SlideShare uma empresa Scribd logo
1 de 11
Mobile Device Firewall

A PowerPoint Presentation
By
Karunakar Singh Thakur
Problem Statement
What is to be developed?
• We are going to design and implement a
mobile firewall framework on android
platform that not only notifies users about
Wi-Fi misuse, unauthorized data access and
attacking IP address but also blocks the
attacking websites and System IP address.
Objectives
• Study of Android Platform.
• Study of working of regular Windows based
firewall.
• Using the previous studies to implement
Android based Firewall for Smartphone.
• Integrating web browser and the
application firewall for simultaneous
launching.
Methodology
• Point to Point Tunneling Protocol
(PPTP)
• The intrusion detection system should
include thin signature based AV system in
the mobile coupled with a server in the
cloud to perform extensive detection like
behavioral, data mining techniques.
• Android protects applications and data
through a combination of two enforcement
mechanisms, one at the system level and
the other at the ICC level.
Firewall Framework
Parameters
1.
2.
3.
4.
5.
6.

Application memory size
Notification of user
Device Ram
Blocking Rate
Throughput
Forwarding Rate.
System Block Diagram
Input
• Attack Dictionary
– Intrusion Patterns
– Signatures
• Attack Log Files
Expected Outcome
To develop a Mobile Device Firewall
application that runs on the Android OS and
acts as mobile IPS. It is launched as soon
as a web browser is started for internet
access. The application works as static
Firewall for Android enabled Smartphone.
References
 

[1] http://www.airdefense.net 
[2] http://www.developer.android.com
[3] Analysis and Research of System Security
Based on Android, Han Bing, North China
University of Technology, 2012.
[4] Understanding Android Security, William
Enck, Machigar Ongtang, and Patrick
McDaniel, Pennsylvania State University ,
2009.
Thank You

Questions?

Mais conteúdo relacionado

Mais procurados

Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

Mais procurados (20)

Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
FireWall
FireWallFireWall
FireWall
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Network security
 Network security Network security
Network security
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 

Destaque

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
kkkseld
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)
aroosa12
 
Pcy coal presentation_2012
Pcy coal presentation_2012Pcy coal presentation_2012
Pcy coal presentation_2012
Prophecy Corp
 
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
AltheimPrivacy
 
Government Publications August 2015 Library Guide (4)
Government Publications August 2015 Library Guide (4)Government Publications August 2015 Library Guide (4)
Government Publications August 2015 Library Guide (4)
Mary Howrey
 
Day ın the Life - Militant Optimist
Day ın the Life - Militant OptimistDay ın the Life - Militant Optimist
Day ın the Life - Militant Optimist
Noel Hatch
 
地域社会におけるgisの利用
地域社会におけるgisの利用地域社会におけるgisの利用
地域社会におけるgisの利用
naka9181
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazil
meggss24
 
Brazil: Nation Report
Brazil: Nation ReportBrazil: Nation Report
Brazil: Nation Report
meggss24
 
Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)
03ram
 

Destaque (20)

Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configuration
 
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
 
Firewalls
FirewallsFirewalls
Firewalls
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEMWRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
 
Pcy coal presentation_2012
Pcy coal presentation_2012Pcy coal presentation_2012
Pcy coal presentation_2012
 
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
 
Government Publications August 2015 Library Guide (4)
Government Publications August 2015 Library Guide (4)Government Publications August 2015 Library Guide (4)
Government Publications August 2015 Library Guide (4)
 
Day ın the Life - Militant Optimist
Day ın the Life - Militant OptimistDay ın the Life - Militant Optimist
Day ın the Life - Militant Optimist
 
1403903271
14039032711403903271
1403903271
 
地域社会におけるgisの利用
地域社会におけるgisの利用地域社会におけるgisの利用
地域社会におけるgisの利用
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazil
 
PIX:MAG webdesign magazin
PIX:MAG webdesign magazinPIX:MAG webdesign magazin
PIX:MAG webdesign magazin
 
Brazil: Nation Report
Brazil: Nation ReportBrazil: Nation Report
Brazil: Nation Report
 
Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)
 

Semelhante a Android Firewall project

A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
Editor IJCATR
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
Editor IJCATR
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
Sarah Thomas
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
Birodh Rijal
 

Semelhante a Android Firewall project (20)

Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Softeq Development Corp.
Softeq Development Corp.Softeq Development Corp.
Softeq Development Corp.
 
MoizChhatriwalaPotrfolio
MoizChhatriwalaPotrfolioMoizChhatriwalaPotrfolio
MoizChhatriwalaPotrfolio
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Case Study for RFID Based Mobile Application for Job Tracking
Case Study for RFID Based Mobile Application for Job TrackingCase Study for RFID Based Mobile Application for Job Tracking
Case Study for RFID Based Mobile Application for Job Tracking
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted software
 
Prasad_Meduri
Prasad_MeduriPrasad_Meduri
Prasad_Meduri
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
WSO2Con USA 2015: WSO2 Platform for IoT
WSO2Con USA 2015: WSO2 Platform for IoTWSO2Con USA 2015: WSO2 Platform for IoT
WSO2Con USA 2015: WSO2 Platform for IoT
 
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptxAUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
 

Mais de Karunakar Singh Thakur

genetic algorithms-artificial intelligence
 genetic algorithms-artificial intelligence genetic algorithms-artificial intelligence
genetic algorithms-artificial intelligence
Karunakar Singh Thakur
 

Mais de Karunakar Singh Thakur (14)

Rational Team Concert (RTC) installation and setup guide
Rational Team Concert (RTC) installation and setup guideRational Team Concert (RTC) installation and setup guide
Rational Team Concert (RTC) installation and setup guide
 
All About Jazz Team Server Technology
All About Jazz Team Server TechnologyAll About Jazz Team Server Technology
All About Jazz Team Server Technology
 
Hyper Threading technology
Hyper Threading technologyHyper Threading technology
Hyper Threading technology
 
Advanced sql injection 2
Advanced sql injection 2Advanced sql injection 2
Advanced sql injection 2
 
Advanced sql injection 1
Advanced sql injection 1Advanced sql injection 1
Advanced sql injection 1
 
Plsql programs(encrypted)
Plsql programs(encrypted)Plsql programs(encrypted)
Plsql programs(encrypted)
 
Complete placement guide(non technical)
Complete placement guide(non technical)Complete placement guide(non technical)
Complete placement guide(non technical)
 
Complete placement guide(technical)
Complete placement guide(technical)Complete placement guide(technical)
Complete placement guide(technical)
 
How to answer the 64 toughest interview questions
How to answer the 64 toughest interview questionsHow to answer the 64 toughest interview questions
How to answer the 64 toughest interview questions
 
genetic algorithms-artificial intelligence
 genetic algorithms-artificial intelligence genetic algorithms-artificial intelligence
genetic algorithms-artificial intelligence
 
Hadoop
HadoopHadoop
Hadoop
 
Prepare for aptitude test
Prepare for aptitude testPrepare for aptitude test
Prepare for aptitude test
 
Thesis of SNS
Thesis of SNSThesis of SNS
Thesis of SNS
 
Network survivability karunakar
Network survivability karunakarNetwork survivability karunakar
Network survivability karunakar
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Android Firewall project

  • 1. Mobile Device Firewall A PowerPoint Presentation By Karunakar Singh Thakur
  • 2. Problem Statement What is to be developed? • We are going to design and implement a mobile firewall framework on android platform that not only notifies users about Wi-Fi misuse, unauthorized data access and attacking IP address but also blocks the attacking websites and System IP address.
  • 3. Objectives • Study of Android Platform. • Study of working of regular Windows based firewall. • Using the previous studies to implement Android based Firewall for Smartphone. • Integrating web browser and the application firewall for simultaneous launching.
  • 4. Methodology • Point to Point Tunneling Protocol (PPTP) • The intrusion detection system should include thin signature based AV system in the mobile coupled with a server in the cloud to perform extensive detection like behavioral, data mining techniques. • Android protects applications and data through a combination of two enforcement mechanisms, one at the system level and the other at the ICC level.
  • 6. Parameters 1. 2. 3. 4. 5. 6. Application memory size Notification of user Device Ram Blocking Rate Throughput Forwarding Rate.
  • 8. Input • Attack Dictionary – Intrusion Patterns – Signatures • Attack Log Files
  • 9. Expected Outcome To develop a Mobile Device Firewall application that runs on the Android OS and acts as mobile IPS. It is launched as soon as a web browser is started for internet access. The application works as static Firewall for Android enabled Smartphone.
  • 10. References   [1] http://www.airdefense.net  [2] http://www.developer.android.com [3] Analysis and Research of System Security Based on Android, Han Bing, North China University of Technology, 2012. [4] Understanding Android Security, William Enck, Machigar Ongtang, and Patrick McDaniel, Pennsylvania State University , 2009.

Notas do Editor

  1. Any Questions??? (if any)