture the mass attention.

At present, Snapchat has positioned itself so well in the market that it has become a trend. You can find this app in every youngster’s smartphone. The aggressive Snapchat marketing earned it such a wide market share that today other companies and brands extend hands for running their marketing campaigns on the app.

A good platform for Video Marketing
The content creators and marketers are drooling over the video story format of Snapchat. A series of customized videos are being marketed on Snapchat to promote the brand in local networks and spread awareness. Many big brands have already included Snapchat in their Social Media Marketing platforms.But it had some pros that people cant save videos and pictures which can be saved now by using  Applications like SaveMySnaps,  People, and marketers get benefit by Download Free SaveMySnaps APK. Snapchat is of the instant, a deliverer of your friends’ humorous candid thoughts, pics and videos mainly greased down to go in one ear and out the other. Everyone wants to catch the beautiful moments on snapchat in the form of videos or photos.

 

Access to live events
The multiple video upload option of Snapchat enables a user to give a live feed of any event to the people connected to their account. There’s absolutely no limit as to how many people one can add or many videos can be added to the story. This is a great way of communicating with the live video concept. Same is with pictures. You click a picture and can straight away upload it.

Showcase the inside story
Let’s say the marketing team of an event using Snapchat. The team can simply upload the videos of the preparation of the event on the Snapchat story to create excitement among the viewers for the events. If a photographer is at an exotic shoot location, he can too create excitement amongst his local community to look forward to his latest work. Also, he may upload a behind the scenes video to further double the excitement.
Similarly, the marketers can upload influencing videos and pictures in their own story as well as Snapchat’s story. So, this is a free way of communicating with a large audience.
Build a personal touch
The snap-stories are an interpersonal form of communication and can help the brands and companies build a personal touch with their target audience. By sharing pictures and videos of daily life, it is like the viewer is present at the location itself. Thus, building a powerful personal communication.
From the consumer point of view, the marketers are well aware of the fact that a consumer is more likely to buy a product they can relate to and a product that uses the personal appeal in its promotion.

Connect with influencers
Well, the social media has given an opportunity to a lot of individuals to build their fan following and influence them. There are such local influencers in every community and the brands with smart marketers know that connecting with influencers is a clever move. Reaching out to the target audience through the local influencers is an effective way of communicating with the target audience.

Android Emulator

Android emulator

In our lab, the Android emulator is Android Virtual Devices (AVDs) which based on Android Software Development Kit (Android SDK) and Eclipse IDE. The brief steps will be described in the following (For more detail, check the reference in the end of this instruction or google online). your computer is already installed eclipse, you could skip this part directly.

  1. Download the Android Software Development Kit (SDK)

The SDK starter package is not a completed development environment which just included the core SDK tools. download the latest version of SDK starter.

  1. Download Eclipse IDE for Java Developers

This link is the Eclipse downloads. Fine the Eclipse IDE for Java Developers. Noted: the correct version for your operating system should be guaranteed. After your Eclipse IDE download is complete, unzip and move to a permanent folder

 

  1. Install the Android Development Tools (ADT) plugin

Open Eclipse to install the Android Development Tools (ADT) by using Eclipse’s built-in plug-in system. Here are the basic steps.

  1. Choose “Help” > “Install New Software….”
  2. Click the “Add…” button and create a new entry:
    • Name: “Android ADT” (this space is for your own personal use, so name it whatever you want)
    • Location: “https://dl-ssl.google.com/android/eclipse/” (try just http:// if the https:// does not work)
  3. Check all the boxes to install all the tools
  4. Just keep clicking “I agree”, “Next”, “Yes”, etc. until it asks you to restart
  5. Go ahead and restart Eclipse when prompted to

 

  1. Install Android SDK Components

Download the Software Development Kits(SDKs). This step could be done by Eclipse IDE and the Android ADT. Here are the basic steps.

  1. Open Eclipse, click “Window” > “Android SDK and AVD Manager”
  2. In “Available packages”, select the platforms you want to support. You can either choose all, or pick-and-choose what you want to develop for.
  3. In the “Third party Add-ons”, decide what you are interested in. The Google APIs must be installed.
  4. Choose “Install Selected”, then the “Accept All” radio button, then “Install”.

 

  1. E) Setup proxy in the Mobile networks setting. (If the UMD-Wireless or UMD-Secure cannot work, please do this experiment in the other Wi-Fi environment.)

1) Create New AVD, select Window > AVD Manager > New. The new Android Virtual Device should set the Android Virtual Device (AVD) as showed below. (Noted: the AVD showed just for reference, you could create different as long as the experiment could be run.)

Example AVD setting

 

2) Then launch the ADV, the interface shows as below:

 

3) Choose the setting icon. And chose the More…

Android Setting Page

 

4)  Then choose the Mobile networks.

5)  Choose the Access Point Names

6)  Then change the item T-Mobile US

 

Change the proxy to the proxy server’s IP address and change the port number to 8080.

  1. F) Install android application on the emulator.

you can read more about 3dse Bios | Andro support here.

1) put the .apk files in the platform-tools folder. (the default path: C:\Program Files\Android\android-sdk-windows\platform-tools) and for example, named .apk file is game.apk

2) Intall the application.

open the cmd windows, enter the command:

cd C:\Program Files\Android\android-sdk-windows\platform-tools

after enter the folder, then enter the command:

adb install game.apk

3) open the emulator, the installed application will be showed on the interface.

3.3 Testing procedure

3.3.1 Download apps from Google Play

You should choose the apps which come with potential risks, such as those which have a login page for username and password.

The following are some example categories that could be used in this project (you are allowed to choose a different category other than the list below). Please select two categories and test the top 50~100 apps in each category.

  1. SOCIAL
  2. COMMUNICATION
  3. FINANCE
  4. BUSINESS
  5. TRAVEL AND LOCAL
  6. SHOPPING

3.3.2 Test the app with malicious proxy

After your devices connected to the malicious proxy. You can monitor all traffics transmitted between your phone and the proxy.

  1. Perform “login in” in your app.
  2. If the app is secure, if you use ProxyDroid, you will be given a connection error message. If you set up your proxy in the Advanced WiFi Settings, your app will skip the proxy and connect to the legitimate server without use of the proxy server. In both cases, you wouldn’t find a request with username and password form the monitor.
  3. If the app is insecure, you would find your username and password from the monitor.

 

You can also install packet sniffer software such as wireshark to monitor the traffic.

 

 

 Setup your Smartphone proxy

A)  Android smartphone

  1. a) Setup proxy in the advanced WiFi settings. (If the UMD-Wireless or UMD-Secure cannot work, please do this experiment in the other WiFi environment.)
  2. Connect to the desired network (access point) if not already. Select “Modify network” config:

  1. In the opened dialog, mark “Show advanced options” check box:

  1. Scroll to proxy settings, select Manual, proxy options will appear. Set Proxy hostname as your VM’s IP address. Proxy port: as 8080.

  1. Alternatively, you can set proxy by ProxyDroid.

If your smart phone has been ‘rooted’, you can download an app named ProxyDroid. This app would help you manage your proxy settings.

 

B)  IOS smartphone

 

  1. a) Setup proxy in the WLAN settings. (If the UMD-Wireless or UMD-Secure cannot work, please do this experiment in the other Wi-Fi environment.)

WLAN setting page

  1. B) Scroll to HTTP PROXY settings, select Manual, proxy options will appear. Set Server as your VM’s IP address. Proxy port: as 8080.

Set up the malicious proxy server

  Set up the malicious proxy server

  1. The malicious proxy server mitmproxy runs in the Linux environment. So the first step is to set up a virtual Linux environment. (Ignore this setp if you use Linux as your primary OS.)
    1. Download VirtualBox  and then install it.
    2. Download a distribution of Linux. Recommend Lubuntu, which has low hardware requirements. Download Lubuntu
    3. Create a new Virtual Machine in VirtualBox like this. You can use defaults for all following settings.(shown as Figure )

Figure 1: Create New Virtual Machine

  1. Start your VM and select start-up disk as your Lubuntu which you just downloaded like this. (shown as Figure 2)

Figure 2: Select start-up disk

  1. Finish Lubuntu installation. You can use defaults for most settings.
  2. Set Network adapter of your VM works on as Bridged Adapter. Make sure it could be reached by your smart phone. (shown as Figure 3)

Figure 3: Setting Network

 

  1. Install mitmproxy on your virtual Linux machine
    1. First, install pip on your Linux. pip is a tool for installing and managing Python packages. On Debian and Ubuntu, use commands:
      $ sudo apt-get install python-pip
    2. Install mitmproxy. If pip is installed, use commands: (for detailed instructions, please check )
      pip install mitmproxy
      If error occurs, please check all packages used by mitmproxy have been installed.
    3. Strat mitmproxy in Terminal by commands:
      $ mitmproxy
      Detailed usages  (For testing purpose, DO NOT add the root certificate to trust list on smart phone.)
    4. Use the following command to get the VM’s IP address (or the proxy’s IP address) which is to be used by the smartphone
      $ ifconfig

 

 

  1. Optional malicious proxy (this part is optional, if you do not want to use mitmproxy )

Besides mitmproxy, “Charles” and “Fiddler” could also be used as malicious proxy. Please be aware that different proxies use different ways to generate fake certificates. For more information, please check those on related reference.

Read Also: Setup your Smartphone proxy

SSL implantation Vulnerability Lab

Objectives

SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. However, SSL certificate validation has been shown completely broken in many security-applications and libraries. Flawed certificate validation renders these software vulnerable to man-in-the-middle attack.

On the smartphone app market, apps are developed by developers with various level of security knowledge and many of them are suspected to be flawed in certificate validation. In this lab, students will be expected to conduct a serial of experiments to find flawed apps and further analyze the cause. They will learn how to set up the proxy, monitor the HTTPS package, identify the sensitive information in the package and distinguish malicious application.

2.  Pre-lab Reading

There are two excellent articles on SSL security on mobile operating system. “The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software” by Georgiev et al. [1] demonstrated that even the standard SSL libraries such as JSSE, OpenSSL, GnuTLS, etc. which are used in applications may have the certificate validation incorrectly problem. The authors of this paper presented that using SSL in no-browser software is a surprisingly challenging task.

 

The other one is “Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security” by Fahl et al. [2] focus on SSL problem in Android platform. The authors demonstrated an investigation of the current usage of SSL/TLS usage in Android and the security threats.

3.   Experiment

The basic experiment is designed to find whether an app is flawed in its certificate verification process. A malicious proxy server is used to issue a fake certificate when an app tries to set a SSL-connection with a legitimate server. In normal situation, the verification process should fail and the secure connection cannot be setup. However, in the case of flawed apps, a fake certificate can pass a flawed verification process or the verification failure is ignored when the fake certificate failed during the verification process. In either case, a secure channel is setup between the app and the malicious proxy server — hence all future communications between the app and the legitimate server will be monitored by the malicious proxy server.

There are three parts in our experiment. The first one is the applications’ server, the second one is the malicious proxy server, last but not least, the third part is client part. In this lab experiment, our work will focus on the proxy server and the client part. The applications’ server will not be discussed in this lab experiments. It is should be point out that client type will not be limited by mobile device. For students’ convenience, the client type could be smartphone (Android), iOS phone, or emulator.

In the following, brief instructions are given on:

  1. How to setup the malicious proxy server (mitmproxy);
  2. how to set the malicious proxy server as your smartphone’s proxy server
    1. Android phone
    2. Apple phone
    3. Android virtual device

how to test whether an app is flawed or not.

Also Read: SET UP THE MALICIOUS PROXY SERVER

© 2018 The Diary

Theme by Anders NorénUp ↑