Updates from February, 2010 Toggle Comment Threads | Keyboard Shortcuts
It was mid 2004 when I got a gmail invite from a close friend. Like all good things, I wanted to register my gmail id as 'harshadjoshi', but sadely the name was taken already. I said in my mind, WTF is this guy taking away my name?? Arrrgh… Almost 6 years later..ie today. I got a google alert regarding 'Harshad Joshi' in which I got following information. 1. The email id – email@example.com belongs to an IIM, Calcutta alumni.
2. That guy got out of IIMC in 1978, more then 5 years before I was born.
3. His picture and other details – http://picasaweb.google.com/maharishikedia/YearBook?fgl=true&pli=1#5420478777616710226 All this information is courtesy of Google..withing few clicks so much information was availalable which was otherwise impossible.. I wonder if someone can use it for spying on people too..?
These are the nine words that a Woman would use often and the inherent meaning of all of these.1. Fine : This is the word women use to end an argument when they are right and you need to shut up 2. Five Minutes : If she is getting dressed, this means a half an hour. Five minutes is only five minutes if you have just been given five more minutes to watch the game before helping around the house. 3. Nothing : This is the calm before the storm. This means something, and you should be on your toes. Arguments that begin with nothing usually end in fine. 4. Go Ahead : This is a dare, not permission. Don’t Do It! 5. Loud Sigh : This is actually a word, but is a non-verbal statement often misunderstood by men. A loud sigh means she thinks you are an idiot and wonders why she is wasting her time standing here and arguing with you about nothing. (Refer back to #3 for the meaning of nothing.) 6. That’s Okay : This is one of the most dangerous statements a women can make to a man.. That’s okay means she wants to think long and hard before deciding how and when you will pay for your mistake. 7. Thanks : A woman is thanking you, do not question, or Faint. Just say you’re welcome. 8. Whatever : Is a women’s way of saying Get Lost you Idiot! 9. Don’t worry about it, I got it: Another dangerous statement, meaning this is something that a woman has told a man to do several times, but is now doing it herself. This will later result in a man asking ‘What’s wrong?’ For the woman’s response refer to #3.
Stolen from – I dont know, use Google.
# import the app user interface framework module
# create a single-field dialog (text input field): appuifw.query(label, type)
data = appuifw.query(u"Type your name", "text")
# create an information note: appuifw.note(label, type)
appuifw.note(u"Hello "+str(data)+", welcome to Python World", "info") Bang…how many lines for a hello world? Baah, I doubt if people like symbian app development.
A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:
- It should be impossible for an outsider to predict the output of the random number generator even with knowledge of previous output.
- The generated numbers should not have repeating patterns which means the PRNG should have a very long cycle length.
A PRNG is normally just an algorithm where the same initial starting values will yield the same sequence of outputs. On a multiuser operating system there are many sources which allow seeding the PRNG with random data. The OpenBSD kernel uses the mouse interrupt timing, network data interrupt latency, inter-keypress timing and disk IO information to fill an entropy pool. Random numbers are available for kernel routines and are exported via devices to userland programs. So far random numbers are used in the following places:
- Dynamic sin_port allocation in bind(2).
- PIDs of processes.
- IP datagram IDs.
- RPC transaction IDs (XID).
- NFS RPC transaction IDs (XID).
- DNS Query-IDs.
- Inode generation numbers, see getfh(2) and fsirand(8).
- Timing perturbance in traceroute(8).
- Stronger temporary names for mktemp(3) and mkstemp(3)
- Randomness added to the TCP ISS value for protection against spoofing attacks.
- random padding in IPsec esp_old packets.
- To generate salts for the various password algorithms.
- For generating fake S/Key challenges.
- In isakmpd(8) to provide liveness proof of key exchanges.