Suramya's Blog : Welcome to my crazy life…

October 25, 2005

Added WebForum to gWiFi.net

Filed under: gWiFi,Software Releases,Tech Related — Suramya @ 1:20 AM

Added a new webforum to the gWiFi.net site to allow visitors to post their feedback and suggest new Hot Spots for inclusion in the Database.

Check it out and let me know what you think of it.

Thanks,
Suramya

October 16, 2005

Converting a Floppy Disk Drive into a Simple Robot

Filed under: Computer Hardware,Tech Related — Suramya @ 3:24 AM

Converting a Floppy Disk Drive into a Simple Robot

– Suramya

Automating Diagnostic Tests with Ant

Filed under: Computer Software,Tech Related,Tutorials — Suramya @ 2:47 AM

Interesting article that explains how to Diagnostic Tests with Ant
.
Excerpt from the article:

Suppose you have developed your Java application and distributed it to your users. If all goes well, the application just works on every computer. But if there’s a problem, you have to begin troubleshooting. Users will call for all sorts of installation problems, expecting you to fix them. Moreover, the same problems will often come back: the wrong version of Java, a deleted file, too-restrictive file permissions, etc. Most of these problems can be solved by creating a checklist. However, instead of wasting time asking new users the same questions on the checklist over and over, you can create a diagnostic test that goes through the checklist, providing users with the information they need to solve the problem. If users can’t solve the problem themselves, they can show you a clear checklist, so you can take a look at what’s going wrong without asking a bunch of questions first.

– Suramya

October 11, 2005

Protecting Files at Home Using Encrypted Containers

Filed under: Security Tools,Security Tutorials,Tech Related — Suramya @ 9:05 PM

This is an awesome article on how to create Encrypted Containers that makes it easy to create encrypted backup locations that can copied to other systems without hassle and are simple to use.

Protecting Files at Home Using Encrypted Containers

September 27, 2005

A Lesson in Encryption

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 2:15 PM

A good trilogy of articles by Peter van der Linden on encryption.

Part 1, describes how public key encryption works and where to get the GnuPG encryption software. Part 2 walks through some examples of file encryption/decryption, and Part 3 explains how to send and read encrypted e-mail

Lesson in Encryption, Part 1
Lesson in Encryption, Part 2
Lesson in Encryption, Part 3

– Suramya

September 22, 2005

Linux LDAP authentication tutorial

Filed under: Security Tutorials,Tech Related,Tutorials — Suramya @ 2:46 PM

Tutorial on how to setup LDAP on Linux. Looks interesting, might try it out on my spare machine when I go home next week.

Article Link: Linux LDAP authentication

– Suramya

September 21, 2005

How to Investigate Intermittent Problems

Filed under: Computer Tips,News/Articles,Tech Related — Suramya @ 9:14 PM

A really really good post by James Bach on how to investigate Intermittent Problems. Any person who does product testing should read this. Even developers/programmers need to read this as this will make it easier to find and fix bugs.

Brief extract from this post:

Some Principles of Intermittent Problems:

  • Be comforted: the cause is probably not evil spirits.
  • If it happened once, it will probably happen again
  • If a bug goes away without being fixed, it probably didn’t go away for good.
  • Be wary of any fix made to an intermittent bug. By definition, a fixed bug and an unfixed intermittent bug are indistinguishable over some period of time and/or input space.


Some General Suggestions for Investigating Intermittent Problems:

  • Recheck your most basic assumptions: are you using the computer you think you are using? are you testing what you think you are testing? are you observing what you think you are observing?
  • Eyewitness reports leave out a lot of potentially vital information. So listen, but DO NOT BECOME ATTACHED to the claims people make.
  • If someone tells you what the problem can’t possibly be, consider putting extra attention into those possibilities.

Original Post:
How to Investigate Intermittent Problems

– Suramya

September 20, 2005

thebroken dot organization

Filed under: Tech Related — Suramya @ 1:32 PM

Found this interesting site yesterday while surfing the web, it is ‘computer show’ that is a bit different than the average computer show. It goes a bit into the gray area and talks about hacking, social engineering, making exploding laptops etc. Not very technical but interesting anyways.

So far they have released three episodes but more are on the way…

Check it out:
thebroken dot organization

– Suramya

September 17, 2005

Ver 0.3 of the CollageGen script released

Filed under: Software Releases,Tech Related,Website Updates — Suramya @ 3:14 AM

I have just Released CollageGen, Version 0.3. Incase you are wondering, CollegeGen is an application that uses the Yahoo search API to create a collage for any search term entered by the user.

Changes made in this release:

  • The backend script was rewritten from scratch to make the collage generation faster and more efficient.
  • Redesigned the CollageGen access website
  • Threading support was removed from the backend

Check it out and let me know what you think.

Thanks,
Suramya

September 13, 2005

Snooping on Text by Listening to the Keyboard

Filed under: Computer Related,My Thoughts,Tech Related — Suramya @ 8:25 PM

According to Bruce Schneier’s blog a group of researcher’s from Berkeley have developed a process that lets them identify the keys being typed by analyzing an audio recording of someone typing at the computer for about 15 mins.

There was some research done on this earlier but their method required specific training tapes where the system knew what keys were pressed and when to configure the listener before it was able to accurately deciper the input. In this case the training tape is an actual recording of a target.

This brings an interesting possibility for hackers/crackers to steal passwords/information by setting up hidden mic’s etc.

Saw a technique somewhat like this being used in a TV show called ‘MI-6″ (Or was it MI-5? It was 3 am… ) In it one of the spies gives a special cufflink to the target and gets him to type her resume out. As the spies knew what was on the resume they were able to get a readout of each key (They didn’t explain what readout’s they were taking in too much detail) and once they got that they were able to see what ever the target typed on the computer in realtime as long as he was wearing his cufflink. Neat eh?

But before you start panicking, remember the bad guy’s still have to either get physical access to your system and/or the area around your system in order to bug it and you know the law: “Physical access is root access”.

So to lower the risk of this attack all you have to do is follow the same basic rules you have been following about not granting unknown people access to your workplace and keep an eye out for people carying video camera’s and mic’s.

To make the risk go away completely play loud music to drown out the typing sound when working on sensitive data.

Original Source:
Schneier on Security: Snooping on Text by Listening to the Keyboard

Link to the Paper: Snooping on Text by Listening to the Keyboard (PDF File)

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress