Saturday, May 20, 2006

The DaVinci Code

The Da Vinci Code and what about this Leonardo Da Vinci
confusion between speculation and fact.

A film follows a professor of symbology, Robert Langdon, as he is called
to the scene of a grisly murder in the Louvre. Along with a young French
cryptographer Sophie Neveu, Langdon tries to solve the message left by the victim
in order to preserve a secret, kept for thousands of years, which could
revolutionise the Christian faith.

_The Da Vinci Code_ is a mystery/detective novel by American
author Dan Brown,
The plot of the novel involves a conspiracy by the Catholic Church to cover
up the "true" story of Jesus. The Vatican knows it is living a lie but does
so to keep itself in power. The novel has helped generate popular interest
in speculation concerning the Holy Grail legend and the role of Mary Magdalene
in the history of Christianity.

Concerns the attempts of solving the murder of renowned curator
Jacques Saunière of the Louvre Museum in Paris.

refers, among other things, to the fact that Saunière's body is found in the Denon Wing of the Louvre naked and posed like Leonardo da Vinci's famous drawing,
the Vitruvian Man


with a cryptic message written beside his body
and a Pentagram drawn on his stomach in his own blood.

The interpretation of hidden messages
inside Leonardo's famous works,
including the Mona Lisa and The Last Supper, figure prominently in
the solution to the mystery.

The main conflict in the novel revolves around the solution to two mysteries:
What secret was Saunière protecting that led to his murder?
Who is the mastermind behind his murder?

The unraveling of the mystery requires the solution to a series of
brain-teasers, including anagrams and number puzzles.
The solution itself is found to be intimately connected with the possible
location of the Holy Grail and to a mysterious society called the
Priory of Sion, as well as to the Knights Templar.
The story also involves a fictional rendition of the Catholic organization Opus Dei.

Secret of the Holy Grail

In the The Last Supper by Leonardo da Vinci

the figure at the right hand of Jesus is supposedly not the apostle
John, but Mary Magdalene. According to the book Mary Magdalene
was the wife of Jesus Christ and was in fact pregnant with his child at
the time of his crucifixion. The absence of a chalice in the painting
supposedly indicates that Leonardo knew that Mary Magdalene
was actually the Holy Grail (the bearer of Jesus' blood). This is said
to be reinforced by the letter "M" that is created with the bodily
positions of Jesus, Mary, and the male apostle (Saint Peter) upon
whom she is leaning. The apparent absence of the "Apostle John",
under this interpretation, is explained by identifying John as
"the Disciple Jesus loved", allegedly code for Mary Magdalene.
The Mona Lisa is actually a self-portrait by Leonardo as a woman.
The androgyny reflects the sacred union of male and female which is
implied in the holy union of Jesus and Mary Magdalene.

Due to speculations and alleged misrepresentations of core aspects
of Christianity, the history of the Roman Catholic Church, and
descriptions of European art, history, and architecture.
The book has received mostly negative reviews from Catholic and
Christian communities, as well as historians.

Think and you are free and welcome to post your comment ... !

Friday, May 19, 2006

Et in Arcadia ego ( I am also in Arcadia )

It's a pastoral paintings depicting idealized shepherds clustering around an austere tomb.
By Nicolas Poussin (1594–1665). comes in three versions.

"et in Arcadia ego" appear to be an incomplete sentence, the presumed grammatical defect has led some pseudohistorians to speculate that it represents some esoteric message concealed in a (possibly anagrammatic) code, it is an anagram for I! Tego arcana Dei, which translates to "Begone! I keep God's secrets", suggesting that the tomb contains the remains of Jesus or other important Biblical figure.


It is a sculpture located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia/United States. Since its dedication , there has been much speculation about the meaning of the encrypted messages it bears. It continues to provide a diversion for employees of the CIA and other cryptanalysts attempting to decrypt the messages.

The following are samples of the solutions :

The coordinates mentioned in the plaintext: 38°57′6.5″N, 77°8′44″W; on Google Maps

Thursday, May 18, 2006

Debian Women:

Alex, Margarita, Helen, Pilar, Erinn, Magni , Hanna and Miriam
sent By Erinn Clark


Tanglewood Warrior II Bass Solid ash

I miss my warrior-II ,
my fingers miss its heavy strings.

Memorized Pose...

Thanks for the _this inspirational art_ ...
Appreciate it. it's of my work ;)
Keep it up, please!

Monday, May 15, 2006

Google bomb

Due to the way that Google’s PageRank algorithm works, a page will be ranked higher if the sites that link to that page all use consistent anchor text.)

-The initiator chooses a word to be searched : “Linux-Tux“

-The initiator chooses the target website : ““

-The initiator creates a link like this : linux-Tux
Linux-tux result will be: Linux-Tux

-The initiator places this code in his website, as his signature in forum, in his blogs as a tag to a post, on his sidebar, etc… do whatever you like with it.

-The initiator talks to other people about the “bomb” and tells other people to use the code in their own writings.

-GoogleBot indexes and ranks, resulting in Google search having Alaa’s case as a first result

Holy Bible --> AUP ?

Holy Bible (AUP) Acceptable Use Policies

Since non of the Holy books is under a certain license ... redistribute or edit any of them is allowed. !!!!! ???

Thursday, May 11, 2006

Google Trends

Google Trends service, announced today ,
The service allows you to tap into Google's database of searches,
to determine what's popular. For example, do a trends query on
cars, and you can see the volume of queries over time, by city,
regions, languages and so on.

Vulnerability in Google Gmail

This bug has already been corrected, that's why it's been
published (October-November 2005)
Due to the bug's gravity (that allowed in a
few simple steps to login in any Gmail account), it was
decided not to publish this document while the bug was
still active. Motives are more than obvious because
ALL Gmail accounts were vulnerable to the bug.

Microkernel Debate :

micro vs monolithic kernel, do you share the address space with the
caller or put in slightly different terms: can the callee look at and change
the callers state as if it were its own .

Quantum cryptography:

Is an approach based on quantum physics for secure communications.

A central problem in cryptography is the key distribution problem.
One solution, that of public-key cryptography, relies on the computational
difficulty of certain hard mathematical problems (such as integer factorisation),
whereas quantum cryptography relies on the laws of quantum mechanics.
Quantum cryptographic devices typically employ individual photons of light.

How...... ?

it is possible to encode information into some quantum properties of a photon
in such a way that any effort to monitor them necessarily disturbs them in
some detectable way. The effect arises because in quantum theory, certain
pairs of physical properties are complementary in the sense that measuring
one property necessarily disturbs the other.

SO..... ?

Two different types of quantum cryptographic protocols were invented:

The first type uses the polarization of photons to encode the bits of information
and relies on quantum randomness to keep you from learning the secret key.

The second type uses entangled photon states to encode the bits and relies
on the fact that the information defining the key only "comes into being"
after measurements performed.

Cool ........ :)

Malicious cryptography: armored virus

When the malware is detected, it is regarded as new code to be analyzed.
When the analysis is completed, signatures and heuristics are created to
enable anti-virus software to block this malware

In order to avoid this "problem," a malware writer must delay, or even
forbid, the analysis of his malignant creature what's called _armored virus_.

It has several techniques:

both the binary and the process were ciphered

several interruptions, including debugging ones, are hooked
by Whale, and it also hides in high memory before decreasing the max
limit of memory known by DOS, which was prominent at the time.

the code changes depended on the architecture (8088 or 8086),
and had what is known as anti-debug
(if a debugger is detected, the keyboard is blocked and Whale kills itself).

Why Micro$oft Causes Stupidity

Too many people just get stuck on "Yes, but they're making money",
Others: and stay with
"They're popular", or even the dreaded
"They made it possible for anybody to use a computer",
or other catchphrases which tend to just derail real arguments.
And it's not because they're valid points,
it's because they're practically impossible to address;
they're perfectly valid points, but in a totally different context than
the one the arguments are in.

If you don't know/Understand something, you're stupid about that something.
I'm pretty stupid about Civil engineering.
If you don't understand computers, you're stupid about computers.
You're not bloody well "computer illiterate". It's a failure phrase,
and the only reason to use a copout phrase is to attempt to
be dishonest against other people and/or yourself.
Admit it; you're stupid about computers. It's not a stigma,
it's an admission.

Ex: User friendly means "easy to use".
We can all agree on that, I think.
And it's what we mean when we say it. So far, so good.

Except, not. When people say "easy to use", what they __REALLY__ mean
is "easy to learn", or "easy to use without learning".

And it's important, to realise the difference between the latter two.
so now we have "user friendly" (easy to use), and
"stupid-user friendly" ==>___easy to use without learning___ .

SO it's the best thing you can do is play with stuff yourself. Not work with it

What's So Bad About Microsoft?

Why is it that Microsoft's products keep increasing in size
with each new release always requiring significantly more disk space
and more processing power than the last time?

This is Microsoft's way of rubbing Intel's back so that
Intel will give Microsoft preferential treatment when it comes out
with new chip specs.

It's also Microsoft's way of convincing consumers that their newer product
versions are better because they are so much bigger.

At the time that an Open source Softwares + OS not more than 4 GB.
Any comment ... ? CNN has a good article

Advice! DO NOT marry a programmer

Husband: (returning late from work):Good eveining dear,I'm logged in.
Wife: Have you bought the groceries?
Husband: Bad command or filename.
Wife: But i told ya in the morning!!
Husband: Syntax Error.Abort?
Wife: What about the new TV?
Husband: Variable not found....
Wife: At least give me your Credit Card; I want to do some shopping!
Husband: Sharing Violation.Access denied.
Wife: Do you love me or do you love computers or are you just being funny?!
Husband: Too many parameters.
Wife: It was a great mistake that I married an idiot like you.
Husband: Type mismatch.
Wife: You are useless.
Husband: It's by default.
Wife: What about your salary?
Husband: File in use... Try later.
Wife: What is my value in this family?
Husband: Unknown Virus.


what is scponly?:

scponly is an alternative 'shell' (of sorts) for system administrators
who would like to provide access to remote users to both read and
write local files without providing any remote execution priviledges
it is best described as a wrapper to the tried and true ssh suite of

Monday, May 08, 2006

The Luhn algorithm

A method of validating identification numbers. It is a simple
checksum formula used to validate account numbers,
such as credit card numbers and Canadian Social
Insurance Numbers.

it protects against accidental error, not malicious attack.

Starting with the second to last digit and moving left,
double the value of all the alternating digits.
For any digits that thus become 10 or more,
add their digits together.

For example,
1111 becomes 2121, while 8763 becomes 7733
(from 2x8=16 -> 1+6=7 and 2x6=12 -> 1+2=3).
Add all these digits together.
For example, 1111 becomes 2121,
then 2+1+2+1 is 6; while 8763 becomes 7733, then 7+7+3+3 is 20.

If the total ends in 0 (put another way, if the total modulus 10 is congruent to 0),
then the number is valid according to the Luhn formula,
else it is not valid.

So, 1111 is not valid (as shown above, it comes out to 6),
while 8763 is valid (as shown above, it comes out to 20).

Ajax ...., am i coding or searching

Google is making a huge investment in developing
the Ajax approach.
Ajax isn't a technology. It's really several technologies,
each flourishing in its own right, coming together
in powerful new ways.

But i don't think so that Google is only built and has its power
by Ajax. keep thinking ............. .

Numbers proof

2= 2.30

100 - 100 = 200 - 200 {By taking the log of the 2 hands}
Log 100 - Log 100 = Log 200 - Log 200
2 - 2 = 2.30 - 2.30
2 (1 - 1) = 2.30 (1 - 1)
Then 2 = 2.30
Lame isnt it ?

Sunday, May 07, 2006

Rock Station Festivale:

Friday 12-5-06 at 6:00 PMAt Sawy Culture WheelRiver Hall -
Ticket by 25 L.E
Chronic: Oasis-Coldplay
Dieksi: Evanescence-Lacuna Coil-Originals
Invaders: Iron Maiden
Promised Dawn: Originals Rock

Saturday 13-5-06 at 6:00
Binge: MotorHead-Black Label Society-Ozzy Osbourne
Brain Candy: Anti Flag-GreenDay-Nofx-Sum41-Originals
Davinci: Originals Rock
Default Pain: Dream Theater-Joe Satriani

Case-Based Reasoning

Case-Based Reasoning relation to
Genetic algorithm and Data mining.

Case-based reasoning has been formalized for purposes
of computer reasoning as a four-step process:

Retrieve: Given a target problem, retrieve cases from memory
that are relevant to solving it. A case consists of a problem,
its solution, and, typically, annotations about
how the solution was derived.

Reuse: Map the solution from the previous case to the target problem.
This may involve adapting the solution as needed to fit the new situation.

Revise: Having mapped the previous solution to the target situation,
test the new solution in the real world (or a simulation)
and, if necessary, revise.

Retain: After the solution has been successfully adapted to
the target problem, store the resulting experience as a
new case in memory.

G.A / is a seaerch technique to find approximate solutions
to optimization and search problems .

Data Mining: can be defined as "The nontrivial extraction of implicit,
unknown, and potentially useful information from data"

Leads to what is called :
Justification-Based Truth Maintenance Systems (JTMS)


The desolation and terror of, for the first time, realizing that
the mother can lose you, or you her, and your own abysmal
loneliness and helplessness without her.

The tie which links mother and child is of such pure
and immaculate strength as to be never violated.
I miss thee, my Mother! Thy image is stillThe deepest
impressed on my heart.

A father may turn his back on his child, brothers and sisters
may become inveterate enemies, husbands may
desert their wives, wives their husbands.

But a mother's love endures through all.
The mother is queen of that realm and sways
a scepter more potent than that of kings or priests.

Mothers are fonder than fathers of their children
because they are more certain they are their own.

A mother always has to think twice, once for herself
and once for her child.Mothers most of all,
who carry the key of our souls in their bosoms.

Cloning, Right Here, Right Now!

whipped up spare copies of myself.

If you are asking what's a Clone:
Clone: An exact duplicate: Implies a legal reimplementation from documentation or by reverse-engineering.

Laugh along with IT

Funny C declarations!
register voters;
static electricity;
short circuit;
double entendre;
double trouble;
short pants;
void check;
unsigned check;

#include "mother.h"
#include "father.h"
#infndef FATHER
#warn("Father unknown -- guessing\n")
#include "bastard.h"
/* Set up sex-specific functions and variables */
/* Kludged code -- I'll re-design this lot and re-write it as a proper
* library sometime soon.
struct genitals
#ifdef MALE
Penis *jt;
/* G_spot *g; Removed for debugging purposes */
#ifdef FEMALE
Vagina *p;

men() {
goto pub;
return pissed;

women() {
goto bathroom;
bathroom: while (1) ;

Brainfuck is a real computer programming language
for challenge and amuse programmers, not for practical use.

What is :
Thought Processor: An electronic version of the
intended outline procedure that thinking people
instantly abandon upon graduation from high school.

Advanced User: A person who has managed to remove
a computer from its packing materials.

Multitasking: A clever method of simultaneously
slowing down the multitude of computer programs
that insist on running too fast.

Spreadsheet: A program that gives the user quick
and easy access to a wide variety of highly detailed
reports based on highly inaccurate assumptions.

You Might Be A Programmer If:
1. You immediately complain that this should
be subscripted as zero.

2. Most people say "Go To Hell," but you tell people
to redirect to/dev/null.

3. By the time you've gotten here in the document,
you've run Tidyor a similar app to check my X/HTML skills.

4. The statement (0x2b!0x2b) makes sense to you.

5. You find 4 funny.

6. You note with disgust that it always
evaluates to true, since0x2b != 0.

7. Point 6 disgusts you, because under other languages
than C++(Java, per se), it would throw an exception,
runtime error, etc.

8. Both points 6 and 7 disgust you,
because (0x2b!0x2b) isn't a statement.

9. You wonder why there's so much religious debate.
After all,can't they just type man life?

10. When you think of Blowfish, the stuff described
on www.blowfish.comhas no relation to what
comes to mind.

11. You can write formal grammar statements for C, C++,
C#, Java,Perl, Python, PHP, HTML, any XML schema,
StarMath, and just about anything else I could throw at you,
and yet the question, "Is our children learning?"raises no red flags.

12.You quit drinking coffee; caffeine I/Vs are easier.

13.Your root@localhost password is the chemical formula for caffeine.

14.You didn't know that there was a war in Iraq:
too busy preparingfor the next gcc compiler release.

15.You wrote the GPL.


QUESTION: Where do the characters go when
I use my backspace or delete them
on my computer?

ANSWER: The characters go to different places,
depending on whom you ask:
Stephen King's explanation: Every time you hit the
(Del) key you unleash a tiny monster inside the cursor,
who tears the poor unsuspecting characters to shreds,
drinks their blood, then eats them, bones and all. Hah, hah, hah!

IBM's explanation: The characters are not real. They exist only
on the screen when they are needed, as concepts, so to delete
them is merely to de-conceptualize them. Get a life.

What is a portable app?

portable - carried or moved with easeapp - a computer program like a web browser or word processor

A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. When your USB thumbdrive, portable hard drive, iPod or other portable device is plugged in, you have access to your software and personal data just as you would on your own PC. And when you unplug the device, none of your personal data is left behind.

No Special Hardware - Use any USB thumbdrive, portable hard drive, iPod/MP3 player, etc
No Additional Software - Just download the portable app, extract it and go
No Kidding - It's that easy

GHz radiation

Effects of GHz radiation on the human nervous system: Recent developments in the technology of political control

The United States has developed communications equipment which can make the blind see, the deaf hear and the lame walk. It can relieve the terminally ill of all pain, without the use of any drugs. A man might retain the use of all his faculties up until the day of his death.

This communications equipment depends on a new way of looking at the human brain and neuromuscular system, and gigahertz radiation pulsed at ultra-low frequencies.
Some of this equipment is now operational within the Central Intelligence Agency and the Federal Bureau of Investigation. It will never be used to make the blind see and the deaf hear and the lame walk because its use is central to the domestic political agenda and foreign policy of James A. Baker and George Herbert Walker Bush.

Domestically, the new communications equipment is being used to torture and murder persons who match profiles imagined to be able to screen a given population for terrorists, to torture and murder citizens who belong to organizations which promote peace and development in Central America, to torture and murder citizens who belong to organizations opposed to the deployment and use of nuclear weapons, and to create a race of slaves called Automatons or what is popularly called the Manchurian Candidate.

Overseas, experimentation is taking place on hostages held by the United States in Canada, Great Britain, Australia, Germany, Finland and France. In addition, there has been a long series of bizarre suicides among British computer scientists, all of whom had some connection to the United States Navy.

Considenng how recklessly, wantonly and indiscriminately America's new weapons have been used, physicians attending the dead and dying should consider the patients known political views and associations before making a diagnosis or conducting an autopsy.