EVM controversy in India

The post is written in honor of Sh. Hari Prasad, the winner of EFF Pioneer Award 2010

How Indian Government deals with Technology

This article illustrates some examples of how the Indian government deals with (Information) Technology. Some of these projects are unheard of while some generated unnecessary hype.

Decline of Microsoft and Intel in smartphone+Internet era

An article on how the internet-centric era supplemented by smartphones is giving tough time to Intel and Microsoft and why the two giants of Desktop-centric computing era are not able to retain their stronghold in the consumer market anymore.

Cyber Security in India : Role of CERT-In

CERT-In is a low-profile (Indian) government organization. The Government of India established the Computer Emergency Response Team (“CERT-IN”) to ensure Internet security. Many institutions, including the Ministry of Home Affairs, courts, the intelligence services, the police, and the National Human Rights Commission, may call on it for specialist expertise. CERT-IN’s stated mission is “to enhance the security of India’s Communications and Information Infrastructure through proactive action and effective collaboration” [ Source] I had a chance to visit CERT-In last week. The experience was overall good, unlike the typical dirty government office with laid-back employees, I saw employees enthusiastic about their work (and a colorful office).

Understanding HTTPS warnings and error messages

A primer on HTTPS warnings and error messages

A preliminary analysis of “Bom Sabado” orkut worm

So, today morning I received an email saying I received an Orkut scrap from a friend with contents “Bom Sabado”. Within a minute, I received the same scrap from another friend. Now getting the feeling that this must be some sort of worm, I decided to open Orkut with firebug logging enabled to see what was going on. It turns out that it’s a typical case of Cross-Site Scripting (XSS), the attacker can inject and execute its script from hxxp://tptools.org/worm.js and the contents of scrap are able to by-pass Orkut sanitization.

Is HTTPS secure?

We all use HTTPS and vaguely understands it as a more secure form of communication.

BlackBerry Controversy in India

Indian Govt. has asked RIM (maker of the BlackBerry smartphone) to provide access to the data going through its servers for intelligence purposes and it appears that BlackBerry has accepted the demands. Due to the lack of understanding of encryption on the part of Indian media, misleading and ambiguous reports have been published on the same. This blog post is an effort to clarify the same.

Understanding Directory Permissions on Linux

This blog post is for those who understand how file permissions work but are looking for an explanation on how file permissions behave when they are applied to directories.

Animation in diagrams (presentations in Latex)

While most people draw diagrams in Xfig (or GIMP) and include them in LaTeX, they can be drawn directly in LaTeX (using tikz package). A major advantage of doing that is animation (\pause) is possible when using these diagrams in presentations(based on beamer) Following is an example demonstrating that (code released under BSD license)