Here is a portal by BSNL where you can pay your Telephone bills online: https://portal1.bsnl.in/aspxfiles/instaPay.aspx. After a long time BSNL people have started making use of technology for public services, apart from providing basic broadband.
I have been paying my land-line bill online since 6-7 months through the same portal, and I had to provide my phone number and account number at the initial stage, and later I was asked for my bank details for making the payment. I guess people were confused with the account number field, and hence last month BSNL made some changes to the portal text fields. Nowadays we don’t have to provide the account number, and it serves as the Truecaller app for getting the owner’s name. Along with the owner’s name, it gives the outstanding payment details. I think in this way BSNL’s portal is not seriously considering our privacy. Anybody can get the name of the owner and the bill details by just providing their phone-number. It works for individual bills, and not for corporate.
Comparing the BSNL’s portal with Truecaller, it provides better facilities – we can get the verified name of the phone owner (as in BSNL database) and the current bill details. And the best point – unlike Truecaller, we don’t need to provide our authentication details or install the app on our phone for BSNL’s portal. This may not be a security issue for the customers, but it is totally violating the privacy.
(You can give it a try. Visit the Instapay portal. Enter the BSNL land-line number of your friend, and the captcha code. You dont need to provide any mobile number or email address. Click ‘Submit’ and you will be provided the land-line owner’s name and their outstanding amount.)
The last time I made a hashing utility, it was in my mind to create a new tool which takes a list of passwords and gives their hash. Now imagine a scenario: you have found out a hash of some common password and now you are in a hurry to get the hashes of words like ‘admin’, ‘root’, ‘admin@123’, ‘passw0rd’, ‘toor’. You can’t take them one by one and find their hash and copy it to a file for matching it with the hash.
Here I present a tiny utility, which will take your words through the command line and create a file with a list of password : matching_hash. Not even just words through command line, you can make a file with the common passwords for future reference – and this utility will give you a new file with the passwords on your file matched with their respective hash.At present it supports just md5 hash function, but the next update (coming soon) will have some other hash functions like sha256 and sha512 and more. Right now the utility takes input as either your words, or a file with the list of those words and gives output as a new file with the words matched with their hashes.
I have uploaded the utility on PyPI, here is the link: wordlisthash.py on PyPI
After developing a tiny game of Rock Paper Scissors Lizard Spock based on python, during the free time today I made a module for getting the hash of a user provided string. This hash function makes use of the built-in ‘hashlib’ in Python, and provides options for using any of the hash function among md5 (128 bits), sha1 (160 bits), sha256 (256 bits) and sha512 (512 bits). It is kind of interactive, and can take any of the two inputs – either a file or a string. Unless specified, the program continues to give the hash through the chosen function.
I am willing to add more hash functions (like RIPEMD, md6, whirlpool) in the next update. Plus, thoughts of some encryption mixology module are in progress.
Have uploaded the hash-er module here: simplyhash.py on PyPI