All posts by raghavkhullar

Instible

Instible is a platform that enables communication between students, teachers and alumni of the same and different educational institutes with a focus on collaborative learning. It provides an internal platform for each institute to collaborate upon as well as inter-institute collaboration. With Instible, we hope to empower the teachers and students with technology in order to make the learning experience better.

Required:

Graphic Designers: Must be AWESOME at photoshop and have a good sense of design.

Web Programmers: Knowledge of php, HTML5, CSS. Anything else an added advantage.

This is a great opportunity to work in a startup by ex-dipsites.Roles are part-time at present so you can work after school from home. Send in your applications to: raghavkhullar[at]gmail.com & shikharsethi90[at]gmail.com.

 

Cheers.

-Raghav

Dennis Ritchie

Dennis Ritchie, a pioneer in computer programming, has died at age 70, according to his longtime employer.

Ritchie created the popular C programming language and helped create the Unix operating software. He died a month after his birthday, according to his biography on a webpage of Alcatel-Lucent’s Bell Labs. Ritchie joined Bell Labs in the late 1960s.

The company confirmed his death to The Associated Press but would not disclose the cause of death or when Ritchie died. A spokeswoman said the company was trying to contact his family.

Ritchie is best known for his contributions to computer programming and software. The C programming language, which Ritchie developed in the early 1970’s, is still popular. It has gone through a number of upgrades, and it is commonly used for website development and other computer tasks. The Unix operating software also surged in popularity. It and its offshoots, including the open-source Linux, are widely used today, in corporate servers and even mobile phones.

Ritchie’s biography on the Bell Labs site says that he was born on September 9, 1941 in Bronxville, New York, and studied physics and math at Harvard University.

“My undergraduate experience convinced me that I was not smart enough to be a physicist, and that computers were quite neat,” Ritchie wrote. “My graduate school experience convinced me that I was not smart enough to be an expert in the theory of algorithms and also that I liked procedural languages better than functional ones.”

Jeong Kim, president of Bell Labs, wrote in a blog post that Ritchie was “truly an inspiration to all of us, not just for his many accomplishments, but because of who he was as a friend, an inventor, and a humble and gracious man.”

Adios Steve

Following is a letter from Steve Jobs who resigned on Wednesday as chief executive officer of technology giant Apple Inc:

To the Apple Board of Directors and the Apple Community: I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple’s CEO, I would be the first to let you know. Unfortunately, that day has come.

I hereby resign as CEO of Apple. I would like to serve, if the Board sees fit, as Chairman of the Board, director and Apple employee.

As far as my successor goes, I strongly recommend that we execute our succession plan and name Tim Cook as CEO of Apple.

I believe Apple’s brightest and most innovative days are ahead of it. And I look forward to watching and contributing to its success in a new role.

I have made some of the best friends of my life at Apple, and I thank you all for the many years of being able to work alongside you.

EXUN eLITE 2007

Date: 12th September 2007
Eligibility: Classes 9 – 11

Quiz
Each team must have 2 members
1st – 3rd Period, OAT (Prelims)
4th – 8th Period, AVH (Finals)

Programming
Each team must have 2 members
1st – 3rd Period, OAT(Prelims)

Group Discussion
1st-3rd Period, Blossoms Seminar Room

Web Designing
Last Date for submission of websites: 20th September

To register, send your name, class/section and event(s) you are participating in to [email protected]

Details for events, along with preparatory material for Quiz and topics for Group Discussion and Web Designing will be sent via e-mail.

Note : It is compulsary for all exun programmers to participate in this event.
        :No exun member shall take part in the quiz.

Matrix-Ecomm 2007

The Mount St. Mary’s School is organising an inter-school computers and economics symposium.The symposium is going to be held on the 24th and 25th August, 2007 and will feature concurrent and general sessions that will focus on development of the field of Computer Science and Economics including:

  • Symposium
  • Quiz
  • Gaming
  • ProgramIt!
  • WebPresent
  • Digimaging
  • Matrix Challenge

Details of all the events can be found here.
There will be a meeting in the break on Wednesday i.e. 22nd August’07 to finalize the teams for this event.


Note: – One participant may participate in more than one event, but no event will be delayed for the convenience of a participant.

-Raghav

SQL Injection attacks

One of the most prominent loopholes, which almost every site has, is an SQL security loophole. Sites that use the SQL database system are the ones vulnerable to it.
An SQL Injection Attack is a form of attack that comes from user input that remains unchecked on the user end. The objective is to fool the database system into running malicious code that will reveal sensitive information or otherwise compromise the server.
There are two main types of attacks. First-order attacks are when the attacker receives the desired result immediately, either by direct response from the application he is interacting with or by some other response mechanism, such as e-mail. Second-order attacks are when the attacker injects some data that will reside in the database, but the payload is not immediately activated.

To be very precise, it gives you the source of the files where all the important data is stored.
Here is an example-

1) Open the following site: http://www.sanjeevkapoor.com/ : I have already informed the administrator about the loopholes through a letter also, but no action has been taken.
2) Click on sign in and type the username as: admin OR 1=1—and password as: ‘OR”=’
Now you see how powerful this Injection Attack is. For me to explain how this happened, you need to know some amount of SQL. So this is what actually happens when you supply a password and login to a logon form.
SQLQuery=”SELECT Username FROM Users WHERE Username=’” & StrUsername & “ ‘ AND Password=’ “ & Strpassword & “ ‘ “
StrAuthcheck= GetqueryResult(SQL query)
If strAuthenticated=” “ then
Boolauthenticated=False
Else
Boolauthenticated= True
The logon and password actually form an SQL query, which goes through the user’s table, and tries to find a match for the username and password you supplied. If a match is found then a string is stored in a variable (strauthcheck) but if this string remains empty then you are not authorized. So by using the SQL queries like 1=1—(which means one is equal to one) you are able to fool the SQL sever which is actually checking for authentication.

Article by : – Ankit Srivastava
                       Head, Network Security – Exunclan

Tech-Edge 2007

Tech Edge 2007 is being organized at Birla Vidya Niketan on the 25th of July. The following students will be participating in the event:-

1.Collage Making

  • Aditya Jain
  • Saakshi

2.Web Designing

  • Shubham Goel
  • Rishabh Marya

(Topics (i)Life in space (ii)Latest technology (iii)Indian Heritage. The teams should submit a copy of their website in a CD by 21st July.)

3.Senior Programming

  • Anant Jain
  • Abhijit Das

4.Multimedia Presentation

  • Rishabh Marya
  • Shubham Goel

( The topic for the presentation is (i) XBOX 360 (ii)Robocop . Teams should submit a copy of their presentation in CD on any one of the above topic by 21st July.The softwares to be used are (i)Frontpage (ii)Flash )