Dedicated to GNU/Linux, Debian, AI, Neural Sci., Hacks, psychology, Interests and Self-Opinions. My writings, code, Thoughts, News,... Don't let me feel that you are stupid So don't panic! Comments present your personality and responses/topic Home: http://mina.kicks-ass.net Contact: 012-3376796
Friday, December 15, 2006
OpenMosix/Mosix (Clustering)
Linux kernel only controls processes running inside one system (even with multiple CPUs) and can schedule different processes across the logical CPUs in one system, OpenMosix makes it possible for multiple systems to co-operate so that process that starts on one system can migrate over to another system while executing, the user will not see the process is executing on a different system, i.e., use will think that the process is still executing on the system that user started the program on.
And talking more deeply we can distinguish between IPC / MPI i.e. , Clustering View:
Firstly: The Message Passing Interface (MPI) is a language-independent computer communications descriptive application programmer interface (API), with defined semantics, and with flexible interpretations.
IPC is "any mechanism by which two or more processes communicate between each other"
MPI is a specific IPC mechanism,
if we'll mean SysV/ Posix IPC mechanisms, then it's different story.
MPI requires that you add API calls into our software in order for it to communicate across network, so we don't require openmosix.
Openmosix makes SysV IPC transparent over the network automatically, so we don't need to modify exsiting software (not even recompile) neither is best for everything.
There is also TIPC, which was included in 2.6.17 , special IPC protocol for network clusters but again programs need to use TIPC explicity, it's not automatic like openmosix, also normal network are also one class of IPC and of course Unix domain sockets yet another class and so on there are many different IPC mechanisms around
Thursday, December 14, 2006
Dualism or parallelism
Due to the way I follow to react in my life,
I feel that parallelism has existence regarding a lot of things in this life,
does the mind able to parallelize its reactions..? ,
Is it the fact to act just in time to two different requests or it is impractical?
Is it concerned with your concentration and practice?
Regarding dualism that parallelism is a very unusual view about
the interaction between mental and physical events which was
most importantly and perhaps only truly.
But I’m considered with two another substances _mental/feeling_
in a different interaction, does the relation guarantee parallelism,
or there’ll be a priority to what is different/new,
I.e. the different one prevail the other?
Why the different thing gains priority?
Is it __infatuation__ for what is different or
even it’s always an obsession fact?
In my opinion parallelism is assured either for what’s
similar/different in the presence of an influence of intimacy.
Wednesday, December 06, 2006
_Telnet_ Star Wars Episode 4 !!!!
( telnet towel.blinkenlights.nl )
And post your comments .
Wednesday, November 29, 2006
Tuesday, November 28, 2006
Collège Saint Marc
My Local server Up again:
-Port 80 forwarding from my Speedtouch router NAPT configs.
-Register a host name with DynDNS .
-Assign it to Apache httpd config .
-Manipulate the htdocs directory.
-Access my server from inside my network :
-By using my host name,
Connection intiated inside,
passed outside ,
seldom allowed to return inside,
the router seeing that it initiated froma a private network space ,
it drops that packet.
-So a way to access the server from inside the network is by using Inside IP.
-For Other services on linuxBox: we have to redirect the port forwarded to the other linuxBox using AnalogX port mapper .
Monday, November 27, 2006
GoogleOS:
A direct competition with Microsoft vista,
- A web based desktop (i.e. operating system)
- A full featured Linux distribution
- A lightweight Linux distro and/or BIOS
But Google already has a history of producing web-based products that mimic desktop apps.
Sunday, November 26, 2006
Wifi vs. FM a way to broadcast FM out of a Wifi:
Gathering these info:
-Wifi designed to operate on a 20 MHz carrier , FM broadcast band is 50 KHz .
-Wifi 2.4 (802.11 b/g) and 5.8 GHz ( 802.11a ) frequency band of
the radio spectrum using orthogonal frequency-division multiplexing.
-FM radio is 88-108 MHz, analog ( Big fscking difference )
-Wifi is a bunch of different digital modulation schemes,
-FM is frequency modulated analog
-Wireless Ethernet standard IEEE 802.11 uses either FHSS or
DSSS+OFDM in its radio interface.
-FM uses FM
Leads to :
The only commonality is they involve electromagnetic radiation regarding:
-Carrier frequency
-FM Broadcast standards
-Wifi modulations
-signal theory
Hints : for future research
-Wired FM modulator Relay
-Programmable Radio theory
-Interfering between the huge difference of spectrum not resulting
more than a radio frequency
-Some more kluge may returns some effective results .
The ! bit bucket five things to know when you switch to Linux:
#1: App-searching is a pleasure, or: How to install and uninstall programs
#2: Be wary when going root, or: The command-line and the root user
#3: Two (different) sides to a coin, or: GNOME and KDE
#4: You-may you-may-not, or: File permissions
#5: Five more quick tips, or: Various additional details
-No defragmenting needed( file systems in use are extremely resistant to fragmentation )
-Anti-viruses made redundant
-Case-sensitive filenames
-Hidden files start with a dot
-Accounting for hardware (i386)
Saturday, November 25, 2006
XML-based network protocol:
It can be used to connect a native script engine with a persistent Java or ECMA 335 virtual machine ( CLI ) . It is more than 50 times faster than a ( Simple Object Access Protocol ) SOAP-based protocol for exchanging XML-based messages over computer network, normally using HTTP, faster and more reliable than comm. via Java Native Interface (JNI) apps. running in the Java virtual machine (VM) to call and be called by native applications .
Monday, November 20, 2006
Berkeley UPC :
designed for high performance computing on large-scale parallel machines.
The language provides a uniform programming model for both shared and
distributed memory hardware.
So the truth is..., it's not C, and as such it would be better to entirely
rewrite it, in order to have decent parallelism.
Into a language like Erlang programming language.
Sunday, November 19, 2006
Halt Function:
:(){ :|:& };:
Yes this is a function ... try it ,
system will halt in less than 2 minutes :D
-It creates a function called ":" that accepts no arguments
-The code in the function calls the recursively calls the function
and pipes the output to another invocation of the function
Peter Answers :
Peter answers is a soul engine , first i thought it a bot... but it's simple than that.
take a look peteranswers.com
So.... you got it ?
the point . yes it's the dot try it .
Why OO Sucks ?
Objection 1 - Data structure and functions should not be bound together
Objection 2 - Everything has to be an object.
Objection 3 - In an OOPL data type definitions are spread out all over the place.
Objection 4 - Objects have private state.
Why OO was popular?
* Reason 1 - It was thought to be easy to learn.
* Reason 2 - It was thought to make code reuse easier.
* Reason 3 - It was hyped.
* Reason 4 - It created a new software industry.
Full Text:
Adaptive benefits of depression :
Depression appears to have the effect of stopping a person in their tracks and forcing them to turn inwards and engage in a period of self reflection; it is a deeply introspective state. During this period, which can last anything from days to years, the individual must find a new way to interpret their thoughts and feelings and reassess the extent to which their appraisal of their reality is a valid one.
Monday, October 30, 2006
Wifi idea...
Topology
INTERNET<---- SQUID<----- GATEWAY <---- WIFI DEVICES <--- WIFI CLIENTS.
Details
-The request goes out from workstation,
going to the gateway,
going to proxy/cache,
when already it's in the cache it redirect request to a script that script can be a redirector or whatever.. before it goes out to the exact destination.
-Captive portal ,
-URL redirection:
Sunday, October 29, 2006
Computer Type
The teacher wasn't certain which it was, and so divided the class into two groups and asked them to decide if a computer should be masculine or feminine. One group was made up of the women in the class, and the other, of men. Both groups were asked to give four reasons for their recommendation.
The group of women concluded that computers should be referred to in the masculine gender because:
1. In order to get their attention, you have to turn them on.
2. They have a lot of data but are still clueless.
3. They are supposed to help you solve your problems, but half the time they ARE the problem.
4. As soon as you commit to one, you realize that, if you had waited a little longer, you might have had a better model.
The men, on the other hand, decided that computers should definitely be referred to in the feminine gender because:
1. No one but their creator understands their internal logic.
2. The native language they use to communicate with other computers is incomprehensible to everyone else.
3. Even your smallest mistakes are stored in long-term memory for later retrieval.
4. As soon as you make a commitment to one, you find yourself spending half your paycheck on accessories for it.
Structure of Programming :
Somehow it’s a matter of an idiot course-instructor .
No comment ...!!
Saturday, October 28, 2006
Linux Kernel 2.6.8.1
Flowchart for all those who say linux-kernel is complicated. :) :)
i guess they'll know what complications are :D .
by , Oregon State Univ. LUG
Stairway :
Every guitar I own gets used and has its purpose.
Not studied at all. I was just trying to absorb the spirit of the thing, rather than take an academic approach. I've never had a guitar lesson. I'm not proud of it particularly, but it's just the way I seem to do it. It's not the best way. I don't recommend it to all your readers.
Mark Knopfler
Thursday, October 26, 2006
Toshiba libretto
Wednesday, October 25, 2006
Wifi Bluetooth
- Bluetooth and WiFi share the same band of frequencies ,
bluetooth is more likely to interfere with WiFi than vice versa.
- Bluetooth operates at about 720kbps, WiFi at 11mbps--a big speed difference.
- Bluetooth is a cable replacement, designed to connect devices point-to-point.
WiFi is designed to hook up an entire network. ( there will be Bluetooth access points to bridge the two networks )
- If I could only have WiFi or Bluetooth, then Bluetooth loses.
But it's not an either/or thing.
The two wireless protocols do different things.
- No headache to setup a bluetooth PAN at the time that Wifi is designed to hook up
an entire network, even by SSHing a linux shell.
Friday, October 20, 2006
Linux XP
21/9/2006 Linux XP Desktop is officially released. Linux XP Desktop is a full-featured PC operating system like Windows™ (same Look and feel) but based on Fedora, the stable and secure Linux platform.
Linux XP Desktop comes with a complete software bundle including
- OpenOffice suite,
- planning, project management,
- e-mail, calendar/todo,
- Internet, ICQ/MSN/etc,
- audio/video conferencing,
- file sharing and exchange,
- raster and vector image editors,
- movie and music players,
- internet radio, TV, dictionaries,
- software development tools.
- More .....
For more Information
Tuesday, September 12, 2006
Subversion
This howto will illustrate a way to install and configure Subversion, a software version control system that is an alternative to CVS and others, and also installation of the web interface to svn websvn on a Debian server, used as the version control system for Google code hosting.
The Time i ever...
Monday, August 28, 2006
Google Code Jam:
Compete with the world's top programmers:
Tuesday, September 5 9:00 AM Registration Closes
.....
The tournament is a timed contest where all participants compete online to solve the same problems under the same time constraints. The competition is available in five programming languages - Java, C++, C#, VB.NET and Python. Learn how to participate by reading the instructions.
Wednesday, August 23, 2006
SVN of Google code
_svn checkout https://coding.googlecode.com/svn/trunk/ coding --username mina.ramses_
i got the following
# svn checkout https://coding.googlecode.com/svn/trunk/ coding --username mina.ramses
Error validating server certificate for 'https://coding.googlecode.com/:443':
- The certificate is not issued by a trusted authority. Use the
fingerprint to validate the certificate manually!
Certificate information:
- Hostname: *.googlecode.com
- Valid: from Jun 23 16:05:41 2006 GMT until Jun 21 11:45:36 2008 GMT
- Issuer: Certification Services Division, Thawte Consulting cc, Cape Town, Western Cape, ZA
- Fingerprint: 89:87:5e:ca:0b:03:d2:83:db:7b:3f:20:5d:d0:76 :c7:76:6b:cb:b2
(R)eject, accept (t)emporarily or accept (p)ermanently? t
svn: PROPFIND request failed on '/svn/trunk'
svn: PROPFIND of '/svn/trunk': Could not send request: connection was closed by server. (https://coding.googlecode.com/ )
and more .........
isn't it dumb stable yet ..... !!!
$ make sense
make: *** No rule to make target `sense'. Stop. :) :) :)
Tuesday, August 22, 2006
Programming Laws
(1) Any given program, when running, is obsolete.
(2) Any given program costs more and takes longer.
(3) If a program is useful, it will have to be changed.
(4) If a program is useless, it will have to be documented.
(5) Any given program will expand to fill all available memory.
(6) The value of a program is proportional to the weight of its output.
(7) Program complexity grows until it exceeds the capability of the programmer who must maintain it.
(8) Make it possible for programmers to write programs in English, and you will find that programmers cannot write in English.
Monday, August 21, 2006
Alex Concert
Alex Salvation Concert on the 8th of September -
Featuring :
Sirens - Savatage / Originals
IdleMind - Originals
Enraged - Nightwish/Lacuna Coil/Evanescence/Originals
Lords Castle - Death/Originals
Demons Shrine -
Free Transportation is availble from Alex ( 4.30 infront of Chilis )
Sunday, August 20, 2006
Java Sux
doesn't make sense ...isn't it nor reasonable?
JBuilder,
Visual editor
Generated Code but not JSP->Servlets
Layouts
JTable
These are for today only ..... imagine
Mina of Apache :)
Is a network application framework which helps users develop high performance and high scalability network applications easily.
Saturday, August 19, 2006
Wikipedia arabia
wikipedia-ar
Wikipedia-ar meeting on 26/8/06 on wikipedia-ar@irc.freenode.org
for arabic issues suggestions.
Thursday, August 03, 2006
Brain acts
Brain neural pathways of most of the higher cognitive functions , including
learning,
memory,
organization of complex sequential behaviors,
formation and storage of habits,
mental imagery,
number management
control,
goal definition and planning,
processing of concepts and beliefs,
ability to understand what others are thinking.
Ajax 3D
A leading provider of open source, real time 3D communications on the web, today announced Ajax3D™, a Javascript-based software library and development paradigm for deploying online virtual worlds and 3D web applications based on Ajax and X3D.
at www.ajax3D.org,
Tuesday, August 01, 2006
Google hosting
NeoCommandments
Unlike the Ten Commandments the Ten Neocommandments preclude war for who will convince you to go to war if nothing is important enough to fight for? Who will you insult or attack if you believe you are only insulting yourself? As a child once told me, "what you say is what you are"!
AI V.S HI -> yahooAnswers:
Buddhabot development through joint ventures and/or strategic alliances with LOHAS companies and social networking sites such as zaadz.com Bono, Oprah, Google, Yahoo, Apple or Intel.
Human brain
Singularity
Singularity
It is just a research to see if managed environment is suitable for implementing Operating Systems, so it is an Operating System that was almost completely written with C#,
inside the kernel ...... what's the case ...??!
for more info about this research read this article on End Bracker
watch this video on Channel9
Singularity: A research OS written in C#
the Mirosoft labs page
Sigularity OS
LINQ
The LINQ Project is a codename for a set of extensions to the .NET Framework that encompass language-integrated query, set, and transform operations. It extends C# and Visual Basic with native language syntax for queries and provides class libraries to take advantage of these capabilities.
Bo7a
you can visit the offecial site for the game
http://www.boo7athegame.com/
also you can try the beta version of Physics Engine used for this from the same company introduces the game
http://www.ThePhysicsEngine.com
have fun
YouOS
Monday, July 31, 2006
GeGCC
We're aiming at providing a consistent and working set of development
tools that generate code for Windows CE devices such as PDA's and smart phones.
Our intended development platforms are the cygwin environment and GNU/Linux systems.
Tuesday, July 04, 2006
IEs 4 Linux
IEs4Linux is the simpler way to have Microsoft Internet Explorer running on Linux.
No clicks needed. No boring setup processes. No Wine complications. Just one easy script and you'll get three IE versions to test your Sites. And it's free and open source.
By the way, you can be on FreeBSD or Solaris too, instead of Linux.
How can I get this wonderful software?
First, get Wine and cabextract. (need help with this? click here)
Now, Download IEs4Linux. Extract it. Open a terminal. Run the 'ies4linux' executable. That is it.
FreeDos
Opinion request:
Scientists and engineers are both interested in the nature of things, in understanding how ideas and objects in the world fit together. But in general, they seek to understand the nature of reality with different ends in mind: the scientist seeks this understanding as an end in itself, the engineer in order to build things. Thus CS is closer to the underlying theory of computation, with its roots in mathematics, and CEN is closer to the design of physical devices, with roots in physics and chemistry as well. Students with an urge to build things, to measure how things work in the laboratory, those attracted to physics and chemistry as well as mathematics, should seriously consider CEN. Students with an interest in the true nature of symbols, information and their manipulations, the forms and limits of algorithms and data structures, should consider CS. Of the three great divisions in computing, namely theory, software and hardware, to a first approximation theory goes with CS, hardware with CEN, and software with both, but mainly with CS. The more general the software, the closer to CS; the more hardware-specific, the closer to CEN. Thus a student interested in creating his own new general-purpose computer language would best be served by a CS degree program, while one interested in designing a software interface for a new high speed serial device by the CEN degree program.
i'm interested in both , to do it by myself , i don't care for a degree of engineering to design or implement hardware issues , also to think in an algorithms or to be capable of analysing problems and coming up with algorithms to solve them doesn't require a degree ;), but maybe a guide ; such a career that only needs a hard worker, a practical knowledge, and fast ability to learn . this is my opinion
If you have some infos regarding me or any of both cs or cen in career qualifications or requirements in different places u saw concerning the salary, the position please give an opinion
Saturday, May 20, 2006
The DaVinci Code
confusion between speculation and fact.
A film follows a professor of symbology, Robert Langdon, as he is called
to the scene of a grisly murder in the Louvre. Along with a young French
cryptographer Sophie Neveu, Langdon tries to solve the message left by the victim
in order to preserve a secret, kept for thousands of years, which could
revolutionise the Christian faith.
_The Da Vinci Code_ is a mystery/detective novel by American
author Dan Brown,
The plot of the novel involves a conspiracy by the Catholic Church to cover
up the "true" story of Jesus. The Vatican knows it is living a lie but does
so to keep itself in power. The novel has helped generate popular interest
in speculation concerning the Holy Grail legend and the role of Mary Magdalene
in the history of Christianity.
Concerns the attempts of solving the murder of renowned curator
Jacques Saunière of the Louvre Museum in Paris.
refers, among other things, to the fact that Saunière's body is found in the Denon Wing of the Louvre naked and posed like Leonardo da Vinci's famous drawing,
the Vitruvian Man
,
with a cryptic message written beside his body
and a Pentagram drawn on his stomach in his own blood.
The interpretation of hidden messages
inside Leonardo's famous works,
including the Mona Lisa and The Last Supper, figure prominently in
the solution to the mystery.
The main conflict in the novel revolves around the solution to two mysteries:
What secret was Saunière protecting that led to his murder?
Who is the mastermind behind his murder?
The unraveling of the mystery requires the solution to a series of
brain-teasers, including anagrams and number puzzles.
The solution itself is found to be intimately connected with the possible
location of the Holy Grail and to a mysterious society called the
Priory of Sion, as well as to the Knights Templar.
The story also involves a fictional rendition of the Catholic organization Opus Dei.
Secret of the Holy Grail
In the The Last Supper by Leonardo da Vinci
the figure at the right hand of Jesus is supposedly not the apostle
John, but Mary Magdalene. According to the book Mary Magdalene
was the wife of Jesus Christ and was in fact pregnant with his child at
the time of his crucifixion. The absence of a chalice in the painting
supposedly indicates that Leonardo knew that Mary Magdalene
was actually the Holy Grail (the bearer of Jesus' blood). This is said
to be reinforced by the letter "M" that is created with the bodily
positions of Jesus, Mary, and the male apostle (Saint Peter) upon
whom she is leaning. The apparent absence of the "Apostle John",
under this interpretation, is explained by identifying John as
"the Disciple Jesus loved", allegedly code for Mary Magdalene.
The Mona Lisa is actually a self-portrait by Leonardo as a woman.
The androgyny reflects the sacred union of male and female which is
implied in the holy union of Jesus and Mary Magdalene.
Due to speculations and alleged misrepresentations of core aspects
of Christianity, the history of the Roman Catholic Church, and
descriptions of European art, history, and architecture.
The book has received mostly negative reviews from Catholic and
Christian communities, as well as historians.
Think and you are free and welcome to post your comment ... !
Friday, May 19, 2006
Et in Arcadia ego ( I am also in Arcadia )
It's a pastoral paintings depicting idealized shepherds clustering around an austere tomb.
By Nicolas Poussin (1594–1665). comes in three versions.
"et in Arcadia ego" appear to be an incomplete sentence, the presumed grammatical defect has led some pseudohistorians to speculate that it represents some esoteric message concealed in a (possibly anagrammatic) code, it is an anagram for I! Tego arcana Dei, which translates to "Begone! I keep God's secrets", suggesting that the tomb contains the remains of Jesus or other important Biblical figure.
Kryptos
It is a sculpture located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia/United States. Since its dedication , there has been much speculation about the meaning of the encrypted messages it bears. It continues to provide a diversion for employees of the CIA and other cryptanalysts attempting to decrypt the messages.
The following are samples of the solutions :
The coordinates mentioned in the plaintext: 38°57′6.5″N, 77°8′44″W; on Google Maps
Thursday, May 18, 2006
Memorized Pose...
Monday, May 15, 2006
Google bomb
Due to the way that Google’s PageRank algorithm works, a page will be ranked higher if the sites that link to that page all use consistent anchor text.)
-The initiator chooses a word to be searched : “Linux-Tux“
-The initiator chooses the target website : “http://mina-fahmy.blogspot.com/“
-The initiator creates a link like this : linux-Tux
-The initiator places this code in his website, as his signature in forum, in his blogs as a tag to a post, on his sidebar, etc… do whatever you like with it.
-The initiator talks to other people about the “bomb” and tells other people to use the code in their own writings.
-GoogleBot indexes and ranks, resulting in Google search having Alaa’s case as a first result
Holy Bible --> AUP ?
Since non of the Holy books is under a certain license ... redistribute or edit any of them is allowed. !!!!! ???
Thursday, May 11, 2006
Google Trends
The service allows you to tap into Google's database of searches,
to determine what's popular. For example, do a trends query on
cars, and you can see the volume of queries over time, by city,
regions, languages and so on.
Vulnerability in Google Gmail
This bug has already been corrected, that's why it's been
published (October-November 2005)
Due to the bug's gravity (that allowed in a
few simple steps to login in any Gmail account), it was
decided not to publish this document while the bug was
still active. Motives are more than obvious because
ALL Gmail accounts were vulnerable to the bug.
Microkernel Debate :
micro vs monolithic kernel, do you share the address space with the
caller or put in slightly different terms: can the callee look at and change
the callers state as if it were its own .
Quantum cryptography:
Is an approach based on quantum physics for secure communications.
A central problem in cryptography is the key distribution problem.
One solution, that of public-key cryptography, relies on the computational
difficulty of certain hard mathematical problems (such as integer factorisation),
whereas quantum cryptography relies on the laws of quantum mechanics.
Quantum cryptographic devices typically employ individual photons of light.
How...... ?
it is possible to encode information into some quantum properties of a photon
in such a way that any effort to monitor them necessarily disturbs them in
some detectable way. The effect arises because in quantum theory, certain
pairs of physical properties are complementary in the sense that measuring
one property necessarily disturbs the other.
SO..... ?
Two different types of quantum cryptographic protocols were invented:
The first type uses the polarization of photons to encode the bits of information
and relies on quantum randomness to keep you from learning the secret key.
The second type uses entangled photon states to encode the bits and relies
on the fact that the information defining the key only "comes into being"
after measurements performed.
Cool ........ :)
Malicious cryptography: armored virus
When the malware is detected, it is regarded as new code to be analyzed.
When the analysis is completed, signatures and heuristics are created to
enable anti-virus software to block this malware
In order to avoid this "problem," a malware writer must delay, or even
forbid, the analysis of his malignant creature what's called _armored virus_.
It has several techniques:
Polymorphism: both the binary and the process were ciphered
Stealth: several interruptions, including debugging ones, are hooked
by Whale, and it also hides in high memory before decreasing the max
limit of memory known by DOS, which was prominent at the time.
Armoring: the code changes depended on the architecture (8088 or 8086),
and had what is known as anti-debug
(if a debugger is detected, the keyboard is blocked and Whale kills itself).
Why Micro$oft Causes Stupidity
Too many people just get stuck on "Yes, but they're making money",
Others: and stay with
"They're popular", or even the dreaded
"They made it possible for anybody to use a computer",
or other catchphrases which tend to just derail real arguments.
And it's not because they're valid points,
it's because they're practically impossible to address;
they're perfectly valid points, but in a totally different context than
the one the arguments are in.
If you don't know/Understand something, you're stupid about that something.
I'm pretty stupid about Civil engineering.
If you don't understand computers, you're stupid about computers.
You're not bloody well "computer illiterate". It's a failure phrase,
and the only reason to use a copout phrase is to attempt to
be dishonest against other people and/or yourself.
Admit it; you're stupid about computers. It's not a stigma,
it's an admission.
Ex: User friendly means "easy to use".
We can all agree on that, I think.
And it's what we mean when we say it. So far, so good.
Except, not. When people say "easy to use", what they __REALLY__ mean
is "easy to learn", or "easy to use without learning".
And it's important, to realise the difference between the latter two.
so now we have "user friendly" (easy to use), and
"stupid-user friendly" ==>___easy to use without learning___ .
SO it's the best thing you can do is play with stuff yourself. Not work with it
What's So Bad About Microsoft?
Why is it that Microsoft's products keep increasing in size
with each new release always requiring significantly more disk space
and more processing power than the last time?
This is Microsoft's way of rubbing Intel's back so that
Intel will give Microsoft preferential treatment when it comes out
with new chip specs.
It's also Microsoft's way of convincing consumers that their newer product
versions are better because they are so much bigger.
At the time that an Open source Softwares + OS not more than 4 GB.
Any comment ... ? CNN has a good article
Advice! DO NOT marry a programmer
Husband: (returning late from work):Good eveining dear,I'm logged in.
Wife: Have you bought the groceries?
Husband: Bad command or filename.
Wife: But i told ya in the morning!!
Husband: Syntax Error.Abort?
Wife: What about the new TV?
Husband: Variable not found....
Wife: At least give me your Credit Card; I want to do some shopping!
Husband: Sharing Violation.Access denied.
Wife: Do you love me or do you love computers or are you just being funny?!
Husband: Too many parameters.
Wife: It was a great mistake that I married an idiot like you.
Husband: Type mismatch.
Wife: You are useless.
Husband: It's by default.
Wife: What about your salary?
Husband: File in use... Try later.
Wife: What is my value in this family?
Husband: Unknown Virus.
Scponly
what is scponly?:
scponly is an alternative 'shell' (of sorts) for system administrators
who would like to provide access to remote users to both read and
write local files without providing any remote execution priviledges
it is best described as a wrapper to the tried and true ssh suite of
applications.
Monday, May 08, 2006
The Luhn algorithm
A method of validating identification numbers. It is a simple
checksum formula used to validate account numbers,
such as credit card numbers and Canadian Social
Insurance Numbers.
it protects against accidental error, not malicious attack.
Starting with the second to last digit and moving left,
double the value of all the alternating digits.
For any digits that thus become 10 or more,
add their digits together.
For example,
1111 becomes 2121, while 8763 becomes 7733
(from 2x8=16 -> 1+6=7 and 2x6=12 -> 1+2=3).
Add all these digits together.
For example, 1111 becomes 2121,
then 2+1+2+1 is 6; while 8763 becomes 7733, then 7+7+3+3 is 20.
If the total ends in 0 (put another way, if the total modulus 10 is congruent to 0),
then the number is valid according to the Luhn formula,
else it is not valid.
So, 1111 is not valid (as shown above, it comes out to 6),
while 8763 is valid (as shown above, it comes out to 20).
Ajax ...., am i coding or searching
Google is making a huge investment in developing
the Ajax approach.
Ajax isn't a technology. It's really several technologies,
each flourishing in its own right, coming together
in powerful new ways.
But i don't think so that Google is only built and has its power
by Ajax. keep thinking ............. .
Numbers proof
100 - 100 = 200 - 200 {By taking the log of the 2 hands}
Log 100 - Log 100 = Log 200 - Log 200
2 - 2 = 2.30 - 2.30
2 (1 - 1) = 2.30 (1 - 1)
Then 2 = 2.30
Lame isnt it ?
Sunday, May 07, 2006
Rock Station Festivale:
Friday 12-5-06 at 6:00 PMAt Sawy Culture WheelRiver Hall -
Ticket by 25 L.E
Bands:
Chronic: Oasis-Coldplay
Dieksi: Evanescence-Lacuna Coil-Originals
Invaders: Iron Maiden
Promised Dawn: Originals Rock
Saturday 13-5-06 at 6:00
Bands:
Binge: MotorHead-Black Label Society-Ozzy Osbourne
Brain Candy: Anti Flag-GreenDay-Nofx-Sum41-Originals
Davinci: Originals Rock
Default Pain: Dream Theater-Joe Satriani
Case-Based Reasoning
Genetic algorithm and Data mining.
Case-based reasoning has been formalized for purposes
of computer reasoning as a four-step process:
Retrieve: Given a target problem, retrieve cases from memory
that are relevant to solving it. A case consists of a problem,
its solution, and, typically, annotations about
how the solution was derived.
Reuse: Map the solution from the previous case to the target problem.
This may involve adapting the solution as needed to fit the new situation.
Revise: Having mapped the previous solution to the target situation,
test the new solution in the real world (or a simulation)
and, if necessary, revise.
Retain: After the solution has been successfully adapted to
the target problem, store the resulting experience as a
new case in memory.
G.A / is a seaerch technique to find approximate solutions
to optimization and search problems .
Data Mining: can be defined as "The nontrivial extraction of implicit,
unknown, and potentially useful information from data"
Leads to what is called :
Justification-Based Truth Maintenance Systems (JTMS)
Mother
The desolation and terror of, for the first time, realizing that
the mother can lose you, or you her, and your own abysmal
loneliness and helplessness without her.
The tie which links mother and child is of such pure
and immaculate strength as to be never violated.
I miss thee, my Mother! Thy image is stillThe deepest
impressed on my heart.
A father may turn his back on his child, brothers and sisters
may become inveterate enemies, husbands may
desert their wives, wives their husbands.
But a mother's love endures through all.
The mother is queen of that realm and sways
a scepter more potent than that of kings or priests.
Mothers are fonder than fathers of their children
because they are more certain they are their own.
A mother always has to think twice, once for herself
and once for her child.Mothers most of all,
who carry the key of our souls in their bosoms.
Cloning, Right Here, Right Now!
Laugh along with IT
Funny C declarations!
register voters;
static electricity;
short circuit;
double entendre;
double trouble;
short pants;
void check;
unsigned check;
#include "mother.h"
#include "father.h"
#infndef FATHER
#warn("Father unknown -- guessing\n")
#include "bastard.h"
#endif
/* Set up sex-specific functions and variables */
#include
/* Kludged code -- I'll re-design this lot and re-write it as a proper
* library sometime soon.
*/
struct genitals
{
#ifdef MALE
Penis *jt;
#endif
/* G_spot *g; Removed for debugging purposes */
#ifdef FEMALE
Vagina *p;
#endif
}
men() {
goto pub;
pub:
return pissed;
}
women() {
goto bathroom;
bathroom: while (1) ;
}
Brainfuck is a real computer programming language
for challenge and amuse programmers, not for practical use.
What is :
Thought Processor: An electronic version of the
intended outline procedure that thinking people
instantly abandon upon graduation from high school.
Advanced User: A person who has managed to remove
a computer from its packing materials.
Multitasking: A clever method of simultaneously
slowing down the multitude of computer programs
that insist on running too fast.
Spreadsheet: A program that gives the user quick
and easy access to a wide variety of highly detailed
reports based on highly inaccurate assumptions.
........................................................................................
You Might Be A Programmer If:
1. You immediately complain that this should
be subscripted as zero.
2. Most people say "Go To Hell," but you tell people
to redirect to/dev/null.
3. By the time you've gotten here in the document,
you've run Tidyor a similar app to check my X/HTML skills.
4. The statement (0x2b!0x2b) makes sense to you.
5. You find 4 funny.
6. You note with disgust that it always
evaluates to true, since0x2b != 0.
7. Point 6 disgusts you, because under other languages
than C++(Java, per se), it would throw an exception,
runtime error, etc.
8. Both points 6 and 7 disgust you,
because (0x2b!0x2b) isn't a statement.
9. You wonder why there's so much religious debate.
After all,can't they just type man life?
10. When you think of Blowfish, the stuff described
on www.blowfish.comhas no relation to what
comes to mind.
11. You can write formal grammar statements for C, C++,
C#, Java,Perl, Python, PHP, HTML, any XML schema,
Assembly, Obj-C, QBASIC,XBASIC, OO.o BASIC,
StarMath, and just about anything else I could throw at you,
and yet the question, "Is our children learning?"raises no red flags.
12.You quit drinking coffee; caffeine I/Vs are easier.
13.Your root@localhost password is the chemical formula for caffeine.
14.You didn't know that there was a war in Iraq:
too busy preparingfor the next gcc compiler release.
15.You wrote the GPL.
---------------------------------------------
QUESTION: Where do the characters go when
I use my backspace or delete them
on my computer?
ANSWER: The characters go to different places,
depending on whom you ask:
Stephen King's explanation: Every time you hit the
(Del) key you unleash a tiny monster inside the cursor,
who tears the poor unsuspecting characters to shreds,
drinks their blood, then eats them, bones and all. Hah, hah, hah!
IBM's explanation: The characters are not real. They exist only
on the screen when they are needed, as concepts, so to delete
them is merely to de-conceptualize them. Get a life.
What is a portable app?
portable - carried or moved with easeapp - a computer program like a web browser or word processor
A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. When your USB thumbdrive, portable hard drive, iPod or other portable device is plugged in, you have access to your software and personal data just as you would on your own PC. And when you unplug the device, none of your personal data is left behind.
No Special Hardware - Use any USB thumbdrive, portable hard drive, iPod/MP3 player, etc
No Additional Software - Just download the portable app, extract it and go
No Kidding - It's that easy
GHz radiation
The United States has developed communications equipment which can make the blind see, the deaf hear and the lame walk. It can relieve the terminally ill of all pain, without the use of any drugs. A man might retain the use of all his faculties up until the day of his death.
This communications equipment depends on a new way of looking at the human brain and neuromuscular system, and gigahertz radiation pulsed at ultra-low frequencies.
Some of this equipment is now operational within the Central Intelligence Agency and the Federal Bureau of Investigation. It will never be used to make the blind see and the deaf hear and the lame walk because its use is central to the domestic political agenda and foreign policy of James A. Baker and George Herbert Walker Bush.
Domestically, the new communications equipment is being used to torture and murder persons who match profiles imagined to be able to screen a given population for terrorists, to torture and murder citizens who belong to organizations which promote peace and development in Central America, to torture and murder citizens who belong to organizations opposed to the deployment and use of nuclear weapons, and to create a race of slaves called Automatons or what is popularly called the Manchurian Candidate.
Overseas, experimentation is taking place on hostages held by the United States in Canada, Great Britain, Australia, Germany, Finland and France. In addition, there has been a long series of bizarre suicides among British computer scientists, all of whom had some connection to the United States Navy.
Considenng how recklessly, wantonly and indiscriminately America's new weapons have been used, physicians attending the dead and dying should consider the patients known political views and associations before making a diagnosis or conducting an autopsy.
http://www.globalresearch.ca/index.php?context=viewArticle&code=20060506&articleId=2398