Showing posts with label Tips And Tricks. Show all posts
Showing posts with label Tips And Tricks. Show all posts

Thursday 21 July 2016

How to Create an Android App Without Any Coding Skills


In this post I am going to share the simplest way to Create an Android App without coding and without any skill. Android app Development is very complicated but with this method you can easily create apps online without ant coding.

In these days Android is the most popular OS for smartphone and tablets. Android is free and open source OS by Google. If you want to create an application for android and you don't have any coding experience than don't worry, with the help of this post you can create an Android app without any coding skills.


How to Create an Android App Without Any Coding Skills

There are many sites you can find on internet that provide a feature to create android app without coding, but we will tell you the best and user friendly only. Just follow the instruction to create an app.

#1 AppsGeyser
Appsgeyser is a free provider that converts your content material into an app and makes you cash. Your app could have all you want including messaging, social sharing, tabs and complete support for html5 upgrades. But overlook approximately the app, assist you build a commercial enterprise and make the most of mobile! they help you monetize your content successfully.

#2 Appypie
Appy pie is the quickest developing cloud primarily based cell apps builder software program (app maker) that lets in customers with no programming abilities, to create android & iphone applications for mobiles and smartphones; and post to google play & itunes. Appy pie’s closed beta become launched on jan 14th, 2013 in noida, india. Appy pie shot to recognition immediately after its out of beta launch. Locating big acknowledgment from global press and the blogosphere, appy pie’s market scored over 850 cell apps within a month.

#3 Buzztouch
Buzztouch is an open source "app engine" that powers tens of thousands of iPhone, iPad and android applications. Buzztouch is used together with the ios and android software developer kits (sdk's). The buzztouch middle (ios and android) serves as the inspiration for any mobile project. This properly examined and extendable project saves developers time and increases the high-quality of their cell apps. All supply documents included in venture downloads are introduced in plain textual content for max hack-potential.

#4 Appyet
The use of appyet, anyone can create a professional android app. There is no programming expertise required, handiest take short time to build your first app. All you need to offer is links to rss/atom feed or website, they're automatically converted into stunning one 100% natural native apps for android. You've got freedom to list/promote app on google play and plenty of other android markets. Earn ad money with embedded advert or get thousand of installations deliver new constant site visitors to your internet site.

#5 Appclay
Appclay , conceived and created via core development professionals at shephertz technologies, is an esteemed intuitive interface that enables each one people- grow to be an app developer results easily with none coding, software installation, renovation and economic funding. Anyone can use appclay to create html5 and android local apps supported through all extensively famous gadgets. App’s functions which include home page, object lists, menus, map, photo gallery, audio-video uploads, social join, about us web page and plenty of extra can be created on the fly.

Conclusion:
So its all about How to Create an Android App Without Any Coding Skills. If you understand any comparable website online to create the app without coding then remark below. If you like this article useful share it with friends. Thank you
Read more

Wednesday 20 July 2016

How Data Recovery Softwares Work


We’ve all dealt with data loss, whether it was from a hard drive failure, data corruption or accidentally deleting a file. If you’ve ever experienced a major loss of data, you’ve probably wondered about data recovery — how does it work?  How effective is it?  How much does it cost? We set out to find out.

Data Loss and Data Recovery
Data loss can take many forms — accidental deletion, hard drive failure, software bugs, data corruption, hacking, even a simple power failure can cause you to lose data. And, of course, there are more extreme cases, like when a hard drive is recovered from a plane crash; amazingly, some data recovery specialists can retrieve data from storage media that’s been almost completely destroyed.

If a piece of data used to be on your hard drive, solid-state drive, USB stick, RAID, or other storage media, you might be able to hire someone (or purchase some software) to perform data recovery. Data recovery is, simply, the salvaging and repair of data that has been lost.

Of course, data recovery won’t always be possible; sometimes a system can be too corrupted or damaged to get much of the data back. However, data-recovery technology has become extremely advanced; for example, Kroll Ontrack, an Australian data recovery company, was able to recover 99% of the data from a hard drive that was on the Challenger space craft when it disintegrated upon re-entry.

How Does Data Recovery Work?
The methods used to recover lost data depend on how the data was lost in the first place; let’s take a look at some of the most common forms here.

File Deletion
Interestingly, any file that’s deleted actually stays on your drive until it’s overwritten with another file. This means that if you act fast, you actually have a pretty good chance of getting the file back. In the case of file deletion, you can use file recovery software like TestDisk, which uses complex algorithms that look at pieces of information that’s left on the hard drive in order to guess where the file was physically stored. If it guesses correctly, you’ll get the file back. If not, you’re out of luck.

However, doing just about anything on your computer can result in the file being overwritten and likely lost forever. Even browsing the Internet can result in cookies or cache files being stored in that location, overwriting the information you’re hoping to retrieve. And installing file recovery software can do the same thing. If the file hasn’t been overwritten, the chances of getting it back vary depending on the format of your file system.

For example, the Windows NTFS system retains file description information after the file has been deleted, making it relatively easy for file recovery software to find the file. Other systems, however, like UTF and FAT, destroy more information about the file when it’s deleted, making it more difficult for file-recovery algorithms to guess the location of the file on the disk.

File Corruption
If you’ve ever gotten one of the dreaded “corrupt hard drive” errors, you know how disheartening it can be. However, it’s still possible that data could be recovered. If you attach the hard drive to another computer, you might find that only the operating system has been corrupted, and that the rest of your data is fine—in this case, it’s just a matter of copying everything to another hard drive.

Another problem that could get you to this point is a corrupted partition table, which might be possible to repair using the correct software. If you can successfully repair the table, it should be easy to get all of your files back. If not, you still might be able to recover enough information from the table to get your files back, though it depends greatly on the level of corruption.

Even if the files you’re trying to recover have been corrupted, there’s a chance that you’ll be able to get usable portions of them back by using recovery software; as long as the software can find the file, it will try to recover it. While you might not be able to use what you get, there’s always a chance that you’ll get a portion of the file back, which could potentially save you a lot of time in trying to recreate it.

File System Format or Damage
Similar to deleting a file, formatting a file system destroys information about the previous files and structure of the disk, but the amount of data that’s erased depends on the system format.

For example, formatting with FAT results in the destruction of a large amount of data and rewriting that section of the disk with zeroes, significantly reducing the likelihood that you’ll be able to recover your data. Some file systems, like NTFS, will have a higher likelihood of recovery if they’re overwritten with the same file system, while others actually have a smaller chance if they’re overwritten with the same system — writing XFS over FAT makes it more likely for the FAT files to be recovered.

In the case of file system damage, the number of files that can be recovered depends on the extent of the damage and what allocation information is still available to the recovery software. If enough information is present for the recovery software to repair the file system and accurately locate previous files, you should be able to recover quite a bit.

Physical Drive Damage
Recovering files that have been deleted or formatted is one thing — getting files off of a drive that’s been damaged is another. While it doesn’t take impressive technical skills to install and run recovery software, dealing with a heavily damaged drive is best left to the professionals, as it usually requires that the drive be taken apart.

Taking a drive apart without damaging it is very difficult — the professionals only open them up in clean rooms, which are highly controlled environments that are free of almost all environmental pollutants. Even a single speck of dust that lands on a hard drive plate can cause the read/write head to crash and multiply the drive’s problems. Static electricity can also damage the drive, so these rooms, these equipment used in them, and the clothing that technicians wear are all specially designed to minimize static.

When a hard drive fails because of physical damage, it can be related to a number of factors, such as a broken controller board or a crashed head. Occasionally these issues can be fixed by replacing the broken part, but in general, if there’s physical damage to the hard drive, you’re going to need some serious work done by the professionals.

If you get your drive to a data recovery specialist, they’ll take a number of steps, from rebuilding parts of the hard drive to creating a disk image and doing their best to repair the corrupted parts using sophisticated software. The cost of the rebuilding, proprietary imaging technologies, and maintenance of the clean rooms is what can drive the cost of professional data recovery upwards of several thousand dollars (though some providers are now able to offer more affordable rates).

Solid State Drive Data Recovery
Solid state drives are becoming more and more popular, especially with the rise of the ultrabook. Obviously, because they haven’t been around as long, recovering data from an SSD is more difficult than it is to recover from a traditional hard drive. However, a number of the same techniques can be used to recover data that’s been deleted or formatted.

However, recovering data from a physically damaged solid state drive can be very expensive, as the technology is still new. When my SSD crashed, the estimate for data recovery on it was about $3,500. A recent white paper estimated that this was average for SSD recovery if the recovery specialist had not received tools and specifications from the manufacturer; that cost was reduced to about $700 if the manufacturer provided support. Hopefully we’ll be seeing this cost come down in the near future.

Your Best Bet: Don’t Lose Your Data
Data recovery software and specialists can do a great job of getting your data back, but it’s risky, time-consuming, and expensive. The best measure you can take to prevent long-term data loss is the one we’ve been advocating for a long time: make lots of backups! Use a cloud backup provider, keep a backup hard drive in your home, and make sure you don’t get caught out by a power surge or an accidental formatting. And take steps to prevent file corruption in the first place.
Read more

Sunday 17 July 2016

10 Awesome PC Tips That Help You Alot


Hello Guys As you know that everyone owns a computer or laptop. but most of you doesn't know about shortcuts in it because that are hidden or we can say that these codes are secret because most of you don't use it. but if you use it i am sure that'll definitely you can save much of your time. so here are the list i hope you can use it and save your precious time.


1. Press Window key and U twice in quick succession to shutdown the computer.
2. Press Alt+F4 as many times as your running applications to close them down after they get closed press Alt+F4 one more time which will open up power off window and pressing enter that'll power off your computer.
3. Press Ctrl+Z for undo and Ctrl+Y for redo, this may come handy while editing pictures or data.
4. Press Ctrl+F to quickly open search bar to find any data or folder.
5. Just type the name of the site you want to visit on the search bar of your browser and press Ctrl+Enter , this will automatically add www. prefix and .com suffix.
6. Annoyed of your username popping up in facebook log in page then try pressing Shift+Delete to permanently delete it. This Shift+Delete also works for deleting the files permanently from computer (they doen't stay on re-cycle bin).
7. Just press Alt+Print Screen to take the screen shot of only the current window.
8. Point the cursor onto the link and press Ctrl+left click to open the link in new window.
9. Press Ctrl+Shift+N to open a new incognito window, which doesn't save the search history and cookies.
10. Press Ctrl+N to do any thing new for example while your are browsing the net press Ctrl+N to open new browser window.

These are the Top 10 amazing and useful computer short cuts that'll help you..Hope you like the article, Please don't forget to like and share the article. and comment if you have any problem.

Read more

Monday 11 July 2016

How To Rename Your Recycle Bin


In computer the recycle bin  is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user (whether or not it is actually a single directory depends on the implementation), allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the "Empty Recycle Bin" function).
Microsoft's Recycle Bin is implemented as a special folder with columns like Date deleted and Original location. Typically only files deleted via Windows Explorer (but not necessarily other Windows graphical interfaces such as file selection dialogs) will be put into the Recycle Bin; files deleted via the Command Prompt are permanently deleted, as (by default) are files deleted via operating system APIs and applications other than Windows Explorer. Some operating system APIs do, however, allow applications to recycle files rather than delete them. In previous Windows operating systems and in MS-DOS, undeletion was the only way to recover accidentally or intentionally deleted files.

The Recycle Bin only stores files deleted from hard drives, not from removable media, such as memory cards, thumb drives, or floppy disks. Nor does it store files deleted from network drives.

The Recycle Bin has a setting to configure the amount of deleted files it can store. Free disk space allocated for this is not actually used until files are deleted from folders and stored in the Recycle Bin. In versions of Windows prior to Windows Vista, the default configuration of the Recycle Bin is a global setting for all drives to hold 10% of the total capacity of each host hard drive volume to store deleted files. For example, on a volume with a capacity of 20 gigabytes, the Recycle Bin will hold up to 2 gigabytes of deleted files. This can be changed anywhere from 0 to 100% of the drive space, but will not be allowed to exceed 3.99GB of space, even if the user-indicated % of the drive space is larger than 3.99GB. If the Recycle Bin fills up to maximum capacity, the oldest files will be deleted in order to accommodate the newly deleted files. If a file is too large for the Recycle Bin, the user will be prompted to immediately and permanently delete the file instead. This 3.99GB limit does not apply in Windows Vista and later Windows versions.[citation needed]

The actual location of the Recycle Bin depends on the type of operating system and file system. On older FAT file systems (typically Windows 98 and prior), it is located in Drive:\RECYCLED. In the NTFS filesystem (Windows 2000, XP, NT) it is Drive:\RECYCLER. On Windows Vista and Windows 7 it is Drive:\$Recycle.Bin folder.

The Recycle Bin can be accessed from the desktop or Windows Explorer.
In Windows Explorer, files are moved to the Recycle Bin in a number of ways:

  • By right-clicking on a file and selecting delete from the menu
  • Selecting the file and pressing the delete key
  • Selecting delete from the Task pane in Windows XP
  • Selecting the file and choosing delete from the File menu (in Windows XP Explorer)
  • By dragging and dropping a file into the Recycle Bin icon
  • From the Send To menu
  • From a context menu command or some other function in a software application (usually configurable)

It is possible to bypass the Recycle Bin and directly delete a file by holding the SHIFT key while performing an action that would normally send a file to the trash

  1. Click Start / Run
  2. Type regedit and press enter
  3. Open the HKEY_CLASSES_ROOT folder
  4. Open the CLSID folder
  5. Open the {645FF040-5081-101B-9F08-00AA002F954E} folder
  6. Open the ShellFolder folder
  7. Change the "Attributes" data value from "40 01 00 20" to "50 01 00 20". Once


completed change the "CallForAttributes" dword value to "0x00000000" (doubleclick
and change value data to 0). You must change both of these values to get the
rename to appear.
After performing the above steps you will be able to rename the icon like any other
icon. Right-click the Recycle Bin icon on the desktop and click Rename and rename it
to whatever you wish.

Hope You Like My Article And Found It Useful Keep Like And Comment If you have any problem

Read more

Tuesday 5 July 2016

Use Whatsapp With Fake US Number


WhatsApp has become the best and most used application for all mobile users. Not only it is available for every mobile system or operating system like android, iphone, blackberry mobile phones, symbian, htc etc. but also it is the most used app in these systems too. If you having an internet in your mobile phone then with the help of this application you can send unlimited messages to any one in the world. Message type can be text, audio, video, images etc. If you are one who daily updates their whatsapp status then check out this awesome cool whatsapp status. As we all know that the popularity of WhatsApp has grown tremendously that many whatsapp tricks and tips coming in the internet.

Many times, we need to use WhatsApp for sending or receiving messages/media without showing or using our real mobile number or even trick our friends and message without revealing our Identity. Now, by using the following tutorial you will be able to create a fake WhatsApp account with a spoofed U.S.A number in any country, that too will all the normal functioning of WhatsApp . The tutorial will work for Android, and iOS devices (iPhone) too!

Follow These Steps To Use Whatsapp Without Number Or With Spoof Number:


  1.  Install Whatsapp With Latest Version (Skip This Step If You Already Install Whatsapp).
  2.  Now Download This App From Playstore.
  3.  Create Account In This App And Verify It With Your Current Mobile Number.
  4.  Now Open The App You'll See US Number In The Option List. Remeber This Number And  Open Whatsapp
  5.  Now Paste The Number Which Is In The App And Click On Verify. Wait For Second You'll  Receive Message In The App.
  • Note: If you didn't receive the message then click on call me and receive the code through call.
Conclusion:
This Trick is 1000% workable checked by me. this trick will also helpful for other online verification sites. hope you like my article comment if you have any problem. and share if you found this article helpful.
Read more

Sunday 3 July 2016

Remotely Shutdown PC Using Android


Almost every one own a android smart-phone ,which can several cool things one can imagine. But not many are unaware tricks which are very cool and easy to implement. Let us show one of the 100’s of tricks an android can do.

How cool is that you can remotely shutdown PC using android ? You can surprise every one around you with this trick. By following few tips and tricks you can Remotely Shutdown PC.

How To Remotely Shutdown PC Using Android
Yes , your reading the right! You can now shut your PC down using an app , anywhere at any time. Sometimes we  a download larger files , at the same time we have to attend a friend regular meet but we avoid it till the download finishes. Which is not only annoying but socially uncool. Things like this can be solved using this very app to shutdown.
In this tutorial we are discussing about how to shut down PC remotely using android phones in 2016

Step 1 : Go to browser and search for Airytec switch off program and install it.

Step 2 : After installation complete, click on notification tray & there is shutdown icon.

Step 3 : Tap on the icon , a window pops up on your screen. Select the options of your choice like Force shutdown.

Step 4 : As you see there are 2 more options , select it to ” Remote” , once there select “Edit Web interface Settings”

Step 5 : Tap on ” enable Web interface” , leave “enable Authentication unchecked “ alone.

Step 6 : We are reaching the end point so be patient.select on ” view / update static addresses ” , You will be redirect to browser , time ti bookmark that “URL” on your mobile device. Double click on “shutdown icon” icon on your notification tray & Enable task.

Step 7 : Connect to wi-fi or data plan of your smart-phone and fire up browser then type in the saved “URL“, Just as shown on below image.
Step 8: Now you can click on shutdown button to shut down your computer.

Final Step: Now you can shutdown you PC. Thank you for hanging on for so long.
It wasn’t that difficult , right ? Thats one of the benefits you get having a smart-phone around. There are plenty of more tricks to explore and learn to implement using our android smart-phone.

So This Is The Way You Can Remotely Shutdown PC Using Android. its a very best trick to impress your friends so now use your android and try this trick. comment if you have any problem.
Read more

Sunday 26 June 2016

Biometrics and Authentication


Authentication using passwords and PINs are no longer considered to be safe. We have seen a couple of recent incidences of data breach where user data is compromised and exploited for even further attacks. Two factor authentication is one option of dealing with it. But, that also cannot be considered to be sufficient. A two factor authentication system also can be compromised. We need some authentication mechanism in which the authentication data can be provided by the individual only and cannot be tampered with. And, that is the main motivation behind using biometric system.

What is Biometrics
The word “biometrics” is derived from the Greek word “bio” which means life and “metric” which means to measure. Biometrics refers to the automatic identification of a person based on his or her unique physiological or behavioral characteristics, such as fingerprints, voice pattern, iris, keystroke rhythm etc. These characteristics are unique to every individual and cannot be tampered easily. And, that is why biometric systems are today widely used for authentication purposes.

History of Biometrics
The history of biometrics dates back to 1870, with the measurement system of Alphonse Bertillon. In this measurement system, human body measurements such as skull diameter, arm and foot length etc used to be used to identify a person uniquely. Until 1920's, this system used to be used for identifying prisoners.

Later in 1960s, identification through fingerprints and facial measurements was proposed. In 1960's, the techniques of digital signal processing were developed and that enabled convenient processing and storing of the biometric data. And, that led to identification of individuals in an automated way.

Voice and fingerprints recognition systems were later developed and their applications included high security access control, personal locks and authentication of financial transactions since 1960's.

Later, biometric system based on face recognition and iris recognition was developed. And, today biometric systems based on fingerprints and face recognition, iris pattern recognition or keystroke rhythm and voice recognition are widely used.

Why Biometrics

There are a number of reasons for which biometrics are supposed to be reliable enough to be used for authentication purposes :

Biometric data of an individual can be produced by the individual only and the individual has to be physically present at the time of authentication. It is not easy to tamper with biometric data. And, this biometric system much reliable, as it can prevent illegitimate access based on stolen credentials.
As biometric data is unique for every individual and can be produced by the individual only, it can provide negative identification. If an individual is enrolled in a biometric system, he cannot later deny his enrollment.
In biometrics, one does not need to remember a huge number of credentials, as it happens in case of passwords or PINs. A password or PIN can be easily forgotten or broken if not strong enough. But, biometric data of an individual is strong enough not to guess or break.
In biometrics, one does not need to carry any physical tokens for authentication, as it is done for smart cards, magnetic stripe cards, photo ID cards, physical keys etc. So, biometric authentication is much more convenient for an individual.

Characteristics of Biometric Data

A biometric data should have the following characteristics so that it can reliably be used for authentication purposes :


  • Biometric data should be constant over a long period of time. There should be no significant differences in the biometric data based on factors like age, disease etc.
  • Biometric data of an individual should be unique and significantly different from another individual.
  • The captured biometric data should be conveniently stored in a format, which is easy to handle.
  • Biometric data of an individual should be impractical to mask or manipulate.
  • Biometric data of an individual should be digitally comparable with that of another individual.
  • Biometric data must be irreproducible by other means, unless the individual himself or herself produces the data.
  • Biometric data has to be accurate. It should not have any false acceptance or false rejection rate.




How does Biometric System work

A biometric system typically works in the following way :

An individual produces his or her biometric data. Normally, the biometric data is captured by a sensing device like a fingerprints scanner or a video camera.
Distinguishing characteristics are extracted from the raw biometric sample and converted into a biometric template.
The mathematical representation of the biometric template is registered and stored in the database.
Later, when an individual tries to authenticate producing his or her biometrics, the stored biometric data is compared with the given data for verification.

Types of Biometrics
Biometrics can be of two types :

  • Physiological Biometrics
  • Behavioral Biometrics

Physiological biometrics is based on some physiological characteristics of an individual, such as fingerprints, iris pattern, face recognition etc.

Behavioral biometrics is based on behavioral characteristics of an individual, such as keystroke rhythm, signature, voice recognition etc.

The main differences between these two biometrics is, physiological biometrics does not get influenced by psycho-emotional state of an individual. It remains unchanged over time and emotional state. But, behavioral biometrics can be influenced by factors like emotional state or disease of an individual. So, physiological biometrics is supposed to be more reliable than behavioral biometrics.

Let's look at a couple of biometric systems and their advantages and disadvantages.

Face Recognition
Each individual has distinctive features in his facial image based on eyebrows, width of eyes, breadth of nose etc. The facial recognition system first captures the facial image of an individual and then differentiates the face from the background. It then extract features from the facial image.

There are around 80 features that a facial recognition system can make use of and these include jaw line length, eye socket depth, distance between the eyes, cheekbone shape, width of the nose etc.

The distinctive features are then suitably represented in a mathematical format and stored in the database. Later, this data is retrieved and compared with the collected data for authentication.


Advantages

  • It is not intrusive.
  • It is hands-free and convenient.
  • It can be done from a distance. This can be useful if used responsibly for surveillance purpose for identifying criminals from a crowd.


Disadvantages

  • A facial recognition system should be resistant to factors like facial expressions etc.
  • Face recognition may not work properly with factors like poor lighting, sunglasses, partially covered face, low resolution images etc.
  • If not used responsibly with the permission of the individual, face recognition can be a major privacy violation.

Iris Recognition
The iris is the colored ring around the pupil of a human being. It eyes has complex random patterns, which are unique and can be seen even from a certain distance. An iris recognition system anlyzes the complex random patterns of an iris and detects a person's identity based upon that.


Advantages

  • Iris recognition technology is not very intrusive as it does not need direct contact between the subject and the camera.
  • Iris recognition can be done using simple video technology.
  • Error rates of iris recognition system is very low and it can be reliably used for authentication purpose.



Disadvantages

  • Scanning iris may be inconvenient, as it can be covered by objects like eyelid or eyelashes.
  • Iris recognition biometrics may prove difficult for people with blindness or cataract.
  • The camera involved for taking iris image should have correct amount of illumination, otherwise it may prove difficult to capture the accurate image of the iris.




Fingerprints Recognition
In this method, digital representation of a fingerprint is scanned using a fingerprint scanner and then features are extracted based on ridges and valleys of the finger. Later, these features are used to identify and authenticate an individual. Among all biometric techniques, fingerprint recognition is the most popular method and is widely used.

Advantages
Fingerprints of an individual develops at the age of about seven months and remains unchanged for the rest of the life. These characteristics do not change easily and so, can be used reliably for authentication.

Disadvantages
For some people it is intrusive, as it is still related to criminal identification.
Captured biometric data is large and needs compression to store efficiently.

Keystroke Rhythm Recognition
Each individual has his own typing rhythm and based on that biometric authentication can be done. The main features used in this technology are :

Latencies between two successive keystrokes.
Finger placement.
Pressure applied on the keys.
Overall typing speed.

Advantages
It is simple to implement and does not require any specialized hardware.

Disadvantages
Keystroke rhythm can be influenced by various circumstances like psycho-emotional state, hand injury, fatigueness of the individual etc. So, it has limited accuracy.

Challenges of Biometric Authentication

There are a couple of challenges of using biometric authentication :
If stored biometric data is compromised, it would be a major privacy concern. Biometric data of an individual, unlike other credentials like passwords or PINs, cannot be changed.
One has to make sure the collected biometric data is not influenced by noise or errors. Biometric systems must endure failures within a rational bound and give reliable results.

Are Biometric Systems vulnerable to hacking ?


Biometric system is still in its infancy and cannot be considered to be 100% secure. A biometric system can be compromised in a number of ways :

Attackers can use a backdoor to bypass authentication and gain unauthorized access of the system.
Attackers can provide facsimile of the actual biometrics to gain access. In the worst case, the attacker can use body parts not attached to the owner to gain access. A biometric system should be able to tell the difference between a live body part and an amputated one.
At the time of enrollment, biometric data of an individual is collected and stored in a database, so that it can later be compared with the collected biometric data for authentication. An attacker can perpetrate a Man-In-The-Middle Attack while storing the biometric data and manipulate the data to take advantage of that later.

So, biometric systems cannot be considered to be fully secure. However, two factor authentication comprising of biometric data of an individual and something you know like a password or PIN will increase the security to a great extent and provide effective countermeasures.

Biometrics and Privacy
Privacy is a big concern for biometrics. We have seen couple of incidences where the use of biometrics call for questions for privacy advocates. For example, using face recognition technology, one can monitor public places and use the scanned images to indentify known criminals. But, if the scanning is done without the knowledge of the public and utilizing a technology which is not fully understood for its impacts, then it is a big privacy concern.

Privacy concern also exists about how the biometric data stored in a database can be used. Using or sharing the biometric data without the individual's knowledge is also a big privacy concern.

Also, biometric systems should be safeguarded from fraudulent activities and data breaches. Biometrics of an individual, unlike other credentials, cannot be changed.

Applications of Biometrics

Biometrics are used in a number of places :

  • It is used in military programs.
  • To survey a busy place to identify known criminals.
  • To access accounts in banks.
  • For ATM transactions, using special purpose kiosks.
  • To secure online banking.
  • For PC or network access.
  • In air travel, to reduce the inspection processing time for authorized travellers.
  • To control travelers crossing the national or state border.
  • Some countries include biometric information in passports, in terms of barcode or smart chips.

So, no authentication system is fully secure. But, biometrics if used responsibly with caution, can enhance security to a large extent. This article just gave some basic information on biometrics. Hope you liked it.
Read more