Page Translate

Sunday, 24 April 2016

Campaign started on Cybersecurity launched by Australia



Australia
set out a far-reaching cybersecurity strategy on Thursday, invoking the leaks
of United States whistleblower Edward Snowden, terrorism and even the threat of
war to push for a coordinated global approach to protection of online data and
also transform into a tech-savvy business hub as its economy deals with a
commodities downturn. In a speech in Sydney, the former online entrepreneur
said hacking attacks cost the country a $1 billion ($780 million) a year and
unveiled a long list of measures - from appointing his own special
cybersecurity adviser to having internet safety taught in schools - to make the
online world freer and safer. "There's no global institution or
infrastructure more important to the future prosperity and freedom of our
global community than the Internet itself," Turnbull said,


"The
same qualities that enable us freely to harness cyberspace for prosperity can
also provide an avenue for those who may wish to do us harm," he said. Turnbull
acknowledged the public has become skeptical about government activity online
since U.S. National Security Agency contractor Snowden leaked classified
documents in 2013, and again this year when the U.S. Federal Bureau of
Investigation sought access to an Apple Inc iPhone used by one of the shooters
in killings in San Bernardi
                      


no, California. But he said that "in certain
very specific circumstances government will work with the private sector ... to
fight serious online crime and extremism and to thwart terrorists and others
who seek to hide their illegal activities online". Turnbull, who delivers
his first budget in May, two months before the election, said he wants to spend
A$230 million on 33 cybersecurity. He also plans to relocate the cybersecurity
office of intelligence agency, the Australian Signals Directorate, outside the
broader Australian Security Intelligence Organisation to make it easier to
coordinate with businesses. Online security industry executives welcomed the
strategy, noting it was Australia's first review of its cyber protection
systems in six years. "Given the speed with which these things have moved,
we are overdue, and strategy goes some way to making good progress," said
Phil Vasic, the Australian managing director of U.S.-listed cybersecurity firm
FireEye Inc, who was at the Turnbull speech.


Campaign started on Cybersecurity launched by Australia

Australia set out a far-reaching cybersecurity strategy on Thursday, invoking the leaks of United States whistleblower Edward Snowden, terrorism and even the threat of war to push for a coordinated global approach to protection of online data and also transform into a tech-savvy business hub as its economy deals with a commodities downturn. In a speech in Sydney, the former online entrepreneur said hacking attacks cost the country a $1 billion ($780 million) a year and unveiled a long list of measures - from appointing his own special cybersecurity adviser to having internet safety taught in schools - to make the online world freer and safer. "There's no global institution or infrastructure more important to the future prosperity and freedom of our global community than the Internet itself," Turnbull said,
"The same qualities that enable us freely to harness cyberspace for prosperity can also provide an avenue for those who may wish to do us harm," he said. Turnbull acknowledged the public has become skeptical about government activity online since U.S. National Security Agency contractor Snowden leaked classified documents in 2013, and again this year when the U.S. Federal Bureau of Investigation sought access to an Apple Inc iPhone used by one of the shooters in killings in San Bernardi                      
no, California. But he said that "in certain very specific circumstances government will work with the private sector ... to fight serious online crime and extremism and to thwart terrorists and others who seek to hide their illegal activities online". Turnbull, who delivers his first budget in May, two months before the election, said he wants to spend A$230 million on 33 cybersecurity. He also plans to relocate the cybersecurity office of intelligence agency, the Australian Signals Directorate, outside the broader Australian Security Intelligence Organisation to make it easier to coordinate with businesses. Online security industry executives welcomed the strategy, noting it was Australia's first review of its cyber protection systems in six years. "Given the speed with which these things have moved, we are overdue, and strategy goes some way to making good progress," said Phil Vasic, the Australian managing director of U.S.-listed cybersecurity firm FireEye Inc, who was at the Turnbull speech.

Upgrading India’s cyber security architecture also finding problems and their solutions





  • Two things set aside India’s digital spaces from that of
    major powers such as the United States and China: design and density. India is
    a net information exporter. Its information highways point west, carrying with
    them the data of millions of Indians. This is not a design flaw, but simply
    reflects the popularity of social media platforms and the lack of any serious
    effort by the Indian government to restrict the flow of data. Equally important
    is the density of India’s cyberspace. Nearly 500 million Indians use the
    Internet today, but they do not access the Internet from the same devices. Apple’s
    market share in the U.S., for instance, is 44 per cent, but iPhones account for
    less than 1 per cent in India. The massive gap between the security offered by
    the cheapest phone in the Indian market and a high-end smartphone makes it
    impossible for regulators to set legal and technical standards for data
    protection.





  • Smart cities are the future of urbanisation and population
    sustainability. The aim of smart cities is to provide a conductive environment
    for living, commercial activities, healthcare and overall development. Smart
    cities also predominantly rely upon use of information and communication
    technologies (ICT) to render public services. Wherever applicable, 
    Internet of Things (IoT) (PDF),
    cloud computing and virtualisation and machine to machine (M2M) system usage is
    also there. However, this omnipresent usage of ICT, IoT, M2M, cloud computing,
    etc has a potential drawback as well in the form of indifference towards 
    smart cities cyber security.

  • It is not difficult to visualise a scenario of cyber-attacks against
    the critical infrastructures of the smart cities that are run by ICT and
    technology. Such a cyber-attack can cripple the entire smart city if properly
    executed. 
    Critical infrastructure
    protection in India
     (PDF) is still at nascent stage. The
    national cyber security policy of India 2013 is also 
    very weak and even that has not been implemented by Indian
    government so far. The much awaited 
    cyber security policy of India
    2015
    is also missing so far.





             



















                                                       




  • This raises the pertinent question as to how Indian government would
    ensure cyber security of smart cities in India. We at 
    Centre of Excellence for Cyber Security Research and Development in India
    (CECSRDI)
     believe that Modi government must take cyber security
    seriously. The 
    cyber security challenges in India would
    increase further and India must be 
    cyber prepared to protect its
    cyberspace. CECSRDI believes that the starting point is to draft the cyber
    security policy of India 2015 as the 2013 policy is highly defective and of
    little significance. We also believe that a dedicated 
    cyber security law of India is need
    of the hour. The same must be a 
    techno legal framework keeping
    in mind contemporary cyber security threats. Further 
    cyber security disclosure norms in India must
    be formulated by Modi government. The 
    cyber security awareness in India
    must be further improved so that various stakeholders can contribute
    significantly to the growth and implementation of cyber security initiatives of
    Indian government.



Upgrading India’s cyber security architecture also finding problems and their solutions

  • Two things set aside India’s digital spaces from that of major powers such as the United States and China: design and density. India is a net information exporter. Its information highways point west, carrying with them the data of millions of Indians. This is not a design flaw, but simply reflects the popularity of social media platforms and the lack of any serious effort by the Indian government to restrict the flow of data. Equally important is the density of India’s cyberspace. Nearly 500 million Indians use the Internet today, but they do not access the Internet from the same devices. Apple’s market share in the U.S., for instance, is 44 per cent, but iPhones account for less than 1 per cent in India. The massive gap between the security offered by the cheapest phone in the Indian market and a high-end smartphone makes it impossible for regulators to set legal and technical standards for data protection.
  • Smart cities are the future of urbanisation and population sustainability. The aim of smart cities is to provide a conductive environment for living, commercial activities, healthcare and overall development. Smart cities also predominantly rely upon use of information and communication technologies (ICT) to render public services. Wherever applicable, Internet of Things (IoT) (PDF), cloud computing and virtualisation and machine to machine (M2M) system usage is also there. However, this omnipresent usage of ICT, IoT, M2M, cloud computing, etc has a potential drawback as well in the form of indifference towards smart cities cyber security.
  • It is not difficult to visualise a scenario of cyber-attacks against the critical infrastructures of the smart cities that are run by ICT and technology. Such a cyber-attack can cripple the entire smart city if properly executed. Critical infrastructure protection in India (PDF) is still at nascent stage. The national cyber security policy of India 2013 is also very weak and even that has not been implemented by Indian government so far. The much awaited cyber security policy of India 2015is also missing so far.

             


                                                       
  • This raises the pertinent question as to how Indian government would ensure cyber security of smart cities in India. We at Centre of Excellence for Cyber Security Research and Development in India (CECSRDI) believe that Modi government must take cyber security seriously. The cyber security challenges in India would increase further and India must be cyber prepared to protect its cyberspace. CECSRDI believes that the starting point is to draft the cyber security policy of India 2015 as the 2013 policy is highly defective and of little significance. We also believe that a dedicated cyber security law of India is need of the hour. The same must be a techno legal framework keeping in mind contemporary cyber security threats. Further cyber security disclosure norms in India must be formulated by Modi government. The cyber security awareness in India must be further improved so that various stakeholders can contribute significantly to the growth and implementation of cyber security initiatives of Indian government.

Saturday, 9 April 2016

"Qubes' Xen-Like Security Requires a Leap of Faith"



Qubes' Xen-Like Security Requires a Leap of FaithIf you want an effective and different approach to computer platform security, turn to the Qubes OS.


Be prepared to adjust your expectations and your computing comfort zone, however. The Qubes OS does not work the way other Linux distros work in adding extra layers of security.


It is based on the Fedora Linux desktop but goes well beyond Fedora's approach. The Qubes OS is a hybrid computing technology that raises the bar for security.


Designed around the concept of security by isolation, it achieves that goal by using domains implemented as lightweight Xen virtual machines.


Its U.S.-based Invisible Things Lab development team combines two concepts. One is making the isolation between domains as strong as possible. The second is making the isolation seamless through an innovative architecture that minimizes the amount of trusted code.


Developers released version 3.1 last month. Qubes OS installs from a DVD but has no live session as a testing vehicle. You can try an alpha version that installs to a USB drive, but that download is an earlier version of Qubes OS.


Still, it gives you a chance to try it before you do a hard disk installation. Installing Qubes in a virtual machine rarely works. If you succeed, the performance is radically impacted. The built-in Xen hypervisor does not play nicely with the other VM environment.


Supreme Isolationism



Qubes locks down each part of the OS by compartmentalizing it. Each component of the OS is relegated to a domain structure that is isolated from all other domains.


The concept is a bit strange to grasp until you see it in operation. You can have multiple domains running on the desktop at the same time. They appear on the screen as windows running applications in a traditional Linux desktop.


The applications actually are running in separate VM windows within the Qubes OS. The barriers between domains are rigidly enforced -- even performing copy and paste operations from one domain window to another requires menu-driven procedures and authorizations.




Qubes OS Xen<br />virtual machines

The Qubes OS runs multiple color-coded Xen virtual machines as isolated windows that raise the bar for security.





This security barrier concept ensures that rogue code or other harmful intrusions in one domain do not affect any other component in the Qubes OS. A self-destructing domain brings an added security option.


Self-Destructing Security



If you open a disposable domain, whatever you run and whatever data you generate from apps within it cease to exist when you close that domain.




Qubes OS domain<br />disposal

The disposable domain is one of the Qubes OS' more rigorous security features.





For example, if you open a Web browser in a disposable domain and stumble on an infected website, the foreign substance would be deleted automatically when the domain closed.


Suppose you save a website to a bookmark. That bookmark and all of the history entries you visited during that browsing session are gone when you open the Web browser in another domain or a new disposable domain.




Domain Sovereignty



When you install Qubes OS, the process creates three default domains: work, personal and untrusted. You can create more domains using the trusted window manager.


Each domain has a name and an assigned color that functions as a label. The trusted window manager uses these colors to draw color frames around the windows border for each application running in each domain.


Dom0 is sort of a system domain separate from the default domains and any other domains you create. The desktop manager runs in this domain. Your login credentials reside there. Much like a super domain, Dom0 is more trusted than any other domain.


It is also cut off from the rest of the Internet world. Dom0 has no network connectivity. It provides just two functions: It runs the window manager and the desktop manager.


Why It Works



The Qubes OS goes beyond the limitations of the traditional monolithic OS structure. In traditional Linux operating systems, all the applications run within a single operating system. Running a distro in a virtual machine relies on using a single hosted hypervisor that creates and runs the VM environment.


The Qubes OS uses a bare-metal hypervisor called Xen. It does not run inside an existing OS. The Xen hypervisor runs directly on the bare metal of the hardware. Qubes runs compartmentalized and isolated VMs, all managed as an integrated OS.


Linux distros running in live sessions still have some vulnerabilities. VM hypervisors running on top of the host OS are only as secure as the host OS itself, according to the developers. Qubes OS's compartmentalized Xen VMs make it much more difficult to compromise.


Using It



It took me awhile to get used to the blended user interface that drives the Qubes OS. Applications run in domain windows. Much of the desktop overlay and familiarity of the KDE and Xfce appearance exist.


However, launching programs is done differently. You control the entire Qubes system with either command line tools run under a Dom0 console or with an intuitive graphical user interface tool.


To open a console window in Dom0, go to Start/System Tools/Konsole, or press Alt + F2 and type "konsole." Once the Qubes VM Manager is running, you can open the window at any time by clicking on the Qubes tray icon, which typically resides in the bottom-right corner of the screen.


Launching the program from the VM Manager's menu first opens its domain window. You can open programs in an already opened domain using the menu button present in each domain window. Applications also can start from the command line.




Qubes OS menu<br />list

The menu list shows installed domains and the applications registered to run in them.





Tricky Requirements



The hardware needs are a bit more tricky with Qubes OS. Expect roadblocks with hardware support. That can be an issue since you will not know how your hardware handles Qubes OS until after you install it.


It might help to check the Qubes hardware compatibility list. You can install the Qubes OS on systems that do not meet the recommended requirements, the developers noted. Provided the hardware is compatible, you will benefit from significant security improvements over traditional operating systems. Features such as GUI isolation and kernel protection do not require special hardware.


You'll need a 64-bit CPU that supports virtualization technology. That support includes both Intel VT-x (or AMD-V) and Intel VT-d (or IOMMU), plus a BIOS with TPM (for Anti Evil Maid). Running numerous VMs within Qubes OS is resource-intensive, so you'll need an abundance of RAM (4 GB is minimum) and a fast processor.


Beware Bugaboos



Macs are not supported. Their keyboard and mouse functions cause problems.


Be aware of two other hardware cautions: Nvidia GPUs may require heavy troubleshooting, and ATI GPUs have not been formally tested.


The installer loads Xen at the beginning of the installation routine. If you see the installer's graphical screen early in the boot up, Qubes OS will probably work on your system, according to the developers.


Bottom Line



This latest version features a new management system that centrally controls the Qubes OS configuration based on Salt management software.


The in-house installation wizard offers various options to precreate some useful configurations. The release also supports booting on machines with UEFI and introduces additional hardware support for a range of video cards.


Qubes OS is not for the faint-hearted. Even Linux users familiar with other security-enhanced distros will feel the challenge in installing and setting up this unique Linux desktop.


Want to Suggest a Review?



Is there a Linux software application or distro you'd like to suggest for review? Something you love or would like to get to know?


"Qubes' Xen-Like Security Requires a Leap of Faith"

Qubes' Xen-Like Security Requires a Leap of FaithIf you want an effective and different approach to computer platform security, turn to the Qubes OS.
Be prepared to adjust your expectations and your computing comfort zone, however. The Qubes OS does not work the way other Linux distros work in adding extra layers of security.
It is based on the Fedora Linux desktop but goes well beyond Fedora's approach. The Qubes OS is a hybrid computing technology that raises the bar for security.
Designed around the concept of security by isolation, it achieves that goal by using domains implemented as lightweight Xen virtual machines.
Its U.S.-based Invisible Things Lab development team combines two concepts. One is making the isolation between domains as strong as possible. The second is making the isolation seamless through an innovative architecture that minimizes the amount of trusted code.
Developers released version 3.1 last month. Qubes OS installs from a DVD but has no live session as a testing vehicle. You can try an alpha version that installs to a USB drive, but that download is an earlier version of Qubes OS.
Still, it gives you a chance to try it before you do a hard disk installation. Installing Qubes in a virtual machine rarely works. If you succeed, the performance is radically impacted. The built-in Xen hypervisor does not play nicely with the other VM environment.

Supreme Isolationism

Qubes locks down each part of the OS by compartmentalizing it. Each component of the OS is relegated to a domain structure that is isolated from all other domains.
The concept is a bit strange to grasp until you see it in operation. You can have multiple domains running on the desktop at the same time. They appear on the screen as windows running applications in a traditional Linux desktop.
The applications actually are running in separate VM windows within the Qubes OS. The barriers between domains are rigidly enforced -- even performing copy and paste operations from one domain window to another requires menu-driven procedures and authorizations.
Qubes OS Xen
virtual machines
The Qubes OS runs multiple color-coded Xen virtual machines as isolated windows that raise the bar for security.
This security barrier concept ensures that rogue code or other harmful intrusions in one domain do not affect any other component in the Qubes OS. A self-destructing domain brings an added security option.

Self-Destructing Security

If you open a disposable domain, whatever you run and whatever data you generate from apps within it cease to exist when you close that domain.
Qubes OS domain
disposal
The disposable domain is one of the Qubes OS' more rigorous security features.
For example, if you open a Web browser in a disposable domain and stumble on an infected website, the foreign substance would be deleted automatically when the domain closed.
Suppose you save a website to a bookmark. That bookmark and all of the history entries you visited during that browsing session are gone when you open the Web browser in another domain or a new disposable domain.

Domain Sovereignty

When you install Qubes OS, the process creates three default domains: work, personal and untrusted. You can create more domains using the trusted window manager.
Each domain has a name and an assigned color that functions as a label. The trusted window manager uses these colors to draw color frames around the windows border for each application running in each domain.
Dom0 is sort of a system domain separate from the default domains and any other domains you create. The desktop manager runs in this domain. Your login credentials reside there. Much like a super domain, Dom0 is more trusted than any other domain.
It is also cut off from the rest of the Internet world. Dom0 has no network connectivity. It provides just two functions: It runs the window manager and the desktop manager.

Why It Works

The Qubes OS goes beyond the limitations of the traditional monolithic OS structure. In traditional Linux operating systems, all the applications run within a single operating system. Running a distro in a virtual machine relies on using a single hosted hypervisor that creates and runs the VM environment.
The Qubes OS uses a bare-metal hypervisor called Xen. It does not run inside an existing OS. The Xen hypervisor runs directly on the bare metal of the hardware. Qubes runs compartmentalized and isolated VMs, all managed as an integrated OS.
Linux distros running in live sessions still have some vulnerabilities. VM hypervisors running on top of the host OS are only as secure as the host OS itself, according to the developers. Qubes OS's compartmentalized Xen VMs make it much more difficult to compromise.

Using It

It took me awhile to get used to the blended user interface that drives the Qubes OS. Applications run in domain windows. Much of the desktop overlay and familiarity of the KDE and Xfce appearance exist.
However, launching programs is done differently. You control the entire Qubes system with either command line tools run under a Dom0 console or with an intuitive graphical user interface tool.
To open a console window in Dom0, go to Start/System Tools/Konsole, or press Alt + F2 and type "konsole." Once the Qubes VM Manager is running, you can open the window at any time by clicking on the Qubes tray icon, which typically resides in the bottom-right corner of the screen.
Launching the program from the VM Manager's menu first opens its domain window. You can open programs in an already opened domain using the menu button present in each domain window. Applications also can start from the command line.
Qubes OS menu
list
The menu list shows installed domains and the applications registered to run in them.

Tricky Requirements

The hardware needs are a bit more tricky with Qubes OS. Expect roadblocks with hardware support. That can be an issue since you will not know how your hardware handles Qubes OS until after you install it.
It might help to check the Qubes hardware compatibility list. You can install the Qubes OS on systems that do not meet the recommended requirements, the developers noted. Provided the hardware is compatible, you will benefit from significant security improvements over traditional operating systems. Features such as GUI isolation and kernel protection do not require special hardware.
You'll need a 64-bit CPU that supports virtualization technology. That support includes both Intel VT-x (or AMD-V) and Intel VT-d (or IOMMU), plus a BIOS with TPM (for Anti Evil Maid). Running numerous VMs within Qubes OS is resource-intensive, so you'll need an abundance of RAM (4 GB is minimum) and a fast processor.

Beware Bugaboos

Macs are not supported. Their keyboard and mouse functions cause problems.
Be aware of two other hardware cautions: Nvidia GPUs may require heavy troubleshooting, and ATI GPUs have not been formally tested.
The installer loads Xen at the beginning of the installation routine. If you see the installer's graphical screen early in the boot up, Qubes OS will probably work on your system, according to the developers.

Bottom Line

This latest version features a new management system that centrally controls the Qubes OS configuration based on Salt management software.
The in-house installation wizard offers various options to precreate some useful configurations. The release also supports booting on machines with UEFI and introduces additional hardware support for a range of video cards.
Qubes OS is not for the faint-hearted. Even Linux users familiar with other security-enhanced distros will feel the challenge in installing and setting up this unique Linux desktop.

Want to Suggest a Review?

Is there a Linux software application or distro you'd like to suggest for review? Something you love or would like to get to know?

Techno by Mangal Sen: "Techno Teen by Akshat Mittal"

Techno by Mangal Sen: "Techno Teen by Akshat Mittal": Older Post

Techno by Mangal Sen: "Techno Teen by Akshat Mittal"

Techno by Mangal Sen: "Techno Teen by Akshat Mittal": Older Post

"Techno Teen by Akshat Mittal"


खेलता हूं जम कर
और पढ़ता भी
जम कर हूं: अक्षत
आजकल मार्क्स लाने से जरूरी है कुछ नया और
तूफानी करना। ऐसा
ही कुछ कर दिखाया
है क्लास 9 में पढ़ने
वाले 13 साल के
अक्षत मित्तल ने।
उन्होंने ऑड-ईवन
रूल को फॉलो करने
के लिए वेबसाइट
बनाई जिसे एक बड़ी
कंपनी ने इसी हफ्ते
खरीद लिया। अक्षत मित्तल से बात की
अमित मिश्रा ने :

Q इस वेबसाइट को बनाने का ख्याल कब और कैसे
आया? 


मैंने जब दिल्ली में ऑड-ईवन रूल आने की बात सुनी, तब
मेरे मन में राइड शेयरिंग को लेकर कुछ करने का ख्याल
आया। चूंकि मैं अपने स्कूल (एमिटी) में कंप्यूटर प्रोग्रामिंग
सीख रहा था
इसलिए मैंने इस
प्रॉजेक्ट पर काम
करना शुरू कर दिया। पिछले साल मैंने odd-even.com
को लॉन्च कर दिया।

Q वेबसाइट का शुरुआती रेस्पॉन्स कैसा रहा?

मुझे यह देख कर हैरानी हुई कि लोगों ने इसे सराहा और
जल्दी ही इसके यूजर्स 30 हजार तक पहुंच गए।

Q आपकी वेबसाइट कार पूलिंग की बाकी वेबसाइट्स
और दूसरे ऐप्स से कैसे अलग है?
 इसमें आधार नंबर और कार रजिस्ट्रेशन नंबर अटैच करने का
ऑप्शन है जिससे सेफ्टी सुनिश्चित हो जाती है। जेंडर प्फरेंस भी दे रे
सकते हैं कि किसके साथ कार पूल करना चाहते हैं।

Q जब वेबसाइट बन कर तैयार हो गई तो इसे बेचने का
ख्याल कैसे आया?


 असल में मैंने कभी भी इसे बेचने के लिए नहीं बनाया
था। पिछली बार ऑड-ईवन का नियम लागू होने के बाद
मेरी वेबसाइट के बारे में मीडिया में चर्चा हुई। इसके बाद
ओराही (Orahi) ने मुझसे संपर्क किया। मुझे डील अच्छी
लगी तो मैं राजी हो गया।

Q अपनी वेबसाइट बिकने का दुख नहीं हुआ? 

नहीं, ऐसा कुछ नहीं हुआ। मुझे तो इस बात से भी खुशी
हुई कि ओराही ने मुझे अपने एडवाइजरी बोर्ड में रखा है।

Q डील से मिले इतने पैसों का क्या करोगे?

मैं अपने अगले प्रॉजेक्ट पर खर्च करूंगा।

Q odd-even.com बनाने में कितना वक्त लगा? 

तकरीबन 2-3 हफ्ते।

Q क्या यह आपकी पहली वेबसाइट थी? 

पहले भी कुछ छोटी-मोटी बनाई हैं लेकिन कभी लॉन्च नही कीं।

Q 11 वीं में मेडिकल स्ट्रीम लेना चाहते हैं या इंजीनियरिंग? 

ऐसा कुछ सोचा तो नहीं है लेकिन कपंयूटर में मेरा इंटरेस्ट है
इसलिए इंजीनियरिंग स्ट्रीम ही जाऊंगा।

Q बनाने में खर्च कितना आया और पैसा कहां से आया? 

खर्च सिर्फ डोमेन रजिस्ट्रेशन में ही तकरीबन 1 हजार रुपये लगे।
मैंने घर से पैसे लेकर डोमेन रजिस्टर करवाया।

Q वेबसाइट बनाना किसने सिखाया? 

मैंने 7वीं क्लास से ही स्कूल में बनाना सीखा है।

Q कंप्यूटर पर ज्यादा वक्त बिताने पर घर वाले टोकते
नहीं थे?


हां, कभी-कभी टोकते तो थे लेकिन मैंने वेबसाइट बनाने
की ठान ली थी इसलिए मैनेज कर लेता था।

Q आपके मम्मी-पापा क्या करते हैं?

 मेरी मम्मी डॉक्टर हैं और मेरे पापा एक ऑन्ट्रप्रनर हैं।

Q आप पढ़ाकू टाइप के हैं या मस्ती करने वाले? 

मैं पढ़ाई के वक्त जम कर पढ़ता हूं और मस्ती के वक्त
जम कर मस्ती करता हूं। वैसे मेरे ग्रेड्स अच्छे आते हैं। 

"Techno Teen by Akshat Mittal"

खेलता हूं जम कर और पढ़ता भी जम कर हूं: अक्षत आजकल मार्क्स लाने से जरूरी है कुछ नया और तूफानी करना। ऐसा ही कुछ कर दिखाया है क्लास 9 में पढ़ने वाले 13 साल के अक्षत मित्तल ने। उन्होंने ऑड-ईवन रूल को फॉलो करने के लिए वेबसाइट बनाई जिसे एक बड़ी कंपनी ने इसी हफ्ते खरीद लिया। अक्षत मित्तल से बात की अमित मिश्रा ने :
Q इस वेबसाइट को बनाने का ख्याल कब और कैसे आया? 
मैंने जब दिल्ली में ऑड-ईवन रूल आने की बात सुनी, तब मेरे मन में राइड शेयरिंग को लेकर कुछ करने का ख्याल आया। चूंकि मैं अपने स्कूल (एमिटी) में कंप्यूटर प्रोग्रामिंग सीख रहा था इसलिए मैंने इस प्रॉजेक्ट पर काम करना शुरू कर दिया। पिछले साल मैंने odd-even.com को लॉन्च कर दिया।
Q वेबसाइट का शुरुआती रेस्पॉन्स कैसा रहा?
मुझे यह देख कर हैरानी हुई कि लोगों ने इसे सराहा और जल्दी ही इसके यूजर्स 30 हजार तक पहुंच गए।
Q आपकी वेबसाइट कार पूलिंग की बाकी वेबसाइट्स और दूसरे ऐप्स से कैसे अलग है? इसमें आधार नंबर और कार रजिस्ट्रेशन नंबर अटैच करने का ऑप्शन है जिससे सेफ्टी सुनिश्चित हो जाती है। जेंडर प्फरेंस भी दे रे सकते हैं कि किसके साथ कार पूल करना चाहते हैं।
Q जब वेबसाइट बन कर तैयार हो गई तो इसे बेचने का ख्याल कैसे आया?
 असल में मैंने कभी भी इसे बेचने के लिए नहीं बनाया था। पिछली बार ऑड-ईवन का नियम लागू होने के बाद मेरी वेबसाइट के बारे में मीडिया में चर्चा हुई। इसके बाद ओराही (Orahi) ने मुझसे संपर्क किया। मुझे डील अच्छी लगी तो मैं राजी हो गया।
Q अपनी वेबसाइट बिकने का दुख नहीं हुआ? 
नहीं, ऐसा कुछ नहीं हुआ। मुझे तो इस बात से भी खुशी हुई कि ओराही ने मुझे अपने एडवाइजरी बोर्ड में रखा है।
Q डील से मिले इतने पैसों का क्या करोगे?
मैं अपने अगले प्रॉजेक्ट पर खर्च करूंगा।
Q odd-even.com बनाने में कितना वक्त लगा? 
तकरीबन 2-3 हफ्ते।
Q क्या यह आपकी पहली वेबसाइट थी? 
पहले भी कुछ छोटी-मोटी बनाई हैं लेकिन कभी लॉन्च नही कीं।
Q 11 वीं में मेडिकल स्ट्रीम लेना चाहते हैं या इंजीनियरिंग? 
ऐसा कुछ सोचा तो नहीं है लेकिन कपंयूटर में मेरा इंटरेस्ट है इसलिए इंजीनियरिंग स्ट्रीम ही जाऊंगा।
Q बनाने में खर्च कितना आया और पैसा कहां से आया? 
खर्च सिर्फ डोमेन रजिस्ट्रेशन में ही तकरीबन 1 हजार रुपये लगे। मैंने घर से पैसे लेकर डोमेन रजिस्टर करवाया।
Q वेबसाइट बनाना किसने सिखाया? 
मैंने 7वीं क्लास से ही स्कूल में बनाना सीखा है।
Q कंप्यूटर पर ज्यादा वक्त बिताने पर घर वाले टोकते नहीं थे?
हां, कभी-कभी टोकते तो थे लेकिन मैंने वेबसाइट बनाने की ठान ली थी इसलिए मैनेज कर लेता था।
Q आपके मम्मी-पापा क्या करते हैं?
 मेरी मम्मी डॉक्टर हैं और मेरे पापा एक ऑन्ट्रप्रनर हैं।
Q आप पढ़ाकू टाइप के हैं या मस्ती करने वाले? 
मैं पढ़ाई के वक्त जम कर पढ़ता हूं और मस्ती के वक्त जम कर मस्ती करता हूं। वैसे मेरे ग्रेड्स अच्छे आते हैं। 

Blog Archive