Is your child a hacker?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operating system, invented by a Soviet computer hacker called Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called “xenix”, which was written by Microsoft for the US government.
These programs are used by hackers to penetrate other people’s computer systems to steal credit card numbers. They could also be used to penetrate other people’s music channels and steal their music using the “mp3” program. Torovoltos is a prominent hacker, responsible for writing many hacker programs, such as “telnet”, which is used by hackers to connect to Internet machines without using the telephone …
Your child could try installing “lunix” on his hard drive. If you are careful, you may not be aware of their presence, however lunix is ​​a whimsical beast, and if handled improperly, your child could damage your computer, and even break it completely if you delete Windows, in which case you will need your computer is repaired by a professional.

If you see the word “LILO” during Windows startup (just after turning on the machine), your child has installed lunix. To be able to eliminate it you will have to send your computer back to the manufacturer, so that he can install a new hard drive. Lunix is ​​an extremely dangerous software and can not be erased without destroying part of the surface of your hard drive.

PD: I just copy what was already said in Kriptopolis: I just ask that no absent-minded journalist find it and take it seriously, please.

Download videos from Google, YouTube, …

Vdonwloader, a program that works to perfection and allows you to download videos from google videos, youtube, Dailymotion, etc. in AVI or MPG formats just by entering the url of the video 😉 a pity that at the moment does not support metacafe (at less since the program does not give the option).

Party in the Atahualpa, chronicle of a night

When I change my blog to wordpress, I leave all my old stories behind, but seeing that there are many who asked me for the chronicle of the atahualpa, I picked it up and put it back here 😉

Anyway, the old one still has it here, I do not know why …

For those who do not know what is going on, it is a chronicle about the parties of my faculty (Computing at the Pontifical University of Salamanca) that were organized in a nightclub called Atahualpa

And that people do not take bad concept of the night Salamanca, that removing exceptions, we have very good atmosphere 🙂

Chronicle:

The words most heard during yesterday were: buahh pedal go I’m going to catch tonight, drunk, my mother free bar in the atahualpa for 9 euros ..

23:21: Arrived at the atahualpa
23:43: We managed to get closer to the bar
23:59: I get to ask
24:05: The waitress processes my order
24:06: The waitress tells me that that can not serve me (was not it all free bar?)
24:08: The waitress made the first ice
24:09: The waitress made the second ice
24:10: The waitress has misplaced the second ice, throws it out and made another
24:11: The waitress finds the bottle and serves me
24:12: I wet my lips at last
24:13: I ask for another drink
24:14: The waitress ignores me
24:34: The waitress keeps ignoring me
24:42: Insult to the waitress, I think that does not help me anymore
24:43: They just opened another bar I’m running
24:44: In the new bar they do not have ice, I have to wait
24:50: The ice arrives (in a mop bucket, to last about 10-15 minutes)
01:01: I manage to take my second cup
01:02: I’m going to ask for my third cup
01:03: There are no ice
01:10: I go to the service to cry
01:15: I pick up 3 glasses and go to the bar
01:30: I ask for 3 glasses
01:41: They serve me the 3 glasses
01:45: I dig in with my 3 glasses between a table and the speaker, grrrrrrr that nobody comes near!
01:48: The last drink .. it was the good one .. good bottle .. I’m noticing it ..
01:50: Rufus arrives, the savior, he knows the waitresses, it turns out that the blonde apart from being slow and believed is Romanian, as she calls immigration …
01:52: Rufus provides us with drinks because, as they know him, they serve him before others.
02:20: we left the atahualpa never to return
Basically that was the night, for the future organizers of social events, take good care of this bar because they have not kept their word, 6 waiters promised and at the beginning there were only 4, on the edges of balls, they also said that all the drinks came and they did not It was like this.

I do not know if they would make a lot of money but what I do know is that many people left dissatisfied and there is nothing worse than that.

New “attacks”

I read genbeta that new malware has appeared on the Internet.

Trend Micro tells us about two new types of attacks related to the new features that most browsers incorporate.

The first of them is Tabjacking, which uses tabbed browsing to use some of them to show advertising, making it also persistent, that is, it stays between sessions when opening and closing the browser.

The other type of attack is Searchbox Stealing, which consists of adding search engines to the search box of the browser and using them by default, so that false results are shown when searching from it.

For now it does not seem that these attacks are very extended, but better to be attentive to them, because it would not be surprising that we would soon find them running through the network.

Zaragoza City Council migrates to linux

The city of Zaragoza will save a million euros a year by migrating all its windows systems to Linux.

The migration process will be completed by the end of 2008.
The complete news you can read in baquia.

Problems with library software

As we can read in the country, a good one has been assembled with the new software implemented in Madrid’s libraries:

After more than three years of preparation and eight months in operation, the computer program that manages the cataloging of the books of the municipal libraries of the capital still does not work. The Estela, which replaced the Syrtex in June 2006 and was designed by Software AG, has left a trail of thousands of books accumulated in the central warehouse. “Now it starts to work, but it keeps hanging all the time. It’s a continuous nuisance, “says an employee at a library who does not want to reveal his identity.

Advanced Linux Programming

Linux Programming “you can find a link to all the chapters of the book here.

The truth is that it has come to me of pearls to throw an eye to him to some chapters of programming of processes, since this year in the subject of Design of Operative Systems we used much programming on linux, and the truth that documentation on specific aspects in Internet. It is not that I have found much.

Available in PDF format (Open Publication License) and source code (GPL) and at the moment there is no translation into Spanish :-p but everything is understood wonderfully.

Now I will continue with the practice of OS that must be delivered on Monday and at this step .. I choke all, todita, all xD

A former employee sued IBM for addiction to the Network

James Pacenza was fired from IBM for spending many hours visiting adult sites, and now he has sued the company, asking him to compensate him with 5 million dollars.

Pacenza alleges that he suffers Internet addiction, so he could not stop visiting adult chats during his work hours. In his opinion, what he needed was to receive a treatment, not to be thrown out.

According to his lawyer, the former worker of the Blue Giant never visited pornographic sites during the working day, so he did not violate any company regulations.

However, sources of the company said that its policy against surfing the Internet on websites for adults is very clear, and that Pacenza was notified four months before his behavior before firing him definitively, something that the plaintiff denies.

Pacenza also claims that other workers have received much less severe treatment and that IBM should compensate him for not helping him overcome his addiction to the Network.

Your Windows programs on Linux

One of the things that people go to linux misses, are some programs that have been using for years and have no counterpart in the free operating system.

Some time ago I read of some possibilities to be able to use these programs from a Linux distribution and the one I liked the most was wine (known free implementation of the Windows API for GNU / Linux.), But when trying to test it with some programs, its result It was not the expected one.

Today I found out that a new version of Wine has come out, the 0.9.31, which can be downloaded from the ibiblio.org mirror. The main novelties in this new version are:

  • Some errors in Direct3D have been fixed and some performance improvements have been made.
  • New test cases for comctl32.
  • More fixes in OLE32.
  • Improvements in the IDL compiler.
  • Numerous bugs fixed.

You can read the whole, from the official Wine website.

Things I did not know about php

Interesting list of things that you probably did not know about php (I did not even know half) taken from this website and this one.

ip2long () and long2ip ()

These two functions ip2long () and long2ip () serve to store the IP addresses as integers rather than as strings in the database, this will reduce the storage resources obtained from the 15 bytes of a chasr (15) to the 4 bytes of an integer

Validation of email addresses

The partial validation of IP addresses is easy thanks to the checkdnsrr () function.
This function assures us that the domain returned exists, for example very useful in case of how it is:

‘User@gmail.com’ Valid
‘User@wwwgmail.com’ Not Valid

How not to do unnecessary work

If you do not want to be working on a certain function for a while, then realize that you have reinvented the wheel … check PEAR before writing the following lines of code.

PEAR – A framework and system of distribution of utilities Php. PEAR offers us php complements grouped in “Packages”.

Format your code

A function that formats a last string, specially designed for source code, highlight_file ().

Very useful in case we want to share questions about our code with a friend either by messenger, IRC or any similar service.

Do not show the errors

Avoid displaying message errors with the error_reporting (0) function. Useful in case of having shared hosting you must include it in the first line of each of your scripts, this will prevent information about PHP connections and MySQL users from being displayed.

Opcodes

PHP uses a mix between interpretation and compilation to try to offer programmers the best between performance and flexibility.

PHP compiles a series of instructions (called opcodes) for your code whenever they are accessed. These instructions are then executed one by one until the script ends. This is different from the conventional way of compiling languages ​​such as C ++ where the code is compiled into executable code that is then executed. Php is recompiled every time a script is requested.

The tag?> Is optional

Each one of the php files that you have programmed probably have this format:

But did you know that the label?> Is optional? Delete it and everything will continue to work, I’m not sure it works with all versions but it works in PHP 5.1.
There is no good argument to justify its removal from our code, but it is quite curious.

Masks other languages within PHP

Java, Perl, Python and .NET are some examples of languages that you can use within PHP code. Support for other languages can be found in PECL.

Make objects look like arrays

You can use the standard SPL php library to convert objects to an array in the following way:

$object = new MyObject();
$object[‘name’] = ‘Hello World’;

object = new MyObject();

foreach ($object as $k=>$v) {
echo “$k = $v\n”;
}

Require is faster than require_once

In versions prior to PHO 5.2 using require instead of require_once you can get a speed increase especially in heavy applications. The reason is that require_once makes an extra call to the system to validate that you have not included this file previously. Require includes a file without any verification.

Handling your mistakes is easy

The summary of errors programmed by PHP certainly is not the best. The famous “headers already sent” or “call to undefined function” that appears in bold and with a line number that may or may not be correct.

But you can program your own error handler.s:

function mis_errores ($numero, $mensaje, $archivo, $linea) {
// Añade el CSS para tu codigo
echo ‘

El siguiente error ocurrio en linea ‘ . $linea . ‘ del archivo ‘ . $archivo . ‘: ‘ . $mensaje . ‘
‘;
echo ‘

Las actuales variables son:

‘ . print_r($GLOBALS, 1) . ‘

‘;
}

Then you will use your own default handler and not the PHP handler to PHP in the set_error_handler () function.

Then most of the errors will be handled by your function (but there are some exceptions). With the previous example the errors are printed with html format.

I should even consider the possibility of sending these errors via mail with the mailto function and in this way you will have real time control of your site, or even handle errors in the connection to a database.

try {
if (!@mysql_connect(‘localhost’, ‘username’, ‘password’))
throw new Exception (mysql_error());
} catch (Exception $e) {
echo ‘Imposible conectar a la base de datos: ‘ . $e->getMessage();
}

Updates

Well, finally I have a little time between exams to add some things from the old blog to this one.

On the one hand I have passed the guestbook, it is a little bit frivolous because they all have the same date and time and it seems that I have put them 😀 and on the other hand I have put the old assembler section inside university, my intention will be hang some notes, some practices, if someone wants to collaborate, it’s good for you (students of the ponti), you can send me yours and I’ll hang it here.

On the other hand I have added a photo of myself and using GD + php + mySQL I have created a visitor counter to show with a graphic the last 7 days.

I do not want to fill the page with a lot of photos since it will take a long time to load, so during these days I will continue to make some changes.

Internet Explorer will activate the Activex components

A great news for web programmers because so far one of the worst things that happened when programming a component for a website was that from the explorer the user was forced to activate it before it could be used, which could be heavy for any visitor

What I did not know was that in some cases, this could be avoided by using javascript.

In short, there is no need to worry that as of January the activex controls will be activated automatically through the “Internet Explorer Automatic Component Activation Preview”

First round of exams finished

Yesterday I had, in my opinion, the worst exam of February, 5 hours sitting in front of the computer to do a partial Java in which I had to use Serialization and Introspection of Objects.

The thing was like this, for the Approved: implement the creation, for the notable, in addition to the above the invocation and for the outstanding, adding apart from basic types, Strings .. support for arrays.

Before the exam was clear that in an hour and a half at most two hours could finish it .. yes, from 4 to 9 there sitting and only to do the approved and without finishing the remarkable (missing support for several parameters).

Problems I had:

– Lack of knowledge, since I could have used a function that returned me the constructor that I wanted by simply passing the appropriate parameters, as I did not know of the existence of that function, I had to program it whole, that is, recovering all the constructors declared for an object and checking for each number of parameters and type.

– VERY TYPICAL programming flaws. I lost something more than an hour and a half, as I was continually failing a function I had programmed. This function (contained in the previous section, that is, could have saved me) had to return true if the parameters were consistent with the constructor and false otherwise. What was happening? because he did not do it well, he always returned true and he made an exception. Far from thinking Why does it always return true? I focused on the exception that occurred, blaming the failure of the function, very bad on my part. After an hour and a half I learned that after calling the function, I checked if it was true, and if it was because I invoked the constructor, what happens … that more than verifying that it was true, I assigned it true, then always executed the first constructor and if the parameters did not fit the exception 😛
check = checkTypeParameters (…);
……
if (check = true) {…}

The function was correct, an = I had taken almost almost two hours of exam … send noses, but hey, from the mistakes you learn 😛 from now-> if (checkTypeParameters) {..} and I’m done with lios 🙂
I hope to approve 🙂 but it depends on the teacher, because when I get nervous … I do not attend to reasons, nor to modulated programming xDD is a salve who can, if you do not mind that the code is a little sloppy … hehe and otherwise neither nothing happens, in June I’m sure I get it much better 😉

Remove Windows Live Messenger advertising

With WLM Universal patcher you can remove the advertising that accompanies the last instant messaging client of Microsoft.

Remove the tabs, the banners, the advertising bars, the MSN search engine …

It even brings several options to customize it to your liking.

Something that surely will like a lot is that it brings support for several accounts. It also includes several languages, including Spanish, so you have no excuse not to use it.
Via: GenBeta

Password theft on Myspace

I read in barrapunto that: 60,000 users have “stung” on a phishing page and have entered their MySpace passwords. The most curious of the subject are the passwords most used among those who have fished: “password1” (106), “abc123” (73), “swimmer1” (43), “iloveyou1” (41), “monkey1” (40) , “Fuckyou” (37), “123456” (33), “myspace1” (32), “fuckyou1” (32), “i” (32). Truly impressive, among them we see some classics such as “123456” and “password1” also known as “password1” … we must admit that they are easy to remember, which is usually inversely proportional to the security of the password.