Automated University of Michigan Application Status Checker

<p>this eats up so much of my bandwidth but i still use it :P</p>

<p>You could just edit it to make it check less frequently</p>

<p>Sure, I can add an option of changing the interval.</p>

<p>You really really deserve to get in, OMGMIT. You’re awesome :)</p>

<p>Lol</p>

<p>Coding = Magic</p>

<p>Thank you. I hope they will agree with you. :)</p>

<p>Here is the new version which allows you to change the interval. I have also made minor improvements on the error handling mechanism.</p>

<p>[url=&lt;a href=“File sharing and storage made simple”&gt;http://www.mediafire.com/?cfbbp10bpzm5p0e]DOWNLOAD[/url</a>]</p>

<p>…and you know what’s encouraging: 2221 people have already downloaded the first version. :)</p>

<p>Cool, but are you sending people’s usernames and passwords in plaintext? That would not be cool. :)</p>

<p>The data transaction between your computer and University of Michigan servers is made through HTTPS, and therefore encrypted using SSL. (connection is encrypted with AES-256 CBC, and key exchange is made through a channel encrypted with RSA)</p>

<p>So it is at least as secure as entering your password into WA. :)</p>

<p>Ok, good job. Do you plan to make the source code available?</p>

<p>(P.S. using SSL doesn’t necessarily make it as secure as using WA)</p>

<p>If WA uses SSL too, then it does. There is no relay server between WA and you. You are directly communicating with WA.</p>

<p>I can send the source code to anyone who is interested. </p>

<p>Everyone; if you want the source code, just PM me. :)</p>

<p>No, it does not. There are many cases in which using SSL can still fail; it’s hard to tell without seeing code. The crypto itself is strong, but that doesn’t mean it’s used in a strong way. For example, you could be leaking your private keys/using one that is easily guessable.</p>

<p>I’d be interested in eventually seeing the source code, though. It’s certainly more than I did to get into UMich. :-p</p>

<p>You have a point but I don’t think that anyone is spoofing one of ours network traffic and monitoring our HTTPS POSTs. :)</p>

<p>SSL can certainly fail at some point and the man-in-the-middle can get hold of the credentials; but this is always a possibility with WA too. I don’t think that I can do anything more to further protect the data as I am using .NET framework’s own crypto classes. In my opinion, doing anything more to protect the posted data would be an overkill.</p>

<p>What an enjoyable conversation about network security. Are you a computer science major?</p>

<p>I would love to try this but when I tried to download it Norton Internet Security stopped the download, saying it was a medium risk security threat?
Do you know why this is?
Has anyone else had a problem with it?</p>

<p>Certainly. There is most likely no harm in using this (if you can be trusted not to put malicious code in the exe :)); attackers have much better things to do, and your crypto is most likely solid. I was only curious.</p>

<p>This is cool, though. If your code is clean, I’d submit it to them; hopefully it’s not too late.</p>

<p>Gotta go to class. :(</p>

<p>@KenLewis
I sent my admission counselor a screenshot. I don’t think they will spend time on reading the source code. I don’t think that they would even direct it to the computer science department.</p>

<p>It is as simple as a yes/no question for them. :)</p>

<p>@sparrow1
I know that in these cases, the uploader is not the first person to trust, but here is my explanation:</p>

<p>Anti-virus softwares use heuristic detection algorithms which rapidly sweep through the code and try to make sense of what it does. The fact that this application sends data to a remote server over an encrypted channel might have resulted it to be classified as a “medium risk security threat”.</p>

<p>Same thing happened to me. I downloaded it but then Norton blocked and removed it as it saw it as a security threat…</p>

<p>That’s interesting. Is this happening only with the new version, or was it also present with the first version?</p>

<p>I had the file scanned at VirusTotal.com:
<a href=“http://www.virustotal.com/file-scan/report.html?id=abf9ddfbf50abf1eb1156fb7a3f63b08eae1fd2a8e8383e8373f8577b2ca2b4a-1300810142[/url]”>http://www.virustotal.com/file-scan/report.html?id=abf9ddfbf50abf1eb1156fb7a3f63b08eae1fd2a8e8383e8373f8577b2ca2b4a-1300810142&lt;/a&gt;&lt;/p&gt;

<p>It says it’s clean. Try it yourself. :)</p>

<p>well, you emailed me the first one and nothing there was no “security threat” discovered then…but ill try to download it again?</p>

<p>this is what came up after it removed your program…</p>

<p><a href=“http://i55.■■■■■■■.com/6pyvfa.jpg[/url]”>http://i55.■■■■■■■.com/6pyvfa.jpg&lt;/a&gt;&lt;/p&gt;

<p>I have an idea. I will RAR and then upload it. This way Norton won’t label it as a threat after you extract it.</p>

<p>The problem may be stemming from the fact that your browser labels the file as “downloaded from a remote server”.</p>

<p>[Check</a> UMich.rar](<a href=“File sharing and storage made simple”>http://www.mediafire.com/?dvg9y48aze13918)</p>