Wednesday, May 30, 2012

Satyamev Jayate

I want to share my views on Satyamev Jayate program aired in star plus every Sunday

Episode 1: 
Female Foeticide - Large section of society including highly educated maroons are indulged in killing girls before birth.


 Episode 2:
 Child Sex Abuse : Every 2nd Child in the age group of 5 to 18 years (both genders) are sexually harassed or abused in their teen ages


Episode 3:
Dowry menace - Women are being harassed for extra or additional dowry before and after marriage in various forms like cash/furniture/house .etc

Episode 4:
Health Care Need Healing .. Commission model : Pharma companies to doctors , doctors to patients. Making the cost of medicines increased upto 20 to 50 times the base cost.

The official website for satyamev jayate : http://www.satyamevjayate.in

Tuesday, May 29, 2012

Hire -- Fire

Once upon a time the government with Ruling Party XYZ.. had a vast scrap yard in the middle of a desert.
Ruling Party XYZ Said -
"Someone may steal from it at night."

So they created a night watchman position and hired a person for the job.

Then Ruling Party XYZ Said-
"How does the watchman do his job without instruction? "
So they created a planning department and hired two people, one person to write the instructions, and one person to do time studies.

Then Ruling Party XYZ Said-
"How will we know the night watchman is doing the tasks correctly?"
So they created a Quality Control department and hired two people. One to do the studies and one to write the reports.

Then Ruling Party XYZ Said-
"How are these people going to get paid?"
So they created the following positions, a time keeper, and a payroll officer, then hired two people.

Then Ruling Party XYZ Said-
"Who will be accountable for all of these people?"
So they created an administrative section and hired three people, an Administrative Officer, Assistant Administrative Officer, and a Legal Secretary.

Then Ruling Party XYZ Said-
"We have had this command in operation for one year and we are $18,000 over budget, we must cutback overall cost."

So they lay off the night watchman.

Sunday, May 27, 2012

Virtual Life Ater Physical Death .. YES !!


Most of us has two life's
                                       1) Physical 
                                       2) Virtual

     
Virtual life is an instance of physical life, existing in multiple forms in multiple locations. 

The virtual life's is nothing but your profile in social networking websites and personal blogs. Most of us have accounts/profiles in Gmail, Facebook, Twitter ..etc. Each virtual instance will grow independently based on your updates and posts in respective networking sites.

All the social networking site use your information and makes their own business model in creating ads and promotions to make money

Of course with some exception Zurker is an upcoming social networking site with revenue model making its users as owners.

Whats New with Zurker ?
             I have already shared my views on Zurker network. click here to read more about it.


Virtual Life after Physical Death 
           Virtual instance is controlled by physical life but what happens to your virtual world after death, yes it still exists without you in digital form. Below is the list popular networking sites with their policies on how to deal with the profiles of deceased ones.

Facebook has a memorialising feature by setting the account to private so that only confirmed friends and family members can search and leave posts in remembrance. It disables any future logins to the profile. Family members can also request for removal of account

Google can provide the content to the authorized representative of deceased user with careful review of documents and other policies before providing the credentials.

LinkedIn, Twitter, Flickr and Orkut -  Deletes the account if death certificated is submitted and filling the online form at the respective sites.

Paypal  closes the account and issue's a cheque to the legal heir

Friday, May 25, 2012

Priest and Vodka

A new priest at his  first mass was so nervous he could hardly speak.After mass he asked  the monsignor how he had done.

The monsignor replied,  "When I am worried about getting nervous on the
pulpit, I put a glass of vodka  next to the water glass.If I start to get  nervous, I take a sip."

So next Sunday he took  the monsignor's advice. At the beginning of the sermon, he got nervous and took  a drink. He proceeded to talk up a storm.

Upon his return to his  office after mass, he found the following note on the door

1. Sip the Vodka,  don't gulp..

2. There are 10  commandments, not 12.

3. There are 12  disciples, not 10.

4. Jesus was  consecrated, not constipated.

5. Jacob wagered his  donkey, he did not bet his ass.

6. We do not refer to  Jesus Christ as the late J. C.

7. The Father, Son,  and Holy Ghost are not referred to as Daddy, Junior
     and the Spook.

8. David slew Goliath,  he did not kick the shit out of him.

9. When David was hit  by a rock and was knocked off his donkey,don't
    say he was stoned off his ass.

10. We do not refer to  the cross as the "Big T."

11. When Jesus broke  the bread at the Last Supper he said, "Take this and eat    it for it is my body."  He did not say "Eat me"

12. The Virgin Mary is  not called "Mary with the Cherry,"

13. The recommended  grace before a meal is not: Rub-A-Dub-Dub thanks for the  grub, yeah God.

14. Next Sunday there  will be a taffy pulling contest at St. Peter's, not a peter    
      pulling contest at  St. Taffy's.


Wireless Network Attacks .. Do you aware of them ?

In smart phones generation , the usage of wireless network has reached the peaks. In some metro cities every home at least own more than 1 smart phone and laptop.  Internet is a backbone making people crazy with social network sites like facebook,youtube,zurker,twitter.


Here is serious threat i want to discuss. All of the devices discussed above used Wireless router. Following question need to be addressed without negligence


 How many of you think your router is secure ?
 How frequent do you change the password or key ?
 Do you ever notice the usage of your internet bandwidth ?


Tools like wireshark,aircrack can easily crack your wireless network without your knowledge. 

Do you think hacking skillset require a good programming knowledge ?

No, your neighbor or any user with basic computer knowledge can easily crack the network based on the tutorials and demos available across internet


Once your network is under your neighbor / hackers control he can spoof and sniff total network.


I want to write an article how to defend and protect your network from neighbor or hackers ?


Before that i would like to know your knowledge on the wireless routers.


Please complete the below survey , I am sure it doesn't take more than 20 seconds


 http://www.surveymonkey.com/s/VVRLGJP


Thanks




Petrol rate hikes in india

Petrol has reached the eighties milestone in some places like hyderabad.. Century is very close  :(

In 2005 fuel prices were increased twice with both petrol and diesel revised at 43.49 and 30.45 in September

From 2005 to 2010 petrol prices were increased by Rs 15 and diesel roughly by Rs 9.03.

By Sep 2010 its 51.83, within 2 months , it again raised by 5.6 % making Rs 53.

From 2011 Jan to till date petrol rates were revised 8 times including the may 24th hike of 7.5 Rs made it stand at 73.18 in delhi.

Hyderabad petrol rates crossed 81 Rs making it all time record.

Petrol  has increased by more than 60 % within last 2 year ( from Rs 50 to 81)

For more information on historical price list refer http://www.mypetrolprice.com/2/Petrol-price-in-Delhi







Wednesday, May 23, 2012

Ultimate !!!!


An old nun who was living in a convent next to a construction site noticed the coarse language of the workers and decided to spend some time with them to correct their ways.

She decided she would take her lunch, sit with the workers and talk with them.

She put her sandwich in a brown bag and walked over to the spot where the men were eating. She walked up to the group and with a big smile said, "And do you men know Jesus Christ?"

They shook their heads and looked at each other very confused. One of the workers looked up into the steelworks and yelled out, "Anybody up there know Jesus Christ?"

One of the steel workers yelled down Why?

The worker yelled back, "Cos his wife's here with his lunch.

Shock Lagaaaaaaaaaaaa


Follow me @ https://www.facebook.com/TimepassUnlimited








Thursday, May 17, 2012

Who is tracking you online ?

Firefox Collusion

A addon to your firefox browser can help you in analyzing who is tracking your cyber movements.

Who will track me online am not a VIP?
         It provide the vital information to advertisers to focus on your interests and likes to provide the relevant ads and offers. No privacy ahhh ...

        Some of the hackers tries to spoof the traffic to get the vital informations like your passwords and credit card numbers.


Collusion shows the real time tracking of cooking depositing in your computer. It shows a graph and spots the circles with varying size based on the tracking behavior.

How to Install Collusion ?

After you've installed Collusion from Mozilla's Firefox add-ons gallery you have to enable it by clicking on Tools>Add-ons>Extensions and then click "Enable" next to Collusion. After that you should see a small red circle on the bottom right of your browser. Now, just start browsing the Web as you normally would. To see the tracking graph build up, click on the Collusion icon in the bottom right of your screen. This will open a separate browser tab with your Collusion graph.


Firefox Add-On Collusion Shows Who's Tracking You OnlineCollusion graph after visiting the Android Market, ESPN, IMDb, The New York Times, The Wall Street Journal and Yahoo.


Each circle represent the website you visited and each line growing out of the circle are the cookies deposited in your browser by that site.

Why still waiting , Try and review collusion now.


References : http://www.pcworld.com/article/250986/firefox_addon_collusion_shows_whos_tracking_you_online.html







Tuesday, May 15, 2012

Asterisk - Open source PBX - Linux

Today I want to present one of the leading open source PBX  whose current market share is 18% and increasing gradually which may eventually be  FUTURE TELEPHONY LEADER  like cisco today. my special greetings to DIGIUM (asterisk founder) for making it open source.

It is "Asterisk - an open source PBX", for detailed information on asterisk please refer the wiki page. Here I will be discussing only those features which I have implemented in my home PC.

PC used    : Inspiron 1501, 2 GB RAM, 160 GB HD, AMD sempron processor

OS             : Ubuntu 11

Asterisk     : Asterisk -1.8 ( Software)

softphone*  :  Twinkle on Linux     (http://www.twinklephone.com/)

                      3CX phone on my Andriod (http://www.3cx.com/VOIP/voip-phone.html)

                      Adore on Windows 7 machine(http://www.adoresoftphone.com/)

I have installed asterisk PBX server on ubuntu and the other softphones on Windows laptop and andriod phone.

NOTE: 1) All the devices are connected to LAN using wireless router. 

           2) I have not used a hardphone because it requires some hardware setup which i dont have but this is true for analog phone too.      

           3) Softphone : A softphone is a software program for making telephone calls over the Internet using a general purpose computer



In asterisk configuration, I have defined the basic dialplan like giving 2 extensions assigned usernames for them as shown below. Now my Linux machine with asterisk  is ready to take and route the calls as defined in the plan.

          Usename           Extension

          abcdef                1000

          xyz                     1002

I have logged on to my Adore softphone on windows with username - abcdef  and on 3CX softphone on Andriod Cell phone with username - xyz . When I call the extension 1000 from my andriod then I can see the phone ringing on my Windows Adore phone, Isn't it Amazing?

I do not want to explain how the asterisk communicates technically. You can google out later if you are really interested in it.

After this, now I tried to use another feature of Asterisk of calling gtalk/skype. After the successful configuration with gtalk I can now route my gtalk incoming calls to my softphone. You can also implement the same in another way. Say if the user calls on some extension say 1006 we can route that call to gtalk.... wowwwww... Its an amazing feature. Isn't it ?

Asterisk has all the features which you can see in the existing CISCO systems. I am currently preparing a white paper on this and hopefully I will update you on this in near future....

Edited and Corrected by : Vipanchi Chennamaneni

Ignore - Laugh - Fight - Win

First They Ignore you
Then They Laugh at you
Then they fight you
Then you win
                                    -- Gandhi

One of the inspiring video by Redhat


Guess the output

main()
{
char *p="hai friends",*p1;
p1=p;
while(*p!='\0')
{
++*p++;
}
printf("%s   %s",p,p1);
} 
 
What will be the output at runtime  ?

Sunday, May 13, 2012

Just for Laughs - Perceptions

A ship sank in high seas and the following people got stranded on a

beautiful deserted island in the middle of nowhere:

A. 2 Italian men and 1 Italian woman

B. 2 French men and 1 French woman

C. 2 German men and 1 German woman

D. 2 Greek men and 1 Greek woman

E. 2 Polish men and 1 Polish woman

F. 2 Mexican men and 1 Mexican woman

G. 2 American men and 1 American woman

H. 2 Indian men and 1 Indian woman

What a Crazy coincidence!

One month later, on various parts of the island, the following was

observed:

A. One Italian man killed the other Italian man for the Italian woman.

B. The two French men and the French woman are living happily together.

C. The two German men have a strict weekly schedule of when they alternate

with the German woman.

D. The two Greek men are sleeping together, and the Greek woman is cooking

& cleaning for them.

E. The two Polish men took a long look at the endless ocean and a long look

at the Polish woman, and they started swimming.

F. The two Mexican men are talking to all the other men on the island

trying to sell them the Mexican woman.

G. The two American men are contemplating suicide. The American woman is

bitching about her body being her own, the true nature of feminism, how she

can do everything that they can do, about the necessity of fulfilment, the

equaldivision of the household chores, how her last boyfriend respected her

opinion and treated her much better, and how her relationship with her

mother is improving.

H. What happened to the Indians????

scroll down......

>>

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>.

>>

The 2 Indian men are still waiting for someone to introduce them to

the Indian woman!

Saturday, May 12, 2012

Zurker Social Networking Site

New Trends in Social Networking - It started with Zurker

I would like to share the my views on Zurker Social Networking. Before that i would like to brief about facebook.com

Do we use Social Networking or They use us ??


History of Facebook

Its started on October 28, 2003 with Facemash within Harvard university where users has to rate Hot or Not observing two randomly displayed images. Zuckerberg (facebook founder) hacked Harvard's computer network to get the private ID images (pictures). Facemash has a recorded number of hits within first 4 hours.

Later in Jan 2004 Zuckerberg began writing code for a new website "Thefacebook.com". Six days of launch Cameron Winklevoss, Tyler Winklevoss and Divya Narendra, accused Zuckerberg of intentionally misleading them into believing he would help them build a social network called HarvardConnection.com.

 The Social Network is about "Accidental Billionaires" shows how facebook was started and resulting lawsuits against zuckerberg.

Facebook now about to release IPO (Initial Public Offering) from May 18th.


Zurker - Beta Project - Join here

Cameron Winklevoss and Tyler Winklevoss  - two twin brother got 650 million dollar in 2007 for singing a non disclosure agreement with facebook.

Now twin brothers are back with Zurker with a unique style but with old concept of Multilevel Marketing.

First time a Social Network which gives it shares to the users. They say Zurker is owned by their users. Every user earns with referrals.

This concept is bit old like MLM schemes (Multilevel Marketing) where a  user 'X'  purchases a product and refers two other users to get share(commission). This kind of MLM schemes are banned in india and some companies like speak asia got sued in the past.

Of course good news is Zurker ,not hard product  which doesn't require initial capital to join :) but rest protocols  stand same as MLM.

Let wish Zurker all the best !!!!!!!!!




Here is a referral link : http://www.zurker.in/i-141397-phbskktscz

Please share your thoughts with comments - Thanks


Local Newspaper Ran a competition asking for a rhyme with the most
Romantic First Line... but the Least Romantic Second Line.
Here are some of the entries they received.

I thought that I could love no other
Until, that is, I met your brother..

Roses are red, violets are blue, sugar is sweet, and so are you.
But the roses are wilting, the violets are dead, the sugar bowl's empty and so is your head.

 Of loving beauty you float with grace
 If only you could hide your face

 Kind, intelligent, loving and hot;
 This describes everything you are not

 I want to feel your sweet embrace
 But don't take that paper bag off of your face

 I love your smile, your face, and your eyes -
 Damn, I'm good at telling lies!

 My darling, my lover, my beautiful wife:
 Marrying you screwed up my life

 I see your face when I am dreaming.
 That's why I always wake up screaming

 My love, you take my breath away.
 What have you stepped in to smell this way

 My feelings for you no words can tell,
 Except for maybe "go to hell"

 What inspired this amorous rhyme?
 Two parts vodka, one part lime

Read More of this kind gags from my page
 https://www.facebook.com/TimepassUnlimited

Multiply two numbers without using operators

Write a program to multiply two numbers without using + , - or * operators ?



Multiplication is nothing but repeated addition, so as long as you could figure out a way to add two numbers, then repeating them will also provide you product of two numbers.

Since, Python is the best language, I am giving the solution in Python only.

import sys
def recurse(a,b):
  x = a^b
  y = a&b
  if y:
     return recurse(x,y<<1)
  else:
     return x

if __name__ == '__main__':
   a = int(raw_input("Enter value of 'a' --> "))
   b = int(raw_input("Enter value of 'b' --> "))

   product=0
   for i in range(0,b):
       product=recurse(product,a)
   print repr(a) + " x " + repr(b) + " = " + repr(product)

PS: Python rocks!!! and this is the way, it is done internally, that is by using bitwise operations.
----

For more info please contact me at rakeshkumar.techie@gmail.com



Happy Programming -- Happy Hacking

Friday, May 11, 2012

 

Year 2038 BUG similar to Y2K problem

 
Over view of Y2K Problem

Just to brief about Y2K BUG the year 2000 and 1900 would be same. This happened as the machines does not store the Century digits of dates like

        year 1998 was stored as 98 ,
        year 1999 was stored as 99 ,
        year 2000 was stored as 00 ,

Reason "Limited space for data on the cards led to wide-spread use of two-digit year fields"


Year 2038 BUG

Y2038 also similar to the Y2K in terms of date and time. Most of modern system we use system time as a signed 32 bit signed integer.

Range of 32 bit signed is  value is (-)2147483648 to (+)2147483647  

As the value of time reaches 2147483647  then it resets to (-)2147483648 and there after incrementing each second ( with negative value ) as shown in below figure(attached).

On "Tue Jan 19 03:14:07 2038"  the value of time will be (+)2147483647 and any increments further will result it to (-)2147483648 which is  Fri Dec 13 20:45:52 1901.
We can also call it Friday 13 BUG :)


Some of the modern systems use 64 bit singed integer and it  has a range upto 20 times greater than the age of universe( theoretical ).

Most of the todays Embedded systems fall into this category.

COBOL systems from the 1970s, 1980s and 1990s that have not been replaced by 2038-compliant systems -- Not sure about the authenticity


References
http://computer.howstuffworks.com/question75.htm
http://2038bug.com
http://en.wikipedia.org/wiki/Year_2038_problem