நீங்க செம காமெடி சார்!

 

மாண்பு மிகு ஆற்காட்டார் அமைச்சராக இருந்த போது தமிழகத்தின் மின் தேவை 2007-08 இல்  8969 MW, 2008-09 இல் 9459 MW [1]. ஆனால்  இந்த வரிடம் தேவை ஆனது 11,283 MW ஆகா உள்ளது [2]. பல பவர் ப்லாண்டிருக்கு IV போன மாணவர்களுக்கு தெரியும் ஒரு ப்லாண்டில் (generation) காபசிட்டி அதிகம் செய்ய எவாளவு வரிடம் ஆகும் என்று. இது மட்டும் இல்லாமல் நமது மின்தேவையில் காற்றளைகளுக்கு பெரும் பங்குண்டு, 2010-11 இல் காற்று வேகமாக அடிததுகு கலைங்கரோ அல்லது ஆற்காடரோ காரணம் இல்லை, அதே போல் இந்த வரிடம் காற்று அடிக்காமல் போனதுக்கு அம்மா காரணம் இல்லை.

நம்மால் முடித்த ஆலோசனைகளை அரசிற்கு அளிப்பதை விட்டுவிட்டு  எங்கள் ஆட்சியில் மழை பெய்தது உங்கள் ஆட்சியில் பெய்யவில்லை என்பதை போல் கேப்மரிதனமாக பேசுவது எப்படி இருக்கு என்றால் “முதலாம் ஆண்டிலிருந்து ரெண்டு ரெண்டு படத்தில் அரியர் வைத்த மாணவன், கடைசி வருடத்தில் பாடம் நடத்தினவர் சேரி இல்லை, அதனால் தான் நன் 15 அரியர் வைத்தேன் என்று சொல்வது போல இருக்கு.”

பொதுமக்களே சிந்திபீர்

[1] http://www.tn.gov.in/dear/9.%20Energy.pdf
[2] http://www.deccanchronicle.com/channels/cities/chennai/record-power-consumption-tamil-nadu-601

Advertisements

Involuntary learning

Learning is a thought process, believe it or not every one learns something every day in one way or the other. I remember reading somewhere in a reddit discussion in which there was a comment stating that the best and the practical way to learn is to learn from your friends. I just stumbled upon it and thought for a while to recall what all the things which i’ve learnt myself from my friends without knowing that i was learning and decided to blog it, may be it would be funnier to read after few years.

Naveen: He was my classmate from 9th grade to 12th,  He was the class dobber topper at that time. I would recall a punch dialogue from the Hari’s flick saamy ” போலீஸ் காரனுக்கு நு ஒரு திமுரு இருக்கனும் “,  Similar to this punch, he utilized what all the privileges he had to the fullest.

Niranjan: He was also my class mate and he had the confidence and courage to show his middle finger to  Naveen (Mhh, well, not literally)  while every one succumbed to Naveen’s authority.

Kabilan: He was my roomie during my Freshman year, the best thing which i found in him was,  he sorts his desire very well, in other words he remains in total control of his desire. He chooses which one to give up and which to never give up.

Varun: He was my கூட்டாளி for the last 5 years,  The best thing in him is that, that that smile, that smile which he would sport casually whatever the situation is. He would smile when the teacher praises him and even when the teacher says GTFO of here. Every one would call him as “Maddy”, he thinks they are trolling him, but seriously they aren’t!.

Venky: கூட்டாளி again, he was and is the family guy in our gang. Family guy is the word used in recent times to indicate that one is in some sort of deep relationship, but that’s not what i intended to mean. he is a family guy literally. He is that son, that every parent wishes to have. He works hard for his family to keep their business running.  The last time when i went out to buy groceries for my house was when i was in my trousers and had no sign of a moustache in my face.

Naresh: கூட்டாளி number 3, yet again a family guy, never disobeys or objects his parents, works his arse off if you say there is going to be a exam tomorrow 😛 and would recharge your mobile for free if you are a, are a…. well, i don’t want my bones broken.

Vignesh: Cousin/Brother/Friend, While i was watching Cartoon Network, he watched Discovery and NGC, While i was seeing random Tamil comedies, he saw NDTV.  If you start a conversation about anything, anything, anything with him, he would have at least a word or a huge summary to speak about that particular thing. The best part is yet to come, if you ask about something to him, he simply wouldn’t say i don’t know, he knows everything somehow :D, guess what, he eats Wikipedia for lunch.

Pretty good amount of skills learnt through involuntary learning, Not bad.

Low-Medium Critical Infrastructure Security

As the Internet says

                              Security is as strong as it’s weakest link.

While researchers are busy with analyzing stuxnet and duqu, there exists a wide range of ICS on the internet with relatively less or almost no security at all.  Current research covers just the high critical targets while low-medium critical targets or almost ignored. I wouldn’t say that the strategy of researchers are wrong, they are right, it is the right choice to protect a oil refinery from a intruder rather than protect a water treatment plant of a golf course. It must be the responsibility of the vendors to protect against such attacks; actually it doesn’t requires that much of a path breaking research to protect these (low-medium critical) devices, the right architecture and right configuration is what all it needs to secure these devices.

I don’t know how many would believe if i say i’ve saw this thing many times before the news even broke out. It was just hanging around in Shodan. The default password was 100 or 101 i believe, if my memory cells are still intact. One does not need a high probability NIDS to protect the infrastructure of these devices, since they are hardly being targeted by industrial/political espionage or terror attacks. People who hijack these devices are simple script kiddies or psychopaths.

I’m not saying that the security of low-medium critical systems should be taken lightly, but instead of leaving it alone just like that without any protective measures, with the time being i think few very basic solutions by the vendors or Infrastructure Admin might keep those script kiddies away.

By basic solutions i mean,

* Make VPN support available out of the box

* Banner display to show last logged in time, IP and host names.

* Strong Passwords

* Clean or deceptive banners, after all that is how Shodan identifies you.

* Strip out legacy services like FTP, SNMP.

* A sticker which says “Do not connect this thing to internet without a basic VPN” 🙂

MiTM

MiTM attacks on Open WiFi Hotspots

Since it is so trivial to set WiFi Hotspots as open networks in order to reduce the complexity of the infrastructure setup; A question arises how one can remain safe from MiTM attacks which takes advantage of the inherent trust between the connecting client and the Access Point. As Vivek Ramachandran in his series of WiFi security primer video says there is no way for the client to authenticate the Access Point to which it is connecting to.

If you are a novice in wireless security, then first para might sound like selvaraghavan’s movie;  I’ll explain how MiTM attacks are performed on open (networked) Access Points [WiFi Hotspots to be in precise].

MiTM is popularly called as Man in the Middle Attack or you can use Hak5 Darren’s expansion Monkey in the Middle Attack. In case of a open network all the data as well as management 802.11 (wifi) packets traveling around you in the air are unencrypted, though the management packets  are unencrypted even in WEP and WPA networks, but that’s a different story.

Few of the Management Packets are

* Beacon Packet
* Probe Request, Response
* Authentication Request, Response
* Association Request, Response
* Disassociation Request, Response
* De Authentication Request, Response

In order to perform a MiTM attack the attacker must make the clients connected to the original AP to connect to him. The attacker can achieve this by keep on performing a Deauth attack on the access point, thereby disconnecting all legitimate clients from the legitimate AP and use airbase-ng to setup a fake AP in the same name as the legitimate AP thereby attracting the users towards him. Signal strength need not to be higher than the legitimate AP, because the legitimate AP is hammered by a continuous deauth attack.

Assume that the WiFi Hotspot’s network is like this and the network name is freewifi, At normal working case, the client happily connects to the free wifi access point and transfers data

 

The Attacker may start sending De Auth Broadcast Management packets for the bssid of free wifi thereby making all the clients to disconnect from freewifi Access point.

Next the Attacker sets up his own Access Point by the name of freewifi, but with a different bssid using airbase-ng, since the attacker’s fake AP advertises itself as freewifi, the client goes ahead and connects to the attacker’s AP. This is where the inherent trust of the client over AP is exploited.


Now that the client is connected to us believing that we are the freewifi access point and sends data(unencrypted) to us and we happily intercept the data monitor it and forward it to internet through our  source either using a 3G phone or a data card. We have the option to tamper, monitor, modify the user’s data.

Detecting MiTM Attacks:

So now,  if we have something in the host(client) computer that verifies the AP’s BSSID (mac id), it would be easy to find out a MiTM attack. You may think “Mac spoofing is a peice of cake and what if the attacker launches his duplicate AP with the same bssid (mac id) as the legitimate ones, The Verification mechanism will be rendered useless right?” My answer is Yes, but No. If the attacker changes the BSSID of the fake AP which he created using airbase-ng as the same one as legitimate AP’s he would end up deauthenticating his fake AP aswell as both have same SSID. so technically, unless the attacker has a high gain, directional antennae, he would not change the BSSID of his fake AP to reflect the original AP.

Now, i plan to follow up this with a python daemon program, which manages a file with list of AP’s along with its BSSID’s, so whenver you are connected to a network it checks whether you had previously connected to that network or not. if yes, it checks the BSSID which will be different in case of a MiTM and same in case of Normal usage.

The Higher Education Bubble in Tamil Nadu

   Many people, particularly in TN don’t get a picture of the bubble which is all set to burst in few years. I’ll try to explain it in a simple way.

Time line of Tamil Nadu’s Higher Secondary Education:

Government Forms a committee to design a new challenging curriculum for 12th and 11th students and succeeds in designing one, For some reason the same Government thinks the curriculum is too hard for students and for few teachers too and then decides to scrap *most of the portions* of it. Then the government sets up a simple question paper for the final board exam with just one or two *twisted/thinkable/knowledge-based* questions. Then after few weeks the Govt., decides to give grace marks to those twisted questions in a result to beef up the pass percentage of students. In Parallel to this, the state approves a shit load of colleges under its mighty *Anna University*.

What the high scores in board exam means to parents of students from rural areas ?

The parents of those children from rural areas don’t think that the score which their child has got is a result of monopoly played by the Govt., [On a side note, most of the parents from urban areas too don’t realize it] according to them, their child has scored a good score in their higher secondary, so most of them decide to sell their *agriculture land, cattle, property*   etc to fund their children’s higher education.

What happens in Engineering Colleges?

*MOST* of those students who were pushed to be passed by the government find it next to impossible to clear their exams. And many students in the fear of thinking that they had taken a wrong decision and now that their family is in risk of losing everything they had earned till now sadly end up in taking choices like this, this and these. Other students who survived their 4 years of engineering life in a –not-so-worthy- college  obviously might not have got a good education [see teachers in college and their mindsets for clarification] end up either getting unemployed or taking up a M.E course at another –not-so-worthy-college and chose to be lecturers in engineering colleges.

Bubble Burst:

At a particular period of time, the elite professors in engineering institutions will be replaced by these students who failed to succeed thereby diluting the quality of teaching rapidly. And what if a mass IT recruiter didn’t turn up for recruitment for a year ?. How many investments made by those poor people are at risk ?. Can they repay their loans on property ?   Who is responsible for the miserable state of TN students ? You do not need to be a detective to figure it out. It’s the Govt., which rakes money from private engineering colleges as well as colleges owned by politicians, approves them and adds it to their Anna University affiliated colleges kitty, sets easy question papers, gives good marks to most of the students irrespective of the easy question paper and not so great answers thereby driving/manipulating them to invest in a engineering college. On other words, it’s all a fuckin  evil Plan laid out by the then Govt., which said it contributed a lot to the higher education reforms in the state.

My suggestion:

Readers need not mistake me for being a hypocrite over rural students on this issue, after all I’m not a urban student, I won’t say I’m a rural student either, I’m from this awesome town. I’m not generalizing that students from rural areas don’t perform well in engineering education, there are many bright students too; but this post focuses on those not-so-bright students.  My suggestion is to give quality-uniform education to all at the school level and based on competitive exams they should be given admissions in engineering colleges so that a deserving student gets his dream accomplished and a non-deserving students doesn’t ends up in losing his life and his family won’t get bankrupt.

Cloud Computing with Amazon EC2

Cloud Computing with Amazon EC2

Audience criteria: This article is written for beginners in cloud computing so if you are a pro I would recommend you to skip this article

Cloud dem(y)istified

Wherever I go I hear people around me using the term cloud computing but their understanding of the concept is barely Minimum. Here is the popular youtube video which shows how much cloud computing is being misunderstood due to its catchy name.

An unorthodox definition to cloud computing would be “ The method of computing in which the physical machine which processes or gathers your data is present in the cloud. ” Cloud is nothing but The Internet

Note: The above mentioned definition is completely unorthodox and you’ll definitely not get 2 marks if you write this answer in Anna University examination.

Example for cloud computing:

Note: This is a very basic example, if you have a basic idea of cloud and its example i would recommend you to skip this paragraph.

Knowingly or unknowingly every one of us use one or the several features of cloud computing in a day-to-day routine, the best and simplest example for a cloud based service is Gmail. The service offered by Gmail is SaaS [ Software as a Service]. It means Gmail offers its software for people over the cloud. Now lets do a bit of substitution, what software does Gmail offer? A web based email client. What is a cloud? It’s the Internet. So after substituting the answers to these questions we get this “ Gmail offers its web based email client over the internet. “ All the emails in your account are physically stored in google’s data centers which is in the cloud aka hooked to the internet and you are accessing it from your computer via internet.

Why Cloud ?

I’ll walk you through this question using a case study. Lets take Anna University results publication as our example. http://results.annauniv.edu is the web server maintained by Anna University (Ramanujam Computing Center, i guess) for publishing its affiliated college’s semester examination results. Every one will experience the bottleneck effect at least for the first 6 hours  right after the results are published. Though Anna University hardly cares about this effect, lets presume Anna University as a more of student friendly university and it plans to do something about this bottleneck effect during results.

The Problem

   The problem here is too simple to identify, the HTTP requests from ferocious students eagerly expecting their results flood the TCP queue of the server (See DDoS). So a logical solution is to add a Load Balancer and widely distribute the requests to some 3 or 4 servers depending on the results [Some times 3rd to 7th semester results are published at same time, which will definitely need more than 2 servers to handle the load; one the other hand some times these results are published individually so 1 or 2 server would be enough to handle the requests at peak time.]

Solution A proposed by some leet Admin at Anna University:

Buy a Load Balancer                        –      Apprx cost $2000

Lower High-end Core i7 server with 6 Gigs RAM  X 4   –  900$ X 4 =  3600$

Power charges for these machines                –  xxx$

Consolidated cost  =    5600 $ + xxx$ per month + Network Maintenance charges + Server Upgrade Charges   ~ 7600$ per year

 

Solution B – The cloud way

2 * Rent a Extra Large Hi CPU on Demand Instance from Asia Pacific Zone for the first 24 hours  -0.76$ per hr

Change the Extra Large Instance to  Small on demand instance for the rest period –  $0.095 per hr

EBS storage  –  $0.1 per GB – month. At the max  our data won’t cross 10 GB mark so lets assume – $1/mo

Imagine EBS as a block of storage (HDD) attached to your instance

Load Balancer cost  – 0.025$/hr

Consolidated cost =   36.48$ + 68.4$/mo + $1/mo + 0.6$  = 37.08$ + 68.4$/mo

Results are published twice a year, so 2 days in a year we will be needing the 2 Extra Large instance with load balancer and for the remaining days a small instance is enough for handling the traffic.

For a year the cost will be =  2 * 37.08$ + 68.4$ * 12 = 74.16$ + 820.8$ =  894.96$

Solution B can serve the University 7 to 8 years with the cost spent on solution A

 

Pros on Solution B

  • Terrible cost cutting method
  •  Completely scalable architecture

“ Say if the university decides to publish the result for 3rd semester students alone separately then according to solution A we can’t save anything as the hardware is already up and running, but according to solution B we can opt for a Medium Hi CPU on Demand Instance or something more corresponding, we could add and remove memory just in few clicks or even we could automate the process using amazon’s api.”

  • Going Green.  ( I Don’t want to speak more about it in this post )

Cons on Solution B

  • Remember the Virginia Zone  Amazon Data Center’s Blackout, which pulled several famous sites along with it. So wise decision would be to host your instance in two different zones or at least have a mirrored EBS volume of your instance in some other zone for redundancy.

Multi-Threading

I’ve been learning ” Operating Systems and Systems Programming ” Online for a while. I use University of California, Berkley’s Online Webcast lectures and Operating Systems Design and Implementation by Andrew S.Tanenbaum as reading material.

I’m blogging here something which is a simple concept though, performs complex working.

Multithreading is a concept, which makes an illusion of  one or more threads running in parallel. To put up in a simple way, only one thread runs at a time, after a specific threshold time the 1st thread stops and 2nd thread continues running, again after the threshold time 2nd thread stops and 1st resumes running thereby creating a illusion of two threads running at same time.

I’m diving straight into the topic, as the basic concepts are out of scope to this article.

Here is an extract from Prof. John kubiatowicz slide

Consider two threads S and T. Consider S is running. A and B are the routines in each thread. After a specific threshold time or  some boundary value or why not, sometimes even after receiving a interrupt signal the running thread (Thread S) makes a yield call. The yield returns the control of execution to the kernel. The kernel checks for waiting threads i.e the threads in runnable state [sometimes based on priority] and makes a call to switch routine, The sweetest of all.

Switch routine accepts two inputs [current thread pointer and new thread pointer]. The basic functionality of switch looks like this.

Seems simple enough, Registers of current thread [Thread S] is saved to TCB[tCur].regs.rx and the values of new thread’s registers TCB[tNew].regs.rx is over written to the CPU registers CPU.rx. The overwritten registers include stack pointer and return address. After the switch performs its process the control is shifted back to the kernel and the kernel hands over the control to the routine whose address is stored in newly overwritten Instruction pointer. In our case thread T starts running. As instructed by Prof.john kubiatowicz, i had a look at the nachos source code for switch.

Switch.S is written in assembly. It has 4 subroutines [MIPS,SPARC,HP RISC,INTEL], each subroutine is called in specific to the CPU architecture. I’ll discuss here the INTEL’s subroutine alone.

/* void SWITCH( thread *t1, thread *t2 )
**
** on entry, stack looks like this:
**      8(esp)  ->              thread *t2
**      4(esp)  ->              thread *t1
**       (esp)  ->              return address
**
** we push the current eax on the stack so that we can use it as
** a pointer to t1, this decrements esp by 4, so when we use it
** to reference stuff on the stack, we add 4 to the offset.
*/
        .comm   _eax_save,4
        .globl  _SWITCH
_SWITCH:
        movl    %eax,_eax_save          # save the value of eax
        movl    4(%esp),%eax            # move pointer to t1 into eax
        movl    %ebx,_EBX(%eax)         # save registers
        movl    %ecx,_ECX(%eax)
        movl    %edx,_EDX(%eax)
        movl    %esi,_ESI(%eax)
        movl    %edi,_EDI(%eax)
        movl    %ebp,_EBP(%eax)
        movl    %esp,_ESP(%eax)         # save stack pointer
        movl    _eax_save,%ebx          # get the saved value of eax
        movl    %ebx,_EAX(%eax)         # store it
        movl    0(%esp),%ebx            # get return address from stack into ebx
        movl    %ebx,_PC(%eax)          # save it into the pc storage
        movl    8(%esp),%eax            # move pointer to t2 into eax
        movl    _EAX(%eax),%ebx         # get new value for eax into ebx
        movl    %ebx,_eax_save          # save it
        movl    _EBX(%eax),%ebx         # retore old registers
        movl    _ECX(%eax),%ecx
        movl    _EDX(%eax),%edx
        movl    _ESI(%eax),%esi
        movl    _EDI(%eax),%edi
        movl    _EBP(%eax),%ebp
        movl    _ESP(%eax),%esp         # restore stack pointer
        movl    _PC(%eax),%eax          # restore return address into eax
        movl    %eax,4(%esp)            # copy over the ret address on the stack
        movl    _eax_save,%eax
        ret

4(esp) points to thread S and 8(esp) points to thread T, thread S’s address is pulled to eax and all the registers viz ebx,ecx,edx etc are stored with respect to eax.   ex: register ecx gets stored to _ECX(%eax) . Then 8(esp) is loaded to eax, and all registers of thread T are loaded to cpu register. ex: register _ECX(%eax) is loaded to %ecx. The return address of each threads are saved and exchanged respectively.

ps: The diagrams were taken from Prof. John kubiatowicz‘s slides.

Plagiarism

Yes My work got plagiarized, Before going further i can blindly say that plagiarism is a global phenomenon but more often i find Indian people getting attached to it closely. Right from Ankit Fadia to some teen sitting in the dorm room copying articles by others and posting on his/her blog for gaining reputation among the masses.

We can attribute the boom of  Engineering education in Tamil Nadu to the mass plagiarism in the south. I, with the help of my friends had published a article on mass copyright infringement which happened in a technical symposium of a engineering college in Chennai. you can find the report here. The responsibility lies on the event organizer to cross check the received papers/articles for copyright infringement , however as  most of the  organizers themselves being a Asst.Prof doing Ph.D in Anna University who publishes plagiarized work for getting a Ph.D doesn’t bothers about plagiarism at the Under Graduate level. I wish to quote one of my friend’s comment on Anna university Ph.D’s

Ordinary persons like you and me will never be able to see the extra-ordinary intellectual capability of “THE” Anna Univ Phds 😛 U should be a Anna Univ Phd yourself to be able to recognize their immense contribution to research! 😛

Well said. OK enough rants, let me arrive at the point. The Research paper which my friend varun and i published at NIT-T [check out the computer science tab] and at packet storm got plagiarized by someone here. I’ve done a cross check and she seems to be 2o12 batch CS student from KLN college of Engineering, Madurai. I had just posted a comment on her blog.

Edit: The issue is resolved after having a conversation with that person

Peace 😀

University Lab Fun (in)security

As an Ex Electrical Engineering Student, i didn’t have opportunities to take many computer science lab courses, as neither the course work nor the electives were flexible.

You know it right, its ANNA UNIVERSITY.

But,thanks to the IT boom, i had

  • Fundamentals of Computer Lab
  • Data Structures Lab
  • Objected Oriented Programming Lab
  • Communication Lab [English]
  • Power System Simulation Lab

Let me walk you through the fun stuffs which i/we had during these labs.

Fundamentals of Computer Lab:

As I was a Fresher,I stayed below the radar and didn’t try anything adventurous. So it typically went like normal lab sessions.

Data Structures Lab:

The lab was entirely based on C, so we were given an unique user id and password, which was merely our roll numbers [ee199 is mine], sadly there was no provision to change the default password. The user id-password was for mounting the user specific directories to the system, so that students could store their programmes on their respective shares. As I was a sophomore at that time, I limited myself to logging into other user’s account and deleting their programs, nothing other than that because i was a bit coward at that time, yeah you read it right i was coward at THAT TIME.

Objected Oriented Programming Lab:

We did C++ and Java, it was the third year and, I was peaking in presentations and coding competitions. The only difference between data structures lab and OOP lab setup was the GUI. We had access to the windows ME machine in OOP lab, whereas in the DSA(Data Structures and Algorith) lab we were given with DOS & Turbo C. The storage part was lamer than the previous lab, as the programs were saved in /bin/ of C drive, and guess what, the c Drives were Shared over the network, so i had to just browse down to a specific user’s bin directory [//system22/c/] and change his/her programs to some random shit, like displaying weird characters on the screen in different colors and running through a infinite loop.

However during the later part they [system admins], were smart enough to change the program storage/execution directory to a NFS, which used to get mounted at the time of logging in. But they were not smart enough to change the password of the server to anything other than “peccc5lab”, so my job became easier. start->run-> //cc5server/c$/eee would list all users’ directories starting from ee101 to ee230 where their programs are stored. Pwnd!

Communication Lab [English]:

It was the same laboratory as the OOP , the lamest lab which I had, it was something similar to the TOEFL exam, The questions used to be generated from a database, and the database file was luckily running from the cc5server which I mentioned above, so I was able to change the questions to anything I want.The funniest part was that, I could have even done the same for the university exams. The procedure was, to send the users database file to Anna University in which the marks were present according to the answers they provided. Before the University Exam, I had the opportunity to view the users.mdb file [//cc5server/c$/exam/users.mdb], surprisingly the marks were encrypted, i thought of copying the encrypted value of my class topper to mine, but what if the marks were encrypted with the roll number as key. So, if i had swapped my marks, it wouldn’t have been able to decipher it, and i would have got landed in a lot of trouble!, so I refrained from doing it.. I even tried to take a look at the .asp file which pulls the questions and reports the answer back, but time didn’t permit and the staffs walking around the lab was watching me as if i looked like a Alien.

Other than this, I used to cause havoc between students using net sent commands. It was a simple trick, As the c drives used to be shared, I used to change the autoexec.bat of system-y to something like

  • @echo off.
  • net send system-x hey as***le !
  • start c:elclient.exe

and change the shortcut link for EL client to open the autoexec,bat file. So when the user in system-y opens his EL client, System-x used to recieve a message displaying as***le! sent from system-y. So it was fun to see the users in system-x and system-y fight with each other.

Ps: EL client is the software in which we used to work, i hardly opened that software.

Power System Simulation Lab:

I have already blogged about this, you can check it here

Operating Systems Lab at SVCE:

Thanks to the Jump start 2 for bringing back the fun part again. This time it was OS lab and we were taught with basic linux commands like ls,chmod,cat,editors [vi] [for some reason the instructor never mentioned emacs, emacs FTW] ,and some pretty basic stuffs. It was easy for me, no i’m not blaming the instructor. they had to cover each and every student, and many of them did not have any idea on either Linux and computers or Rankine cycle, but they used to brag about that they were the mec*sterz ,meh. But she [ the instructor] did not ask me to close my terminal, in which I was teaching my friend about grep and pipe, Never mind. And in the exercise, each user was asked to create files on their home directory i.e exam01…. exam01 was the username given to 90% of the users on that session. Again it was a NFS [Network FIle System], as the files created by each user started appearing in every users’ home directory, some mothafucka created files with filenames that hurt my friend. So the evil inside BORIS stepped out to cook a bash script [evil.sh]

	#!/bin/bash
	for((; ; ) )
	rm /exam/exam01/*
	sleep 60

chmod a+x evil.sh

../evil.sh &

and the charming script was running in the background, which deleted every file users created to learn on that lab. I’m now guilty of making no one to use of the OS lab, I wouldn’t have done it, if the file names were not that rude.

Ps: If you are creating a lab environment for students, then better rely on NFS with different passwords or share less local system disk with limited user privileges.

Pps:Try these at your own risk

Thats it for now, I’m tired of typing from 6:30 pm, and now the time is 9:09pm & thanks to vignesh for editing this post

Good Bye,alvida!

Being (Un)Productive

Its been a long time ! yes,  i’ve become lazy nowadays. A typical day cycle of mine starts with

  • waking up at 10am
  • Break Fast at 10:30am
  • Playing Games and Refreshing Reddit till 1pm
  • Lunch at 1:30pm
  • Watching some random movie till 5pm
  • Playing Games, Refreshing Reddit, Facebook, Twitter,SMS till 9pm
  • Dinner at 9:30pm
  • Good Nite at 10:30pm

There were times when i was coding even while eating [ thanks to KPP of  Kurukshetra 2010] and remained fully occupied, but these summer holidays and a joboffer made me lazy, i feel like i’m in a hibernate mode. so let me kick this out; i need to do something take my mind off from this hibernate cycle. so im gonna start something which i’ve been thinking for a long while [during Design of Electrical Apparatus lecture classes] Facebook Application Developement.

I’ve been going through the documentation of Facebook PHP API’s and FBML from this morning,  i’ll keep you posted about my first Facebook app  !!