tag:blogger.com,1999:blog-82718552024-03-18T19:55:56.124-07:00Thoda sa main...(A little bit of me)Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.comBlogger121125tag:blogger.com,1999:blog-8271855.post-46661252613510556272016-06-23T04:23:00.000-07:002016-06-23T04:23:54.186-07:00Another Entrepreneurial Milestone<div dir="ltr" style="text-align: left;" trbidi="on">
I am delighted to announce that my company "Junco Technologies" has been acquired by Quick Heal Technologies Ltd in an all stock deal.. As you may be aware, Quick Heal is one of the leading IT security solutions company listed with the Bombay Stock Exchange and National Stock Exchange.<br />
<br />
However, I will continue to be the proud owner for ClubHack, as it will remain as a community driven initiative to bring security awareness in common people who use computers and internet in their daily life, thus serving the society and nation at large.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpfEnLxh83xx8EEOK929yAo93Ar6gBi7vgd9gAzswtorGLzNdmF4x4riBVhqoJtemJN5-Str8A0-Ji52ptPhAoDGYzCok1K_9VjvYSYynII8ePyTZzbrEcdLy_UPNBtAvQ8PPp/s1600/JtoQH.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpfEnLxh83xx8EEOK929yAo93Ar6gBi7vgd9gAzswtorGLzNdmF4x4riBVhqoJtemJN5-Str8A0-Ji52ptPhAoDGYzCok1K_9VjvYSYynII8ePyTZzbrEcdLy_UPNBtAvQ8PPp/s400/JtoQH.jpg" width="400" /></a></div>
<br />
<br />
This acquisition deal brings together the world’s leading Security Software Products and Solutions along with world class Cyber Security Intelligence and IT Consulting. The big part of the deal resulted in Quick Heal launching ‘Seqrite Services’ to offer Cyber Security Consulting and ‘Quick Heal Academy’ to impart Cyber Security Education and Training, globally.<br />
<br />
Our mission is to make the businesses and organizations aware of cyber security threats and ways to mitigate risks. Training and Education will work in conjunction with universities, law enforcement agencies and educational institutions. The Seqrite Services division would deal with a wide range of Managed Security Services which, in turn includes a pool of services such as Cyber Forensics, Cyber Audit, Security Consulting and Security Operations Centre (SOC) for various organizations and government bodies.<br />
<br />
I believe this combination will make it possible for new experiences to rise and lay a path towards innovation. As these experiences continue to get more intelligent and delightful this engagement will continue to grow which inturn create new opportunities to achieve our vision.<br />
<br />
With continual research and development we strive to introduce new security techniques in near future and aim to minimize the security. I am sure the big part of the deal will accelerate the growth of Quick Heal to a larger extent. So far I feel that the acquisition was possible as Junco and Quick Heal have similar culture and share many of the same attributes, resulting in deep individual as well as team growth. I hope we continue doing meaningful work and make a difference to our world.<br />
<br />
Thanks everyone for guidance, mentoring, support and love. Hope to be beneficiary of the same in future as well.<br />
<br /></div>
Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-23413315527933019122011-08-30T03:37:00.000-07:002011-08-30T04:14:18.670-07:00What keeping me busy these days?Have heard this question so many times from many friends & well wishers lately. <div><ul><li>Where are you absconding these days? </li><li>What projects are you doing these days? </li><li>What keeps you busy these days?</li></ul><div>
<br /></div><div>Se here's the answer.</div><div>Friends, I'm taking a lean time in my career as of now to spend more time with <a href="http://sanay.in/">Sanay</a>.</div><div>
<br /></div><div>I'm still active on <a href="http://facebook.com/srivastwa">facebook</a> but almost inactive on <a href="http://twitter.com/rohit11">twitter</a> and other places. </div><div>Work wise gone into a safe zone so that I can keep earning enough and still enjoy Sanay's daily growth.</div><div>
<br /></div><div>I plan to be in this phase for sometime now and then relook at other stuff later.</div><div>
<br /></div></div><div>Till that time, here're a few e-activities with Sanay for you</div>
<br /><iframe src="http://player.vimeo.com/video/28253925?title=0&byline=0&portrait=0" width="398" height="224" frameborder="0"></iframe><div>
<br /></div><div>His website: <a href="http://sanay.in/">http://sanay.in</a></div><div>His videos: <a href="http://vimeo.com/sanay">http://vimeo.com/sanay</a></div><div>
<br /></div><div>
<br /></div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-17377005066433268132011-02-24T06:38:00.000-08:002011-02-24T19:55:27.349-08:00Someone is trying to hack me!Yeah! You read it right. Someone is trying to <b><i>hack me!</i></b><br /><br />While you'll be reading it as "<b>HACK </b>me", I'm still thinking "hack <b>ME</b>".<br /><br /><div>----------------------------</div><div><div>Dear Attacker,<br />I don't have anything interesting enough for you to break into my machine and steal it.<br /><br />a) I don't have anything related to national security on my laptop which you can make use of<br />b) I'm not a billionaire that you can scoop off something, rather people know I'm as broke as any other average guy :)</div><div>c) Info about my clients & future plans goes somewhere else & no traces of that will be found on my laptop/phone/home network<br /><br /></div><div>----------------------------</div><div><br /></div><div>Although I used to get gmail password reset request atleast twice a week, but this is a real good one & the attacker deserves a round of applause for it. The amount of time & knowledge he has put in here, I can offer him a very lucrative job with handsome salary (are you listening Mr AV?, we got a candidate). And with this much dedication he can break into corporate or even more secure networks.</div><div><br />For the knowledge & food for thought of my readers, this is how it all looks like.<br />As far as I know/understand, this started in the beginning of Feb 2011. My personal laptop has enough protective layers (antivirus, patches, firewall, blah blah) and as anybody would guess I keep it more up-to-date compared to many people out there.<br /><br />So the attack (when I detected) was done using Metasploit, a wonderful attack/security testing framework by @hdmoore and the attacker caught me on CVE-2010-0840 which is a Java runtime vulnerability allowing remote code execution. It was sent to me via some malicious web page which I might have stumbled somehow. (I'm pretty much into exploring lot of garbage online). I know my JRE was 2 subversions older which made this attack possible.<br /><br />I felt something fishy when on my home broadband (not a shared LAN) I started getting<br />SSL errors. Thanks to stubbornness of Google Chrome, it didn't allowed me to ignore it & made me think twice. When scanned my RAM, I found "meterpreter" running in my explorer.exe (pretty neat dude). This was the time when I knew someone is deliberately trying to get into my machine & it can't be a work of a malware.<br /><br />Damn you attacker, you forced me to change 83 passwords in total.<br /><br />Moving ahead I started keeping a (more) vigil eye on my machine for the attack to re-occur, I also created a honeypot with a lot of legitimate looking traffic to lure him. But seems like the attacker understood that I have found his meterpreter trick & have killed the session once. So now his attack strategy changed and looking at the strategy used further, I'm not sure if it is work of a single guy or bunch of them together or even individually. If it's by a single guy, I seriously have a good job for him waiting.</div><div><br />This time the attacker seems to have got access to the firmware of my home router or wifi access point (I'm still to investigate my firmware). I started getting SSL warnings even on my phone when connected to wifi at home but not on my GPRS. Now this can't be done with access to my machine only, for this the attacker needs access to the network infrastructure. More interestingly the SSL warnings are only for some specific sites (gmail/twitter/facebook).<br /><br />The attacker presented me a fake SSL certificate for api.twitter.com and this is what he did wrong. He created a fake certificate with validity of 10 years. In no good senses , twitter will buy a certificate from verisign (twitter actually uses equifax) for 10 years in one go. This fake certificate was encountered on my phone, when I rechecked actual certificate of api.twitter.com (this time using my USB internet dongle) it is issued by equifax and for one year only. See images below & click them for enlarged view.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilVXdDUQVqpnIGd7BHUYwC4e_Nje6wclONc_etBvc_OE65DxeT3uxLRFA7DM9QgxyhYWGdOBJLm4zNsbRbJseN3bELZ8hyS9zVpD6N51uu7k6zxXTLUIwS0cwssud9yuyogRjK/s1600/DSC01390.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 297px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilVXdDUQVqpnIGd7BHUYwC4e_Nje6wclONc_etBvc_OE65DxeT3uxLRFA7DM9QgxyhYWGdOBJLm4zNsbRbJseN3bELZ8hyS9zVpD6N51uu7k6zxXTLUIwS0cwssud9yuyogRjK/s400/DSC01390.JPG" border="0" alt="" id="BLOGGER_PHOTO_ID_5577272703776822226" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix0kz7JcZ7d5DxN8dr6wBV11CHMvGQCqHj-yZCi_1Q9b8QtWY6lxosW6L0ZDG67WGMJbANxXr0eqgQ_W61LjxloOhYrsk6dVsy0YOc8Zhq56wj_PfT-9-Vp4LEqesw3SwWKr80/s1600/DSC01389.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix0kz7JcZ7d5DxN8dr6wBV11CHMvGQCqHj-yZCi_1Q9b8QtWY6lxosW6L0ZDG67WGMJbANxXr0eqgQ_W61LjxloOhYrsk6dVsy0YOc8Zhq56wj_PfT-9-Vp4LEqesw3SwWKr80/s400/DSC01389.JPG" border="0" alt="" id="BLOGGER_PHOTO_ID_5577272700338767490" /></a><br />There are few more screenshots & reverse trace reports but I'm not posting online for legal reasons. I'd need them to be produced as evidence. </div><div><br /></div><div>I've spent enough time on this attack, reported it to appropriate authority & want to keep my hunt on to find my <b>well wisher</b>. The only problem is I have a life to live & a lot of work to do, which seems like the attacker doesn't have.</div><div><br /></div><div>----------------------------</div><div>So dear attacker,</div><div>Go and get a life, you won't find anything more juicy on my machine/phone/network. If you wanted to prove it to the world that you can "<b>Hack Rohit</b>", I think I have done your work easy with this blog post.</div><div><br /></div><div>----------------------------</div><div><br />An open letter to all my friends, family & followers,</div><div><br /></div><div>If you receive some garbage mail or tweet from my side (@rohit11, @_rohit11, @clubhack) be assured that it wasn't me. You can still expect garbage videos shared on my facebook wall & you know that I keep sharing those stupid videos there :)</div><div><br /></div><div><br /></div><div>Wish me good luck & good life to the attacker(s)</div><div><br /></div><div>PS - If this can happen to me, this can happen to you too. I'd again request you all to be little more careful online. As in "<i>brand new days</i>" song, STING said "<i>It could happen to you - just like it happened to me. There's simply no immunity - there's no guarantee</i>"</div><div><br /></div><div><br /></div><div>PS - I have used "he", "his", "him" to address the attacker but I'm not being gender biased. I don't think I have a "my super ex-girlfriend" kind of ex who would take so much of pain to attack me. Having said that, I'm still not under estimating the skills of female attackers.</div><div><br /></div><div><br /></div><div>PS - I used word "hack" cause that's what 90% of this world understand :) </div></div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-34082792328713833412011-02-19T03:19:00.000-08:002011-02-19T04:10:58.636-08:00Misty Rhythms - What a music band<div style="text-align: left;">I remember in good old days when I was in school & I heard this music band called "Misty Rhythms".</div><div><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhPiaF1VSuFtElrJR9ig-FEsB46F4jsjP0IOF8A7ajN2sz1lZL2R9WrdGkQxVfAmJnLy74i3e2youH4OopJcN9qy-tGhQ_qEO-SLqoLLn63rfJHbAYiWQ9ue9C-hgqSNTuDEGe/s400/aye+laila.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 145px; height: 226px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5575362053694635842" /></div><div>The album was called as "Aye Laila" & had one song with a music video which got somewhat popular due to fresh born MTV in India those days. (Can anyone point me to the actual music video of that song?)</div><br /><div><br /><object width="480" height="390"><param name="movie" value="http://www.youtube.com/v/yK97tjSwmmo?fs=1&hl=en_US&rel=0"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/yK97tjSwmmo?fs=1&hl=en_US&rel=0" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="480" height="390"></embed></object><br /></div><br />I had the "<a href="http://en.wikipedia.org/wiki/Compact_Cassette">cassette</a>" of this album but slowly with death of tapes, I lost this album. I searched online many times to buy a CD/DVD version but never got one till date.<div><br /></div><div>Finally today I searched again and found that someone has uploaded the mp3s on rapidshare. I know its a crime to listen to this MP3 version but I'm ready to pay (double or more) if anyone can get me the legitimate CD/DVD</div><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnoq9ru5eV2GTbz2GyGCGJU5uFXpYPXWSkigFauGbzzTdIGq9zMcSR7ex3qtcXKgfZHVDlSYGmEP_xgKqOL8lbwYaAGFm9fXferzURhsqsjUSGViSVsTtQCAcci9_vH2g1hkuM/s1600/Misty+Rhythms.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 220px; height: 267px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnoq9ru5eV2GTbz2GyGCGJU5uFXpYPXWSkigFauGbzzTdIGq9zMcSR7ex3qtcXKgfZHVDlSYGmEP_xgKqOL8lbwYaAGFm9fXferzURhsqsjUSGViSVsTtQCAcci9_vH2g1hkuM/s400/Misty+Rhythms.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5575362056732115458" /></a></div><br /><div>I found the songs & my day is made.</div><div><br /></div><div>Now you must be thinking what's SO great about this album which has this crazy song & why does it deserves a blog post. So let me tell you this is one of the finest music I have loved. If possible go ahead and listen to other songs of this album. "Aye Laila" is the only one which is funky, rest all are so melodious & wonderfully written that I'm sure many of you would love it.</div><div><br /></div><div>Its a wonderful fusion of Classical + Reggae + African + God knows what. Its really a hypnotic music album. I'm not a music expert or have sat for any session of music appreciation but still this whole album is very close to my heart.</div><div><br /></div><div># Songs like "Big Blue Eyes", "Far far away", "Cuckoo" & "Voice from Stone" has magical lyrics.</div><div># Songs like "Dancing raindrops" & "Dance of Shiva" have the wonderful Indian classical music touch</div><div># Song "Hand in Hand" always reminds me of Bombay theme music</div><div><br /></div><div><br /></div><div>That's not all, there are interesting facts about the band members</div><div><br /></div><div><b>Ramana Gogula</b> - Was MD of Sybase India & Co-founder of Liqwid Krystal, an IT startup in bangalore. Then moved to South Indian film industry as music director </div><div><a href="http://en.wikipedia.org/wiki/Ramana_Gogula">http://en.wikipedia.org/wiki/Ramana_Gogula</a></div><div><br /></div><div><b>Kush Khanna</b> - is a BS graduate and CEO of Bazaar of India Imports, the largest importer of ayurvedic product and musical instruments into the USA. </div><div><br /></div><div>Ramana Gogula and Kush Khanna, both were based in the US and had formed a musical collaboration and named their band as Misty Rhythms</div><div><br /></div>Sources - <a href="http://www.expressindia.com/ie/daily/19980626/17750734.html">http://www.expressindia.com/ie/daily/19980626/17750734.html</a><div><br /></div><div><br /></div><div><a href="http://www.expressindia.com/ie/daily/19980626/17750734.html"></a>Before I end this post, another song @ youtube which you can enjoy</div><br /><div><br /><object width="640" height="390"><param name="movie" value="http://www.youtube.com/v/NSLW1RS1NSg?fs=1&hl=en_US&rel=0"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><embed src="http://www.youtube.com/v/NSLW1RS1NSg?fs=1&hl=en_US&rel=0" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="640" height="390"></embed></object><br /><div><br /></div><div>Ramana, Kush</div><div>Wherever you are, my best wishes to you & would love to get more of such music.</div><div><br /></div></div><br /><br /><!-- http://musicmaasti.blogspot.com/2009/07/misty-rhythms-aye-laila.html -->Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com2tag:blogger.com,1999:blog-8271855.post-85282113014409944532010-12-05T06:30:00.000-08:002010-12-21T03:56:15.958-08:00A dream come trueYou all know my passion behind <a href="http://clubhack.com/">ClubHack</a>. It started with a passion of creating a platform for information security enthusiast to come under one roof & share knowledge.<div><br /></div><div>While this was my passion I had a dream too. My dream was to have the international fame information security guru <a href="http://schneier.com/">Bruce Schneier</a> as a guest in my event. In this 4th year of ClubHack, the Keynote address was delivered by my idol.</div><div><br /></div><div><br /></div><div><br /></div><div><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQqiDSNmYPpr1NmN6bAtXYQQC3gDhOgRFDwv6uvy3R0Y7OrRrkC5r9CSDOrIRcVvXHDEiL7kP8-TsGz3WkYFfWk1PplqgwjEr9XAVchpgZwu3DnAo29PFFe9oZ11QM7hP_u4An/s320/DSC_6339.JPG" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 213px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5547209034986646802" /></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: small;">Bruce Schneier delivering his keynote address @ ClubHack2010</span></b></div><div><br /></div><div>Yeah I was excited as well as proud to have him here in <a href="http://clubhack.com/2010">ClubHack2010</a>. It was indeed a dream come true for me. We welcomed him in a traditional way by tying a pheta on his head and he loved it too</div><br /><br /><div><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNd3eEdFXZvepotJYK2HBPDD0L_0Y5dNTGQYU5nJ8a6PCI49sTIJx1D6dCd8GO_T3RDSGg3Y2Z6VI-mffGonW2z-5yxG-VrbYED0zCMcklngeNdWUiapnemKNlzutc3Q4kvNM0/s320/Bruce2.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 217px; height: 320px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5547209023100614178" /><div style="text-align: center;"><span class="Apple-style-span" style="font-size: small;"><b>That's Bruce Schneier in Indian Pagri</b></span></div></div><div><br /><div style="text-align: center;"><br /></div><div>He also brought me his latest book "Schneier on security" with his typical autograph which is a tiny crypt in itself.</div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7TccVrQoC0D9uqsIXh7Pgla8KiAVh2QU5XvNbtJxos-JHZVx-skfGyT9MrJRiDbFeXpwK1cI2HCwS-W3BO19P4JRHRyQ2o02rrgmbF6QMWTdwhgHWUYjMUqyaiJshv9w8IvaO/s1600/Bruce_Schneier_Signature.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 264px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7TccVrQoC0D9uqsIXh7Pgla8KiAVh2QU5XvNbtJxos-JHZVx-skfGyT9MrJRiDbFeXpwK1cI2HCwS-W3BO19P4JRHRyQ2o02rrgmbF6QMWTdwhgHWUYjMUqyaiJshv9w8IvaO/s400/Bruce_Schneier_Signature.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5547211742123847778" /></a><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: small;">Book "Schneier on Security" & typical autograph of Bruce Schneier</span></b></div><div><br /></div><div>If your read it correctly it reads as "ENJOYTHEBOOK" if you read from top left corner going one character down and then following the string. Pretty Cool.</div></div><div><br /></div><div><br /></div><div>Finally I met my guru Dronacharya & I'm on my cloud number 9 for that :)</div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-81549058182513979982010-10-04T22:36:00.000-07:002010-10-04T23:48:35.199-07:00Free or Cheap Google TV alternatives<div>Google <a href="http://googleblog.blogspot.com/2010/05/announcing-google-tv-tv-meets-web-web.html">announced</a> launch of <a href="http://google.com/tv">http://google.com/tv</a> and everybody including me is very excited about the whole concept as well as the product.<div><br /></div><div>But for a lot of those geeks who don't want to bleed from their pockets for the same</div><div>OR</div><div>Those geeks who can't wait for GoogleTV to come to their country have 2 nice options</div><div><br /></div><div>Remember, these are opensource products hence free for personal use but might need some hardware, hence calling them as "cheaper options"</div><div><br /></div><div>1) Myth TV <a href="http://www.mythtv.org/">http://www.mythtv.org/</a></div><div><br /></div><div><blockquote>MythTV is a Free Open Source software digital video recorder (DVR) project distributed under the terms of the GNU GPL. It has been under heavy development since 2002, and now contains most features one would expect from a good DVR (and many new ones that you soon won't be able to live without)</blockquote></div><br />Myth Today has gone beyond a simple DVR and has almost all the features of GoogleTV.<div><div><ul><li>Watch and record analog and/or digital TV, including HDTV.</li><li>Pause, skip, and rewind live TV shows.</li><li>Completely automatic commercial detection/skipping, with manual correction via an intuitive cutlist editor.</li><li>Intelligently schedules recordings to avoid conflicts.</li><li>Parental controls to keep your kids out of the good shows.</li><li>Watch youtube directly</li><li>Watch and archive DVDs and other video files.</li><li>Listen to your digital music collection.</li><li>Schedule and administer many functions remotely via a web browser.</li><li>Share your TV/Media library in different rooms over UPnP.</li><li>You can add browser to this and do a normal surfing too.</li><li>Many more...</li></ul></div></div><div>Moreover a complete distro called <a href="http://www.mythbuntu.org/">Mythbuntu</a> is available today which as the name specifies, is Myth over Ubuntu. No installation hassles, no config worries. As simple as it can be :)<div><br /><div>Here are some screenshots</div></div></div></div><div><br /></div><div style="text-align: center;"><br /></div><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEYHnO55j6IxqHFLRSniqg-Sy99PMeSEV2uJCvV4gcf_K034cgWfxUDglJDRIErMvoFFpMghiNelUAUx2Z3YfYJqREKuGma8sKKhabRXkbCppzHzThVTylvOAqexBfClsK9tpq/s400/300px-MythCenter-wide.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 169px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5524436684091476082" /><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg85B7gVs9je3_KA9vDORWYJeaDoSU82qLd8qQHK-GgaFJHssCAgt8ERV_PfMAek1OqX0tsi77OTHIfLEebNw0EimZhHXVf1j3n-uhCN8-ck7aZwLf2Df_rP5w-SRQ9X9L8f6cv/s400/300px-Glass-OSD.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 169px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5524436692179240690" /><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPkspTd-hboXIp_L-vl1VsUMytdLAUpYfMcaa_YAOy5bnDvIcY0_5buD6WcKhlFaJ4YNjfng-IdHD1WT-wlIuxy9mAvZSxFv6grDd7Ib-uClZjCoQTtNSX0Xr9_5LeTELJVs4t/s400/300px-Myth-screenshot-2009-44-22T13-44-40.433.jpg" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 188px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5524436693161186882" /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN8TQsx3KrVRhHtH3O-TnHx7PtY_GF5g88j4dhY5pFgn5zMR74mOKFquCkcvq_VBsa7l53PflgY20_lbdke7A8TeJQlIL0wGZAorlcJAx2HKjVq62pyUG2faZgs_rQ6D5brhnU/s1600/300px-Graphite.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 169px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN8TQsx3KrVRhHtH3O-TnHx7PtY_GF5g88j4dhY5pFgn5zMR74mOKFquCkcvq_VBsa7l53PflgY20_lbdke7A8TeJQlIL0wGZAorlcJAx2HKjVq62pyUG2faZgs_rQ6D5brhnU/s400/300px-Graphite.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5524436686143778882" /></a><div>Personal Note - I have tried it & found it working very fine on my atom machine with 1G RAM. I was not able to find a correct TV tuner card which supports the cable. Rest everything including a web browser makes it a perfect home entertainment library. You get a lot of themes to change the look and feel too. It can even fetch info on demand from IMDB including details, images, plot etc about movie collection you have.</div><div><br /><div><br /></div><div>2) LinuxMCE <a href="http://linuxmce.com/">http://linuxmce.com</a></div><div><br /></div><div>LinuxMCE is much beyond a entertainment setup. It even includes home automation wherein you can do</div><div><ul><li>Lighting control - Turn on/off lights</li><li>Climate control - Manage AC, window blinds</li><li>Security - Alarm management, CCTV feature using normal webcam</li><li>Telecom - Home EPABX with bundled asterisk</li><li>& Media - Play your Media Files, DVDs, CDs, TV whereever you are</li></ul><div>As per the website, the media part of LinuxMCE can</div><div><ul><li>Organize media with special metadata tags</li><li>View/Listen to media in any room</li><li>Media automatically follows you through your home</li><li>New media is automatically detected - even if it's on other devices like another computer on your network or Network Attached Storage (NAS)</li><li>Control all your A/V gear through LinuxMCE (using IR, USB, Ethernet, or RS-232) including automatically powering everything on and setting the proper inputs on each device</li><li>Together with the lighting part of LinuxMCE, lights in the room where video is being watched are dimmed when you start the movie.</li><li>Together with the Telecom part of LinuxMCE, the media is paused, when a call comes in, and continued when you hang up.</li></ul><div><br /></div></div><div style="">As you might have guessed by now, to exploit real power of LinuxMCE, you need to be a geekhead. But once you do it, its a great product to live with. Here are some screenshots</div></div></div><div style=""><br /></div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR9oO48pdx-jUIHP4R_hVdbXm25KAMCZ3QcfqxgGV43EUkNQXke-wocXo-NXjJ_RP137sHfj-Dj7I2k__M5ezc6u_XTGmsdfM_4qnMkhe-OdXy5XK_QALQVK1QeeESL14aC5FQ/s1600/gui-1188715246-1_800.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR9oO48pdx-jUIHP4R_hVdbXm25KAMCZ3QcfqxgGV43EUkNQXke-wocXo-NXjJ_RP137sHfj-Dj7I2k__M5ezc6u_XTGmsdfM_4qnMkhe-OdXy5XK_QALQVK1QeeESL14aC5FQ/s400/gui-1188715246-1_800.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5524443646190524546" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjduMXXeWzNBKyG76QSWVfDLgHFNsmaAE5-EVnqlUf1FKEBfarMuSqiSn5nVVS-wVcAHWXx_Nt-Zz2RCtjcARTcXtveXIwXz8UBqDrGg-xpGZXCiVtJi75ZITcU8cfDcK_wanyp/s1600/gui_security_big_800.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 298px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjduMXXeWzNBKyG76QSWVfDLgHFNsmaAE5-EVnqlUf1FKEBfarMuSqiSn5nVVS-wVcAHWXx_Nt-Zz2RCtjcARTcXtveXIwXz8UBqDrGg-xpGZXCiVtJi75ZITcU8cfDcK_wanyp/s400/gui_security_big_800.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5524443640630783586" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc0be2ZawI3bToAXrgFspXk5B3oUP7UP5cYHPKbazoiYxagajACkItJ63Z9rOJLzpzkHlncks7MbVP24zSj1kZQswFJLiMEXdjIV91FHqVHmU91PtsngaDkVJxBch9d1GrRdrN/s1600/maemo_linux_MCE_800.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 274px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc0be2ZawI3bToAXrgFspXk5B3oUP7UP5cYHPKbazoiYxagajACkItJ63Z9rOJLzpzkHlncks7MbVP24zSj1kZQswFJLiMEXdjIV91FHqVHmU91PtsngaDkVJxBch9d1GrRdrN/s400/maemo_linux_MCE_800.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5524443638612924274" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo6N3HZ1FvUogUzOvbdjPKFjhWjapwnPPSWJcc6h4aS0hqlWtrJS6e4SiAmGZTbjl5eatjoDr_FGKisIlpBd0IPX9ir1mIdnJ4HY29RxX-l9tptqGj5N1q_HI8oZ_FN2lyaH_B/s1600/gui_media_video_big_800.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 300px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo6N3HZ1FvUogUzOvbdjPKFjhWjapwnPPSWJcc6h4aS0hqlWtrJS6e4SiAmGZTbjl5eatjoDr_FGKisIlpBd0IPX9ir1mIdnJ4HY29RxX-l9tptqGj5N1q_HI8oZ_FN2lyaH_B/s400/gui_media_video_big_800.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5524443636201222706" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitv4rUVZZoL704x8SxsIaBaJzVq905dtKu_j2Fp7LnRj_zpKZI3PUdor117Yc0z2rrmkXtDy6nkec1cEFH8gGl-A2YguhvPD-OQyymjR-0-JwIZZIcvalCsasI0M95q7-QUKPo/s1600/gui_security_camera_big_800.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 296px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitv4rUVZZoL704x8SxsIaBaJzVq905dtKu_j2Fp7LnRj_zpKZI3PUdor117Yc0z2rrmkXtDy6nkec1cEFH8gGl-A2YguhvPD-OQyymjR-0-JwIZZIcvalCsasI0M95q7-QUKPo/s400/gui_security_camera_big_800.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5524443631765898146" /></a><br /><br />Personal Note - Haven't dived deeper into LinuxMCE. Have tried only camera and media setup which works like charm again on an atom machine with 1G RAM<br /><br /><div style=""><br /></div><div style="">Interested, ping me if you need any help in setting this up. Once you do it I'm sure you'll love it. If you know or have been using some other product for same, do let me know.</div><div style=""><br /></div><div style=""><br /></div><div style=""><br /></div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com3tag:blogger.com,1999:blog-8271855.post-430782247929192232010-04-30T22:47:00.000-07:002010-05-01T00:23:48.469-07:00am I your ssladmin ?In March this year, there were few shouts about US government <a href="http://www.betanews.com/article/Has-SSL-become-pointless-Researchers-suspect-statesponsored-CA-forgery/1269551694">forcing</a> certifying Authorities (CAs) to had over SSL key to decrypt mail transfer. Personally I'm not worried till the time the decrypted data is with any govt but it would be a serious issue if anyone else reads my data. <div><br /></div><div>Old school hacks using fake SSL were popular till sometime where the adversary used to issue a fake certificate and client application (mail client/browser) would throw a warning. Those attacks were banking on stupidity of users to ignore the warning and move forward.</div><div><br /></div><div>Then came a time (I'm not sure if it is over yet) where shady CAs would provide certificate without proper verification.</div><div><br /></div><div>Now latest <a href="http://www.betanews.com/article/Security-researcher-Trivially-easy-to-buy-SSL-certificate-for-domain-you-dont-own/1270072287">findings</a> says few webmail provider were not careful enough to disable few admin-like accounts due to which anyone could have generated a genuinely fake certificate and conduct man-in-the-middle account without ANY warning from any software.</div><div><br /></div><div>So I thought of conducting the same test on Indian webmail providers which are still popular and may people use it for mailing. I choose following 4 popular services and tired to create an account ssladmin@<domain.com></div><div><br /></div><div>1. indiatimes.com</div><div>2. rediff.com</div><div>3. india.com</div><div>4. sify.com</div><div><br /></div><div>Here are my findings</div><div>1. Indiatimes.com - the account creation interface gave an error saying the account is already in use</div><div>2. rediff.com - denied saying this username is not allowed</div><div>3. india.com - denied saying the username is forbidden</div><div>4. sify.com - Oops! sify.com allowed me to create the account. Which means I could have gone to a CA and asked for a SSL certificate.</div><div><br /></div><div>I got in touch with sify.com authorities but no one responded and they didn't either disabled my account for more than a week. Then I had to get in touch with head of portal business via LinkedIn and finally the account was closed. I'm still to receive a note of acknowledgement but atleast sify users are safe now.</div><div><br /></div><div><br /></div><div><br /></div><div>Happy & Safe Browsing</div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-87846243296424941682010-04-15T12:30:00.000-07:002010-04-15T12:59:53.220-07:00How to setup twitter anywhereToday twitter announced public availability of @anywhere which I thought of giving a shot.<br />Yes it's easy to setup and works like charm<br /><br /><div><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn66Al8i58rA35yHx2vzyY-iLdqvI70QN4DWGrbTZiAXKmPzoynYqwdN9YXPebpWS1rzjVlAeN_L5fhTVtxYiPo1L9kIgYCI8uXfh8Llic2GSDrvMIH9XC4KaHOcXi7zeTGQxU/s320/twitter-anywhere.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5460450986225533954" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 320px; height: 246px; " /></span><br /><div>STEPS:</div><div>1. Go to the <a href="http://dev.twitter.com/anywhere">dev site</a> of twitter anywhere</div><div>2. Login using your twitter account & go ahead to create an application</div><div>3. All inputs asked are pretty much intuitive</div><div>4. Go to you APP detail page & take a not of your API key</div><div>5. On your website simply add the code snippet preferably at the end just before </div><br /><div><pre><br /><script src="http://platform.twitter.com/anywhere.js?id=YOUR_API_KEY_HERE&v=1"></script><br /><script type="text/javascript"><br />twttr.anywhere(function(twitter) {<br /> twitter.hovercards();<br /> twitter(".post").linkifyUsers();<br />});<br /></script><br /></pre></div><br /><div>6. Bang you are done. Now any twitter username on your webpage will be linked to twitter hovercacrd & a mouse over will show the fun</div><div>7. If you want to add this on any blog on blogger.com, simply add a "text/html box" under design layout and paste the code snippet in it.</div><div>8. To test I have added the same in this blog & now we'll see a few example with a little shameless plug of my twitter handles ;)</div><div><br /></div><div>Mouseover these twitter handles to see @anywhere in action</div><div><br /></div><div><b>My Twitter handles:</b></div><div>Technical tweets - @rohit11</div><div>General fun & casual tweets - @_rohit11</div><div>ClubHack - @clubhack</div><div><br /></div><div><br /></div><div><br /></div><div>.</div></div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-82715571623613427372010-04-04T12:37:00.000-07:002010-04-04T12:49:12.253-07:00The world with a new lookThe way internet has barged into our lives, we have been seeing the world in a very new way.<br />I stumbled on this image created by <a href="http://www.bytelevel.com/map/ccTLD.html">Byte Level research LLC</a> which shows the new world<div><br /></div><div>As per Byte Level</div><div><blockquote>Each ccTLD is sized relative to the population of the country or territory, with the exception of China and India, which were restrained by 30% to fit the layout. At the other end of the spectrum, the smallest type size used reflects those countries with fewer than 10 million residents.</blockquote></div><br /><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ7oJZfgn3FBKHyGSJSjnfZwzre7K6bYSTfDLt7FEFhyphenhyphentt7XSbxTWQiFne232nDUHfcn9TzDDOD1FDFLzHwPOuNN0o-xMUba93as2dEjmOuFPuTtmKGvso5p7Ui8gBpn2L9zV6/s1600/e-world.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 280px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ7oJZfgn3FBKHyGSJSjnfZwzre7K6bYSTfDLt7FEFhyphenhyphentt7XSbxTWQiFne232nDUHfcn9TzDDOD1FDFLzHwPOuNN0o-xMUba93as2dEjmOuFPuTtmKGvso5p7Ui8gBpn2L9zV6/s400/e-world.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5456369855547660290" /></a><div style="text-align: center;">[click image to enlarge]</div></div><div><br /></div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-69018929772796106642010-02-23T20:04:00.000-08:002010-02-23T20:34:57.250-08:00Free WebApp Security Testing ToolsA lot of tweets today informed me about launch of <u><a href="http://dvwa.co.uk/blog/?p=264">Damn Vulnerable Web App (DVWA)</a></u> which is basically an aid for security professionals to test their skills and tools and help web developers better understand the processes of securing web applications.<br /><br />I had an old list of tools/plug-ins/utilities etc which can be helpful while playing with DVWA and I'd like to share the same for you to learn WebApp Security better.<br /><br /><p><strong>Proxy Servers:</strong><br />WebScarab: <a href="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project#Download">http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project#Download</a><br />Burp: <a href="http://www.portswigger.net/suite/download.html">http://www.portswigger.net/suite/download.html</a><br />Paros: <a href="http://www.parosproxy.org/download.shtml">http://www.parosproxy.org/download.shtml</a><br /><br /></p><p></p><p><strong>Firefox Plugins:</strong> [ <u><a href="https://addons.mozilla.org/en-US/firefox/collection/webappsec">https://addons.mozilla.org/en-US/firefox/collection/webappsec</a></u> ]<br />Tamper Data: <a href="https://addons.mozilla.org/en-US/firefox/addon/966">https://addons.mozilla.org/en-US/firefox/addon/966</a><br />SwitchProxy: <a href="https://addons.mozilla.org/en-US/firefox/addon/125">https://addons.mozilla.org/en-US/firefox/addon/125</a><br />SQL Inject Me: <a href="https://addons.mozilla.org/en-US/firefox/addon/7597">https://addons.mozilla.org/en-US/firefox/addon/7597</a><br />XSS Me: <a href="https://addons.mozilla.org/en-US/firefox/addon/7598">https://addons.mozilla.org/en-US/firefox/addon/7598</a><span style="text-decoration: underline;"></span><br />NoScript: <a href="http://noscript.net/getit">http://noscript.net/getit</a><br />ShowIP: <a href="https://addons.mozilla.org/en-US/firefox/addon/590">https://addons.mozilla.org/en-US/firefox/addon/590</a><br />ViewStatePeeker: <a href="https://addons.mozilla.org/en-US/firefox/addon/7167">https://addons.mozilla.org/en-US/firefox/addon/7167</a><span style="text-decoration: underline;"><br /></span>LiveHTTPHeader: <u><a href="https://addons.mozilla.org/en-US/firefox/addon/3829">https://addons.mozilla.org/en-US/firefox/addon/3829</a></u><br /><br /></p><p><strong>Injection Tools:</strong><br />SQLMap: <u><a href="http://sqlmap.sourceforge.net/">http://sqlmap.sourceforge.net/</a></u><br />SQLNinja: <a href="http://sqlninja.sourceforge.net/">http://sqlninja.sourceforge.net/</a><br />Pangolin: <a href="http://www.nosec.org/en/pangolin.html">http://www.nosec.org/en/pangolin.html<br /></a></p><p><strong>Some other HACKMEs:</strong><br />WebGoat: <a href="http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=61824&release_id=613045">http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=61824&release_id=613045</a><br />Foundstone Hacme Series: <a href="http://www.foundstone.com/us/resources-free-tools.asp">http://www.foundstone.com/us/resources-free-tools.asp</a><br /></p> <p>While doing webapp security testing, how can someone forget rsnake. Check out <u><a href="http://ha.ckers.org/">http://ha.ckers.org/</a></u> & specially his list of jailfree hacking sites @ <u><a href="http://ha.ckers.org/blog/20090406/hacking-without-all-the-jailtime/">http://ha.ckers.org/blog/20090406/hacking-without-all-the-jailtime</a></u></p><p><br /></p><p>Happy Hacking</p><p><br /></p><p><br /></p><p><br /></p>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-43114243905873973262010-01-09T01:10:00.000-08:002010-01-09T01:36:38.302-08:00Prefetch files (.pf) - How to view themEvery time you run an application on Windows box, a prefetch file is created in "c:\WINDOWS\Prefetch". This file with extension .pf keeps information for optimizing the load time of the application (as the name suggests).<br /><br />I always wanted to see what's there in the .pf file. Recently NirSoft has released a tool called <a class="downloadline" href="http://www.nirsoft.net/utils/win_prefetch_view.html">WinPrefetchView</a> which can be used to see the content of these files.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwABO7JaWlm96xWTnqbTq-BZHNhjiR5VeU6_isf8bnV92HlcGvKbpEt0wTJgdVbeSAfmS14A4333Su2PUUVFZKKTKwZlh3gcecJh7CgVIOH9eY3FTPwN6wi7WAgR5c1qZlk85b/s1600-h/winprefetchview.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 235px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwABO7JaWlm96xWTnqbTq-BZHNhjiR5VeU6_isf8bnV92HlcGvKbpEt0wTJgdVbeSAfmS14A4333Su2PUUVFZKKTKwZlh3gcecJh7CgVIOH9eY3FTPwN6wi7WAgR5c1qZlk85b/s400/winprefetchview.gif" alt="" id="BLOGGER_PHOTO_ID_5424666616493752850" border="0" /></a>image source : nirsoft.net<br /><br /><br />Note: This website http://nirsoft.net is a wonderful resource for nice tiny utilities for many system & password plays.Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-41504309990887013772009-12-31T06:25:00.000-08:002009-12-31T19:10:05.937-08:00The year 2009On the brighter side :)<br /># Shifted to Delhi from Pune.<br /># Bought another car.<br /># Worked for <a href="http://cwgdelhi2010.org/">Commonwealth Games 2010</a>.<br /># Finally got married to <a href="http://shaadi.rohit11.com/">Stuti</a>.<br /># Went to Puri & then Nainital for honeymoon.<br /># Delivered talks/lectures in IIM Ahmedabad & IIT Madras.<br /># Tajmahal & Delhi tourism with Stuti along with few more places in north.<br /># Decided to quit Commonwealth Games 2010.<br /># Organized <a href="http://clubhack.com/2009/">ClubHack2009</a>.<br /># Organized Indo-UK cyber security roundtable conference in ClubHack2009.<br /># Did <a href="http://wardrive.in/">wardriving</a> in Pune again<br /># Worked for some serious national security projects.<br /># & right now baking a cake for the new year :)<br /><br />On the down side :(<br /># No bike rides this year. Need to get back there.<br /># No more girlfriends, those were the days...<br /># Very less parties, need to party more<br /># Didn't organized even a single BarCamp, just attended one.<br /><br />In total a very happening year. Hope to have 2010 a better one<br /><br /><span style="font-weight: bold;">Wish you all the readers a very happy & prosperous new year.</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTQgnhWpAcuo_4QoBBgtBr9nPcPky6MQbz4ZGEEnqzgT9r25Z1tonXK56BS86Q6oIlQkeNLIG89CbZab05K7wrtkuolToGcYTNudV-11-Aa005ovlzZUjSf9RhuKwHJzdlTmCv/s1600-h/happy2010.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 484px; height: 313px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTQgnhWpAcuo_4QoBBgtBr9nPcPky6MQbz4ZGEEnqzgT9r25Z1tonXK56BS86Q6oIlQkeNLIG89CbZab05K7wrtkuolToGcYTNudV-11-Aa005ovlzZUjSf9RhuKwHJzdlTmCv/s400/happy2010.jpg" alt="" id="BLOGGER_PHOTO_ID_5421602876953527474" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjPpR8ue74qgWfzi0qHCB54Hy7Tzk-xk7yEHWSaPmidbWyC_9g8rcx37ymU24r7PVUiUiIF8WT-AkqwrZgvtYtjdTj022QzQygWLrvGO2nfTgrtH1M4muWXRHTm11EvoLs88h0/s1600-h/new_year_card.jpg"><br /></a>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-65823383037942631342009-12-23T07:59:00.000-08:002009-12-23T09:13:01.466-08:00Smartphone Security Tips<div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2vre_Zmf6-zWkCR8aOeBqMhJO2An-EU6jF64k7irBDjg9_LAg-7naE_nrsifrbRw0FzuQcamHS0lvjNP4TXiykYjFeqCN-38-cjZ6hnrheT7k0Sd74-1zJFH2X2-Y-4HFeC5/s1600-h/658px-Assorted_smartphones.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 364px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2vre_Zmf6-zWkCR8aOeBqMhJO2An-EU6jF64k7irBDjg9_LAg-7naE_nrsifrbRw0FzuQcamHS0lvjNP4TXiykYjFeqCN-38-cjZ6hnrheT7k0Sd74-1zJFH2X2-Y-4HFeC5/s400/658px-Assorted_smartphones.jpg" alt="" id="BLOGGER_PHOTO_ID_5418463575110259922" border="0" /></a><small><a href="http://en.wikipedia.org/wiki/Smartphone">image: wikipedia</a></small><br /></div><br />Christmas & New year is here and its the time many people buy/exchange gifts. So if the next shiny gift in your hand is a <a href="http://en.wikipedia.org/wiki/Smartphone">smartphone</a>, then remember following tips to be safe & secure your data.<br /><br /><span style="font-weight: bold;">1. Don't loose track of your phone.</span><br />This one goes non-technical. Don't loose the sight of your smartphone. Keep you eyes on it when you leave it anywhere, especially at the airport security checkin. The nature of data stored on phone makes it more important now<br /><br /><span style="font-weight: bold;">2. Turn off Wifi & Bluetooth</span><br />Keep wifi & bluetooth turned off when not in use. I'm sure you are smart enough by now not to accept unknown bluetooth connections but what about wifi. When you use wifi, always remember to use encrypted connections. BTW turning these off will also conserve your battery.<br /><br /><span style="font-weight: bold;">3. Do not sync everything</span><br />Its the first thing everyone tries to do after getting a smartphone, sync it up with your PC. Though it comes very handy, but avoid the temptation of syncing your password and very critical information which you often store in notes of outlook or similar apps. If the phone gets stolen, just remember you might be giving away everything.<br /><br /><span style="font-weight: bold;">4. Do not click on links in emails/sms.</span><br />SPAM has also gone smartphone way, now and then you might get an SMS/MMS for some offer and link to click. DONOT click any such link unless you have verified it in depth. Same goes for mails on phone, follow the similar rule of your PC.<br /><br /><span style="font-weight: bold;">5. Download apps with care.</span><br />The first thing anyone would love to do after getting a shiny new phone is download & install applications, that too loads of them. Always make sure you are downloading them from trusted sources. Sometime common apps are rebundled with malwares and kept for download at different websites. If you know an application, download it from its parent website only.<br /><br /><span style="font-weight: bold;">6. Backup your data.</span><br />Most importantly keep a backup of our data. A regular sync with PC will ensure this but still make sure you have copies of the phone data on your PC which I hope is regularly getting backed up.<br /><br />Smartphones are actually the best gadget to digitise your life and really are very helpful. All you need to do is take little extra care and make it safe.<br /><br /><span style="font-weight: bold;">Merry Christmas & Happy New Year</span>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-48233369283473566292009-12-16T06:28:00.000-08:002009-12-16T07:00:24.853-08:00two one za twotwo one <span style="font-weight: bold;">za </span>two<br />two two <span style="font-weight: bold;">za</span> four<br />two three <span style="font-weight: bold;">za</span> six<br /><br />many of us have grown up <a href="http://www.blogger.com/en.wikipedia.org/wiki/Mugging_%28Rote_learning%29">mugging</a> this and I always wondered what is this <span style="font-weight: bold;">ZA,</span> is it a synonym of "equals to" ??<br /><br />Just a casual browsing today answered this long pending query of mine<br /><br />its actually<br /><br />two 1<span style="font-weight: bold;">s are</span> two<br />two 2<span style="font-weight: bold;">s are</span> four<br />two 3<span style="font-weight: bold;">s are</span> six<br /><br />Thanks to the anonymous who clarified this thing to me today.<br /><br />If we divide the whole table in columns, I always thought that its the "1st column" being counted "2nd column" times gives you the result in "3rd column". Its actually the "2nd column" counted "1st column" time gives you the result in "3rd column".<br /><br />Confused? Have fun....Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com5tag:blogger.com,1999:blog-8271855.post-22720084675109345672009-11-20T19:02:00.000-08:002009-11-20T19:17:17.502-08:00Download the Google Chrome OS Virtual MachineLast week, <a href="http://www.techcrunch.com/2009/11/13/google-chrome-os-to-launch-within-a-week/">Techcrunch reported rumors of the release of the Google Chrome OS</a>. They stated that the info came from a reliable source, and indeed that source was reliable. Google had an event at their headquarters, and indeed <a href="http://googleblog.blogspot.com/2009/11/releasing-chromium-os-open-source.html">provided new details and a demo of the Chrome OS</a>. The Chromium Blog has <a href="http://blog.chromium.org/2009/11/hello-open-source-developers-would-you.html">some great videos that provide some additional information about Chrome OS</a> as well. <p><span id="more-1961"></span>The <a href="http://www.chromium.org/chromium-os/building-chromium-os">Chromium OS source code is available for download</a> (Chromium OS is the open-source version of Google Chrome OS), and you can compile and build it. It took some time, but I did manage to do this on my 64-bit Ubuntu 9.04 (Jaunty Jackalope) machine. I also managed to put together a <a href="http://www.virtualbox.org/">VirtualBox</a> virtual appliance that is all ready to go. I built a torrent for it, so feel free to download it here:</p> <p style="text-align: center;"><a style="border: 1px solid rgb(136, 136, 136); padding: 4px 8px; font-weight: bold;" href="http://geeklad.com/downloads/chromiumos.torrent">Download the Chromium OS VirtualBox Appliance Torrent</a></p> <p>Please continue to seed, as I’m sure there will be many people out there wanting to try it out.</p> <p>To use it, just start up VirtualBox, click <strong>File</strong> and then <strong>Import</strong>. Navigate to the chromiumos.ovf file and select it. The virtual appliance will be imported into VirtualBox and you should be good to go.</p> <p>I also included a txt file that more or less has the commands I used to build it. You may be able to run it as a script, although I haven’t confirmed that it will work. I guess you could say I more or less took “script-like notes” as I was building Chromium OS.</p> <p>If you hit Ctrl+Alt+T when you first log in, you’ll get a shell prompt. You can run “sudo su” (no quotes) to log in as root, and I’ve set the password to “password” (no quotes). If you use this machine for anything serious (although I doubt you would), be sure to change the password.</p> <p>You should be running VirtualBox 3.0.12, and when you import the virtual appliance everything should be configured properly. If you get an error that says “network not connected and offline login fail” when you try to log in, be sure that the virtual network adapter is set to <strong>Intel Pro/1000 MT Desktop (82540EM)</strong>.</p> <p>If the network adapter is already properly configured but you are still seeing the error, try logging in with the user “chronos” with the password “password” (no quotes). This should log you in and bring up the chrome browser window. If you don’t see a Google Accounts login screen, try hitting the refresh button. That should bring up the Google Accounts login screen.</p> <p>It is absolutely astounding how fast it boots. It really is nearly instant-on and takes a mere few seconds to bring up the login screen.</p> <p><img src="http://geeklad.com/wp-content/uploads/2009/11/chromium-os-login.png" alt="chromium-os-login" class="alignnone size-full wp-image-1962" title="chromium-os-login" style="border: 0pt none ;" width="800" height="648" /></p> <p>Once you log in with your Gmail account, it launches and you’ll see the Chromium interface open up to your Gmail. There is also a Google Calendar tab and a New Tab tab. The little chrome sphere appears in the upper left corner, but when you click on it you don’t get a menu as you see in some of the Chrome OS videos. Instead, you get a Google.com account login page.</p> <p><img src="http://geeklad.com/wp-content/uploads/2009/11/google-chrome-running.png" alt="google-chrome-running" class="alignnone size-full wp-image-1963" title="google-chrome-running" style="border: 0pt none ;" width="800" height="648" /></p> <p>As you can see, it looks very much like the <a href="http://www.techcrunch.com/2009/10/13/a-first-glimpse-of-chrome-os-in-the-flesh-at-least-the-browser-part/">Chrome OS screenshots that had surfaced last month</a>. Of course, being that this is running on a virtual machine without any decent video drivers on the operating system, the resolution is quite low (800×600). Your dear old granddad may be the only one that actually finds it visually appealing at this resolution.</p> <p>Right now the most impressive thing is how fast this operating system loads. Of course, it should load fast because there really is hardly anything there. In any case, it is rather neat to see an early release in action. The fact that it actually works on a virtual machine is quite promising. Eventually as drivers for more hardware are incorporated into it, it should be possible to run it your own real hardware.</p><p> I just went into the <a href="https://wave.google.com/wave/#restored:wave:googlewave.com%21w%252Bb1r8KLVBE">Chrome OS Wave</a> I found with the link to the VMWare disk image, and apparently the poor guy that posted that file to Amazon Web Services ran up a $380 bill so he took the file down. Here’s the torrent of the same file posted up on Pirate Bay:</p> <p style="text-align: center;"><a style="border: 1px solid rgb(136, 136, 136); padding: 4px 8px; font-weight: bold;" href="http://torrents.thepiratebay.org/5170843/chromeos-image-999.999.32309.211410-a1.vmdk.bz2.5170843.TPB.torrent">Download the Chromium OS VMWare Virtual Disk Image Torrent</a></p> <p>However, I haven’t tried using it, so I can’t confirm that it will run on VMWare without issue. Enjoy your Google Chrome OS virtual machines!</p><p>[Via <a href="http://geeklad.com/download-the-google-chrome-os-virtual-machine">GeekLad</a>]</p><p>Mind it, this is a simple copy of the blog entry, I was quite busy in preps of <a href="http://clubhack.com/2009">http://clubhack.com/2009</a> and no time to test this or re-write this :)</p><p>No responsibilities if this torrent/VM doesn't work ;)</p><p><br /></p>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-31256206479632890972009-10-31T22:18:00.000-07:002009-10-31T22:27:13.088-07:00Sunday fun blogging: Is that how twins are made...I thought you had to do it twice in a row ;)<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgslotXCvtQHUEARs1CAUM2oaxKG5JXsiGS1EVkBjYs_VYgUf5nGKPK1M2Zuan7GMaDRWgQKJkNb5_oKBiSX9HlNHwtAkjcfJGx-jAaHb6yHA9EzqDcjkzsz7pe8kM0pq6qtzw/s1600-h/geekshavetwins.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 306px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgslotXCvtQHUEARs1CAUM2oaxKG5JXsiGS1EVkBjYs_VYgUf5nGKPK1M2Zuan7GMaDRWgQKJkNb5_oKBiSX9HlNHwtAkjcfJGx-jAaHb6yHA9EzqDcjkzsz7pe8kM0pq6qtzw/s400/geekshavetwins.jpg" alt="" id="BLOGGER_PHOTO_ID_5399000592839014738" border="0" /></a>Windows lovers' way<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRXSksy_Vnxo0di5oFe_YeNo088U4IU0Ldijci4QD0_9nfaDL5bQohc10NjinOZHVEldruvLdBkNuQu4jbbweiiFRGSmDDezA0kBDQo_-gufKO-D2LgJO8vNFkC420kQuW3-Lt/s1600-h/copy-paste-twins.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 288px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRXSksy_Vnxo0di5oFe_YeNo088U4IU0Ldijci4QD0_9nfaDL5bQohc10NjinOZHVEldruvLdBkNuQu4jbbweiiFRGSmDDezA0kBDQo_-gufKO-D2LgJO8vNFkC420kQuW3-Lt/s400/copy-paste-twins.jpg" alt="" id="BLOGGER_PHOTO_ID_5399000596700152418" border="0" /></a>mac fanboys' way<br /><br /><br />What way will a Linux geek use? cp or ctrl+yy or something else???<br /><br /><br /><br /><span style="font-size:78%;">Source: http://www.geeksaresexy.net/</span>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-17677348259046302472009-10-07T22:44:00.000-07:002009-10-31T22:29:20.585-07:00Password analysis from 10,000 leaked Hotmail passwordsOn 5th October theregister <a href="http://www.theregister.co.uk/2009/10/05/hotmail_passwords_leaked/"><u>reported</u></a> more than 10,000 password were leaked mysteriously on pastebin.com. See this <a href="http://twitter.com/rohit11/status/4652436737"><u>tweet</u></a><br /><br />As a followup study "<a href="http://www.acunetix.com/blog/websecuritynews/statistics-from-10000-leaked-hotmail-passwords/"><u>Acunetix Web Application Security Blog</u></a>" did an analysis on the kind of password people use.<br /><br />Some interesting findings are as follows-<br /><blockquote><br /><span style="font-size:130%;">Statistics:</span> <ul><li>The list initially contained 10,028 entries.</li><li>There are 8931 (90%) unique passwords in the list.</li></ul> <ul><li>The longest password was 30 chars long: <strong>lafaroleratropezoooooooooooooo</strong>.</li><li>The shortest password was 1 char long : <strong>)</strong></li></ul><br /><p><span style="font-size:130%;">Top 20 most common passwords:</span></p> <ol><li><strong>123456 </strong>- <span style="font-style: italic;">64 times</span><br /></li><li><strong>123456789 </strong>- <span style="font-style: italic;">18 times</span><br /></li><li><strong>alejandra </strong>- <span style="font-style: italic;">11 times</span><br /></li><li><strong>111111 </strong>- <span style="font-style: italic;">10 times</span><br /></li><li><strong>alberto </strong>- <span style="font-style: italic;">9 times</span><br /></li><li><strong>tequiero </strong>- <span style="font-style: italic;">9 times </span><br /></li><li><strong>alejandro </strong>- <span style="font-style: italic;">9 times</span><br /></li><li><strong>12345678 </strong>- <span style="font-style: italic;">9 times</span><br /></li><li><strong>1234567 </strong>- <span style="font-style: italic;">8 times</span><br /></li><li><strong>estrella </strong>- <span style="font-style: italic;">7 times</span></li><li>iloveyou - <span style="font-style: italic;">7 times</span></li><li>daniel - <span style="font-style: italic;">7 times</span></li><li>000000 - <span style="font-style: italic;">7 times</span></li><li>roberto - <span style="font-style: italic;">7 times</span></li><li>654321 - <span style="font-style: italic;">6 times</span></li><li>bonita - <span style="font-style: italic;">6 times</span></li><li>sebastian - <span style="font-style: italic;">6 times</span></li><li>beatriz - <span style="font-style: italic;">6 times</span></li><li>mariposa - <span style="font-style: italic;">5 times</span></li><li>america - <span style="font-style: italic;">5 times</span></li></ol> <p><span style="font-size:130%;">Password length distribution:</span></p><ul><li>1 chars – 2 – 0 %</li><li>2 chars – 4 – 0 %</li><li>3 chars – 4 – 0 %</li><li>4 chars – 31 – 0 %</li><li>5 chars – 49 – 1 %</li><li><strong>6 chars – 1946 – 22 %</strong></li><li><strong>7 chars – 1254 – 14 %</strong></li><li><strong>8 chars – 1838 – 21 %</strong></li><li><strong>9 chars – 1091 – 12 %</strong></li><li>10 chars – 772 – 9 %</li><li>11 chars – 527 – 6 %</li><li>12 chars – 431 – 5 %</li><li>13 chars – 290 – 3 %</li><li>14 chars – 219 – 2 %</li><li>15 chars – 157 – 2 %</li><li>16 chars – 190 – 2 %</li><li>17 chars – 56 – 1 %</li><li>18 chars – 17 – 0 %</li><li>19 chars – 7 – 0 %</li><li>20 chars – 14 – 0 %</li><li>21 chars – 10 – 0 %</li><li>22 chars – 8 – 0 %</li><li>23 chars – 3 – 0 %</li><li>24 chars – 3 – 0 %</li><li>25 chars – 3 – 0 %</li><li>26 chars – 0 – 0 %</li><li>27 chars – 3 – 0 %</li><li>28 chars – 0 – 0 %</li><li>29 chars – 1 – 0 %</li><li>30 chars – 1 – 0 %</li></ul><br /><p><span style="font-size:130%;">What kind of passwords were in the list? :</span></p> <ul><li><strong>3,713 = </strong><strong>42</strong> <strong>%;</strong> lower alpha passwords : passwords containing only characters from ‘a’ to ‘z’.<br />Example : <em>iloveyou</em></li><li><strong>291 = 3 %; </strong>mixed case alpha passwords : passwords containing characters from ‘a’ to ‘z’ and from ‘A’ to ‘Z’.<br />Example: <em>ILoveYou</em></li><li><strong>1707 = 19 %; </strong>numeric passwords: passwords containing only numbers (’0′ to ‘9′)<br />Example: <em>123456</em></li><li><strong>2655 = 30 %; </strong>mixed alpha and numeric passwords: passwords containing characters from ‘a’-'z’, ‘A’-'Z’ and ‘0′-’9′.<br />Example: <em>Iloveyou12</em></li><li> <strong>565 = 6 %; </strong>mixed alpha + numeric + other characters.<br />Example: <em>1Love You$%@</em></li></ul></blockquote><br />Really wonderful analysis. Loved the way people think & care about their passwordsRohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-13920497798034955202009-09-22T02:22:00.000-07:002009-10-31T22:29:30.507-07:00How to find the order in which drivers are loaded in WindowsIf you want to know the order in which Windows drivers are loaded during boot up you can see that. I'm not sure why would you like to know that but if you have time to kill you can try this.<br /><br /><blockquote>C:\> wmic loadorder list full<br /><br /></blockquote>The output will look something like this<br /><blockquote><br /><pre><br />DriverEnabled GroupOrder Name Status<br />TRUE 1 System Reserved OK<br />TRUE 2 Boot Bus Extender OK<br />TRUE 3 System Bus Extender OK<br />TRUE 4 SCSI miniport OK<br />TRUE 5 Port OK<br />TRUE 6 Primary Disk OK<br />TRUE 7 SCSI Class OK<br />TRUE 8 SCSI CDROM Class OK<br />TRUE 9 FSFilter Infrastructure OK<br />TRUE 10 FSFilter System OK<br />TRUE 11 FSFilter Bottom OK<br />TRUE 12 FSFilter Copy Protection OK<br />TRUE 13 FSFilter Security Enhancer OK<br />TRUE 14 FSFilter Open File OK<br />TRUE 15 FSFilter Physical Quota Management OK<br />TRUE 16 FSFilter Encryption OK<br />TRUE 17 FSFilter Compression OK<br />TRUE 18 FSFilter HSM OK<br />TRUE 19 FSFilter Cluster File System OK<br />TRUE 20 FSFilter System Recovery OK<br />TRUE 21 FSFilter Quota Management OK<br />TRUE 22 FSFilter Content Screener OK<br />TRUE 23 FSFilter Continuous Backup OK<br />TRUE 24 FSFilter Replication OK<br />TRUE 25 FSFilter Anti-Virus OK<br />TRUE 26 FSFilter Undelete OK<br />TRUE 27 FSFilter Activity Monitor OK<br />TRUE 28 FSFilter Top OK<br />TRUE 29 Filter OK<br />TRUE 30 Boot File System OK<br />TRUE 31 Base OK<br />TRUE 32 Pointer Port OK<br />TRUE 33 Keyboard Port OK<br />TRUE 34 Pointer Class OK<br />TRUE 35 Keyboard Class OK<br />TRUE 36 Video Init OK<br />TRUE 37 Video OK<br />TRUE 38 Video Save OK<br />TRUE 39 File System OK<br />TRUE 40 Event Log OK<br />TRUE 41 Streams Drivers OK<br />TRUE 42 NDIS Wrapper OK<br />TRUE 43 COM Infrastructure OK<br />TRUE 44 UIGroup OK<br />TRUE 45 LocalValidation OK<br />TRUE 46 PlugPlay OK<br />TRUE 47 PNP_TDI OK<br />TRUE 48 NDIS OK<br />TRUE 49 TDI OK<br />TRUE 50 NetBIOSGroup OK<br />TRUE 51 ShellSvcGroup OK<br />TRUE 52 SchedulerGroup OK<br />TRUE 53 SpoolerGroup OK<br />TRUE 54 AudioGroup OK<br />TRUE 55 SmartCardGroup OK<br />TRUE 56 NetworkProvider OK<br />TRUE 57 RemoteValidation OK<br />TRUE 58 NetDDEGroup OK<br />TRUE 59 Parallel arbitrator OK<br />TRUE 60 Extended Base OK<br />TRUE 61 PCI Configuration OK<br />TRUE 62 MS Transactions OK<br />FALSE 63 Network OK<br />FALSE 64 Pnp Filter OK<br />FALSE 65 MMC OK<br />FALSE 66 MemoryStick OK<br />FALSE 67 SmartMedia/XD OK<br />FALSE 68 ExtendedBase OK<br />FALSE 69 WdfLoadGroup OK<br /></pre></blockquote><br />This will show you the order in which drivers are loaded on your windows box.<br /><br /><br />Note to self: stop posting if see that you haven't posted anything since long ;)Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com0tag:blogger.com,1999:blog-8271855.post-7572075131314144692009-06-30T10:40:00.000-07:002009-10-31T22:29:39.772-07:00First cut preview of Firefox 3.5 in Hindi<div align="left">While downloading Firefox 3.5 I just noticed the new version was available in Hindi too. So I tried my hands on the Hindi locale of the Firefox 3.5 & here are some sneak previews</div><div align="center"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 232px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353177558227502530" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYzbORXbh8IQnFtXHyUUD1kQ_FKrofzWMb9DLKKCt43Br0LyFaQTfpjzEaVy2FYc4LqCWBn_iLhro6KVZDWfwx9wbpodkUGzCUjdCZ1zzVxE2mTJ4V3r-aiIwzYW9ZHivCHRTA/s320/ff-h1.PNG" /><em>Main Window</em></div><p><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 311px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353178169843214002" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPNIcHBLLexQTfAAJdndYu13V8hy1xjYFDOSAzkCb5NIS5huAjYu-NdOi80Dw6ljYMtjGFGk7MWNp3HmF3VQGD3Yrd5NWMCsYtjTQQ3V9l08FAy_RV2QMpbnxvZ8GuHfLO-jw0/s320/ff-h2.PNG" /></p><p align="center"><em>File Menu</em></p><p></p><p>They tried translating everything<img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 304px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353178177342998802" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLGKBT7L1QLRwLhstLZGPJzy1EBcZ5tSAsAUw85TNBf7dyFLyTwP4t46zB3qWutZTQ-XqQ05krj0_MqcXPZQkBCym1vFkj_uD3NIYRUZ6LOd7KyFxC1O407iH9i9ah-VxhJNcj/s320/ff-h5.PNG" /></p><p align="center"><em>Tools > Options</em></p><p>But seems like were not able to succeed<img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 306px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353178173808927442" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh65amETs9BvVamZfIdVR-s9jArvedImTdE0gHTKUDAzsEExd8dZZnFgk7Xh43ai24_AHEXEE4mBErvIUHn0GMDRPVxsFs2EcaPNcuPFk6jVV4rMKQzDeAhy9Md4xaGOKfbQILD/s320/ff-h4.PNG" /><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 320px; DISPLAY: block; HEIGHT: 188px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353178167082407138" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje9fXFjGdCpbYSXknumi3v2lVLrPnJy45ubXi0sm9Br3Fd5ckEKiLI8GieLtQd5PLxU7Kxa776vB-zmtbdUdjyU0USoovuLhMPMLG50REEcMcU7X_FdX-noLDvN6ORnSbkS4-s/s320/ff-h3.PNG" /></p>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com2tag:blogger.com,1999:blog-8271855.post-24379196522866867672009-04-13T01:32:00.000-07:002009-04-13T01:51:23.747-07:00An open Wedding Invitation to all my friends and followers online<embed type="application/x-shockwave-flash" src="http://picasaweb.google.com/s/c/bin/slideshow.swf" flashvars="host=picasaweb.google.com&RGB=0x000000&feed=http%3A%2F%2Fpicasaweb.google.com%2Fdata%2Ffeed%2Fapi%2Fuser%2Frohit11%2Falbumid%2F5323090379543886705%3Fkind%3Dphoto%26alt%3Drss%26authkey%3DGv1sRgCKCeyM2jprj3GA" pluginspage="http://www.macromedia.com/go/getflashplayer" width="600" height="400"></embed><br /><br /><br /><br /><b>Wedding Website:</b> <a class="moz-txt-link-freetext" href="http://shaadi.rohit11.com/">http://shaadi.rohit11.com</a><br /><b>Date:</b> 27th April 2009<br /><b>Place:</b> Territorial Army Institute, Maidan, Kolkata<br /><b>Time:</b> 7pm Onwards<br /><br />I'm <span style="font-weight: bold; font-style: italic;">TRYING</span> to do a online streaming of the celebration with help of few friends for those who can't make it to the event. Details on the website.<br /><br /><br />All you need to do is RSVP in time if you can come so that I can make necessary arrangements.Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com5tag:blogger.com,1999:blog-8271855.post-88960869796455376332009-03-11T23:46:00.000-07:002009-03-24T08:09:37.040-07:00Indian IT act made little easy for common manUnderstanding Indian IT act (& amendments) made little easy for common man<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQLoZ32vtxbdjf4L1mhZBSwgr7eQ0HZCWM4iunyahvxxLP47vJkDdbfdNrxycgI0HTSjiOK1euXGCEIn3Rxngyt8WZzrVPyzcTLeHdTdS-fDHUgWOO4JVbsoLg3N4GdledfJg6/s1600-h/hammer.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 293px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQLoZ32vtxbdjf4L1mhZBSwgr7eQ0HZCWM4iunyahvxxLP47vJkDdbfdNrxycgI0HTSjiOK1euXGCEIn3Rxngyt8WZzrVPyzcTLeHdTdS-fDHUgWOO4JVbsoLg3N4GdledfJg6/s320/hammer.jpg" alt="" id="BLOGGER_PHOTO_ID_5312193587734346994" border="0" /></a><br /><span style="font-weight: bold;"><span style="font-weight: bold;">Crime</span></span>: A mobile phone or computer or any electric device is stolen.<br /><span style="font-weight: bold;"><span style="font-weight: bold;">Section to be applied</span></span>: 66B.<br /><span style="font-weight: bold;"><span style="font-weight: bold;">Punishment</span></span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Data owned by you or your company in any form is stolen.<br /><span style="font-weight: bold;">Section to be applied</span>: 66B.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Data or computer or mobile phone owned by you is found in the hands of someone else.<br /><span style="font-weight: bold;">Section to be applied</span>: 66B.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><br /><span style="font-weight: bold;">Crime</span>: A password is stolen or used by someone else.<br /><span style="font-weight: bold;">Section to be applied</span>: 66C.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: An e-mail is read by someone else.<br /><span style="font-weight: bold;">Section to be applied</span>: 66C.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: A biometric thumb impression is misused.<br /><span style="font-weight: bold;">Section to be applied</span>: 66C.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: An electronic signature or digital signature is misused.<br /><span style="font-weight: bold;">Section to be applied</span>: 66C.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: A web page is created in your name and you have not authorized it.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: A Phishing e-mail is sent out in your name, say maligning someone or asking for donations.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: An Orkut profile is created in your name.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: An e-mail id is created on a website like hotmail or yahoo in your name.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: On an Internet chat site a false nickname is used.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: SMS’s are sent out in your name.<br /><span style="font-weight: bold;">Section to be applied</span>: 66D.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Clicking of an obscene photograph without a person’s consent or knowledge.<br /><span style="font-weight: bold;">Section to be applied</span>: 66E.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 2 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Transmitting of an obscene photo of a person unknowingly.<br /><span style="font-weight: bold;">Section to be applied</span>: 66E.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 2 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Placing a person’s obscene photo on a web site.<br /><span style="font-weight: bold;">Section to be applied</span>: 66E.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 2 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Sending a terror email.<br /><span style="font-weight: bold;">Section to be applied</span>: 66F.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to life.<br /><br /><span style="font-weight: bold;">Crime</span>: Misusing a Wi-Fi connection for acting against the state.<br /><span style="font-weight: bold;">Section to be applied</span>: 66F.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to life.<br /><br /><span style="font-weight: bold;">Crime</span>: Planting a computer virus that acts against the state.<br /><span style="font-weight: bold;">Section to be applied</span>: 66F.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to life.<br /><br /><span style="font-weight: bold;">Crime</span>: Conducting a denial of service attack against a government computer.<br /><span style="font-weight: bold;">Section to be applied</span>: 66F.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to life.<br /><br /><span style="font-weight: bold;">Crime</span>: Stealing data from a government computer.<br /><span style="font-weight: bold;">Section to be applied</span>: 66F.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to life.<br /><br /><span style="font-weight: bold;">Crime</span>: Tampering with certain computer source code.<br /><span style="font-weight: bold;">Section to be applied</span>: 65.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 2 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Wrongful loss or damage caused by the use of technology by anyone.<br /><span style="font-weight: bold;">Section to be applied</span>: 66.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine up to 2 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: All activity relating to pornography in general.<br /><span style="font-weight: bold;">Section to be applied</span>: 67.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 10 years and/or fine up to 1 lakh.<br /><br /><span style="font-weight: bold;">Crime</span>: Any activity relating to child pornography.<br /><span style="font-weight: bold;">Section to be applied</span>: 67B.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 5 years and fine up to 10 lakhs.<br /><br /><span style="font-weight: bold;">Crime</span>: Every technology user must maintain logs of all e-activity that takes place.<br /><span style="font-weight: bold;">Section to be applied</span>: 67C.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and/or fine.<br /><br /><span style="font-weight: bold;">Crime</span>: You must allow the state to install software on your computers or mobile phone that will monitor all e-activity.<br /><span style="font-weight: bold;">Section to be applied</span>: 69.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 7 years.<br /><br /><span style="font-weight: bold;">Crime</span>: You must allow the state to decrypt all communication that passes through your computer or network.<br /><span style="font-weight: bold;">Section to be applied</span>: 69.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 7 years.<br /><br /><span style="font-weight: bold;">Crime</span>: You must provide access to everything stored on your computer or mobile phone to the relevant authorities.<br /><span style="font-weight: bold;">Section to be applied</span>: 69.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 7 years.<br /><br /><span style="font-weight: bold;">Crime</span>: You must block access to sites that the state decides.<br /><span style="font-weight: bold;">Section to be applied</span>: 69A.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 7 years.<br /><br /><span style="font-weight: bold;">Crime</span>: In a sense all computer users are ISP’s. We must allow the state to monitor and decrypt all traffic that passes though our home grown networks.<br /><span style="font-weight: bold;">Section to be applied</span>: 69B.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 3 years and a fine.<br /><br /><span style="font-weight: bold;">Crime</span>: Service providers like Blackberry and others must hand over the decryption master keys to the state.<br /><span style="font-weight: bold;">Section to be applied</span>: 69.<br /><span style="font-weight: bold;">Punishment</span>: Jail term up to 7 years.<br /><br />Got this via email, source not very clear. This is a suggestive list, advised to recheck; DON’T take these as final verdict of supreme court ;)<br /><br /><span style="font-weight: bold;">UPDATE</span><span> (24th Mar 09') </span>: Ministry of IT has finally published the amendment online on the website http://mit.gov.in<br /><span style="font-weight: bold;">Direct Link</span>: <a href="http://mit.gov.in/download/it_amendment_act2008.pdf">http://mit.gov.in/download/it_amendment_act2008.pdf</a><br />Now its _more_ official nowRohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com3tag:blogger.com,1999:blog-8271855.post-89676184243005970122009-03-05T23:41:00.000-08:002009-03-06T00:15:03.862-08:00Punetech is...I was thinking of writing a blog on the first B'day of PuneTech and tried some online tricks<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://punetech.com/"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 119px;" src="http://punetech.com/files/I_love_punetech_logo-200x119.gif" alt="" border="0" /></a><br />Google: "PuneTech is..."<br /><br /># <em>PuneTech is</em> a free, non-commercial website run by volunteers to disseminate information about information technology and software engineering in Pune.<br /><br /># <em>punetech is</em> of course a great service<br /><br /># <em>PuneTech is</em> a service co-ordinated by the people who run punetech.com<br /><br /># <span style="font-style: italic;">Punetech </span>is worth USD $8 Million <span> in #pulling-a-leg-or-then-maybe-not</span><abbr class="timeago" title="2009-02-17 11:54:27"></abbr><br /><br /># <em>PuneTech is</em> managed by Navin Kabra.<br /><br /># <em>PuneTech is</em> a non-commercial site that collects information about all interesting technology in Pune. PuneTech makes no profits on PuneTech merchandise.<br /><br /># <em>PuneTech is</em> a non-commercial, by the community, for the community site.<br /><br /># <em>punetech is</em> using Twitter<br /><br /># <em>PuneTech is</em> a community portal exclusively focused on the innovative IT companies and startups in Pune.<br /><br /># <em>Punetech</em> is a blog started by highly experienced fellow technology enthu, Navin Kabra and he is being supported by excellent team like Amit Paranjape, Manas and others<br /><br />And once upon a time I twitted the<br /># <span class="status-body"><span class="entry-content">@<a href="http://twitter.com/punetech">punetech</a> is a boon to Pune tech community. A real good source for all the geeks info. @<a href="http://twitter.com/ngkabra">ngkabra</a> I'm missing such a good stuff in Delhi man. (<a href="http://twitter.com/rohit11/statuses/1138805981">twit</a>)<br /><br /><br />Happy Bday PuneTech, its indeed a Boon.<br /></span></span>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com1tag:blogger.com,1999:blog-8271855.post-73234881275194440442009-02-25T08:48:00.000-08:002009-02-25T10:09:42.940-08:00chat protocolScenario 1: You forgot(or don't want) to go offline and you are projecting your screen on projector with some serious discussion in a busy conference room and bang! an old friend messages you on messenger "<span style="font-style: italic;">Hi Sexy</span>"<br /><br />Scenario 2: You are sitting with someone say Mr. A and another friend say Mr. B sends you a message about Mr. A. You know what kind of message I'm talking about<br /><br /><br />These kind of sudden and uninvited chat messages can disturbing at times. So in one of my previous organization we had a protocol for chatting. I found it very helpful and slowly many of my friends have started following it.<br /><br />Here's how it goes, PLEASE try to follow the same when chatting with <span style="font-weight: bold;"><span style="color: rgb(255, 0, 0);">me</span> </span>and may be others too. This will make the online life bit comfortable for you and your friends<br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">[?]</span><span style="color: rgb(255, 0, 0);"> </span>To start a conversation, send a question mark only. Yes a simple " <span style="font-weight: bold; color: rgb(255, 0, 0);">?</span> " only. This can mean anything as per your understanding like "Can we chat?" or "are you there?".<br /><br />Now the answer to this question can be yes no or later<br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">[Y]</span> So if the answer is YES, the person replies " <span style="font-weight: bold; color: rgb(255, 0, 0);">y</span> ". Which means "I'm comfortable chatting with you at this moment, tell me"<br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">[N]</span> If the answer is NO for reasons like "I'm busy", or "Can't chat" or whatever, the person replies " <span style="font-weight: bold; color: rgb(255, 0, 0);">n</span> ". If you get a " <span style="font-weight: bold; color: rgb(255, 0, 0);">n</span> " DO NOT send any more message, not even "OK, I'll ping you later" It like saying DO NOT DISTURB<br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">[5]</span> or for that matter any number like " <span style="color: rgb(255, 0, 0); font-weight: bold;">10</span> " - "<span style="color: rgb(255, 0, 0); font-weight: bold;">15</span> " means busy right now, lets talk after 5 (or 10-15) minutes. This comes very handy when you want to chat but because you are preoccupied in something which you can't leave in between.<br /><br /><span style="font-weight: bold;">[ ]</span> If in case there is no reply from the other side, there can be 2 reasons. Too busy to say a " <span style="font-weight: bold; color: rgb(255, 0, 0);">n</span> " or not near the computer. The best option in this case is treat it as " <span style="font-weight: bold; color: rgb(255, 0, 0);">n</span> " and DO NOT disturb<br /><br />Looking at so many shortcuts, we devised another shortcut. It was "<span style="color: rgb(255, 0, 0);"> </span><span style="font-weight: bold; color: rgb(255, 0, 0);">b</span> " this time which means BYE that comes at the end of conversation.<br /><br /><br />I strongly recommend all my friends to use this protocol while starting a chat with me. Share the protocol with your friends and see the difference.Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com5tag:blogger.com,1999:blog-8271855.post-21381432145803522262009-01-21T23:23:00.000-08:002009-01-21T23:30:03.323-08:00How far you are from Obama...I was just going through my <a href="http://www.linkedin.com/in/rohit11">LinkedIn</a> account and noticed that <a href="http://www.linkedin.com/in/barackobama">Barack Obama</a> is just 2nd degeree away from me :))<img id="BLOGGER_PHOTO_ID_5294016503270557026" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 300px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9n2UIWmPsPSn7PxruCDd86QmS3f1Sjk7mmynBtJPunRRA-SrGGT62r-VOkJtaYWfTjB5esAPU9kYTffh8i1u5xG_DWOq2aU5MKumSOYXaNBMRQ53G86ZnILAqBa-eKg4bGJsw/s400/obama.png" border="0" /> <div></div><div></div><div>I know this might not make a lot of sense but still...</div><div>How far is he from you???</div>Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com2tag:blogger.com,1999:blog-8271855.post-32966156699680949862009-01-13T17:41:00.000-08:002009-01-13T18:10:00.887-08:00Cheat Sheets: Networking, Hacking, Security, Administration, ToolsHere is a bunch of CheatSheets which might be useful from time to time to use as a reference:<br /># <a href="http://www.sans.org/resources/tcpip.pdf?ref=3871">TCP/IP and tcpdump Cheat Sheet</a> - SANS.org<br /># <a href="http://www.sans.org/mentor/GoogleCheatSheet.pdf">Google Hacking and Defense Cheat Sheet</a> - SANS.org<br /># <a href="http://www.sans.org/resources/winsacheatsheet.pdf">Intrusion Discovery Cheat Sheet Windows</a> - SANS.org<br /># <a href="http://www.sans.org/resources/linsacheatsheet.pdf">Intrusion Discovery Cheat Sheet Linux</a> - SANS.org<br /># <a href="http://ha.ckers.org/sqlinjection/">SQL Injection Cheat Sheet </a>- ha.ckers.org<br /># <a href="http://ha.ckers.org/xss.html">Cross Site Scripting Cheat Sheet</a> - ha.ckers.org<br /># <a href="http://www.secguru.com/files/cheatsheet/webappcheatsheet2.pdf">Web application Cheat Sheet</a> - secguru.com<br /># <a href="http://www.tldp.org/REF/ls_quickref/QuickRefCard.pdf">Linux Security Quick Reference Guide</a> - Linuxsecurity.com<br /># <a href="http://www.cheat-sheets.org/saved-copy/linux_quickref.pdf">LINUX Administrator’s Quick Reference Card</a> - cheat-sheets.org<a href="http://www.cheat-sheets.org/saved-copy/linux_quickref.pdf"></a><br /># <a href="http://www.red-database-security.com/wp/oracle_cheat.pdf">Oracle Security Cheat Sheet</a> - red-database-security.com<br /># <a href="http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf">Nmap & Nessus Cheat Sheet</a> - secguru.com<br /># <a href="http://www.zeltser.com/network-os-security/security-incident-survey-cheat-sheet.pdf">Security Incident Survey Cheat Sheet</a> - zeltser.com<br /># <a href="http://www.zeltser.com/network-os-security/security-incident-questionnaire-cheat-sheet.pdf">Initial Security Incident Questionnaire for Responder </a>- zeltser.com<br /># <a href="http://packetlife.net/static/cheatsheets/cheatsheets.zip">BGP, EIGRP, First Hop Redundancy, 802.1X, IPsec, IPv4 Multicast, IPv6, IS-IS, OSPF , STP, tcpdump, Wireshark, Common Ports, IP Access Lists, Subnetting, Markdown, MediaWiki, MPLS,QoS, VLANs, Cisco IOS, Physical Terminations Cheat Sheets</a> - packetlife.net<br /><br />If you have more, post them in comments & I'll update the list :)Rohit Srivastwahttp://www.blogger.com/profile/10024873320275519064noreply@blogger.com3