Digital Ocean and others have collaborated with Github on Github Education Program to give a bunch of free stuff that normally aren’t so. As the Program name suggests, it’s for students. So, technically, only students can avail the benefits.
If you are not a student and yet here, you can get $10 credits if you haven’t signed up for a DO account already.
$10 credits – Signup for Digital Ocean account using this link
This has been around for more than a semester now! I take no credit for this. Blame? – sure! but keep it to yourself. This was brought to the notice of concerned people a long time ago and yet, here it is!
All it takes is a simple if condition – reminds me of the famous Heartbleed bug
It can be done in any browser using inspect element or equivalent. I will leave the video to speak for itself about how to do it.
15 Aug 2014, 22:52 IST. Video has been made private on request from ISAA regarding privacy concerns. Will open up once the bug is fixed or not fixed after a few days. Which ever comes first After all, the main intention of the post is to elevate the issue, NOT to explore or let explore
The seriousness of the bug is far more than what was depicted in the video! Your thoughts and criticism on ASC are welcome. On me? Not so
Abstract: “One cable to rule them all”. I intend to build a system where all the basic peripherals – keyboard, mouse and display, can be connected to BeagleBone by attaching it with a USB cable to Android phone. This will be implemented as a kernel module and an ready to use out-of-box app for Android. This module shall have a greater reach and also serve as seed for extending to other systems – Windows, iOS, Ubuntu phones etc.
This is one thing that baffles me, why do I always dig into these things during my exams !? That was a rhetorical question and I wasn’t expecting you to answer that anyway. So, now getting to the point.
You need ROOT for this to work
Here is a snapshot of the working setup on my Nexus 10
Multi window demo. Google Music on top of Kindle reader.
Now that the elections have come to an end. Congratulations to the new office bearers, your hard work sure did pay back (I guess I should wait for this)Let me make this clear at the very outset that I’m NOT pointing at any possible security exploits or breaches that have happened or could have happened at a level where the numbers could be tampered. For one I’m not an expert in any of it and also be informed that the below mentioned can NOT, in any way, be exploited to tamper the counts.
Now that I have done with the ‘putting myself on safe side’. Here it is, what else could have been done, may be not in all places (voting hubs) but definitely at few places.
I somehow managed to get an Aakash 2.0 device from a friend of mine who is working on it. I was once working on too but not anymore. Anyways let me not go into that and come to the point straight. Here’s a performance video,
I was so excited after attending a session on Raspberry Pi to do some hands on stuff. Though, not much as you may expect from my enthusiastic tone, I managed to write (actually modify an example code) and connect R Pi to a LED – Resistor circuit which toggles the LED with some delay. You may find the video below.