<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5398937973466649681</atom:id><lastBuildDate>Sun, 08 Sep 2024 14:07:33 +0000</lastBuildDate><category>ECIL</category><category>Tutorials</category><category>Hacking</category><category>Tips n Tricks</category><category>Privacy</category><category>Security</category><category>Smart Internet of Things</category><category>Threats in IOT</category><category>Mac OS X</category><category>Personal</category><category>Tech News</category><category>Virtualization</category><title>Abhinav's Blog</title><description>Building Self-Reliant Cyber-Resilience at Electronics Corporation of India, Dept. of Atomic Energy, Govt. of India </description><link>http://abhinavbiswas.blogspot.com/</link><managingEditor>noreply@blogger.com (Abhinav Biswas)</managingEditor><generator>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>© Abhinav Biswas - All rights reserved !.</copyright><itunes:subtitle>Building Self-Reliant Cyber-Resilience at Electronics Corporation of India, Dept. of Atomic Energy, Govt. of India </itunes:subtitle><itunes:author>Abhinav Biswas</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>Abhinav Biswas</itunes:name></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-3149252400083332532</guid><pubDate>Fri, 23 Mar 2018 08:44:00 +0000</pubDate><atom:updated>2018-03-23T14:36:28.372+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Smart Internet of Things</category><category domain="http://www.blogger.com/atom/ns#">Threats in IOT</category><title>Internet of 'Hidden' Things: How to Build a Confidential IOT Network using TOR &amp; Docker Containers</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4HGRjgt-aCInyJavUK39lsDsXqqlO6uilm_Mwmw9yCVveHT8iHDC1klW1ibj52WQGFedSVMbgYEimMcm13PuX4VqczspsDyZwGPb2g_if2uY4PQR5t8ia-EJ9GlcauF44XWKTdcJsz9fc/s1600/OSSR5103.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1067" data-original-width="1600" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4HGRjgt-aCInyJavUK39lsDsXqqlO6uilm_Mwmw9yCVveHT8iHDC1klW1ibj52WQGFedSVMbgYEimMcm13PuX4VqczspsDyZwGPb2g_if2uY4PQR5t8ia-EJ9GlcauF44XWKTdcJsz9fc/s640/OSSR5103.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently, I conducted a Workshop at the &lt;b&gt;India Electronics Week - EFYCON 2018&lt;/b&gt; held at KTPO, Bangalore. This session was focussed on sensitising the audience about how we can leverage the anonymity &amp;amp; containerisation benefits of TOR &amp;amp; Docker technologies respectively to address the security &amp;amp; privacy challenges in IOT Businesses and stop Surveillance Capitalism.&lt;br /&gt;
&lt;br /&gt;
There were several Live Demos on how to build an &lt;b&gt;Internet of 'Hidden' Things&lt;/b&gt; by creating confidential, authenticated and anonymous IOT Applications using TOR Hidden Services amalgamated with Docker Containers. The demos showed that these 'Hidden' Things/Devices can even hide the fact they exist at all, if you don’t know the necessary cookie. One can neither crawl nor probe your IOT device through the Internet while your device uses the Onion Authentication feature of TOR Hidden Services. The workshop also covered the dark-side of using Internet of Hidden Things in future.&lt;br /&gt;
&lt;br /&gt;
Here's the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Introduction to TOR Hidden Services (HS)&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- HS Rendezvous Protocol&lt;br /&gt;
&amp;nbsp;- Analysis of hiddenness of HSs&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Introduction to Docker Containers&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- Virtualization vs Containerization&lt;br /&gt;
&amp;nbsp;- Security Advantages of using Docker Containers&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Dark-Side of Internet of Things&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- Smart Devices: bridging the gap between Digital threats &amp;amp; Physical threats&lt;br /&gt;
&amp;nbsp;- Recent Hacks: Jeep Cherokee, Mattel's Wi-fi Hello Barbie, Mirai DDoS Botnet&lt;br /&gt;
&amp;nbsp;- Era of Ubiquitous Surveillance: Data being the new Oil of 21st century&lt;br /&gt;
&amp;nbsp;- Security vs Privacy vs Anonymity: Importance of Trust in IOT Privacy&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Need for Internet of 'Hidden' Things&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- Security by Obscurity vs Security by Design&lt;br /&gt;
&amp;nbsp;- Achieving Privacy with Hidden IOT Devices&lt;br /&gt;
&amp;nbsp;- Leveraging the anonymity &amp;amp; containerisation benefits of TOR &amp;amp; Docker in IOT&lt;br /&gt;
&amp;nbsp;- How hidden &amp;amp; anonymous IOT Devices can stop Surveillance Capitalism&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Live Demos:- Hosting Tor Hidden Service in seconds with Docker Containers&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- Pushing hidden containers to Linux-based IOT devices for hiding them&lt;br /&gt;
&amp;nbsp;- Connecting anonymously to hidden IOT devices with proper authentication&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6. Dark-Side of Internet of Hidden Things&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- How hidden IOT devices can be exploited for malicious purposes&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7. Discussion &amp;amp; Takeaways&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;- Conclusion &amp;amp; Futuristic Thoughts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation material for the delivered session.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/wjrZNnDF8JX6wf" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt;</description><link>http://abhinavbiswas.blogspot.com/2018/03/internet-of-hidden-things-confidential.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4HGRjgt-aCInyJavUK39lsDsXqqlO6uilm_Mwmw9yCVveHT8iHDC1klW1ibj52WQGFedSVMbgYEimMcm13PuX4VqczspsDyZwGPb2g_if2uY4PQR5t8ia-EJ9GlcauF44XWKTdcJsz9fc/s72-c/OSSR5103.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-2246498766578799512</guid><pubDate>Fri, 23 Mar 2018 08:10:00 +0000</pubDate><atom:updated>2018-03-23T14:12:39.154+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Smart Internet of Things</category><category domain="http://www.blogger.com/atom/ns#">Threats in IOT</category><title>Demystifying the Dark-Side of Internet of Things (IOT): A Journey through Security &amp; Privacy Challenges</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://media.licdn.com/media/gcrc/dms/image/C5612AQGbr3Gzzi65GQ/article-cover_image-shrink_720_1280/0?e=2120997600&amp;amp;v=alpha&amp;amp;t=maf0F7ifZxGeYuqRHJgDOIX3D9_SRQWz9bf3UWAHxFQ" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="450" data-original-width="800" height="360" src="https://media.licdn.com/media/gcrc/dms/image/C5612AQGbr3Gzzi65GQ/article-cover_image-shrink_720_1280/0?e=2120997600&amp;amp;v=alpha&amp;amp;t=maf0F7ifZxGeYuqRHJgDOIX3D9_SRQWz9bf3UWAHxFQ" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently, I spoke at the &lt;b&gt;India Electronics Week - EFYCON 2018&lt;/b&gt; held at KTPO, Bangalore. The talk focussed on sensitising the audience about the paradigm shift that is required for securing IOT Businesses where Proprietary protocols, indigenous hardware &amp;amp; air-gapped networks are not just enough in the era of Industry 4.0. The talk also presented a view on 'What are we currently doing to protect ourselves' and 'What we need to do'. What are the new security challenges that are coming up and how privacy &amp;amp; anonymity is taking the lead over security with respect to IOT.&lt;br /&gt;
&lt;br /&gt;
Here’s the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why is everything getting Smart with the advent of IOT?&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;Sensors or Cloud or M2M.&lt;br /&gt;
&amp;nbsp;How is IOT bridging the gap between Digital threats and Physical threats?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Top recent IOT Hacks:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;Chrysler's Jeep Cherokee,&lt;br /&gt;
&amp;nbsp;Mattel's Wi-fi Hello Barbie.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Eavesdropping through microphones of Smart Dolls, Smart Teddy Bears &amp;amp; Smart TV&lt;/b&gt;s.&lt;br /&gt;
&amp;nbsp;What if the smart doll teaches offensive things to your kid.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Exploitable Smart Refrigerators, Smart Thermostats, Smart Insulin Pumps.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;How Smart TVs have been hacked &amp;amp; infected by malware&lt;br /&gt;
&amp;nbsp;for automated Ad Clicks and Cryptocurrency mining.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;IOT Ransomeware is now reality.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;How much someone would be willing to pay to remove ransomware from a Smart Pacemaker?&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Denial of Service (DOS) attacks on &amp;amp; through IOT devices.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;How hackers can turn a Smart Fridge into a spam-bot?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why can't we make smart devices smart enough to be secure?&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;The IOT Security Challenges:&lt;br /&gt;
&amp;nbsp;Resource Constraints, STRIDE Threat vectors.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security vs Privacy vs Anonymity.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;Importance of Trust in IOT Privacy.&lt;br /&gt;
&amp;nbsp;Security by Obscurity vs Security by Design:&lt;br /&gt;
&amp;nbsp;Proprietary protocols, indigenous hardware &amp;amp; air-gapped networks.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security can not be an afterthought.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;It has to considered &amp;amp; implemented in all of stages of IOT Business:&lt;br /&gt;
&amp;nbsp;Planning, Design, Implementation, Verification, Validation, Deployment &amp;amp; Operations.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;IOT Business Model needs to change.&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;Earlier we used to Build product, Ship them &amp;amp;&lt;br /&gt;
&amp;nbsp;forget about them until we had to Service them,&lt;br /&gt;
&amp;nbsp;but now we have to Ship &amp;amp; Remember.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation material of the delivered talk.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/6FP8tw5ojMIMmX" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavbiswas.blogspot.com/2018/03/demystifying-dark-side-internet-of.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-5939795692931643780</guid><pubDate>Tue, 22 Aug 2017 04:45:00 +0000</pubDate><atom:updated>2017-08-22T10:53:41.952+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBPaYjqYOSiADN2dlDF09t64R7JOy3CDUM29jN-VyGgINNpTXVkMsmaVjvm5Sv-mCJ0l_s4lHdMqTmQ7i0o7MQxGt1lQMwkNj0foTzdHNph1fo_8ny_eQHlJ8q9Om5MN76tWJFdxCXiXO/s1600/Abhinav_c0c0n+copy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1019" data-original-width="1600" height="407" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBPaYjqYOSiADN2dlDF09t64R7JOy3CDUM29jN-VyGgINNpTXVkMsmaVjvm5Sv-mCJ0l_s4lHdMqTmQ7i0o7MQxGt1lQMwkNj0foTzdHNph1fo_8ny_eQHlJ8q9Om5MN76tWJFdxCXiXO/s640/Abhinav_c0c0n+copy.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently, I spoke at the &lt;a href="http://is-ra.org/c0c0n/" target="_blank"&gt;&lt;b&gt;C0C0N X&lt;/b&gt; Security &amp;amp; Hacking Conference&lt;/a&gt; 2017 held at Le Meridien, Kochi. The talk focussed on the '&lt;b&gt;Hiddenness&lt;/b&gt;' of &lt;b&gt;TOR Hidden Services&lt;/b&gt; specific to the detection of HS Directory Surveillance by injecting &lt;b&gt;&lt;i&gt;Decoys&lt;/i&gt;&lt;/b&gt; or &lt;b&gt;&lt;i&gt;Honeypots&lt;/i&gt;&lt;/b&gt; inside the TOR network. Here’s the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is TOR?&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The Onion Router – Gateway to Anonymity&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How TOR works?&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Establishing the Circuit&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Directory Authorities - The Gatekeepers of TOR&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Introduction to TOR Hidden Services (HS)&lt;span style="white-space: pre;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Why run a TOR HS? - Sneak peek into HS features&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How TOR HS works? - HS Rendezvous Protocol&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Analysis of hiddenness of TOR HSs&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Research Hypothesis - Are TOR HS really Hidden?&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The HS Honeypot Approach&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Setting up the Onion Decoy Project&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Live Demo&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Hosting Tor Hidden Service in seconds with Docker Containers&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;How to setup Honeypots (aka Onion Decoys) inside TOR Network&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Q82UYxCDXWBXRRcZLnty3fQ2_wHEinKWvbvEaInUEdm9Q6bHL-35TehmxDjsaVSl3Rnt_u_kAoI6K6UllFhbu_Dy4jiocHcWlHrUnx_4796EH0rMlqX5xHcxnGTHe5JjCJSF_iJPTFVE/s1600/OnionDecoy.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="703" data-original-width="1054" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Q82UYxCDXWBXRRcZLnty3fQ2_wHEinKWvbvEaInUEdm9Q6bHL-35TehmxDjsaVSl3Rnt_u_kAoI6K6UllFhbu_Dy4jiocHcWlHrUnx_4796EH0rMlqX5xHcxnGTHe5JjCJSF_iJPTFVE/s200/OnionDecoy.png" width="200" /&gt;&lt;/a&gt;&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Live probing of Onion Decoys to detect intrusions by attackers&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Results of the Onion Decoy Experiment&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Private Hidden Services are not really hidden&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion &amp;amp; Takeaways&lt;/b&gt;&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;Everything can be a Honeypot, if you don’t know it fully&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;The more you hide, The more somebody wants to know why&lt;br /&gt;
&lt;span style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The Source Code of the &lt;b&gt;Onion Decoy Project &lt;/b&gt;is available at &lt;a href="https://github.com/OnionDecoy"&gt;https://github.com/OnionDecoy&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/pnDQxP4KcwtFiM" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavbiswas.blogspot.com/2017/08/tor-hidden-services-directory.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBPaYjqYOSiADN2dlDF09t64R7JOy3CDUM29jN-VyGgINNpTXVkMsmaVjvm5Sv-mCJ0l_s4lHdMqTmQ7i0o7MQxGt1lQMwkNj0foTzdHNph1fo_8ny_eQHlJ8q9Om5MN76tWJFdxCXiXO/s72-c/Abhinav_c0c0n+copy.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-5109840010899587979</guid><pubDate>Mon, 26 Sep 2016 20:13:00 +0000</pubDate><atom:updated>2016-09-27T01:43:36.763+05:30</atom:updated><title>How the next Edward Snowden should access Internet for maintaining privacy? - Rethink VPN &amp; TOR</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjF_-p2b8k0BGPoOEL55T1U-Etc16j0gykR98RgxNbEpGPQevHFQBY5N_p6uFkh7anQVbBqMzD0uuv-Td67RqPIdKa93Sk5LY5a57zXNH5pffmdEWsJdtg3_JuD4t4qKejMqwMxlYmmgot/s1600/tor-vpn.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;"&gt;&lt;img border="0" height="210" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjF_-p2b8k0BGPoOEL55T1U-Etc16j0gykR98RgxNbEpGPQevHFQBY5N_p6uFkh7anQVbBqMzD0uuv-Td67RqPIdKa93Sk5LY5a57zXNH5pffmdEWsJdtg3_JuD4t4qKejMqwMxlYmmgot/s320/tor-vpn.png" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
In the present era of Mass Surveillance by intelligence agencies like NSA, GCHQ &amp;amp; RAW, you should know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route is in the hands of some electronic system whose reach is unlimited, but whose safeguards are questionable. This amount of metadata collected about you is more than enough to create simulations of you and predict your behaviour in any given circumstance. It involves a systematic interference with individual’s right to privacy in terms of subjection to significant indiscrimination, monitoring and censorship. Hence, &lt;b&gt;Privacy&lt;/b&gt; &amp;amp; &lt;b&gt;Anonymity&lt;/b&gt; are rising concerns among informed citizens, journalists, whistleblowers and &lt;b&gt;Edward Snowdens&lt;/b&gt; of the world.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
When it comes to technology, privacy and anonymity enthusiasts extensively use encrypted proxy services like VPN &amp;amp; TOR Anonymity network to hide their identities &amp;amp; activities online. But let’s understand how useful &amp;amp; worthy they are, what are the differences and how can we leverage the potential of both.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
VPN is faster than TOR, and is suitable for P2P downloading. The major downside however (and reason VPN is said to provide privacy rather than anonymity) is that it requires your trust the VPN provider. This is because, should it wish to (or is compelled to), your VPN provider can “see” what you get up to on the internet. VPN also allows you to easily spoof your geographic location.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
On the contrary, TOR is much slower because of the built-in &lt;i&gt;Onion Routing&lt;/i&gt;, is often blocked by websites, and is unsuitable for P2P, but it does not require your truston anybody, and is therefore much more secure &amp;amp; truly anonymous.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Interestingly, VPN &amp;amp; TOR can be clubbed and used together in order to provide an extra layer of security, and to mitigate some of the drawbacks of using either technology exclusively. The main downside, however, of doing so combines the speed hit of both technologies, making connections more secure but slow. It is also important to understand the difference between connecting VPN to TOR and connecting TOR to VPN for accessing the Internet. &lt;b&gt;Order Matters!&lt;/b&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;VPN to TOR&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Under this configuration you first connect to your VPN server, and then to the TOR network before accessing the internet:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; VPN -&amp;gt; TOR -&amp;gt; Internet&lt;/b&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This is what happens when you use TOR Browser while connected to a VPN server.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;i&gt;Your apparent IP on the internet = IP of the TOR exit node.&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will not know that you are using TOR (but it can know that you are using VPN).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. The TOR entry node will not see your real IP address, but the IP address of VPN server.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. Allows access to TOR hidden services (.onion websites).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider knows your real IP address.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. No protection from malicious TOR exit nodes. Non-SSL traffic entering and leaving TOR exit nodes is unencrypted and could be monitored.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. TOR exit nodes are often blocked by popular websites.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;TOR to VPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This configuration involves connecting first to TOR using TOR client and then to a VPN server to access the internet using regular browser:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; TOR -&amp;gt; VPN -&amp;gt; Internet&lt;/b&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This setup requires you to configure your VPN client to work with TOR, and note, not all but some VPN providers support this like AirVPN, BolehVPN, etc.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;i&gt;Your apparent IP on the internet = IP of the VPN server.&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider cannot ‘see’ your real IP address – only that of the TOR exit node.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. If combined with an anonymous payment method (such as properly-mixed / well-laundered Bitcoins) made anonymously over TOR, the VPN provider will have no way of identify you.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. Protection from malicious TOR exit nodes - As data is encrypted by the VPN client before entering (and exiting) the TOR network.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
4. VPN Provider Allows you to choose server location (Great for geo-spoofing).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
5. All internet traffic is routed through TOR (even by apps that usually don’t support it).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
6. Bypasses any blocks on TOR exit nodes (Important!).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will know that you are using TOR.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. The VPN provider can see your internet traffic (but can’t identify you - true anonymity)&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. Slightly more vulnerable to global end-to-end timing attack as a fixed point in the chain exists (the VPN provider).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
4. Does not allow access to TOR hidden services (‘.onion’ websites).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;TOR after TOR to VPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This configuration involves connecting first to TOR using TOR client, and then to a VPN server and using TOR Browser to access the internet:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;b&gt;Your computer -&amp;gt; TOR -&amp;gt; VPN -&amp;gt; TOR -&amp;gt; Internet&lt;/b&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Note, this setup requires you to use TOR Browser as well as configuring your VPN client to work with TOR.&lt;/div&gt;
&lt;blockquote class="tr_bq" style="text-align: justify;"&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Your apparent IP on the internet = IP of the TOR exit node of 2nd TOR circuit.&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Pros:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your VPN provider cannot ‘see’ your real IP address – only that of the TOR exit node.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. If combined with an anonymous payment method (such as properly mixed Bitcoins) made anonymously over TOR, the VPN provider will have no way of identify you.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. Protection from malicious TOR exit nodes - As data is encrypted by the VPN client before entering (and exiting) the 1st TOR Circuit.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
4. VPN Provider allows you to choose server location (Extra-functionality not required actually because, 2nd TOR circuit will provide geo-spoofing).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
5. Allows access to TOR hidden services (‘.onion’ websites).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
6. Less prone to global end-to-end timing attack because of two TOR circuits.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Cons:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
1. Your ISP will know that you are using TOR.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
2. The VPN provider can see your internet traffic (but can not identify you - true anonymity)&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
3. TOR exit nodes are often blocked by popular websites.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;So which one is better?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
However, before that, two important things to ponder upon:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;1. Malicious exit nodes:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
When using TOR, the last exit node in the chain between your computer &amp;amp; open internet is called an exit node. Traffic enters and exits this node unencrypted (unless some additional form of encryption is used like SSL), which means that anyone running the exit node can spy on users’ internet traffic. This is not usually a huge problem, as a user’s identity is hidden by the 2 or more additional nodes that traffic passes through on its way to and from the exit node. If the unencrypted traffic contains personally identifiable information, however, this can be seen by the entity running the exit node.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Such nodes are referred to as malicious exit nodes, and have also been known to redirect users to fake websites. SSL connections are encrypted, so if you connect to an SSL secured website (https://) your data will be secure, even it passes through a malicious exit node.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;2. End-to-End (E2E) timing attacks:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
This is a technique used to de-anonymize VPN &amp;amp; TOR users by correlating the time when they were connected, vis-a-vis the timing of otherwise anonymous behavior on the internet. An incident where a Harvard bomb-threat idiot got caught (http://www.businessinsider.com/harvard-student-used-tor-for-bomb-threat-2013-12) while using TOR is a great example of this form of de-anonymization attack in action.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
On a global scale, pulling off a successful E2E attack against a TOR user would be a monumental undertaking, but possibly not impossible for the likes of the NSA, who are suspected of running a high percentage of all the world public TOR exit nodes. If such an attack (or other de-anonymization tactic) is made against you while using TOR, then using VPN as well will provide an additional layer of security.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Note, TOR to VPN is usually considered more secure than VPN to TOR since it allows you to maintain complete (and true) anonymity if the correct precautions are taken because not even your VPN provider knows who you are. It also provides protection against malicious TOR exit nodes, and allows you to evade censorship via blocks on TOR exit nodes. You should be aware, however, that if an adversary can compromise your VPN provider, then it can control one end of the TOR chain. Over time, this may allow the adversary to pull off an E2E timing or other de-anonymization attack. The additional benefit you get if you use TOR after TOR to VPN is that you can access ‘.onion’ websites, but with a caveat that tor exit nodes are often blocked by popular websites.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Hence, the bottom line is that any user who requires a very high level of security, privacy &amp;amp; anonymity must carefully weigh up the pros and cons of each of the above three configurations in relation to their particular needs.&amp;nbsp;&lt;/div&gt;
</description><link>http://abhinavbiswas.blogspot.com/2016/09/next-edward-snowden-internet-for.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjF_-p2b8k0BGPoOEL55T1U-Etc16j0gykR98RgxNbEpGPQevHFQBY5N_p6uFkh7anQVbBqMzD0uuv-Td67RqPIdKa93Sk5LY5a57zXNH5pffmdEWsJdtg3_JuD4t4qKejMqwMxlYmmgot/s72-c/tor-vpn.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-106906110425867630</guid><pubDate>Sun, 28 Aug 2016 18:04:00 +0000</pubDate><atom:updated>2016-08-28T23:44:43.765+05:30</atom:updated><title>Dark-Side of Internet of Things (IOT): Security &amp; Privacy Challenges</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRfP6UfSkgLZnZRvpeKDnUGpy5ndkgjcxaDfjRnpKjY-dhJwI9JTOW-AzWGOqC-NL-7tdvGS-PNxa7-7E5n77HD2Eefit7TnaJVNfcPbMX2OUrgd3CWQQml0TAUyWbFk0CWE8gS2p9omTz/s1600/Screen+Shot+2016-08-28+at+9.29.00+PM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRfP6UfSkgLZnZRvpeKDnUGpy5ndkgjcxaDfjRnpKjY-dhJwI9JTOW-AzWGOqC-NL-7tdvGS-PNxa7-7E5n77HD2Eefit7TnaJVNfcPbMX2OUrgd3CWQQml0TAUyWbFk0CWE8gS2p9omTz/s640/Screen+Shot+2016-08-28+at+9.29.00+PM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Recently, I was invited to deliver a talk at the &lt;b&gt;Global IOT Conclave&lt;/b&gt; held at The Chancery Pavilion, Bangalore. The talk focussed on the Dark-Side of Internet of Things specific to Security &amp;amp; Privacy Challenges in IOT. Here’s the digest of the presentation.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Why is everything getting &lt;b&gt;Smart&lt;/b&gt; with the advent of IOT? &amp;nbsp;&lt;b&gt;Sensors&lt;/b&gt; or &lt;b&gt;Cloud&lt;/b&gt; or &lt;b&gt;M2M&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;IOT is bridging the gap between the &lt;b&gt;Physical world&lt;/b&gt; &amp;amp; the &lt;b&gt;Digital world&lt;/b&gt; and how Digital threats are becoming Physical threats?&lt;/li&gt;
&lt;li&gt;Top IOT Hacks: Chrysler's &lt;i&gt;Jeep Cherokee&lt;/i&gt;, Mattel's &lt;i&gt;Wi-fi Hello Barbie&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;Eavesdropping through microphones of Smart Dolls, Smart Teddy Bears &amp;amp; Smart TVs. What if the smart doll teaches offensive things to your kid.&lt;/li&gt;
&lt;li&gt;Exploitable Smart Refrigerators, Smart Thermostats, Smart Insulin Pumps. How Smart TVs have been hacked &amp;amp; infected by malware for automated Ad Clicks and Cryptocurrency mining.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;IOT Ransomeware&lt;/b&gt; is now reality. How much someone would be willing to pay to remove ransomware from a Smart Pacemaker?&lt;/li&gt;
&lt;li&gt;Denial of Service (DOS) attacks on &amp;amp; through IOT devices. How hackers can turn a Smart Fridge into a spam-bot?&lt;/li&gt;
&lt;li&gt;Why can't we make smart devices smart enough to be secure? The IOT Security Challenges: &lt;b&gt;Resource Constraints&lt;/b&gt;, &lt;i&gt;STRIDE&lt;/i&gt; Threat vectors.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Security&lt;/b&gt; vs &lt;b&gt;Privacy&lt;/b&gt; vs &lt;b&gt;Anonymity&lt;/b&gt;. Importance of &lt;b&gt;Trust&lt;/b&gt; in IOT Privacy.&lt;/li&gt;
&lt;li&gt;Security by &lt;b&gt;Obscurity&lt;/b&gt; vs Security by &lt;b&gt;Design&lt;/b&gt;: Proprietary protocols, indigenous hardware &amp;amp; air-gapped networks.&lt;/li&gt;
&lt;li&gt;Security can not be an afterthought. It has to considered &amp;amp; implemented in all of stages of IOT Business: &lt;i&gt;Planning, Design, Implementation, Verification, Validation, Deployment &amp;amp; Operations&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;IOT Business Model needs to change. Earlier we used to Build product, Ship them &amp;amp; forget about them until we had to Service them, but now we have to &lt;b&gt;Ship &amp;amp; Remember&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/AcmsgPtGWwvVu5" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;strong&gt; &lt;a href="https://www.slideshare.net/Abhinav_Biswas/dark-side-of-internet-of-things-iot" target="_blank" title="Dark - Side of Internet of Things (IOT)"&gt;Dark - Side of Internet of Things (IOT)&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="https://www.slideshare.net/Abhinav_Biswas" target="_blank"&gt;Abhinav Biswas&lt;/a&gt;&lt;/strong&gt; &lt;/div&gt;
&lt;br /&gt;</description><link>http://abhinavbiswas.blogspot.com/2016/08/dark-side-of-internet-of-things.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRfP6UfSkgLZnZRvpeKDnUGpy5ndkgjcxaDfjRnpKjY-dhJwI9JTOW-AzWGOqC-NL-7tdvGS-PNxa7-7E5n77HD2Eefit7TnaJVNfcPbMX2OUrgd3CWQQml0TAUyWbFk0CWE8gS2p9omTz/s72-c/Screen+Shot+2016-08-28+at+9.29.00+PM.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-6870922888511871524</guid><pubDate>Fri, 03 Jun 2016 08:53:00 +0000</pubDate><atom:updated>2016-07-13T11:56:04.928+05:30</atom:updated><title>Touring the Dark-Side of Internet: A Journey through IOT, TOR &amp;amp; Docker</title><description>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJsYh1GQ4bJFxJ3WCdTpKvUG07H6Shgq5_-mW67T7eEMKF5CsQuYgmghXvEJPn695frFzzWF7gxseQ8TuDEo41HBQqRijTVPQlYeq_vBYUT6RioF7quhzQrbgGlkxvRSZxQ0M0UNBEXC3u/s1600/Geeknight.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJsYh1GQ4bJFxJ3WCdTpKvUG07H6Shgq5_-mW67T7eEMKF5CsQuYgmghXvEJPn695frFzzWF7gxseQ8TuDEo41HBQqRijTVPQlYeq_vBYUT6RioF7quhzQrbgGlkxvRSZxQ0M0UNBEXC3u/s640/Geeknight.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
Recently, I had the privilege of delivering a talk at &lt;b&gt;ThoughtWorks &lt;a href="http://twhyderabad.github.io/geeknight/" target="_blank"&gt;GeekNight&lt;/a&gt;&lt;/b&gt; Hyderabad along with my co-speaker @Sarath. The session focussed on the &lt;b&gt;&lt;i&gt;Dark-Side of Internet&lt;/i&gt;&lt;/b&gt; touching upon the following theme.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;With the advent of &lt;b&gt;IOT&lt;/b&gt;, Every &lt;b&gt;'Thing'&lt;/b&gt; is getting &lt;b&gt;Smart&lt;/b&gt;, starting from the range of smartwatches, smart refrigerators, smart bulbs to smart car, smart healthcare, smart agriculture, smart retail, smart city and what not, even smart planet. &lt;b&gt;But why is every thing getting smart? &lt;/b&gt;Is it just a marketing gimmick?&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt; &lt;i&gt;People are trying to bridge the gap between Digital World &amp;amp; Physical World by means of ubiquitous connectivity to Internet, and when digital things become physical, digital threats also become physical threats. &lt;b&gt;Security &amp;amp; Privacy &lt;/b&gt;issues are rising as never before. What if the microphone in your smart TV can be used to eavesdrop the private communications in your bed room? What if a smart driverless car deliberately crashes itself into an accident? What if you want to be Anonymous over Internet and don't want anybody to track you?&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt; The talk focused on answering the above questions with a view on '&lt;b&gt;What are we currently doing to protect ourselves' &lt;/b&gt;and &lt;b&gt;'What we need to do'&lt;/b&gt;. What are the new security challenges that are coming up and how &lt;b&gt;privacy&lt;/b&gt; &amp;amp; &lt;b&gt;anonymity&lt;/b&gt; is taking the lead over &lt;b&gt;security&lt;/b&gt;. The talk also sensitised the audience about the paradigm shift that is happening in IOT DevOps, with help of &lt;b&gt;Docker&lt;/b&gt; Containers and how they can be anonymised using &lt;b&gt;TOR&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
The detailed Agenda of the delivered talk:&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Top 5 Security Attacks of 2015&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Sony Hack, Ransomware, State-Sponsored, Hacktivism&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;The Cyber Attack Kill Chain&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;APTs (Advanced Persistent Threats)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Defense Strategies &amp;amp; New Challenges&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Signature-based vs dynamic sandboxing&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Virtualization &amp;amp; Cloud Security&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Security vs Privacy vs Anonymity&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;The Advent of IOT&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;People - Process - Product (Era of ‘Smart’ Things)&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Cloud - M2M - Sensors (How connectivity can go bad)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Introduction to Docker&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;From Virtualization to Containerization&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;Shift in DevOps –&amp;nbsp;&lt;b&gt;Demo&lt;/b&gt;&amp;nbsp;of Web hosting through containers&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Deep Net vs Dark Net&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul class="ul2"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;TOR (The Onion Router) – How to be Anonymous on Internet&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Demo&lt;/b&gt;&amp;nbsp;of TOR hidden service through Docker Containers&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="li1"&gt;&lt;b&gt;&lt;/b&gt;&lt;span class="s1"&gt;&lt;b&gt;Future thoughts.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is the presentation for the delivered talk.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/oC62UUCuhuswTc" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin-bottom: 5px;"&gt;
&lt;strong&gt; &lt;a href="https://www.slideshare.net/Abhinav_Biswas/touring-the-dark-side-of-internet-a-journey-through-iot-tor-docker" target="_blank" title="Touring the Dark Side of Internet: A Journey through IOT, TOR &amp;amp; Docker"&gt;Touring the Dark Side of Internet: A Journey through IOT, TOR &amp;amp; Docker&lt;/a&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
from &lt;strong&gt;&lt;a href="https://www.slideshare.net/Abhinav_Biswas" target="_blank"&gt;Abhinav Biswas&lt;/a&gt;&lt;/strong&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavbiswas.blogspot.com/2016/06/touring-dark-side-of-internet-journey.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJsYh1GQ4bJFxJ3WCdTpKvUG07H6Shgq5_-mW67T7eEMKF5CsQuYgmghXvEJPn695frFzzWF7gxseQ8TuDEo41HBQqRijTVPQlYeq_vBYUT6RioF7quhzQrbgGlkxvRSZxQ0M0UNBEXC3u/s72-c/Geeknight.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-5118168076361737994</guid><pubDate>Fri, 01 Apr 2016 05:20:00 +0000</pubDate><atom:updated>2016-07-13T11:59:16.180+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ECIL</category><category domain="http://www.blogger.com/atom/ns#">Personal</category><category domain="http://www.blogger.com/atom/ns#">Tech News</category><title>Digital Disruption - Facts to ponder! </title><description>&lt;div style="text-align: justify;"&gt;
Why didn’t a cab driver think of Ola or Uber?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t a Shopping Mall owner think of Flipkart?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t a Theatre owner think of BookMyShow?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t Airtel or Vodafone think of Paytm?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Why didn’t Taj or Marriott think of GoIbibo?&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href="http://www.analystconsult.com/wp-content/uploads/2015/11/digital-disruption-in-Nigeria.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;"&gt;&lt;img border="0" src="http://www.analystconsult.com/wp-content/uploads/2015/11/digital-disruption-in-Nigeria.png" height="157" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
The answer to all above, and the myriad of all other companies displaced by &lt;b&gt;digital disruption&lt;/b&gt;, is that at some point they became so busy and coupled with the ongoing need to meet or exceed the quarterly numbers, that they forgot to look far enough outside of their business to see the disruption ahead. A quite convincing reason why so many companies fail to face the disruption is that when someone from the outside uses digital disruption to disrupt you, the strategy most often invoked is to protect and defend the status quo. It is amazing how much time and money organizations spend protecting and defending their current ‘cash cows’. In the past this was a valid strategy that did produce good results. But digital disruption is different. Because it tends to be game-changing with a very low cost of entry, it is not hard for a small startup to quickly disrupt not only a big business, but even an entire industry.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
But, why all this is happening now? What is digital disruption?&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Digital disruption is nothing but the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services. Consider how fast the mobile web has changed how we all live, work, and play. The sudden instant, massive connectivity of the smartphones &amp;amp; internet enabled the ‘service economy’. Transformation is far reaching, and it is happening at lightning speed. Technologies and gadgets that are omnipresent today didn't even exist a few years ago. Gone are the days of SMS, it’s all WhatsApp now. Telcos are defending by fighting to kill Net Neutrality. But is it the right solution? Or they need to come up with new startup ideas.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
We are one of over 3 billion people connected to the internet. That’s nearly half of the people on Earth. Many of these people are shopping online or catching up with friends over social networks like Facebook, Twitter &amp;amp; LinkedIn. But some creative people are evaluating a new business idea, raising a startup, or building an app that’s going to change the world. Are you one of those creative people?&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Think about other emerging digital disruptions that are coming in near future: the wearable web (smart watches, smart health monitors), the drivable web (smart semi-autonomous cars), the domestic web (smart TVs, smart homes), and so on. What does that do to your industry? If you think the answer is ‘Nothing’, I encourage you to think twice. You need to become our own disruptor, your own best competition. You should not get comfortable. You should disrupt yourself, or someone else will. In order to thrive in this era of exponential change and rapid digital disruption, you need to actively anticipate new ways to disrupt yourself, before others do it for you.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
So, start thinking and think big. Who knows, you may have the next great idea:&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;The Next Startup Boom&lt;/b&gt;...&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://abhinavbiswas.blogspot.com/2016/03/digital-disruption-facts-to-ponder.html</link><thr:total>0</thr:total><georss:featurename>Hyderabad, Telangana, India</georss:featurename><georss:point>17.385044 78.486671</georss:point><georss:box>16.9002155 77.841224 17.8698725 79.132118</georss:box><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-4113998495889692496</guid><pubDate>Tue, 13 Oct 2015 20:06:00 +0000</pubDate><atom:updated>2016-07-13T11:59:53.962+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mac OS X</category><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Virtualization</category><title>Installing Mac OS X El Capitan 10.10 on Vmware ESXi 6.0</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhweNRguxNjJwYsb2b7lKfsTr5z6_jmO99fKQfwCVIDHyMAATX1Wf0HMDBT7rPpFc14iH5qBDwe92gWivhbxYO2-4E5JBi3BIbInIdFFCnfqLWINPn7QMwvAiRKLmLNFMi5eEhxoKzWOUAB/s1600/Os-X-El-Capitan-Requirements-800x420.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhweNRguxNjJwYsb2b7lKfsTr5z6_jmO99fKQfwCVIDHyMAATX1Wf0HMDBT7rPpFc14iH5qBDwe92gWivhbxYO2-4E5JBi3BIbInIdFFCnfqLWINPn7QMwvAiRKLmLNFMi5eEhxoKzWOUAB/s320/Os-X-El-Capitan-Requirements-800x420.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
After a long struggle of 48 hours, I could finally able to install the&lt;b&gt; Apple&lt;/b&gt;'s latest &lt;b&gt;Mac OS X El Capitan&lt;/b&gt; v10.11 &amp;nbsp;on a &lt;b&gt;Virtual Machine&lt;/b&gt; (VM). The experiment was conducted on Vmware ESXi 6.0 virtualization platform running over physical IBM Server X3650 M3. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following are the installation steps:&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Setting up ESXi for running Apple Mac OS X&amp;nbsp;&lt;/h2&gt;
Vmware ESXi 6.0 doesn’t support OS X out of the box.&lt;br /&gt;
&lt;ol&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHjfNptHnmbiXSjSuFbhdK8Ga-coRRb9HL256uekMrQPGTuiexUzZPaQisIj7VYOZ8jYx08GUYGmdUkfENFuQmhVy_f1x4rzXAOyPAmTPKECaiPdz9jYqMAsHjQA5r-5JTGnnPe0W5Gkut/s1600/esxi-dedicated-server-icon.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="100" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHjfNptHnmbiXSjSuFbhdK8Ga-coRRb9HL256uekMrQPGTuiexUzZPaQisIj7VYOZ8jYx08GUYGmdUkfENFuQmhVy_f1x4rzXAOyPAmTPKECaiPdz9jYqMAsHjQA5r-5JTGnnPe0W5Gkut/s200/esxi-dedicated-server-icon.png" width="200" /&gt;&lt;/a&gt;
&lt;li&gt;So, the first thing you need to do is to customise the &lt;b&gt;hypervisor&lt;/b&gt; layer by executing&lt;a name='more'&gt;&lt;/a&gt;&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt; an &lt;b&gt;Unlocker script&lt;/b&gt; by &lt;a href="http://www.insanelymac.com/forum/files/file/339-unlocker/" target="_blank"&gt;insanelymac.com&lt;/a&gt;. Please note that you will need to register on the site in order to download the Unlocker tool.&lt;/li&gt;
&lt;li&gt;You need to &lt;b&gt;enable SSH&lt;/b&gt; on your ESXi host. In order to do that, login to the host using VMware&lt;b&gt; vShpere Client&lt;/b&gt; and navigate to &lt;i&gt;Configuration-&amp;gt;Security Profile&lt;/i&gt;. From here click on &lt;i&gt;Properties&lt;/i&gt; in the upper right corner where it says &lt;i&gt;Services&lt;/i&gt;. The dialog &lt;i&gt;Services Properties &lt;/i&gt;should appear and from here you can click on&lt;i&gt; SSH-&amp;gt;Options&lt;/i&gt; and choose &lt;i&gt;Start and stop with host&lt;/i&gt;. Click &lt;i&gt;Start&lt;/i&gt; and then close all the open dialogs.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Transfer&lt;/b&gt; the Unlocker-files to the host using any &lt;b&gt;SFTP client&lt;/b&gt;. Make sure you extract the files somewhere on your client before transfer and connect to the ESXi host using the user &lt;i&gt;root&lt;/i&gt;. Once connected navigate to &lt;i&gt;/vmfs/volumes/datastore01/&lt;/i&gt; , replacing &lt;i&gt;datastore01 &lt;/i&gt;with your actual datastore name. Create a new folder (&lt;i&gt;mkdir&lt;/i&gt;) called &lt;i&gt;tools &lt;/i&gt;and transfer your unlockerXXX directory.&lt;/li&gt;
&lt;li&gt;Now &lt;i&gt;&lt;b&gt;cd &lt;/b&gt;&lt;/i&gt;into the uploaded directory and ensure the ESXi scripts have execute permissions by running &lt;i&gt;chmod +x esxi-install.sh&lt;/i&gt;. Now &lt;b&gt;run &lt;/b&gt;&lt;i&gt;./esxi-install.sh&lt;/i&gt; in order to install the Unlocker.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Reboot &lt;/b&gt;the ESXi host.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Download and create the bootable OS X El Capitan ISO&lt;/h2&gt;
Grab the &lt;b&gt;El Capitan installer app&lt;/b&gt; from the Apple &lt;b&gt;Appstore&lt;/b&gt;. Note, you need &amp;nbsp;a real Mac in order to download and convert the El Capitan installation disk. Once downloaded minimize or close the installer.&lt;br /&gt;
&lt;br /&gt;
Open the &lt;b&gt;terminal &lt;/b&gt;and change directory to /tmp using command&lt;i&gt; cd /tmp&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Create a new &lt;b&gt;script file&lt;/b&gt;: &lt;i&gt;nano ElCapitan.sh&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Paste the following into the script file and save:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;#!/bin/bash&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;# Mount the installer image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil attach /Applications/Install\ OS\ X\ El\ Capitan.app/Contents/SharedSupport/InstallESD.dmg -noverify -nobrowse -mountpoint /Volumes/install_app&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Create the ElCapitan Blank ISO Image of 7316mb with a Single Partition - Apple Partition Map&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil create -o /tmp/ElCapitan.cdr -size 7316m -layout SPUD -fs HFS+J&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Mount the ElCapitan Blank ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil attach /tmp/ElCapitan.cdr.dmg -noverify -nobrowse -mountpoint /Volumes/install_build&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Restore the Base System into the ElCapitan Blank ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;asr restore -source /Volumes/install_app/BaseSystem.dmg -target /Volumes/install_build -noprompt -noverify -erase&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Remove Package link and replace with actual files&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;rm /Volumes/OS\ X\ Base\ System/System/Installation/Packages&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/Packages /Volumes/OS\ X\ Base\ System/System/Installation/&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Copy El Capitan installer dependencies&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/BaseSystem.chunklist /Volumes/OS\ X\ Base\ System/BaseSystem.chunklist&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;cp -rp /Volumes/install_app/BaseSystem.dmg /Volumes/OS\ X\ Base\ System/BaseSystem.dmg&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Unmount the installer image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil detach /Volumes/install_app&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Unmount the ElCapitan ISO Image&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil detach /Volumes/OS\ X\ Base\ System/&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Convert the ElCapitan ISO Image to ISO/CD master (Optional)&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;hdiutil convert /tmp/ElCapitan.cdr.dmg -format UDTO -o /tmp/ElCapitan.iso&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;# Rename the ElCapitan ISO Image and move it to the desktop&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;mv /tmp/ElCapitan.iso.cdr ~/Desktop/ElCapitan.iso&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Now ensure that the &lt;b&gt;script file&lt;/b&gt; has execute permissions by running&lt;i&gt; chmod +x ElCapitan.sh&lt;/i&gt; and run with &lt;i&gt;sh ./ElCapitan.sh&lt;/i&gt;. This will take some time, so just be patient. Once done it should have created a file called &lt;b&gt;ElCapitan.iso &lt;/b&gt;on your desktop.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Create a virtual Mac OS X VM&lt;/h2&gt;
The next step should be fairly simple if you have used ESXi before. As usual open your &lt;b&gt;datastore &lt;/b&gt;and transfer the iso to wherever you normally store your installation files. Then create a new vm, select &lt;i&gt;Typical &lt;/i&gt;and you should be able to select &lt;i&gt;Other &lt;/i&gt;and then &lt;i&gt;Apple Mac OS X 10.10 (64-bit)&lt;/i&gt;. Complete the wizard, mount the ISO and &lt;b&gt;install Mac OS X&lt;/b&gt; as usual. Please &lt;b&gt;note &lt;/b&gt;that you must format the hard drive using the &lt;b&gt;disk utility&lt;/b&gt; before it will be visible in the install wizard.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Configure Mac OS X&lt;/h4&gt;
It’s very important to install the &lt;b&gt;VMware Tools&lt;/b&gt; as soon as possible after the install has finished. Without it Mac OS X might not awake from sleep and in general be very unreliable. I also recommend to turn off sleep and the screensaver in settings as these may cause issues.&lt;br /&gt;
&lt;br /&gt;
Finally, reboot and start enjoying your &lt;b&gt;virtual Mac&lt;/b&gt; on non-Apple hardware.</description><link>http://abhinavbiswas.blogspot.com/2015/10/installing-mac-os-x-el-capitan-1010-on.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhweNRguxNjJwYsb2b7lKfsTr5z6_jmO99fKQfwCVIDHyMAATX1Wf0HMDBT7rPpFc14iH5qBDwe92gWivhbxYO2-4E5JBi3BIbInIdFFCnfqLWINPn7QMwvAiRKLmLNFMi5eEhxoKzWOUAB/s72-c/Os-X-El-Capitan-Requirements-800x420.jpg" width="72"/><thr:total>0</thr:total><georss:featurename>Hyderabad, Telangana, India</georss:featurename><georss:point>17.385044 78.486671</georss:point><georss:box>16.9002155 77.841224 17.8698725 79.132118</georss:box><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-3251661987102497740</guid><pubDate>Fri, 17 Apr 2015 07:56:00 +0000</pubDate><atom:updated>2016-07-13T12:01:05.513+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips n Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Signing Java .jar Files with CLI Command Jarsigner using Hardware Token in Windows</title><description>&lt;h2 style="font-family: UbuntuLight, Arial, sans-serif; font-weight: normal; margin: 0px 0px 20px;"&gt;
&lt;a href="https://www.digicert.com/images/code-signing/java-logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: black;"&gt;&lt;img alt="" border="0" src="https://www.digicert.com/images/code-signing/java-logo.png" style="font-family: UbuntuLight, Arial, sans-serif; margin-top: -15px;" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="background-color: white; font-size: large;"&gt;How to Configure Java JDK to Use the eToken&lt;/span&gt;&lt;/h2&gt;
&lt;ol style="font-family: UbuntuLight, Arial, sans-serif;"&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Download the JDK from Oracle.com.&lt;br /&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Even if you are using a 64-bit version of Windows, the 32-bit JDK is required.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;div&gt;
&lt;span style="background-color: white;"&gt;Open a text editor (such as Notepad) and do the following:&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Copy and paste the following 2 lines into the text (Notepad) document:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;name=eToken&lt;br /&gt;library=c:\WINDOWS\system32\eTPKCS11.dll&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;div&gt;
&lt;span style="background-color: white;"&gt;Save this file as&amp;nbsp;&lt;b&gt;eToken.cfg&lt;/b&gt;&amp;nbsp;in the appropriate directory for your version of the JDK, for example:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style="list-style: disc; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;&lt;b&gt;JDK 1.8&lt;/b&gt;&lt;br /&gt;&lt;em&gt;C:\Program Files (x86)\Java\jdk1.8.0_20\bin&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;If you are running a 32-bit version of Windows, the Java JDK is installed in&amp;nbsp;&lt;em&gt;C:\Program Files\Java\...&lt;/em&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run WordPad (&lt;b&gt;Start &amp;gt; Accessories &amp;gt; WordPad&lt;/b&gt;), open the&amp;nbsp;&lt;b&gt;java.security&lt;/b&gt;&amp;nbsp;file from your Java Runtime Environment (JRE) installation (e.g.&amp;nbsp;&lt;em&gt;C:\Program Files\Java\jdk1.8_20\jre\lib\security&lt;/em&gt;), and then do the following:&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Search the file (&lt;b&gt;Ctrl + F&lt;/b&gt;) for the following line:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;security.provider.10=sun.security.mscapi.SunMSCAPI&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;If the following line isn't already present in the file, add it right after the line above:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;security.provider.11=sun.security.pkcs11.SunPKCS11 ./etoken.cfg&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;./etoken.cfg&lt;/b&gt;&amp;nbsp;is the path to the etoken.cfg file, and cannot contain a drive letter (i.e., it must be on the same drive as the JDK installation).&lt;/span&gt;&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;When WordPad asks if you want to save the file as a text-only document, select&amp;nbsp;&lt;b&gt;yes&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Open Windows explorer and go to the JDK installation folder (i.e.&amp;nbsp;&lt;em&gt;C:\Program Files\Java\jdk1.8_20\&lt;/em&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Hold&amp;nbsp;&lt;b&gt;shift&lt;/b&gt;&amp;nbsp;down and&amp;nbsp;&lt;b&gt;right-click&lt;/b&gt;&amp;nbsp;on the bin folder and select&amp;nbsp;&lt;b&gt;Open command window here&lt;/b&gt;.&lt;br /&gt;&lt;img alt="Open Command Prompt in Windows Explorer" height="150" src="https://www.digicert.com/images/code-signing/open-command-prompt.png" style="border: 2px solid;" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run the following command to find out in which token slot your certificate is stored:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;keytool -keystore NONE -storetype PKCS11 -list -J-Djava.security.debug=sunpkcs11&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;This command displays a lot of information.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Go to the top of the information display where the information starts, and search for a line similar to this:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;Slots with tokens:&lt;span class="boldred"&gt;#&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;Where # is a number such as 0 or 2.&lt;br /&gt;If the slot used is "&lt;b&gt;0&lt;/b&gt;", skip to&amp;nbsp;Step 9.&lt;br /&gt;&lt;img alt="Keytool command output showing the certificate slot number on the hardware token." height="273" src="https://www.digicert.com/images/code-signing/adobe-air-pkcs11-keytool.png" style="border: 2px solid;" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Remove the eToken device from the USB drive for a few seconds and then plug it back since it only allows you to run one keytool command at a time.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 22px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;&lt;a href="https://www.blogger.com/null" name="step_9" style="text-decoration: underline;"&gt;&lt;/a&gt;Open the file etoken.cfg you created in&amp;nbsp;Step 2, and change the value after&amp;nbsp;&lt;span class="boldred" style="font-weight: bold;"&gt;slot=&lt;/span&gt;&amp;nbsp;to match the slot from the previous keytool command then save the file.&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;name=eToken&lt;br /&gt;library=c:\WINDOWS\system32\eTPKCS11.dll&lt;br /&gt;slot=&lt;span class="boldred"&gt;0&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/code&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class="boldred" style="font-weight: bold;"&gt;0&lt;/span&gt;&amp;nbsp;is the default slot. If you have added additional certificates to the token or re-keyed/re-issued your certificate, you may have a different number than the default.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: &amp;quot;ubuntulight&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;ubuntulight&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span style="background-color: white; font-family: &amp;quot;ubuntulight&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; line-height: 26px;"&gt;How To Sign .jar Files Using the CLI Command Jarsigner&lt;/span&gt;&lt;/h2&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ol style="font-family: UbuntuLight, Arial, sans-serif;"&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In Windows Explorer, navigate to the&amp;nbsp;&lt;b&gt;JDK&lt;/b&gt;&amp;nbsp;folder.&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In the&amp;nbsp;&lt;b&gt;JDK&lt;/b&gt;&amp;nbsp;folder, push and hold&amp;nbsp;&lt;b&gt;Shift&lt;/b&gt;, right-click on the&amp;nbsp;&lt;b&gt;bin&lt;/b&gt;&amp;nbsp;folder, and select&amp;nbsp;&lt;b&gt;Open command window here&lt;/b&gt;.&lt;br /&gt;&lt;img alt="Open Command Prompt in Windows Explorer" height="150" src="https://www.digicert.com/images/code-signing/open-command-prompt_Java-jar-files.png" width="400" /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;To view the Code Signing Certificate and the certificate alias on the token:&lt;/span&gt;&lt;ol&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Plug in your token.&lt;/span&gt;&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Run the following command from the command prompt:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;keytool -list -keystore NONE -storetype PKCS11 -J-Djava.security.debug=sunpkcs11&lt;br /&gt;Enter keystore password: [enter password]&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;Sample output:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;Keystore type: PKCS11&lt;br /&gt;Keystore provider: SunPKCS11-eToken&lt;br /&gt;Your keystore contains 1 entry&lt;br /&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;, PrivateKeyEntry,&lt;br /&gt;Certificate fingerprint (SHA2):&lt;br /&gt;XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="list-style: lower-roman; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;In this example,&amp;nbsp;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;is the certificate &lt;b&gt;alias&lt;/b&gt; that you use to sign .jar files.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;To use the code signing certificate on the token to sign file.jar, run the following command from the command prompt:&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;jarsigner -verbose -keystore NONE -storetype PKCS11 -J-Djava.security.debug=sunpkcs11 "C:\path\to\file.jar" "&lt;b&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;le-a66a-2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , sans-serif; font-weight: normal; line-height: normal;"&gt;&lt;span style="line-height: 26px;"&gt;&lt;b&gt;1c4-b862-3c4345271551&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;"&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="line-height: 26px; list-style: decimal; margin: 0px 0px 1em 20px;"&gt;&lt;span style="background-color: white;"&gt;If the command executed successfully, you should see something similar to the following output:&lt;br /&gt;&lt;b&gt;Sample output:&lt;/b&gt;&lt;/span&gt;&lt;div class="supportBox" style="border: 1px solid rgb(203, 210, 210);"&gt;
&lt;code style="display: block; font-family: 'Courier New', Courier, sans-serif; margin: 1em;"&gt;&lt;span style="background-color: white;"&gt;Enter Passphrase for keystore:&lt;br /&gt;&amp;nbsp;adding: META-INF/7800FA4C.SF&lt;br /&gt;jar signed.&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;ul style="color: #333333; font-family: UbuntuLight, Arial, sans-serif;"&gt;&lt;/ul&gt;
</description><link>http://abhinavbiswas.blogspot.com/2015/04/signing-java-jar-files-with-cli-command_17.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-3916361665700296287</guid><pubDate>Sun, 31 Aug 2014 18:30:00 +0000</pubDate><atom:updated>2016-07-13T11:20:49.991+05:30</atom:updated><title>What Data Science tells me?</title><description>• If you’re a DBA, you need to learn to deal with unstructured data &lt;br /&gt;• If you’re a statistician, you need to learn to deal with data that does not fit in memory &lt;br /&gt;• If you’re a software engineer, you need to learn statistical modeling and how to communicate results. &lt;br /&gt;• If you’re a business analyst, you need to learn about algorithms and tradeoffs at scale.&lt;br /&gt;&lt;br /&gt;Just stare at the following figure, you'll understand.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLq5q8mEXoJgxbC6jlQgUS_LZJBsV7vkZd2lBfeT2cjgKGkebTCPpT5Sa87kAQMqw_kYZ1AmfKa4hwx4A5rAGDDxZRduxSBhUGugNTegyAOK3OE29if0jkNWo9XCzt2QyZe2d2JlG6daRV/s1600/001_context.pdf.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLq5q8mEXoJgxbC6jlQgUS_LZJBsV7vkZd2lBfeT2cjgKGkebTCPpT5Sa87kAQMqw_kYZ1AmfKa4hwx4A5rAGDDxZRduxSBhUGugNTegyAOK3OE29if0jkNWo9XCzt2QyZe2d2JlG6daRV/s400/001_context.pdf.jpg" height="341" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://abhinavbiswas.blogspot.com/2014/08/what-data-science-tells-me.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLq5q8mEXoJgxbC6jlQgUS_LZJBsV7vkZd2lBfeT2cjgKGkebTCPpT5Sa87kAQMqw_kYZ1AmfKa4hwx4A5rAGDDxZRduxSBhUGugNTegyAOK3OE29if0jkNWo9XCzt2QyZe2d2JlG6daRV/s72-c/001_context.pdf.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-1719066866189308286</guid><pubDate>Tue, 16 Jul 2013 18:00:00 +0000</pubDate><atom:updated>2016-07-13T11:20:49.986+05:30</atom:updated><title>What happens when you hit a key to start a job on a remote EC2 machine</title><description>Have you ever thought about what happens when you hit a key to start a job on a remote&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/Amazon_Elastic_Compute_Cloud" target="_blank"&gt;EC2&lt;/a&gt; machine.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Strike a key on the keyboard and the &lt;b&gt;capacitance&lt;/b&gt; changes instantaneously, sending a &lt;b&gt;signal&lt;/b&gt; down the USB cable&amp;nbsp;into the computer. The computer’s keyboard &lt;b&gt;driver&lt;/b&gt; traps the signal, recognizes the key it’s from, and sends&amp;nbsp;it to the &lt;b&gt;Operating System&lt;/b&gt; for handling. The OS determines which &lt;b&gt;application&lt;/b&gt; is active and decides whether&amp;nbsp;the keystroke needs to be routed over an&lt;b&gt; internet&lt;/b&gt; connection. If it is routed, a set of bytes is sent down the&amp;nbsp;CAT-5 cable into the wall socket, abstraction masked via the OSI 7-layer model, and sent to a router. The &lt;b&gt;router&lt;/b&gt;&amp;nbsp;determines the closest router which is likely to know the IP of your destination ( a lot of stuff behind this even like DNS resolution etc.), and sends that &lt;b&gt;packet &lt;/b&gt;onwards.&lt;/div&gt;&lt;div&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;Eventually the packet arrives at the destination computer, enters the via &lt;b&gt;ethernet&lt;/b&gt; cable, is trapped by the&amp;nbsp;remote OS, interpreted as an enter stroke, sent to the shell, sent to the current program, and executed. Data&amp;nbsp;from that remote machine is then sent back over the cable and the routers to your machine, which takes the&amp;nbsp;packet, uses it to update the display, and tells you what happened on that remote box.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;All of that happens&amp;nbsp;within an imperceptible fraction of a second. Just think...&lt;/div&gt;</description><link>http://abhinavbiswas.blogspot.com/2013/07/what-happens-when-you-hit-key-to-start.html</link><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5398937973466649681.post-1511483449316987626</guid><pubDate>Mon, 16 Jan 2012 16:42:00 +0000</pubDate><atom:updated>2016-07-13T12:02:07.093+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>SetUp Eclipse CDT using MinGW for Windows</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-6DVe89cPG6uWh1GCttkLrwTJy8o4zblqm-3pJxsiM1TKUOBG_q0iDXPh04Hw_B_dDs0GSfORPqZm1W9FrzC83H10kphoCzN3QIlF6g1rduLGNOoLgkiwEd6o6SEaIyitcqadjoEZZ5tw/s1600/root_banner_logo.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-6DVe89cPG6uWh1GCttkLrwTJy8o4zblqm-3pJxsiM1TKUOBG_q0iDXPh04Hw_B_dDs0GSfORPqZm1W9FrzC83H10kphoCzN3QIlF6g1rduLGNOoLgkiwEd6o6SEaIyitcqadjoEZZ5tw/s1600/root_banner_logo.jpg" /&gt;&lt;/a&gt;The standard &lt;b&gt;Eclipse CDT IDE&lt;/b&gt; (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's &lt;b&gt;make&lt;/b&gt;, &lt;b&gt;gcc compiler&lt;/b&gt;, and &lt;b&gt;gdb debugger&lt;/b&gt; utilities. For windows, &lt;b&gt;&lt;a href="http://www.mingw.org/" target="_blank"&gt;MinGW&lt;/a&gt;&lt;/b&gt;&amp;nbsp;and &lt;b&gt;&lt;a href="http://www.cygwin.com/" target="_blank"&gt;Cygwin&lt;/a&gt;&lt;/b&gt;&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime.&lt;br /&gt;
&lt;br /&gt;
In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://www.blogger.com/null" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
1. Install &lt;b&gt;MingGW Offline Installer&lt;/b&gt; (&lt;a href="http://mingw-offline-install.googlecode.com/files/mingw-6.3.exe" target="_blank"&gt;mingw-6.3.exe&lt;/a&gt;&amp;nbsp;, 7-zip Self-extracting Archive) in the &lt;b&gt;C:\&lt;/b&gt; drive.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL&lt;br /&gt;
&lt;br /&gt;
2. Install Minimal SYStem &lt;b&gt;MSYS Base&lt;/b&gt; (&lt;a href="http://downloads.sourceforge.net/mingw/MSYS-1.0.11.exe" target="_blank"&gt;MSYS 1.0.11&lt;/a&gt;) in the default folder &lt;b&gt;C:\msys\1.0&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico&lt;br /&gt;
&lt;br /&gt;
3. Extract &lt;b&gt;Eclipse CDT Helios SR2&lt;/b&gt;(&lt;a href="http://www.eclipse.org/downloads/download.php?file=/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-win32.zip" target="_blank"&gt;eclipse-cpp-helios-SR2-win32.zip&lt;/a&gt;) in the&lt;b&gt; 'Program Files' &lt;/b&gt;folder.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="Apple-style-span" style="color: lime;"&gt;-&lt;/span&gt; The Installation Folder Structure would be like...&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse"&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html&lt;br /&gt;
&lt;br /&gt;
4. Start Eclipse &amp;amp; enjoy creating &lt;b&gt;C/C++ Projects&lt;/b&gt; in Eclipse.&lt;br /&gt;
Go Start Programming...&lt;br /&gt;
&lt;br /&gt;</description><link>http://abhinavbiswas.blogspot.com/2012/01/setup-eclipse-cdt-using-mingw-for.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-6DVe89cPG6uWh1GCttkLrwTJy8o4zblqm-3pJxsiM1TKUOBG_q0iDXPh04Hw_B_dDs0GSfORPqZm1W9FrzC83H10kphoCzN3QIlF6g1rduLGNOoLgkiwEd6o6SEaIyitcqadjoEZZ5tw/s72-c/root_banner_logo.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (Abhinav Biswas)</author><enclosure length="3283940" type="application/octet-stream" url="http://downloads.sourceforge.net/mingw/MSYS-1.0.11.exe"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The standard Eclipse CDT IDE (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's make, gcc compiler, and gdb debugger utilities. For windows, MinGW&amp;nbsp;and Cygwin&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime. In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform. 1. Install MingGW Offline Installer (mingw-6.3.exe&amp;nbsp;, 7-zip Self-extracting Archive) in the C:\ drive. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL 2. Install Minimal SYStem MSYS Base (MSYS 1.0.11) in the default folder C:\msys\1.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico 3. Extract Eclipse CDT Helios SR2(eclipse-cpp-helios-SR2-win32.zip) in the 'Program Files' folder. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html 4. Start Eclipse &amp;amp; enjoy creating C/C++ Projects in Eclipse. Go Start Programming...</itunes:subtitle><itunes:author>Abhinav Biswas</itunes:author><itunes:summary>The standard Eclipse CDT IDE (for C/C++) needs integration with the GNU toolchain, before you can start making your C/C++ projects in Eclipse (the world's best Open-source IDE, Integrated Development Environment). This includes GNU's make, gcc compiler, and gdb debugger utilities. For windows, MinGW&amp;nbsp;and Cygwin&amp;nbsp;are the two main platform choices for acquiring the toolchain. It is important to note the difference between them. Cygwin produces executables that use the Cygwin POSIX runtime. MinGW produces native Windows executables that do not require a separate runtime. In this tutorial I'll show you how to setup Eclipse CDT using MinGW toolchain in a Windows Platform. 1. Install MingGW Offline Installer (mingw-6.3.exe&amp;nbsp;, 7-zip Self-extracting Archive) in the C:\ drive. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\MinGW" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*include\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*lib\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*libexec\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*README_STL 2. Install Minimal SYStem MSYS Base (MSYS 1.0.11) in the default folder C:\msys\1.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\msys\1.0" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*bin\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*doc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*etc\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*home\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*mingw\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*postinstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*share\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*uninstall\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*m.ico &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.bat &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*msys.ico 3. Extract Eclipse CDT Helios SR2(eclipse-cpp-helios-SR2-win32.zip) in the 'Program Files' folder. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- The Installation Folder Structure would be like... &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "C:\Program Files\eclipse" &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*configuration\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*dropins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*features\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*p2\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*plugins\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*readme\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*.eclipseproduct &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*artifacts.xml &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipse.ini &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*eclipsec.exe &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*epl-v10.html &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;*notice.html 4. Start Eclipse &amp;amp; enjoy creating C/C++ Projects in Eclipse. Go Start Programming...</itunes:summary><itunes:keywords>Tutorials</itunes:keywords></item></channel></rss>