Saturday, January 21, 2012

Funny Source Code Comments


1
2
3
4
5
6
7
8
/**
* For the brave souls who get this far: You are the chosen ones,
* the valiant knights of programming who toil away, without rest,
* fixing our most awful code. To you, true saviors, kings of men,
* I say this: never gonna give you up, never gonna let you down,
* never gonna run around and desert you. Never gonna make you cry,
* never gonna say goodbye. Never gonna tell a lie and hurt you.
*/



1
2
3
4
5
6
7
8
9
10
// 
// Dear maintainer:
// 
// Once you are done trying to 'optimize' this routine,
// and have realized what a terrible mistake that was,
// please increment the following counter as a warning
// to the next guy:
// 
// total_hours_wasted_here = 16
//
1
// TODO: Fix this. Fix what?
1
2
3
// no comments for you
// it was hard to write
// so it should be hard to read
// I will give you two of my seventy-two virgins if you can fix this.

1
options.BatchSize = 300; //Madness? THIS IS SPARTA!
1
2
// I am not responsible of this code.
// They made me write it, against my will.
1
2
//Dear future me. Please forgive me.
//I can't even begin to express how sorry I am.
1
double penetration; // ouch
1
# To understand recursion, see the bottom of this file.
At the bottom file:
1
# To understand recursion, see the top of this file.
1
//I am not sure why this works but it fixes the problem.
1
2
//somedev1 - 6/7/02 Adding temporary tracking of Logic screen
//somedev2 - 5/22/07 Temporary my ass
1
2
3
4
5
6
7
/*
 * You may think you know what the following code does.
 * But you dont. Trust me
 * Fiddle with me, and youll spend many a sleppless
 * night cursing the moment you thought you be clever 
 * enough to "optimize" the code below.
 * Now close this file and go play with something else.
1
// drunk, fix later
1
// Magic. Do not touch.

1
2
Exception up = new Exception("Something is really wrong.");
throw up; //ha ha
1
2
//When I wrote this, only God and I understood that I was doing
//Now, God only knows
// if i ever see this again i'm going to start bringing guns to work
/*
 * OK; before you read the following code know what I am trying to do.
 * I needed to get the list of child catagories from the root node so that
 * the root node didn't appear in the selection box. But for some stupid
 * fucking reason the stupid fucking DBA wont let me access the items using
 * indices and I instead have to use their stupid fucking Iterator
 * implementation. So there.
 */
$firstList = $this->getRootNode()->getChildren();
foreach ($firstList as $node)
{
    $nodes = $node->getChildren();
    break;                // wtf?
}

Wednesday, January 18, 2012

Protest SOPA & PIPA ACT - protect the Internet

Why you should read this is because you should know what are you protesting and why?


Probably the largest online protest in history of Internet, many websites are blacked out today.

The reason is to protest the proposed U.S. legislation that threatens internet freedom: the Stop Internet Piracy Act (SOPA) and the Protect IP Act (PIPA). A quick update on this, some of the regular websites changed their skin to protest..

Wikipedia 




Wordpress


TechCrunch


I am no lawyer, i am a programmer, and if any programmer in my team would have written code like this rotten bill, i would fire him on spot. Honestly i haven't read the whole bill but some part of it which is scary ...For those who want to read it, here is the full text of the bill, as of Jan 15, 2012

Read on ...
The PROTECT IP Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011), better known as PIPA was introduced into the Senate by Sen. Patrick Leahy (D-VT). The act’s goals were described by its sponsors as protecting intellectual property and punishing foreign sites who post copyrighted material. If a site was discovered doing so, the U.S. attorney general could order U.S. based Internet service providers, search engines, payment systems and advertising networks to suspend doing business with the website.
Pathetic..!!


Do you understand what above act will do ... It give the AG(Attorney General) of America power, because of which...

  • Internet service providers will be required to block your access to the site (section 102(c)(2)(A)(i)) within five days.
  • Search engines (Google, Yahoo, Bing, etc.) will be forced to remove all references to the offending sites from their indexes (section 102(c)(2)(B)).
  • Ad providers (Google AdSense, Federated Media, etc.) will be required to stop providing ad service to the site.
  • Payment providers (PayPal, Visa, etc.) will be required to terminate service to the site.
I hope u read SOPA and PIPA and understand it, and know why it is bad. I know it is bit difficult to read it and understand, but if you care of Internet and Freedom of it, you should also join and protest this act.

इन्कलाब झिंदाबाद !!!

Thursday, January 12, 2012

Lenovo unveils first Android television set

The world's first television based on Google's Android Ice Cream Sandwich operating system has been announced by Lenovo. The TV set, however will initially only be for sale in China. Available in 42" and 50" versions, the device is unusual because it is not using Google's TV software, which is based on an earlier version of Android, codi-named Honeycomb!!

google-android-tv-mobiles


The K91 Smart TV will join a host of other 'smart TV's that are set to be announced at the Counsumer Electronics Show(CES)' in Las Vegas. Those made by LG are already confirmed as using Google TV, and they are expected to be joined by models from Sony and Samsung.

GigaOm reports that the Lenovo set will use a Qualcomm Snapdragon processor running at 1. GHz, as well as offering 1GB of Ram , SD card storage and a 5mp webcam. The remote control will feature a touchscreen and an integrated microphone for voice control.

A key theme  of CES is set to be TV that increasingly blur the line between computers and televisions, while their remote controls increasingly resemble smartphones. Apple is also reported to be working  on a TV of its own. Lenovo additionally announced the IdeaTab S2, a tablet with a keyboard dock that is similar to the award wining Asus Transformer Prime, as well as laptops that include the company's first bid to take on the 'ultrabook' market of new thin and light computer. The U310 and U410 will initially sell in america for just $699, but are slightly heavier than their more expensive rivals.

The prices marked manufactures attempts to differentiate their products in this new category of devices primarily through price. Forrester analyst Sarah Rotman Epps had previously observed that at $1000 ultra books would  be too expensive for mainstream consumers.

Saturday, January 7, 2012

kalekushal.blogspot.com is now 1!... A belated ha-p new year to all readers :P

It's time to celebrate... my blog is now a year old ... i started blogging from December 2010.
Initially started this blog to share my knowledge and experience with you all...
I know its late to wish a ha-p new year... but better late than never... tough to manage time form busy schedule and blog..



2011 was tough year... i post graduated, and like every other's do.. finding a job was very tedious... though i started in December 2010 i wouldn't write much since i could hardly find time. Now a year down the line blogging is what i think every time. Let's see where it takes me.

Not much to say now, I wish you all readers a happy prosperous new year and may all your wishes come true... Thanks again, and lets get back to work :P

Malware threatens Android phones - Part ||


In Malware threatens Android phones - Part | post we read how malware threats are increasing on Android platform. here in second part of Malware threats to Android phones" we will see some more applications which are more dangerous.

We read in earlier post how Android phones are now drawing crooks attention. It is easier to launch malware on Android. In most cases, the phones are being compromised by installation of certain applications that exploit the vulnerabilities Many of my friends who use iPhone said "Apple's  iPhone too has an app store but the applications that are available on the store are put through a stringent evaluation and it is a closed Eco-
system". In the case of Android , the eco- system is open and there are multiple app stores. That is precisely why the incidence of malware is high on Android phones.  "A map application with malware is more dangerous. It provides the exact location of the phone-user and it is great threat to the phone-user as a
person". Similarly, there are malware in the guise of application that track other forms of data, including mobile banking and the contact list.
android-malware-malicious-2.2-tablet-market-apps-phones

A key difference between the early days of cybercrime targetting PC's and the current drift towards mobile platform is that cybercriminals are starting from scratch, There are circles within circles.For instance."SMS Privato Spy" is marketed as a app that allow buyers(read scammers) to spy on a smartphone user by doing such things as viewing the phone screen live, viewing call logs, performing GPS tracking and activating the phone's microphone to listen in on conversations. The only problem - besides such an app being an obvious invasion of privacy  - is that SMS Privato Spy doesnt exist! Those behind the scam go to great  lengths to convince potential buyers that it does exist. But all that the buyers get for their money is a lighter wallet.But there are malware that do exist. Even when bad apps are discovered, it does not solve the problem. 

Such malware is hard to uninstall. Instead of infecting  devices at one go, the attackers parcel their 'workload'-their malicious code. This is similar to a smuggler who evades detection by bringing in small amounts of the consignments over a period  of time, rather than sneaking in the entire lot in one attempt.
Smaller pieces are easier to hide. This strategy obviates a long permission list which can trigger suspicion and give their game away. 

A new version of malware called Android.Lightdd attempted this. The first payload performs reconnaissance
and intelligence-gathering(model, language, country ,IMEI, IMSI, IS version), followed by the downloading of additional payload.


Related Articles:



Wednesday, January 4, 2012

Malware threatens Android phones - Part |

Crooks' arsenal ranges from mobile games to a simple map

Smartphone security firms have reason to worry. Malware threats to Android phones, which have positioned themselves in the smartphone category, are growing. This time, mobile crooks are targeting certain features that are popular on PC's but are found to be vulnerable on Android phones. For eg: unlike other smart phones with proprietary app store, Android phones keep their app stores 'open', exposing themselves to attacks by malware writers.
android-malware-google-sdk-download-what-is-malware-android-market-widgets-droid-apps-for-android

The Android phones offer a variety of applications that allow users to operate the  phone for requirements that are beyond voice. Typically, smartphone makers offer applications through their app stores. Wresting control of the app stores, however can allow malware writers to pick vulnerabilities in Android phones.

Following are some of the Android specific mobile threats:
AndroidOS.Tapsnake
A user who downloads this application assumes that it is the Android version of the popular "Snake" game.
However what happens is that the threat switches on the phone's GPS and relays information about the user's coordinates to the cyber criminal.

Andorid.Pjapps
Android.Pjapps is an example of a Trojan with backdoor capabilities that targets Android devices. As seen with previous Android threats, it spreads through compromised versions o legitimate applications. One of the applications carrying Android.Pjapps code is Steamy Window similar to other  compromised Android applications, it is difficult to differentiate the legitimate version form the malicious one once it is installed. During installation, however it is possible to identify the malicious version by the excessive permissions it requests.When run, both the legitimate and malicious versions of the application mimics  a steam effect on your Android devices screen. It even lets you wipe it off with your finger. The  aim of Android.Pjapps is to build a botnet controlled by a number of different Command and Control(C&C) servers.

Android.Rootcager
Android Packages(.apk) include the file "rageagainstthecage", which is a tool commonly used to root the phone. In legitimate circumstances, this file can be used by the owner of the phone to acquire administrative rights on his or her phone this case, rooting the pone can allow malware we call Android.Rootcager to form more than the usual activities not commonly allowed on droid phones. Android.Rootcager roots phone without user consent by performing activities such as taking screen shots, monitoring installed applications and downloading additional packages of code.


Related Articles:



Monday, January 2, 2012

Join Us - Calling all Guest Author's and Writers


kKB(short for kalekushal.blogspot.com :P)  invites Guest Authors and Writers who are willing to write for this blog. If you want to get latest updates on Blogging, SEO, Mobiles, Databases, Programming, Linux, Facebook, Gadget etc topics, we are covering here at  kalekushal.blogspot.com .

Why should you write for  kalekushal.blogspot.com ?

kKB is become a popular tech blog where we write on Blogging, SEO, Mobiles, Databases, Programming, Linux, Facebook, WordPress, Twitter, Social Bookmarking, Google, Gadgets, Affiliate Marketing and Make Money Online. At the time we have 2100+ Monthly Traffic and  Page Views and still growing. This is a positive thing for us and also this shows the fast growth of blog in such small time.You will surely get lots of exposure when you write for us. This includes Traffic + Respect + Good Readers.


Writer's Guidlines...

  • Author's Bio : Author bio can contain upto 2 Links. We don’t accept author bio with links to illegal sites.
  • Credit : We respect individual work and if your idea is derivative of some one else work, feel free to give credit.
  • Self promotion : Your bio will be displayed at the end of the post, so don’t add any promotional text in the post.
  • Comment's : Comments are the conversation and when your article is published. Try to answer any query related to your article via comments.This will give you more exposure and also help people.
  • Use formatting : Use bold to highlight the most important parts of your paragraphs, but only use it on a few words in a paragraph.and bullet ed lists are a great way to list a set of points or resources so use them whenever you can. Make sure there are no spelling mistakes and grammatical errors and after that submit it for review.
        * (PS: The above guidelines,conditions are subject to change without prior notice :P)




Note : 

kalekushal.blogspot.com  is a community for bloggers, but if any one is found violating any of the above Writer’s Guidelines, he/she will be banned instantly without any notice. So, please make sure you offer only quality content. If you are agree with all above the Writer’s Guidelines points then don’t wait. Contact us..


Related Posts Plugin for WordPress, Blogger...follow kalekushal.blogspot.com