Sexy Mobile Apps? iTunes Had Plenty Of Them!

Prior to 2010, there used to be lots of mobile applications at the iTunes store, the functions of which were more than a little naughty. Apple, however, did not take too kindly to the more titillating of such apps – and most of them were banned, much to the disappointment of many iPhone-users worldwide. We here look back at some really sexy mobile apps that are either no longer available, or still have a presence at iTunes:

1. Bikini Blast – Images of hotbods in itsy-bitsy bikinis – that was what this rather plainly-named iPhone app offered to users. The photos (at least most of them) were pretty aesthetically captured – and there were hardly any hint of vulgarity. Probably Apple was not aware that much more objectionable images could be viewed in any standard ‘R’-rated movie. Bikini Blast was sexy, but definitely not lewd.

2. Sexy Game – Gaming app with a touch of erotica about it. Sexy Game represented the height of imaginativeness on the part of mobile app developers – who included a virtual wheel in the application. The wheel had to be spun (practically, a variant of ‘Spin The Bottle’), and if you won, you got to… well… touch any body part of a scorching member of the opposite sex. There were even personalized setting options, to make the game even more interesting.

3. LoveLine – This one is basically a knowledge-sharing app, and that’s probably why it escaped the wrath of Apple. Once LoveLine is set up and launched on your iOS device, the hypothetical Dr. Drew appears – providing all the relevant (and exciting!) details about the physical aspect of romance. Not quite the type of information you would want your kid to listen – but it’s not a bad app at all!

4. Puma Index – Feel that stockbrokers are boring, stiff-lipped professionals – with no feel for fun and excitement whatsoever? You would be surprised at the sheer number of Dow Jones executives who had the Puma Index application in their phone. There were virtual female models showcased in the app – each representing a company’s share. As share prices started to fall, the models began to strip (you read that right!). It’s a good thing that no other mobile app development company has yet thought of creating such a ‘business-meets-pleasure’ application!

5. iJiggly – Okay, this app did reek of perversion, and deserved to be ousted from the iTunes store (it should not have been included in the first place!). There were no other features on this application other than displaying a pair of jiggling… well, you probably have already guessed what. High-schoolers with vivid fantasies were saddened when iJiggly was banned, but parents heaved a sigh of relief.

6. Maxim – Every issue of the magazine is filled with pictures of scantily-clad celebs, and its mobile app version did not take much time to become popular either. The application can be downloaded for free, while a nominal price has to be paid – for getting the hot cover photos of new issues. During a long, boring day, gazing at an hourglass figure is a pretty cool idea, right?

7. Adult Sex Life – The name says it all. An average expert on iPhone app development cannot possibly imagine about the in-depth details regarding sexual positions, pleasure-giving during physical intercourses, and even orgasm information that this ‘strictly for adults’ application provided. If you had a steady partner, you could keep track of her intercourse ‘performances’ as well.

8. Eucalyptus – Only staring at semi-naked bodies is not quite your thing? Among the slightly erotic iPhone reading apps, Eucalyptus is probably the most noteworthy. Nearly 21000 famous sexual literature can be read on this app – including the Indian bible of sex education, Kamasutra. It is a paid app – but hey, the thrill of reading such sexy texts make the expense more than worth it!

9. iGirl – When Apple announced that iGirl was going to be banned, many young adults almost felt the pain of a breakup. The mobile app developers of this one have to be credited for creating an app that had become the veritable pocket-girlfriend of thousands of users worldwide. Apart from interacting with the virtual babe, people could also tell her to pose in sultry, seductive positions. With iGirl gone, a fine source of sexy fun for iPhone owners was lost.

10. What’s Your Sex Appeal? – Probably the least objectionable of the apps mentioned on this list. This one is still available for download, and it helps you to confirm (or otherwise!) whether you are indeed a handsome hunk or not. The app is designed in the format of a fun quiz (comprising of twenty questions). If you answer them truthfully, you will get an idea of your hotness quotient.

11. Playboy – Since the ban on sexy iPhone apps, developers have stayed well clear of making apps like the one for Playboy magazine. Right from almost naked (but fit!) female bodies and vulgar jokes, to racist comments – the app had it all, and it getting banned was, for all purposes, only a matter of time. The Playboy application did not feature full nudity – but it was still way too bold for the Apple authorities.

12. PeekaBabe – Played the ‘Peek-a-Boo’ game as a child? This naughty (with a hint of perversion) app functioned in basically the same manner. You could, by shaking the iPhone or tapping on the screen, catch a glimpse of the lingerie that the otherwise fully-clothed lady inside the app was wearing. PeekaBabe was nothing short of an absolute delight for voyeuristic, slightly frustrated users – who mourned when the app disappeared from iTunes.

Flirt By So Sexy was a mighty popular app which got banned because it portrayed images and live videos of real girls in… erm… PG-13 positions. iHottiez and iSteam were removed from the app store due to roughly similar reasons. If you are a fan of sweaty, sexy exercising, you might have already used the Gymbabes application on your smartphone. Apple currently has a strong stand against apps with any sort of sex-connotations – but previously, things were a lot more spicy!

An Introduction to Mobile VPN

The following article aims to provide a brief introduction to the concept of mobile VPN, how it works and its potential applications in business and the public sector.

Mobile VPN

A Virtual Private Network or VPN is a mechanism which allows users to securely connect to local networks from remote locations across public networks using encrypted parcels of data and authentication at each end point.

The term mobile VPN, or mVPN, refers to systems in which users of portable devices such as mobile phones, tablets and laptops connect securely to fixed local networks from remote locations, across the internet, by connecting initially to wireless networks or mobile phone carrier networks. The key challenges for mobile VPNs relate to the fact that the user and their device will, by definition, be mobile. They will need to be accessing their VPN connection from differing networks, often roaming between networks as they are on the move and occasionally experiencing moments offline between these networks (or as they put their device to sleep). The aim of a mobile VPN is to allow the device to be authenticated when connecting from this variety of networks and to maintain the VPN session as the user and their device roam.

The problem this poses, however, is manifold. Firstly, the IP address of the client device will vary depending on where they are accessing the network from, making authentication harder. The device may be assigned a dynamic IP address anyway (which will therefore change every time they connect), regardless of its location, but in addition the device’s IP address will change each time it connects from a different mobile or wireless network (Wi-Fi hotspot). What’s more, when the user is roaming across networks, the identity of the device end point will be changing each time they do switch from one to another. Secondly, the moments when the device is offline when the it is in a location without an available network, is switching from one to another or is idle can result in the suspension of the VPN session.

How Does It Work?

The classic model of a VPN involves the creation of a secure tunnel (in which information is encrypted) through the internet, essentially from one IP address to another, usually with the IP addresses of each end point predefined. This mechanism creates two problems for mobile users. Firstly a mobile system cannot utilise IP verification if the IP address of the connecting device changes on each occasion, which negates one of the authentication methods, removing a level of security for the VPN. Secondly this tunnel would break each time the IP of an end point changed or when the device goes offline. Mobile VPNs therefore overcome this obstacle with VPN software that assigns a constant static IP address to the actual device rather than relying on its network assigned IP address. In addition they can utilise a virtualised VPN session which is kept open as the status of the device changes and then an automated login to reestablish the connection when the device reconnects.

Where Can It Be Used?

Mobile VPNs can be beneficial for any profession or industry where the client is on the go, working from various locations; particularly where the information that is being accessed and transmitted is of a sensitive nature and therefore needs to be kept secure. In the public sector, for example, mobile VPNs can allow health professionals to communicate with central networks when outside of the surgery or hospital (i.e., in the field), to view and update patient records. Other public services whose jobs also require them to be on the move constantly, such as the police can employ the technology to the same effect to view centralised databases.

Whilst being initially popular in the public sector the technology is becoming vital to the private sector too with enterprise realising its value in allowing output to continue seamlessly for employees within businesses where travel is a necessary element of the work. Examples form the private sector can include transportation and delivery services, utility employees and travelling salesmen.

As the cost and productivity efficiencies of working securely on the move are realised by both business and the public services, and with the continuing proliferation of smartphones and tablets, the adoption of mobile VPN technology is set to gather significant pace and consequently become commonplace throughout many aspects of our lives.

Are Your Smartphones and Other Mobile Devices Secure?

Smartphones and other mobile computing devices are under attack and face major risks. They have become prime targets for cybercriminals. Many people are unaware.

Mobile phones, tablets and notepads have significant vulnerabilities. You need to be aware and take steps to keep them from becoming a victim of a cybercriminal and losing critical information.

Today’s smartphones are very powerful and can access as much confidential information as networked computers. Modern mobile platforms are incredibly capable and are routinely used by people who are on the go and in environments that are insecure. The sensitivity of the information being sent and received virtually includes any set of confidential information to which the user has access.

Mobile digital equipment faces the same attack vectors as desktop computers (e.g. malware, social engineering, signal interception and overlay attacks).

Additional challenges that are very unique exist. Your smartphone wireless signal, for example, can connect with a fake cell tower being operated by a cybercriminal and gain access to all of your information.

The mobile information security problem is becoming worse. More than two million varieties of malware are in existence and directed against transportable computing devices. A single data breach could potentially bankrupt a company.

One information security news source, ChannelPro, reports that more than 70 million smartphones are physically lost each year with only 7 percent being recovered. One laptop is stolen every fifty-three seconds. Mobile devices are easy to steal.

The security perimeter, in recent years, has been pushed back from the secure space behind a firewall to any location on the planet where a user can make a wireless connection. The user of a smartphone or a tablet functions outside of the protection of a computer network and the signal is “in the wild”. Unless robust encryption is being used, any information that is being broadcast through the air can be intercepted and compromised.

The fact that users routinely “sync” their mobile devices with desktop computers is another significant vulnerability. Both devices can easily be infected with malware if one or the other digital hardware has been compromised.

Computing on the go faces all of the typical threats and vulnerabilities as well as a number of new ones. Smartphones or notepads can be individually targeted. Cybercriminals, for example, can gain access to your confidential information by simply observing you work. There are other vulnerabilities. “Texting”, for example, has been known to deliver malware to unsuspecting users that can allow cybercriminals to completely compromise an entire hardware platform.

Smartphones, tablets and other mobile devices must be secured at all times, particularly when they are being used in public (e.g. in an airport). Users should be alert to the threat of having their equipment physically stolen and should take extraordinary steps to protect their data being stored or transmitted.

Smartphones and mobile digital equipment, in reality, are at a much greater risk of being lost, damaged or compromised than a networked computer. Smartphones can easily be stolen but they can also function as a conduit for the transfer of malware when they are synced or used to exchange information with network computers. Now that mobile digital devices are so powerful it’s fair to suggest the damage that can be done by the loss of a mobile device can be just as bad as by any other means.

You should make every effort to learn how to secure your mobile digital equipment.