The University Student Union at CSU Northridge (my school) started a contest. Make your own "Bernie Lean" video. For those of you who do not know what a "Bernie Lean" is, consider the following: In short, it's a stupid dance that makes Gangnam Style look like international ballroom by comparison. And yet, all I could think of was "Going to the Store". So I made this:
And submitted it with the team name "What the hell is the bernie lean? Screw it, I'm going to the store". In the description of the video I say that "Yes, CSUN, I think this contest is stupid and I'm making fun of this whole thing". And yet, they posted it on their website for people to vote for it.
Now, even though I don't give a damn about the prize, being the ever-so-slightly evil guy that I am, I thought, "Hey, why don't I write a script or something that'll just hit that URL 1000 times and I'll just win?"
But then I thought, what if I gave the URL a different YouTube video? So I gave it some random one as a test and it told me that my vote was counted. Now, we can't see the backend of it to see if the vote actually counted for a video, but it's worth a shot.
SO! Does anyone else feel like joining me in some quality chaos?
I voted for never gonna give you up. You can too with this link
That. It also seems to accept any URL, so perhaps we should throw them a lemon party? *evil chuckle* EDIT: Haha, the schools SSH runs python! I'll just setup a few looped scripts to poll these URLS every 10 seconds so it's not actually DOS-ing them.
I'll give Rick Astley 400 votes and me 500. If I win, I'll be able to take the prize, tell them to their faces that they contest was stupid, and then just throw out the prize in front of them, followed by dousing it in chocolate milk (rain).
I just wish there were counters under them so I could tell how many were needed to win.
No, send in huge numbers of votes. They're responsible for training the future leaders/bureaucrats/tech people, they should be punished severely for not considering vulnerabilities in their voting process.
Seriously, identifying and closing vulnerabilities is a huge problem in IT nowadays. Fuck those guys for allowing it to go unaddressed at such a fundamental level.
Thank you for participating in the Bernie Lean Video Contest. Unfortunately, your video is not admissible due to inappropriate content (i.e. naked body suit). If you are still up for the challenge, we would love to see another video that follows the guidelines: http://src.csun.edu/contests/bernielean/.
We understand that the video did take time and effort on your behalf, so we would like to honor the free SRC t-shirt. You will be notified when they become available for pick up.
Thanks again for your interest in the Bernie Lean Video Contest.
We hope to see another video soon!
Now, this email is from someone I've had prior dealings with in the USU office. But, even if this email was sent on the 13th, the video has remained on the website all this time.
This is the email I plan on sending:
Ms. --name--, It's a pleasure to hear from you. It has been a while since we last spoke. My apologies for the late response. I don't check this email address too often.
In response to your email: That isn't a naked body suit. That is a 3d rendered model of a non-gendered figure. In that respect, it is no more inappropriate than a Ken doll. What surprises me, though, is that, seeing how strangely that figure bends and moves, how could anyone possibly believe it was anything but a computer graphic?
After seeing my video posted on the SRC site, your email, unfortunately, only confirms my suspicion that either: A. No one actually watched my video in its entirety or even read the description of it, and simply posted it on the site, sight unseen.
B. Whoever is actually doing the work of running this contest has a massive sense of humor, is in agreement with me, and posted it to the site in support of my opinion, while those "in charge" were none the wiser.
That being said, if it is decided that my video is still a valid entry and I do win, feel free to give the prize to the next runner up. I don't even know what an "insanity workout program" is.
Comments
Dear C-sun:
EDIT: Haha, the schools SSH runs python! I'll just setup a few looped scripts to poll these URLS every 10 seconds so it's not actually DOS-ing them.
I just wish there were counters under them so I could tell how many were needed to win.
Seriously, identifying and closing vulnerabilities is a huge problem in IT nowadays. Fuck those guys for allowing it to go unaddressed at such a fundamental level.
Also, hilarity.
This is the email I plan on sending: I think that's charitable enough, don't you?