Category Archives: Uncategorized

Blackberry for sale, anyone interested?

Hi all,

Most of you might not recognize me… so here’s a quick intro, I was with EXUN way back in 1996-2000 era and was the President in 2000. Even post 2000, I was very much involved in the annual events till about 2004-05.

I have a blackberry 8700g handset which will soon become useless for me as I am transferring to the US and will get a new handset from my company there. I have therefore put my 7.5 month used handset on auctionon eBay at http://cgi.ebay.in/ws/eBayISAPI.dll?ViewItem&item=130141173668&ssPageName=ADME:B:EF:IN:11

Feel free to bid if you’re interested!

Cheers!

Ankit Wadhwa

Gateway 2007 Result

We have won the overall at Gateway 2007 held in Montfort School.
The result is as follows:

Quiz1st Position

  • Manas Gautam
  • Kartikeya Asthana

Gaming1st Postion

  • Digivijay Singh

Group Discussion1st Position

  • Radhika Malik

Web Designing2nd Position

  • Gaurav Mishra
  • Aviral Goyal

Congratulations to everyone!

Thinkquest Participation 2006-2007

Last year, we participated in ThinkQuest Competition with a Topic – Open Source

Open source describes the principles and methodologies to promote open access to the production and design process for various goods, products, resources and technical conclusions or advice. The term is most commonly applied to the source code of software that is made available to the general public with either relaxed or non-existent intellectual property restrictions. This allows users to create user-generated software content through either incremental individual effort, or collaboration.” – Wikipedia

To make the explanation clear, let us take an example: suppose there is a company ‘Centaur Music’. It creates cutting edge sound cards. Now, a global leader in the music industry, ‘Globo Musicals’ has started a new venture. They want to enter the lucrative DVD-player market. So, they enter into an agreement where Centaur will provide them the sound cards which they will use in their DVD-players. So this is how OEM companies function. Oh well, that was Wikipedia defining open source in its own way, now it is our turn. This site of ours is an effort to make people better understand, comprehend and know open source as well as they know their closest people.

To see our team’s website CLICK HERE

This year – the registration for ThinkQuest Competition is starting from August 15, 2007.
For more details – Visit http://www.thinkquest.org/

Computer Star Awards 2007

This year over 5,600 students from about 130 schools across Delhi and the NCR participated in the Computer Star Contest. There were 2 categories, Group A & B, and 53 prizes were given to students excelling in both the groups respectively. Ananth Govind Rajan from our school received the top rank in Group B with 296 marks out of 300 and received a Toshiba laptop. There were a total of 22 students from our school who received consolation prizes from both groups. Our school had the maximum number of meritious students and the third largest number of participating students with 254 students. Hence, we have secured the Computer Ratna for best teachers (Mukesh Kumar & Anjana Virmani), maximum participation and the overall position as the best school.

DON BOSCO FIESTA

Event
PANORAMA – Power Point Presentation
Date
25 August 2007
Registration Time
08:00 am
Event Time
10:30 am – 01:00 pm
Eligibility
Student of class XI & XII
(One Team per school – 3 Members – Speaker, Presenter, Interjector)
Presentation Duration
2 1/2 Minutes
Topic
Censorship murdering Creative Liberty

Organisor School
DON BOSCO SCHOOL, Alaknanda, New Delhi
Contact Phone Numbers
26043099,32949703, 40533616

SQL Injection attacks

One of the most prominent loopholes, which almost every site has, is an SQL security loophole. Sites that use the SQL database system are the ones vulnerable to it.
An SQL Injection Attack is a form of attack that comes from user input that remains unchecked on the user end. The objective is to fool the database system into running malicious code that will reveal sensitive information or otherwise compromise the server.
There are two main types of attacks. First-order attacks are when the attacker receives the desired result immediately, either by direct response from the application he is interacting with or by some other response mechanism, such as e-mail. Second-order attacks are when the attacker injects some data that will reside in the database, but the payload is not immediately activated.

To be very precise, it gives you the source of the files where all the important data is stored.
Here is an example-

1) Open the following site: http://www.sanjeevkapoor.com/ : I have already informed the administrator about the loopholes through a letter also, but no action has been taken.
2) Click on sign in and type the username as: admin OR 1=1—and password as: ‘OR”=’
Now you see how powerful this Injection Attack is. For me to explain how this happened, you need to know some amount of SQL. So this is what actually happens when you supply a password and login to a logon form.
SQLQuery=”SELECT Username FROM Users WHERE Username=’” & StrUsername & “ ‘ AND Password=’ “ & Strpassword & “ ‘ “
StrAuthcheck= GetqueryResult(SQL query)
If strAuthenticated=” “ then
Boolauthenticated=False
Else
Boolauthenticated= True
The logon and password actually form an SQL query, which goes through the user’s table, and tries to find a match for the username and password you supplied. If a match is found then a string is stored in a variable (strauthcheck) but if this string remains empty then you are not authorized. So by using the SQL queries like 1=1—(which means one is equal to one) you are able to fool the SQL sever which is actually checking for authentication.

Article by : – Ankit Srivastava
                       Head, Network Security – Exunclan

CV Raman and Bhaskara Trophy

Bluebells School, Kailash Colony is organising a Science Symposium for the CV Raman and Bhaskara Trophy on July 31, 2007. One speaker and two presenters are required for the same.

A 5 minute presentation needs to be made on the topic “Technology of Mobile Connectivity” on either PowerPoint or Flash MX. If it is made on any other software, then the participants will have to bring the software with them for the event.

All those interested please give in your names before July 20, 2007.

Mata Jai Kaur Public School result

Senior Event

  • Quiz
    Kartikeya Asthana
    Ananth Govind Rajan
  • Programming (C++, VB)
    Aayush Kumar
    Shikhar
  • CEO Hunt
    Aayush Kumar

    Junior Events

  • Mobile Phone Website
    Tanay Padhi
    Dwarkesh
  • Treasure Hunt
    Aditya Jain
    Sakshi Gupta
  • Video Editing

    Sub Junior Events

  • Junior Quiz
    Shubham Goel
    Rishabh Marya
  • Futuristic Gizmo
    Shubham Goel
    Tanay Padhi