Wednesday, 20 April 2022
Srinagar youth develops Valley's first Ramadan App.Working on other projects to benefit people: Haider Ali Punjabi
Srinagar, Apr 20 : A youth from Srinagar has developed the Valley's first offline Ramadan app with multiple features.
Haider Ali Punjabi (22), a resident of Srinagar pursuing PG from Computer Applications from Cluster University Srinagar developed the app titled "Iftarkar" used on all devices.
Talking with—Kashmir News Observer (KNO), he said that Iftarkar is a Ramzan Companion App made for the people of Jammu and Kashmir. It features Iftar/Sehri timings for Ramadan along with an intuitive countdown for the same.
"It's available as a website (iftarkar.com) and can be used on all devices (mobiles, computers, etc). It is also available as an Android App from Google Play Store,” he said.
"People normally look for Ramdan timings in newspapers etc but after the outbreak of Covid, they weren't available. To help people, we constructed this website,” he said.
"Since it received very good response, the app continued to be updated every year.
Iftarkar has been uniquely developed in a manner so that it can be accessed on slow internet speed, and doesn't need internet after the first time," he added.
"Unlike other timing apps, Iftarkar uses timings from reputed local sources like Darul Uloom Raheemiya Bandipora, Educational Trust Kashmir, Madrasa Arabia Islamia Taleem Ul Quran, Jammu, etc,” he said.
According to him, he is working on more projects for the benefit of people. They include Accher, a Kashmiri Wordle and Kashmiri stickers for WhatsApp and Tweet2Pic, an android app for converting tweets to images.
Apart from Iftarkar, Haider Ali Punjabi worked with two friends Mudasir Ali and Vikas Bukhari on CovidKashmir.org , a website dedicated to track Covid-19 in J&K, along with providing other Covid related information—
Skill India is organising a National Apprenticeship Mela to provide nation's youth with an opportunity to earn while they learn. Candidates can walk in with their required documents for on-spot interviews, assessment and apprenticeship training offers from over 4000 reputed companies across 30 sectors. Register now, and take the first step towards shaping your career: appmelaapril22#NAM2022 #ApprenticeshipMela #Skill4All #SkillIndiaPMO India Narendra Modi NITI Aayog MyGovIndia Press Information Bureau - PIB, Government of India Ministry of Micro, Small and Medium Enterprises,Government of India
Tuesday, 19 April 2022
Sunday, 17 April 2022
Saturday, 16 April 2022
Cisco has released a security advisory to warn about a critical vulnerability (CVSS v3 score:
Cisco has released a security advisory to warn about a critical vulnerability (CVSS v3 score: 10.0), tracked as CVE-2022-20695, impacting the Wireless LAN Controller (WLC) software.
The security flaw allows remote attackers to log in to target devices through the management interface without using a valid password.
The bug involves the improper implementation of the password validation algorithm, making it possible to bypass the standard authentication procedure on non-default device configurations.
If this prerequisite is present, the attacker may use crafted credentials to gain varying levels of privilege, potentially going all the way up to an administrative user.
Impact and remediation
According to Cisco's advisory, the products affected by this flaw are those that run Cisco WLC Software 8.10.151.0 or Release 8.10.162.0 and have "macfilter radius compatibility" configured as "Other."
The affected products are:
3504 Wireless Controller
5520 Wireless Controller
8540 Wireless Controller
Mobility Express
Virtual Wireless Controller (vWLC)
In addition to the above, some customers using the following builds not available through the Software Center should also consider themselves vulnerable: 8.10.151.4 to 8.10.151.10 and 8.10.162.1 to 8.10.162.14.
Finally, Cisco has confirmed the following as not vulnerable to CVE-2022-20695:
Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
Catalyst 9800 Series Wireless Controllers
Catalyst 9800 Wireless Controller for Cloud
Embedded Wireless Controller on Catalyst Access Points
Wireless LAN Controller (WLC) AireOS products not listed in the Vulnerable Products section
To determine if your configuration is vulnerable, issue the "show macfilter summary" command. If the RADIUS compatibility mode returns "Other," you're vulnerable to attacks.
Command to determine configuration vulnerability
Command to determine configuration vulnerability
(Cisco)
Applying the latest available security updates (8.10.171.0 or later) released by Cisco addresses this vulnerability no matter what configuration you're using.
Possible workarounds
Cisco has provided two possible workarounds for those who can't update the Wireless LAN Controller.
The first option is to reset the "macfilter radius compatibility" mode to the default value by issuing the following command: "config macfilter radius-compat cisco".
The second option would be to change the configuration to other safe modes, such as "free", using this command: "config macfilter radius-compat free".
At the time of writing this, Cisco is not aware of the vulnerability being under active exploitation, and Bleeping Computer has seen no reports about scanning attempts either.
Subscribe to:
Posts (Atom)