SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Presentation By:
Huzair Khan (D-19-TE-24)
Muhammad Fuzail (D-19-TE-40)
Department Of Telecommunication Engineering
AGENDA
Introduction to
both Android &
IOS (Operating
System).
Discussing
About Their
Vulnerabilities.
Discussing
About Both
OS’s In Terms Of
Security.
Discussing
About Their
Agile Behavior.
Conclusion.
Android
&
IOS.
ANDROID:
• ANDROID IS A “LINUX” BASED OS DESIGNED FOR TOUCH SCREEN MOBILE DEVICES.
• ONE OF THE MOST WIDELY USED OS THESE DAYS IS ANDROID.
• ANDROID SUPPORTS LARGE NUMBER OF APPLICATIONS IN SMART PHONES.
• THE FIRST VERSION (ALPHA) 1.0 OF ANDROID RELEASED IN 2008 AND LATEST
VERSION IS PIE RELEASED IN 2018.
• ANDROID OS WAS FOUNDED IN PALO ALTO, CALIFORNIA IN OCTOBER 2003.
• ANDROID OS IS AN OPEN SOURCE SOFTWARE WHICH IS AVAILABLE TO ALL THE
DEVELOPERS.
IOS:
• IOS IS THE (OS) OPERATING SYSTEM DEVELOPED BY APPLE INC FOR ALL APPLE
MOBILE DEVICES (INCLUDING IPHONE, IPAD, IPOD, AND APPLE TV).
• IOS WAS DESIGNED TO MEET THE NEEDS OF A MOBILE ENVIRONMENT, THE
TECHNOLOGIES ARE AVAILABLE ONLY ON IOS, SUCH AS THE MULTI-TOUCH
INTERFACE, EXCELLENT GRAPHIC.
• IT NOT ONLY MANAGES POWER EFFICIENTLY BUT ALSO DELIVERS OUTSTANDING
BATTERY LIFE. IOS EVEN ENSURES THAT PERFORMANCE AND BATTERY LIFE DON’T
SUFFER EVEN IF YOU ARE MULTITASKING.
• APPLE MAKES BOTH THE IPHONE HARDWARE AND THE OPERATING SYSTEM,
EVERYTHING WORKS TOGETHER SEAMLESSLY AND INTELLIGENTLY.
• IPHONE AND IOS ARE MADE TO BE USED AROUND THE WORLD. THE USER
INTERFACE IS LOCALIZED INTO OVER 30 LANGUAGES, AND YOU CAN EASILY
SWITCH BETWEEN THEM.
INTRODUCTION
DEFINATION FOR ANDROID: Android 'API
breaking' vulnerability leaks device data, allows user tracking. A
vulnerability in the Android operating system can be used to track
users without their knowledge.
DEFINATION FOR IOS: This vulnerability exploits an iOS feature
called iTunes Wi-Fi sync, which allows a user to manage their iOS
device without physically connecting it to their computer. A single
tap by the iOS device owner when the two are connected to the
same network allows an attacker to gain permanent control over
the device.
ANDROID:
 Companies like Verizon, AT&T Contained its bloatware software, in that
reason there is a possibility of vulnerability.
 The environment of android is fully customizable that’s why there is a big
thread of stealing information through the benefit of open source.
 In android, rooting is a process in which we can easily customize and
occurred changing with our software but ut us a big and possible thread
of vulnerability.
IOS:
 It allows approximate attackers (Hacker) to bypass the lock screen
protection and obtained private notification content via Siri
 In IOS, jailbreaking is a process in which we can fully customize our IOS
device but it is a big and possible thread of vulnerability.
 An issue was discovered in apple ios affected that issue evolves in the
massage component. It allows the hacker to cause denial of service via
craft message.
ANDROID:
Mobile security applications for Google's Android platform help protect
Android smartphone and tablet mobile devices from malware threats as well
as unauthorized access following accidental loss or theft of the device.
IOS:
Apple operating system is a closed system and therefore much more secure.
This is the same with mobile.
ANDROID:
 Android devices relying on an open source code, meaning that the organization
(carrier services) of these devices can tinker with their phone’s and tablet OS.
Too much tinkering might create a weakness in their device’s security.
 If a vendor put outs a new device with a modification to the android OS and
there’s a vulnerability in that code, hackers will find it.
 Android is more often targeted by hackers too. As it is the more popular
smartphone. Android devices are more vulnerable to the malware and viruses
that these criminals can unleash.
IOS:
 Apple’s operating system is a closed system. Apple doesn’t release its source
code to app developers, and the owners of iPhones and iPads can't modify the
code on their phones themselves. This makes it more difficult for hackers to find
vulnerabilities on iOS-powered devices.
 In iOS may be considered more secure, it’s not impossible for cybercriminals to
hit iPhones or iPads.
 The owners of both Android and iOS devices need to be aware of possible
malware (bloatware) and viruses, and be careful when downloading apps from
third-party app stores. It’s safest to download apps from trusted sources, such
as Google Play and the Apple App Store, which yet the apps they sell.
DEFINATION: Agile Methodology (Behavior) is a type of
project management process. The agile method anticipates
change and allows for much more “FLEXIBILITY” than
traditional methods. Clients can make small objective
changes without huge amendments to the budget or
schedule.
ANDROID:
 As compared to iOS android is more agile, because we can transfer files
easily or quickly through one device to another like USB (mass storage ).
 Android OS is more agile, because we can download our files from
browser.
 In contrast to other operating system android is more agile because it has
more multitasking efficient ability (recent apps).
IOS:
 IOS is agile because it can transfer file through another iOS device without
cost of vulnerability.
 IOS cannot allow third party files to download on their default safari
browser for the sake of malicious viruses.
 In IOS it cannot allow third party apps to run on their devices so it is more
agile.
According to our perspective we think that
IOS is more secure as compared to Android
but at the same time android is working
way too harder for securing their devices for
example: GOOGLE PLAY PROTECT which is
too much protected and secure as android’s
predecessor GOOGLE APP MARKET. Google
Play Protect is a security feature for the
Google Play Store to make their apps as well
as their users secure. IOS on other way is
strong on their R&D department for all three
factors of our presentation.
?
THANK YOU SO MUCH
EVERYONE IT IS OUR
GREAT PLEASURE TO
SHARE OUR
KNOWLEDGE IN FRONT
OF YOU ALL. ALLAH
HAFIZ HAVE A NICE
DAY 

Mais conteúdo relacionado

Mais procurados

Android technology- Advantages & Limitations
Android technology- Advantages & LimitationsAndroid technology- Advantages & Limitations
Android technology- Advantages & Limitations
Vaibhav Dixit
 

Mais procurados (20)

Android vs ios
Android vs iosAndroid vs ios
Android vs ios
 
Android ppt
Android ppt Android ppt
Android ppt
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
ios vs android.ppt
ios vs android.pptios vs android.ppt
ios vs android.ppt
 
Ios operating system
Ios operating systemIos operating system
Ios operating system
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOS
 
Android technology- Advantages & Limitations
Android technology- Advantages & LimitationsAndroid technology- Advantages & Limitations
Android technology- Advantages & Limitations
 
Introduction to Android ppt
Introduction to Android pptIntroduction to Android ppt
Introduction to Android ppt
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Android PPT Presentation 2018
Android PPT Presentation 2018Android PPT Presentation 2018
Android PPT Presentation 2018
 
android technology presentation
android technology presentationandroid technology presentation
android technology presentation
 
PPT on Android
PPT on AndroidPPT on Android
PPT on Android
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Mobile Operating Systems
Mobile Operating Systems Mobile Operating Systems
Mobile Operating Systems
 
mobile Os
mobile Osmobile Os
mobile Os
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
iOS PPT
iOS PPTiOS PPT
iOS PPT
 
Android Presentation
Android PresentationAndroid Presentation
Android Presentation
 
Presentation on iOS
Presentation on iOSPresentation on iOS
Presentation on iOS
 

Semelhante a Ios vs android

Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment i
lorindajamieson
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 

Semelhante a Ios vs android (20)

Comparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfComparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdf
 
Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment i
 
Android security
Android securityAndroid security
Android security
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
Which mobile os should you choose while building
Which mobile os should you choose while buildingWhich mobile os should you choose while building
Which mobile os should you choose while building
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Android Architecture and Working
Android Architecture and WorkingAndroid Architecture and Working
Android Architecture and Working
 
Android Vs Iphone
Android Vs IphoneAndroid Vs Iphone
Android Vs Iphone
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
Android OS - Simple pres.
Android OS - Simple pres.Android OS - Simple pres.
Android OS - Simple pres.
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Mobile Application Development with Android
Mobile Application Development with AndroidMobile Application Development with Android
Mobile Application Development with Android
 
Android and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce AppAndroid and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce App
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 

Último

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Último (20)

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 

Ios vs android

  • 1. Presentation By: Huzair Khan (D-19-TE-24) Muhammad Fuzail (D-19-TE-40) Department Of Telecommunication Engineering
  • 2. AGENDA Introduction to both Android & IOS (Operating System). Discussing About Their Vulnerabilities. Discussing About Both OS’s In Terms Of Security. Discussing About Their Agile Behavior. Conclusion.
  • 3. Android & IOS. ANDROID: • ANDROID IS A “LINUX” BASED OS DESIGNED FOR TOUCH SCREEN MOBILE DEVICES. • ONE OF THE MOST WIDELY USED OS THESE DAYS IS ANDROID. • ANDROID SUPPORTS LARGE NUMBER OF APPLICATIONS IN SMART PHONES. • THE FIRST VERSION (ALPHA) 1.0 OF ANDROID RELEASED IN 2008 AND LATEST VERSION IS PIE RELEASED IN 2018. • ANDROID OS WAS FOUNDED IN PALO ALTO, CALIFORNIA IN OCTOBER 2003. • ANDROID OS IS AN OPEN SOURCE SOFTWARE WHICH IS AVAILABLE TO ALL THE DEVELOPERS. IOS: • IOS IS THE (OS) OPERATING SYSTEM DEVELOPED BY APPLE INC FOR ALL APPLE MOBILE DEVICES (INCLUDING IPHONE, IPAD, IPOD, AND APPLE TV). • IOS WAS DESIGNED TO MEET THE NEEDS OF A MOBILE ENVIRONMENT, THE TECHNOLOGIES ARE AVAILABLE ONLY ON IOS, SUCH AS THE MULTI-TOUCH INTERFACE, EXCELLENT GRAPHIC. • IT NOT ONLY MANAGES POWER EFFICIENTLY BUT ALSO DELIVERS OUTSTANDING BATTERY LIFE. IOS EVEN ENSURES THAT PERFORMANCE AND BATTERY LIFE DON’T SUFFER EVEN IF YOU ARE MULTITASKING. • APPLE MAKES BOTH THE IPHONE HARDWARE AND THE OPERATING SYSTEM, EVERYTHING WORKS TOGETHER SEAMLESSLY AND INTELLIGENTLY. • IPHONE AND IOS ARE MADE TO BE USED AROUND THE WORLD. THE USER INTERFACE IS LOCALIZED INTO OVER 30 LANGUAGES, AND YOU CAN EASILY SWITCH BETWEEN THEM. INTRODUCTION
  • 4. DEFINATION FOR ANDROID: Android 'API breaking' vulnerability leaks device data, allows user tracking. A vulnerability in the Android operating system can be used to track users without their knowledge. DEFINATION FOR IOS: This vulnerability exploits an iOS feature called iTunes Wi-Fi sync, which allows a user to manage their iOS device without physically connecting it to their computer. A single tap by the iOS device owner when the two are connected to the same network allows an attacker to gain permanent control over the device.
  • 5. ANDROID:  Companies like Verizon, AT&T Contained its bloatware software, in that reason there is a possibility of vulnerability.  The environment of android is fully customizable that’s why there is a big thread of stealing information through the benefit of open source.  In android, rooting is a process in which we can easily customize and occurred changing with our software but ut us a big and possible thread of vulnerability. IOS:  It allows approximate attackers (Hacker) to bypass the lock screen protection and obtained private notification content via Siri  In IOS, jailbreaking is a process in which we can fully customize our IOS device but it is a big and possible thread of vulnerability.  An issue was discovered in apple ios affected that issue evolves in the massage component. It allows the hacker to cause denial of service via craft message.
  • 6. ANDROID: Mobile security applications for Google's Android platform help protect Android smartphone and tablet mobile devices from malware threats as well as unauthorized access following accidental loss or theft of the device. IOS: Apple operating system is a closed system and therefore much more secure. This is the same with mobile.
  • 7. ANDROID:  Android devices relying on an open source code, meaning that the organization (carrier services) of these devices can tinker with their phone’s and tablet OS. Too much tinkering might create a weakness in their device’s security.  If a vendor put outs a new device with a modification to the android OS and there’s a vulnerability in that code, hackers will find it.  Android is more often targeted by hackers too. As it is the more popular smartphone. Android devices are more vulnerable to the malware and viruses that these criminals can unleash. IOS:  Apple’s operating system is a closed system. Apple doesn’t release its source code to app developers, and the owners of iPhones and iPads can't modify the code on their phones themselves. This makes it more difficult for hackers to find vulnerabilities on iOS-powered devices.  In iOS may be considered more secure, it’s not impossible for cybercriminals to hit iPhones or iPads.  The owners of both Android and iOS devices need to be aware of possible malware (bloatware) and viruses, and be careful when downloading apps from third-party app stores. It’s safest to download apps from trusted sources, such as Google Play and the Apple App Store, which yet the apps they sell.
  • 8. DEFINATION: Agile Methodology (Behavior) is a type of project management process. The agile method anticipates change and allows for much more “FLEXIBILITY” than traditional methods. Clients can make small objective changes without huge amendments to the budget or schedule.
  • 9. ANDROID:  As compared to iOS android is more agile, because we can transfer files easily or quickly through one device to another like USB (mass storage ).  Android OS is more agile, because we can download our files from browser.  In contrast to other operating system android is more agile because it has more multitasking efficient ability (recent apps). IOS:  IOS is agile because it can transfer file through another iOS device without cost of vulnerability.  IOS cannot allow third party files to download on their default safari browser for the sake of malicious viruses.  In IOS it cannot allow third party apps to run on their devices so it is more agile.
  • 10. According to our perspective we think that IOS is more secure as compared to Android but at the same time android is working way too harder for securing their devices for example: GOOGLE PLAY PROTECT which is too much protected and secure as android’s predecessor GOOGLE APP MARKET. Google Play Protect is a security feature for the Google Play Store to make their apps as well as their users secure. IOS on other way is strong on their R&D department for all three factors of our presentation.
  • 11. ? THANK YOU SO MUCH EVERYONE IT IS OUR GREAT PLEASURE TO SHARE OUR KNOWLEDGE IN FRONT OF YOU ALL. ALLAH HAFIZ HAVE A NICE DAY 