Skip to main content

"Thought's"

"It is easy to be pleasant,
When life flows like a song,
But the Man who smiles,
when everything goes wrong,
is worth a more."

"Believe in yourself,
the ideas that you endure,
Remember its always good,
to keep those hope's."

"Difficult time will pass on,
Hold on some more,
You will become stronger,
More than you have known."

"Enlighten yourself from,
miseries that have blown,
you are the product of your own thoughts,
that's all I have Known"

Comments

Popular posts from this blog

The Null Pointer Nightmare: How a Simple Mistake Can Halt The World

A global IT outage, described as “the largest IT outage in history” by Microsoft Regional Director Troy Hunt, occurred on July 19, 2024, affecting millions of Windows-based systems worldwide. Imagine you’re driving on a highway, and suddenly, your GPS starts pointing to a nonexistent road. You keep driving, and before you know it, you're in a ditch because there was no road where your GPS pointed. Something similar happened with a recent CrowdStrike outage, but instead of a car, it involved lines of code, and instead of a ditch, it resulted in a system crash also called Blue screen of Death (BSOD). Let’s dive into what happened, why it happened, and how we can avoid such nightmares in the future. The Culprit: A Null Pointer In the world of programming, a "pointer" is like a GPS for data. It points to a specific location in the computer’s memory where information is stored. In this case, a CrowdStrike developer wrote a piece of code that created a pointer. This pointer was...

Cyber-warfare - The Fifth Dimension:

Today the World is talking about the use of Pegasus Software which has been allegedly used by Government agencies to manipulate and control institutions and Society. The Controversy is mired with suppositions, facts, false trials but also the kernel of the truth - has reignited the debate on Cyber Warfare. Pegasus is no ultimate form of cyberweapon but it has still awakened the Nations from their sleep and compelled them to ponder on the threat posed by these new-age weapons. Hominoids to Hominids [The Evolution]: One of the first instances of the use of this kind of Cyber weapon was in 1990. It was used by Israel's Intelligence Agency on one of the chief bomb makers of Hamas Abd-al Ayyash. A doctored phone was containing explosives was blown out when he got a call from an unknown  person.  This was a paradigm change in the usage of explosives. Before a lot of efforts were used to breach the area and plan the explosives with much risk and resources utilized. Later usage has mi...

"Our Infected Criminal Justice System"

If one reads a well established textbook of law, he understands the theory behind Criminal Justice System. Generally in India maintaining Criminal Justice System is the responsibility of all the organs of the Constitution, the Parliament which deals with the making of laws, the executive which controls the institutions involved in investigating the crime and last the Judiciary which decides on the culpability of the crime. Now understanding the edifice on which the Criminal Justice System is build upon let's move to the present day trends. Today their is a large question echoing in houses of India about the efficiency and efficacy of it ?  Atom is Disintegrating: Today the history has repeated itself and the era is of majoritarian government. The State through its power of absolute majority controls both the Parliament and the Executive i.e they are one who will make law and control the investigating machinery. Criminal Justice System without punishment is like a Atom without nucle...