Monthly Archive September 2018

ByJayanthi

Tamil Nadu

Born and brought up in Tamil Nadu(a state in Southern India) and having lived close to 23 years in the state,I have never done a post on my home state  – how did it happen? Let’s get started right away…:) Here are a few points about my beloved state:

  1. Language – Most of you might be knowing this – but to reiterate there is only one language that is freely spoken and understood in Tamil Nadu – and that is Tamizh! 🙂 Unfortunately, no other language is visible except for English, of course… It is not to say that people from other parts of India cannot thrive here – once here, everybody blends in very well after a while… 🙂 
  2. Food – We love our idlis and dosas…I have written extensively written about it…in addition we also love our Venn Pongal, Sakkarai Pongal(sweet Pongal), Vadai, Thayir sadam(Curd rice), different varieties of rice(Puliyodharai(tamarind rice), lemon rice)  and all other poriyals(vegetables)!  Rice is our staple and it finds its way into all the meals whether directly or indirectly…The non-vegetarian spread is no less too!
  3. Cities – the more important cities in Tamil Nadu are Chennai, Coimbatore, Salem, Madurai and Trichy.
  4. Weather – It is a very hot state – there is no concept of winter here – though the month of ‘Margazhi'(December) is considered to be slightly cooler…
  5. Music and dance: It is a great state to learn classical dance and music. If you would like to learn Bharatnatyam or classical music in the true authentic way – then this is the place to be. With places like the Kalakshetra and gurus like the Dhanajayans – it is THE place to learn Bharatnatyam.
  6. Festivals –  the ‘Golu’ season(Dusshera) is celebrated with dolls adorning the steps for the nine days. ‘Pongal’ (Sankranti) is another important festival which is celebrated with much pomp and happiness for a full five days.  Unlike other cities, Chennai wakes up early in the morning to celebrate Diwali (around 4:00 a.m. or so)
    And interestingly enough, there is no dancing or partying for any of the festivals! 🙂 And no…. no Holi , Karva Chauth etc. 🙂
  7. Fashion – It is one of states where women still dress conservatively(at least, I think so! :)) No ripped pants, shorts, 3/4 pant, sleeveless tops etc. etc. for women. Fashion for women can still be a simple salwar kameez with beautiful jasmine flowers to adorn the hair! 🙂 Of course, not to say that nobody wears western clothes – but the number of people wearing them might be less(and might be only in Chennai)
  8. Temples – Tamil Nadu has huge number of temples with beautiful architecture for the various Hindu Gods and Goddesses. Most of these temples are several hundred years old and it is a privilege to visit these temples!
Temple

These are a few things that I could think of that make Tamil Nadu…can you think of anything else? Add them in comments below! 🙂

This post is my sixth post for my #MyFriendAlexa by @Blogchatter.

ByJayanthi

Black Widow

The Information security world is a deep one and sometimes it is quite shocking to know the things that can be done. Did you know that ‘Black widow’ is not just the name of a spider…but it is a actual software that is used for ‘reconnaissance’ too(Of course, InfoSec professionals will know :))

‘Reconnaissance’ is the ability to obtain freely available information about a website. Vocabulary.com defines “Reconnoitering as checking something out, but in a sneaky way!”

Once this information is obtained one can seal the extra unwanted information that is unintentionally creeping out(for example, maybe passwords and employee details are visible with the reconnaissance tools) One of the ways that a site can be ripped is by employing website downloaders like ‘Black Widow’, Website downloader  and Httrack.

Most of these tools will allow you to download the entire website and the directory structure, external links, bad links and email addresses. The picture below shows a screen shot of the ‘Black Widow’ software…

The details provided above are for informational purposes only! Please do not use it in any inappropriate way!

This is my fifth post for #MyFriendAlexa by @Blogchatter!

Liked this post? Please comment and share! 🙂

ByJayanthi

The clock

He got up at the same time of 4:30 every morning. Not one morning had he ever gotten up late. In fact, the alarm always needed him to get up… 🙂 He had his fixed morning routines that he would follow everyday. Whether it was the gym or walking – it was followed meticulously and perfectly. Neither rain nor shine could ever disrupt anything. He would leave for work at the exact same time everyday and get back home at the exact time everyday. Breakfast, lunch, dinner was had at the same time of day. Exercise was reserved for certain days of the week. Personal phone calls were made at the exact time intervals(nobody gets extra free calls in his routine!! :)) Even the move to India had not thrown his schedule out of gear. 

If he was busy doing something, it had to be at a particular time of day…There was no need to to look at the clock in this house as there was already a “clock” roaming around! 🙂 Once you see him in a particular location, you knew the time of the day.

She knew the routine as she was married to him for a very long time. While most people maintain a routine, he was an absolute stickler for it…from food habits to exercise to sleep and work – everything followed the hands of the clock. No wonder she thought she was married to the clock rather than him!! 🙂

Most of you must have guessed this “clock” – if you haven’t as yet guessed, come home – I will introduce you to him! 🙂

Clock

This is the fourth post for #MyFriendAlexa by @Blogchatter

ByJayanthi

Pharming

The online world unfortunately is not a fun place as it seems. There are other types of people around too seeking to grab credit card numbers, bank account numbers, steal pictures of children and/or any personal data that is floating around. 

Let us assume that you would like to visit a website, www.abac.com (a fictitional website) What happens when you visit www.abac.com and do a bit shopping and submit your bank account details or any other personal details only to realize after a day – that the website that you visited was actually a fake one? 

This type of attack is known as ‘Pharming’. ‘Pharming’ is done by modifying the victim’s file or by a more complicated technique known as ‘DNS poisoning’. 

To protect oneself:

The best way to protect oneself from ‘Pharming’ attacks is to:

  1. install the latest version of anti-virus software
  2. Apply the patches as and when posted
  3. Associating one-self with a good ISP
  4. When making payments ensure that SSL(secure sockets layer) is enabled for the website
  5. Keeping with the latest in the security field(where are the breaches, what was stolen, what is the newest type of attack)
  6. And keeping ears and eyes open! 🙂

We have seen yet another concept of ‘Information security’ in this post.

This is the third post for ‘MyFriendAlexa’ by @Blogchatter!

ByJayanthi

Who are better multi-taskers? Men or Women?

She was busy in the kitchen. It was a Monday morning. The school bus would be here anytime. It was idli for breakfast. While the first kid was unhappy about idli being the breakfast for the day, the second kid was super excited!  One preferred  coriander chutney. The other one preferred sambhar. Husband was already rushed and late for a meeting(what’s new?! :)) It was a super busy morning making breakfast/lunch – sending the kids and husband off to school/work and getting herself ready for work too!

After work, she had to give attention to both kids as each of them had separate requirements. One needed chart paper for a project, the other needed a printout. Home work, exams, were all over the place and seemed to be solely her responsibility. Dinner had to made and her own needs had to be met too. While her husband did step in every once in a while to help out…he could never keep with all the things she could do… 

Sounds like a familiar story? It is not mine 🙂 but I am sure it is many a woman’s story…

Multi-tasking is the art of doing multiple things simultaneously in my view. Who does this better? 

Working moms, stay at home moms, work from home moms, young ladies are all into multiple things at once. They will don multiple hats during the day and night. They create yummy food for their family according to each one’s taste, teach their kids, do their projects, become a doc for their kids during medical crisis, shuttle the kids from class to class, support their families, keep up with their own personal interests and more! I feel like they are demi-gods brandishing the ‘multi-tasking’ sword…

With all the above points, I have a faint idea about who is the better multi-tasker.. don’t you? 🙂

This post is my second post for #MyFriendAlexa by #Blogchatter!

Have a wonderful day! 🙂

mutitasking

ByJayanthi

Hacking

While ‘Information security’ always gives us images of breaches, hacks, stolen credit card numbers and bank account numbers, my blog has always been associated with the concepts of ‘Information security’ or the many defenses that are there to keep your information safe.

In this post, I will like to delve into the reality of letting off the ‘Information security’defenses down. Apart from the breaches and hacks, what are the other ugly things that are possible?  While this may be common knowledge to those in InfoSec domain – it may not be known to every one. It is always a common thought – “it will not happen to me” – it is a reality that it does happen quite frequently and everybody gets affected at some point or other!

  1. Remotely controlling  Android/Apple device 

                There are a variety of ways in which one can remotely control another person’s Android or Apple device.  There are plenty of apps that allow you to control an Android device from a PC, via an another Android device, via WiFi, via Bluetooth and really the possibilities are endless!  

I am sure most of you remember the time when Saket Modi, the co-founder and CEO of Lucideus hacked the phone of a person sitting in the audience. Through this hacking, he was able to procure the subject’s SMSes, contacts, call logs, GPS locations and more! (Source: https://www.youtube.com/watch?v=3fT6pUQrY6M)

2. Hacking cars?

Is this even possible? Yes – maybe in the future! Researchers have shown that hackers can remotely kill your engine, lock the doors to your car, put the car in reverse gear without your permission and many other frightening moves! 

Automotive hacking may be a distinct possibility as the years roll by!

hacker

3. ATM skimming

Many people are sure to have fallen to this type of hack. A small skimmer is attached to the ATM machine by means of which bank details are retrieved.  The numbers are then transferred to blank ATM cards and money and data are stolen! 

4. Keylogger

‘Keylogger’ is a type of surveillance software which when installed on your system, can monitor every key stroke, record passwords, captures screenshots and more. It can be run in invisible mode and thereby the user will have no clue of its presence. This is commonly used by employers to keep tabs on their employees. 

In addition to all this, the devious mind can find ways to see your private Facebook picture, Instagram pictures and any other private information. In short, the more you want to keep it private online, the more someone is eager to see it! 🙂

This is just the tip of the wild side of security hacks… anything is possible  for a determined mind! 

How do we protect ourselves from all this?

Maintain a minimal online presence.  And it is good to keep up with all security updates and install all patches and upgrades as and when posted.

This is my first post for #MyFriendAlexa. I am taking my Alexa rank to the next level with #Blogchatter