screenmilker

1234567891011121314151617181920212223
Across
  1. 2. using the internet to harass, intimidate, embarrass or demean others
  2. 4. the name of mobile app to steal confidential data
  3. 8. technique used to take screenshots /backups
  4. 9. is a daemon whose goal is to launch Apps(parent process for all apps)
  5. 10. type of spam targeting users of instant messaging services
  6. 12. An extension of an enterprise's private intranet
  7. 14. it refers to connecting one device to another
  8. 15. Temporary storage area for data that a user wants to copy from one place to another
  9. 17. an organization set up by Sony in 2003 that determines a universal set of rules and guidelines so devices can share digital media.
  10. 19. A set of protocols to support secure exchange of packets at the network layer
  11. 20. gzip and bzip2 uses this for data integrity
  12. 21. malicious software
  13. 22. is a filename extension for android apps
  14. 23. key used to reset pin in 3gpp phones
Down
  1. 1. barcode in matrix form
  2. 3. The theft of information from a wireless device through a Bluetooth connection
  3. 4. a type of phishing attacks that target to specific victims
  4. 5. alternative to iptables discussed in the paper
  5. 6. a piece of code which performs bad activities when certain conditions are met
  6. 7. type of malware that prevents or limits users from accessing their system and forces victim to pay money
  7. 11. block cipher used in GSM/UMTS
  8. 13. is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don't permit.
  9. 15. android version 1.5
  10. 16. state of android phone when you cannot succeed in rooting and gets halted
  11. 18. is a type of display used in mobile phone