Wisdom is Free
March 2024, Volume 1
Issue 1, Pg - 1
“If war can be started by lies, peace can be started by truth.”
"Wisdom Is Free" it's a canvas for the untold stories,
unconventional talents, and unapologetic truths that pulse through
our student body. In a world often veiled in conformity, we've
embarked on a journey to celebrate the authentic voices of our
students. This newsletter serves as a sanctuary for the
unconventional. Here, we amplify the whispers of creativity that
might be drowned in the locker rooms of traditional norms. From
showcasing avant-garde art to unearthing hidden talents, "Wisdom
Is Free" is a testament to the richness that lies beneath the surface.
Truth, unfiltered and unbridled, is our compass. In every edition,
we pledge to unravel the realities that often go unnoticed. Our
articles delve into the depths of societal norms, shining a light on
the obscured corners where truth resides. Whether through
investigative journalism or personal narratives, our aim is to
present a mosaic of perspectives that challenge preconceptions and
foster understanding.
Satire is our weapon of choice – a powerful tool that can dissect
societal absurdities with a humorous edge. Through satirical
articles, we encourage our writers to wield their pens like swords,
(For the pen is mightier than the sword) cutting through the
illusions and revealing the incongruities that surround us.
Laughter, after all, has the unique ability to puncture the pompous
and expose the ludicrous. Jokes and cartoons are not just light-
hearted additions but potent instruments of truth. In the simplicity
of a joke or the strokes of a cartoon, we find a medium to articulate
the profound. Our students are invited to infuse humour with
wisdom, creating content that not only entertains but also provokes
thought. This platform is a collaborative effort, an invitation to
every student to contribute to the collective wisdom of our
community. We aim to enable students to be truth-seekers and
truth-tellers, empowering them to articulate their perspectives with
confidence. It's about fostering an environment where authenticity
is not just welcomed but celebrated.
To a More Darker Era
This World is getting into an era of darkness, as compared to the
past few decades of our history, we can now observe that the media
is bounded from the truth. There is no longer the truth being
covered in the mainstream media and the media houses are being
controlled by rich and powerful individuals, we are basically being
manipulated by them. And now in the few years it has changed a lot!
we can no longer see the people in the streets of Delhi journalising
From The Editor
with a laptop and few equipments (They used to be
independent), the group debates are going
underground because of fear of being intimidated by
the higher powers. People used to have open
discussions and debates about sensitive topics, which
they no longer can.
Internet Censorship, it used to be a very hot topic. In
layman’s term what it does is that, it supervises what
can be published, accessed or viewed on the internet.
because of this, thousands of academic documents and
research papers have been censored on the open web
and many of these uncensored papers are stored in big
institutions, one namely being the Massachusetts
Institute of Technology (MIT), for which Aaron
Swartz fought for the de-censorship of these academic
and research papers.
Being a part of this newsletter, I feel privileged to
express this issue to all of you reading this. I am
honoured to contribute to this cause and will keep on
contributing. To be remembered as.....
“The Truth Must Prevail”
As the Editor-in-Chief, my commitment is to curate a
space where each edition is a tapestry of diverse truths,
talents, and satirical brilliance. Let "Wisdom Is Free"
be the mirror reflecting the vibrant, dynamic, and
authentic spirit of our student community. Together,
let's continue to unveil the truth, one page at a time.
You Know Who
Let's tell you some things about our favourite seniors.
They are literally the nicest people I've known my
entire life. They are sickly sweet and treat their juniors
with utmost respect. They could "never" mistreat
their junior by snatching their device, which is
basically torment. Another thing they will do under no
circumstances is making comments on someone's
appearance. How could they? Making juniors fill their
bottle, sending them to run personal errands, making
them finish writing their notebooks, etc.......you name
it and they just "would not" do it! They are so syrupy!
To sum it all up, inflicting torture upon their juniors
definitely isn't their favourite past time. It’s a pride of
our seniors that they will preserve as long as they are
here for a few while.
- Anonymous
2
The Life of Julian
Assange
In 2006, Julian Assange founded wiki leaks, which is a website for
whistle blowers where you can anonymously upload sensitive documents
and publish it to all over the world. But wiki leaks wasn't really a big deal
until 2010, when Chelsea Manning, who was an army intelligence
analyst uploaded hundreds of thousands of classified document exposing
how the U.S. was doing war and diplomacy around the world and it
revealed some frankly horrifying stuff, like never before released death
toll numbers that were much higher than what shown on the mainstream
media. And also showed disturbing footage of American soldiers killing
Iraqi civilians, including children and journalists. Around 15,000
civilians were killed, mostly by the Iraqi soldiers, but the US knew about
this and did nothing. The Pentagon was furious about these leaks and
soon with the Swedish Government, arranged for a fake rape case against
Assange.
Julian Assange was given political asylum at the Ecuadorean Embassy in
London. He stayed there for 7 years, trying to avoid arrest from the US
Government.
In 2017, "Vault 7 : CIA Hacking Tools Revealed" files were leaked in
the wiki leaks page, which exposed all the hacking tools the CIA used to
get unauthorized access to the privacy of millions of people around the
world and governments too. In 2019, while Assange was still in the
embassy, he was kicked out of there by the then President of Ecuador,
because wiki leaks released some embarrassing leaks of the President.
Soon as he was kicked out, he was handed over to the British Police and
was sent to the Belmarsh prison. While you are reading this article, Julian
Assange is still in prison.
Assange was examined by the UN medical
practitioners and found out that he was in a
really bad health. Cases of psychological
torture, trauma, physical torture, isolation and
also many inhumane treatment were performed
on him, he was medically neglected and suffered
anxiety too.
How to Create a Recovery Drive
It's a good idea to create a recovery drive. That way, if you PC ever
experience a major issue such as hardware failure, you'll be able to use
the recovery druve to reinstall windows 11. Windows updates to
improve security and PC performance periodically, so we recommend
you recreate the recovery drive anually. Personal files and any apps that
did not come with your pc will be backed up. You'll need a USB drive
that's at least 16 gigabytes. To create a recovery drive in Windows 11 :
In the search box on the taskbar, search for create a recovery drive and
then select it. You might be asked to enter an admin passowrd or
confirm your choice.
When the tool opens, make sure Back Up system to the recovery drive
is selected and then select Next.
Connect a USB Drive to your PC, select it, and then select Next.
Select Create. Lots of files need to be copied to the recovery drive, so
this might take a while.
Indian IT Act 2000
If a person hacks with the intent to cause wrongful loss or damage to
the public or any person, they can be faced with a penalty of three
years in prison as well as a fine of up to 500,000 rupees.
Cyber terrorism is a severe offense in India, punishable by up to life
in prison. If a person denies access to authorized personnel to a
computer resource or accesses a protected system to threaten India's
unity, integrity, sovereignty, or security, he has committed cyber
terrorism.
First of all you'll need a
USB flash drive of
minimum storage of 16
GB, however I suggest
you use something like
64 GB or 128 GB. To
install Kali Linux (An
Operating Software for
penetration testers)
you'll need two pieces of
software :
1. Go to kali.org and
download the "Live
Boot" image, we DO
NOT want to download any of the other versions.
2. The next piece of software is Rufus go to the official site
of Rufus (this is to make your USB flash drive bootable)
and download the latest exe file and run rufus.
Before running Rufus, make sure that you have your USB
flash drive inserted on your system. Then as shown in the
picture select your USB and also select your Kali iso image
file, and set up the persistence storage if you would like to, I
advice you not to do so and just get a high storage USB.
Perform a Targeted Deauthentication Attack on a Network
Power off your computer/laptop and while the USB is still
in, turn on your system. If your are not directed to the Kali
Linux interface, just go to the BIOS (try combination of
SHIFT + F2/F10, as it is in your laptop) and change the
b o o t i n g
device. But
i n m o s t
circumstanc
es, you won't
have to go to
your BIOS.
Once your
Kali Linux is
open, on the
top left corner you’ll see that terminal box, right beside
firefox, there on the drop down menu, click Root terminal
and then you will find the pop up as shown in the picture
here.
Now the initial steps are done, so the only thing left is to go
and start the process of Deauthentication, for that follow
the steps in the coming sequences.
Once, you’re done with the above procedures, you will
need an external wifi adapter to enable Monitor Mode so as
to be able to delivery the wireless attacks. I will suggest you
to buy an adapter from any brand, the only thing it matters is
the chipset inside the adapter. My preference of chipsets
are, Atheros AR 9271 and Realtek RTL8814 AU.
So, once you’re set up, follow the commands in the above
picture, type the command “ifconfig” it will show how
many wireless compatible devices you have, one is the wifi
card built in and the another is the wifi adapter that we have
connected (The Atheros AR 9271), which in this case is
wlan0, by giving the command “ifconfig wlan0” you can
see the mac address of the adapter.
Now, by default these type of wifi adapters are in ‘managed’
mode, and to perform this wireless deauthentication attack
we need our adapter to be in ‘monitor’ mode. To do that,
first bring down the adapter card; “ifconfig wlan0 down”,
and enable the monitor mode by giving the command,
“iwconfig wlan0 mode monitor”, finally bring up our
adapter; “ifconfig wlan0 up”. Re-check this command
from, “iwconfig” and we can see that the wifi adapter
(wlan0) is in Monitor mode.
A Caution to be followed while performing this is that,
there is always risks associated with doing such
activities, even though it is not intentional or done with a
malicious intent. To avoid getting into trouble, please
adhere to the rules of “Indian IT Act 2000” , given in
the previous page. ALWAYS be on the ethical side!
The rest of the tutorial will be continued in the coming
edition, stay tuned! I will bring on more stuffs like,
‘Sniffing Packets’ and ‘Targeted Packet Sniffing’.
- Temjenwapang Jamir (Editor-In-Chief)
To Be Continued.........
4
“It Ends With Us”
Book Review
Movie Review 12th Fail
A r t o f S a t I r e
"It Ends With Us" by Colleen Hoover is a novel that, despite
its popularity, left me with mixed feelings and a sense of
disappointment. While the book explores important and
sensitive topics, including domestic abuse, it falls short in
various aspects that impact its overall quality. One of the
primary issues with the book lies in its character
development. The protagonist, Lily Bloom, is portrayed as
a strong and independent woman, but her actions and
decisions often contradict these qualities. The
inconsistencies in Lily's character make it challenging for
readers to connect with and fully invest in her journey.
Instead of growing throughout the story, Lily's character
seems to oscillate between strength and vulnerability
without a clear and believable trajectory. Furthermore, the
romantic relationships in the book are problematic. The
central romance between Lily and Ryle fails to convince
readers of its authenticity. This lacks depth and
development of their connection feels rushed, and the
chemistry between them lacks the necessary foundation for
a compelling love story. As a result, when the narrative
takes a darker turn, the impact on the reader is diminished
because the emotional investment in the characters is not
well-established. The novel attempts to tackle the complex
issue of domestic abuse, and while it deserves credit for
addressing such an important topic, the execution leaves
much to be desired. The portrayal of abusive behaviour is
oversimplified, and the resolution feels overly optimistic.
The gravity of the subject matter demands a more nuanced
and realistic exploration, which "It Ends With Us" fails to
deliver. The narrative structure of the book also contributes
to its shortcomings. The dual timelines, alternating between
past and present, disrupt the flow of the story and hinder the
reader's ability to fully immerse themselves in the plot.
Instead of enhancing the narrative, the timeline shifts feel
forced and at times confusing, detracting from the overall
reading experience. This lack of depth in the secondary
characters further diminishes the overall impact of the
narrative, as their actions and reactions feel contrived and
serve the main plot rather than contributing to a rich and
interconnected story.
"12th Fail" is a compelling coming-of-age film that
navigates the challenges and aspirations of Indian youth.
Directed by Abhishek Reddy, the movie unfolds the
journey of the protagonist, played by a promising young
actor. The storyline revolves around the aftermath of a
student failing the crucial 12th-grade examination, a
common predicament in the Indian education system. The
film masterfully captures the societal pressure and stigma
associated with academic failure, providing a poignant
commentary on the rigid expectations placed upon
students. The protagonist's character is well-etched,
offering a nuanced portrayal of resilience and self-
discovery. The script skilfully weaves together moments of
humour, heartbreak, and hope, resonating with a wide
audience. The narrative is enriched by a well-chosen
supporting cast, each contributing to the film's emotional
depth. What sets "12th Fail" apart is its authenticity in
depicting the struggles faced by Indian youth. The director
incorporates relatable elements, addressing the dilemmas
of career choices, parental expectations, and societal
judgments. The film doesn't shy away from addressing the
flaws in the education system, sparking reflection on the
broader issues affecting students. The cinematography is
visually appealing, capturing the vibrant landscapes and
cultural nuances of the Indian milieu. The soundtrack
complements the narrative, enhancing the emotional
impact of key scenes. Reddy's direction demonstrates a
keen understanding of storytelling, keeping the pacing
engaging while allowing moments of introspection. While
the movie excels in portraying the emotional journey of the
protagonist, there are instances where certain subplots
could have been further explored for a more
comprehensive narrative. Additionally, some dialogues,
although impactful, might feel slightly didactic. In
conclusion, "12th Fail" is a thought-provoking film that
transcends the typical tropes associated with academic-
themed movies. It offers a sincere exploration of the human
spirit and resilience in the face of societal expectations.
With its relatable characters, emotional depth, and relevant
social commentary.