Thursday, November 17, 2011

Abuse of the word Computer Hacker

In the wake of recent Facebook's security issue which compromised lot of profiles I am seeing lot of posts putting vague information about Hackers and "How to be safe on Facebook".

First and foremost the term Hacker is misused all the time, Hacker is simply a computer enthusiast who loves to tinker with systems, it need not to be a computer all the time. It is not necessary that the term Hacker is related to a crooked mind who misuses the vulnerabilities in a system for a malicious intentions. There is another term for such, it's called Crackers. Know the terminology or do a bit of research in Google

Tuesday, August 16, 2011

Posting from my Nexus S :)

Though I do not prefer (or like) using a smartphone for blogging, I just thought of giving it a try.

I bought my Google Nexus S a month back (my first Android) and so far I've been pondering and tinkering in the Android Ecosystem, so far, so good :) two days back I've installed WordPress app for Android and synced my account with it, the app looks good and gives access to very basic features like comments, posts, blog stats it's a neat and simple app :). so here it is -

Thursday, June 30, 2011

Culture is not your friend

What civilization is, is 6 billion people trying to make themselves happy by standing on each other’s shoulders and kicking each other’s teeth in. It’s not a pleasant situation. And yet, you can stand back and look at this planet and see that we have the money, the power, the medical understanding, the scientific know-how, the love and the community to produce a kind of human paradise. But we are led by the least among us - the least intelligent, the least noble, the least visionary. We are led by the least among us and we do not fight back against the dehumanizing

Friday, June 24, 2011

Potential DoS attack on a Cisco Layer 2 Switch

I came across an Issue at my work where one of our customer's RF network was frequently going down. This RF network supports wireless handheld inventory management RF guns. The initial reason for the network down time was unknown but on careful examination through remote user assistance the cabling for the standard network setup was altered.

Usually, in small network installations, it is a best practice to connect an RF network to a Gigabyte or fast Ethernet port on a switch, on a 24 port switch it is a good practice to connect the RF network to the last switch ports, either 23X or 24X, not a coercion, but that's what I've

Wednesday, May 18, 2011

Network Administration, troubleshooting from Linux #1 Ping

Linux has dozens of tools for network troubleshooting, among them the famous Ping, the preferred tool that comes to my mind for any kind of IP connectivity related issue. This post is to explain basic information for people who would like to know its usage.

Ping is a well know tool to test the IP connectivity of a host in a network. When we execute ping followed by the host name/IP it sends Echo packets to the target until we press the Ctrl+C, in Linux.

Monday, May 2, 2011

The beauty of Incompleteness Theorem of Kurt Gödel

Mathematics and Physics played a major role in our humanity to observer and understand  the world we live in and they helped a lot in filling the gaps and answered the age old questions we humans curiously looked for with observations and proven tests.
Most of us take for granted that Maths is the absolute realization of physics, its like physics is the blue print and maths is the concrete/cement or the language to be precise.

Saturday, April 2, 2011

A day to celebrate in India … Really?

Yesterday was a day of celebration in India. I was sleeping and having dreams but had to get because of the loud fire crackers outside.  My very first thought was either India is leading its way into winning track or it has already won in the world cup. Yesterday was cricket world cup finals, and yes! I was sleeping! 
First of all, I was sleeping because I work in night shifts and I care more about myself than wasting time watching a day long

Saturday, February 26, 2011

How Google and Wikipedia influenced my life

Almost everyone knows about Google and Wikipedia, directly or in directly we use their services and products everyday, let it be Maps or Ads we click on websites or the articles we refer in Wiki for our homework/assignments. Google has some role in our daily lives, in my case Wikipedia & Google has a significant influence. I am a kind of person who never takes anything for granted. I always search for the facts. The availability of information without any hurdles or fabrication is very important. Human knowledge should be free and available to everyone, these are the key factors which lead to the success of Google Search and

Sunday, February 13, 2011

TCP flags: Hackers Playground and Functions

TCP is a very important protocol in the Internet. More than half of the traffic in Internet uses TCP. When it comes to reliable communications, TCP plays a major role, let it be logging into Facebook  or opening a website like the underlying protocol which takes care of these reliable connections is TCP. TCP’s dominance over internet has its advantages and disadvantages from security point of view. The architecture of TCP/IP protocol suit doesn’t have any security features in built, what it has are algorithms for protocol timers, error correction, flow control, buffering, but there is nothing in code for its security, as Internet evolved the techniques to use it in unethical ways also evolved.

Monday, February 7, 2011

Finally Tattooed!

I finally got a tattoo! 

I had this dream since from my 18's, but I was pulled back by lot of stuff like family, friends, college environment and bla bla. I wasn't that free to take decisions when I was in college, like any other teen.

Friday, February 4, 2011

What is an Intrusion Detection System?

Definition from Wikipedia:

An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.

My own words:

Basically an IDS is a dedicated box tapped into a computer network which sniffs the traffic (raw packets) to check for anomalies/intrusions/virus/attacks.