Back to Camping…

Here we are, organizing the 4th BarCamp of Pune The team is little bit twisted this time, some oldies might not be physically available,Atul & Anand shifted to USDibya is on the run againKarthik is now in BangaloreBut no worries, I'm here with Kiran & Tarun. With few good people supporting like Anil & Ketan we'll be surely having a lot of fun.See you there @ http://barcamp.org/BarCampPune4

ClubHack 2007

OK, I'm back to my blogosphere now :)I was busy doing the first Hackers' Convention of India by the name "ClubHack 2007"The event was on 9th of December 2007 @ International Convention Center, Pune12 quality speakers shared their knowledge with people. http://clubhack.com/2007/speakers.htmlWe saw a good crowd of technically smart people attending the event. The kind of interaction at the talks was really good.We had a hard time collecting sponsors for the

Where are we heading mister (bar)Camper

So finally I reached SJMSOM by 1130hrs & saw that my talk was scheduled at 1400hrs. Tarun created a good base before I reached by the catchy "gabbar" statement for my topic.Was an OK experience all together but was sorry to see the missing punch of BarCamps. All the topics of the day were circling around "start-ups" & "web2.0" (Except a very few). Is this BarCamp actually meant for? It would be great to see more variety of topics in future BarCamps

Once a (Bar)Camper, always a camper

Very true!Attended MashupCamp yesterday in Pune & here I'm on my way to BarCampMumbai2.Thought of trying the alternate mode of commute to Mumbai & hopped on "Deccan Queen" in the morning at about 0715. Man! this is a nice train. Much comfortable than Volvo travel to Mumbai.And above all, I'm connected. Thanks to Reliance data card, speed sucks but connectivity rocks :)I hope to reach event venue by 1100hrs. Already informed Tarun to book my slot for the t

CSRF attack, Gmail and Adsense Hacked. How to be safe??

We all noticed a lot of noise on the CSRF attack recently unearthed in Gmail which is really dangerous & can cause harm to many other websites also. [1] [2]So the question arises, What to do to be SAFE?Here are few alternatives, select one as per your convenience.1) POP your mails: I'll again emphasis on POPing the mail over SSL, this way you are not logging on the webmail so you are safe from such attacks, moreover you are on a complete encrypted cha

SkillsCamp @ Pune [Live Blogging]

0930: Good morning!, Here we are with yet another BarCamp. This one is specialized into training & video casting of tutorials.0945: People are still coming. Not a very big crowd though. Now this is the actual crowd who comes for Camp & not for the free t-shirt. This time we have not kept any free t-shirts :)1000: Freeman has put up the story board & speakers posted there timings. I'll be speaking @ 1200. Freeman is about to start the intro session .101...

A day with fancy keyboards

When I saw few images of fancy laser keyboards online & the flexible keyboard in "Die Hard 4.0" and Yahoo! store online, I made up my mind to get my hands on the same.My friend Rohas Nagpal brought me the same on his recent trip to Singapore & I had a nice time playing around with them.-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-The flexible keyboard as seen in "Die Hard 4.0"# Its a nice rubber keyboard which can be rolled up and stored in very less space# Sp

Responsible Vulnerability Disclosure Policy

[The Policy I follow]This policy outlines how I try to handle responsible disclosure of a vulnerabilityto the product vendors, security vendors and the general public. Step 1: Vulnerability detectedStep 2: Inform the vendor of the product or the servce formally through email to following mail accounts/aliasessecurity@VENDOR,support@VENDOR,info@VENDOR,secure@VENDOR,admin@VENDOR,sysadmin@VENDORStep 3: Wait for vendor's acknowledgement for 5 working daysStep