Tuesday, December 31, 2013

"Let's Live! Happy new year"

Life is beautiful. EnJoy it.
"Enjoy it Before committing your LaSt Mistake"
[happy new Year]
[start]

Friday, December 13, 2013

P.S. I loveD you '13

If 2013 was a person I would describe it as someone with whom I have a love - hate relationship(kind of kill you first and then take your name). When we met, it was a love at first sight. Thought everything will be fine from now onwards. but you around there somewhere in between started breaking the promises and sometimes dreams, sometimes hopes, Just to make me stronger. It may sound a long journey but it was just a second.

You don’t remember anything when you fall in love but you remember every detail when you are falling out of it, that was the second half of 2013. So, Miss 2013 took me to great places and in my imaginations the whole world. We had a good chance of being together but then I expected too much out of you and that was just the truth..with the cold breeze of December here you were looking at me but I was lost somewhere else, I took another ticket to find you, but realized you have left the old place. And now you are just a history, intact in my memory. 

My memory loves you, often asks about you. I talk about you with my best friend 2014, she loves to hear about you (she just nods in a hope) because that gives me happiness and she cares. We still have time(18 days or so) and we will make it great together.
I will bid adieu with a smile, I promise.

You are beautiful, always will be. You will be missed.
P.S. Mantosh

Friday, November 29, 2013

How to make MAC write on NTFS drive

By default Mac OS can only read NTFS, it cannot write to it.
Follow these steps to write on your NTFS disk(tested with MAC 10.8.5).
1. open Terminal
2. ls /Volumes/
    you can see all available Disks name.
3. Now I assume your external hard-disk name is "Mantosh Harddisk".
    diskutil info /Volumes/Mantosh Harddisk
     Now you must be seeing all the info related with your disk.
4. sudo vi /etc/fstab
    This is a system file, that's why you need to use sudo.
5. write the below line in this file.
    LABEL=Mantosh\040Harddisk none ntfs rw,auto,nobrowse 
    \040 is for space in hard-disk name.
    (if LABEL is not supported in your system, you can use UUID=NUMBER none ntfs rw,auto,nobrowse)
6. Quit Terminal and Now, just unmount and re-mount the disk.

Wait a minute, I don’t see my disk listed in the Finder window!
As of Mountain Lion, the “nobrowse” mount option is required for this to work. This means that the partition will not show up on your desktop. However, you can access it normally through Finder by doing the following:
  • Open Terminal and type “open /Volumes/THE_NAME_OF_YOUR_VOLUME” (without the quotes)
  • The Finder pops up automatically and you can see your disk listed there.

OR simply format your hard-disk to FAT file system.

Thursday, November 28, 2013

Solution: To change a local variable in Pdb

In the previous post, I had mentioned the problem. This is happening because the cache of the current frame gets  overridden by the contents of the real locals which undoes modifications made by the debugging user.

To have a solution for this issue, you need to make changes in your installed python package. Here are the steps.
Note: This change will be effective for Python 2.4 version(Tested with this version only)
1.  Login your mach as a root user.
2.  cd /usr/lib
3.  chmod 777 python2.4/pdb.py
4.  cp python2.4/pdb.py YOUR_BACKUP_LOC (Do not forget to have a backup of this file. We are going to make changes in this file)
5.  Make changes in /usr/lib/python2.4/pdb.py as said below.
6.  chmod 755  python2.4/pdb.py

Changeset for pdb.py.

--- a/Lib/pdb.py
+++ b/Lib/pdb.py
@@ -114,6 +118,10 @@ class Pdb(bdb.Bdb, cmd.Cmd):
 def setup(self, f, t):
        self.forget()
        self.stack, self.curindex = self.get_stack(f, t)
        self.curframe = self.stack[self.curindex][0]
+       # The f_locals dictionary is updated from the actual frame
+       # locals whenever the .f_locals accessor is called, so we
+       # cache it here to ensure that modifications are not overwritten.
+       self.curframe_locals = self.curframe.f_locals
        self.execRcLines()

@@ -202,7 +210,7 @@ class Pdb(bdb.Bdb, cmd.Cmd):
     def default(self, line):
         if line[:1] == '!': line = line[1:]
-        locals = self.curframe.f_locals
+       locals = self.curframe_locals
         globals = self.curframe.f_globals
         try:
             code = compile(line + '\n', '<stdin>', 'single')

@@ -360,7 +368,7 @@ class Pdb(bdb.Bdb, cmd.Cmd):
      def do_break(self, arg, temporary = 0):
                 .........
                 .........
                 try:
                     func = eval(arg,
                                 self.curframe.f_globals,
-                                self.curframe.f_locals)
+                               self.curframe_locals)
                 except:
                     func = arg
                 try:

@@ -681,7 +689,7 @@ class Pdb(bdb.Bdb, cmd.Cmd):
     def do_debug(self, arg):
         sys.settrace(None)
         globals = self.curframe.f_globals
-        locals = self.curframe.f_locals
+       locals = self.curframe_locals
         p = Pdb(self.completekey, self.stdin, self.stdout)
         p.prompt = "(%s) " % self.prompt.strip()
         print >>self.stdout, "ENTERING RECURSIVE DEBUGGER"

@@ -705,9 +713,8 @@ class Pdb(bdb.Bdb, cmd.Cmd):
    def do_args(self, arg):
-        f = self.curframe
-        co = f.f_code
-        dict = f.f_locals

+       co = self.curframe.f_code
+       dict = self.curframe_locals

         n = co.co_argcount
         if co.co_flags & 4: n = n+1
         if co.co_flags & 8: n = n+1

@@ -719,8 +726,8 @@ class Pdb(bdb.Bdb, cmd.Cmd):
     def do_retval(self, arg):
-        if '__return__' in self.curframe.f_locals:
-            print >>self.stdout, self.curframe.f_locals['__return__']

+       if '__return__' in self.curframe_locals:
+           print >>self.stdout, self.curframe_locals['__return__']

         else:
             print >>self.stdout, '*** Not yet returned!'
     do_rv = do_retval

@@ -728,7 +735,7 @@ class Pdb(bdb.Bdb, cmd.Cmd):
     def _getval(self, arg):
         try:
             return eval(arg, self.curframe.f_globals,
-                        self.curframe.f_locals)
+                       self.curframe_locals)
         except:
             t, v = sys.exc_info()[:2]
             if isinstance(t, str):

@@ -797,7 +804,7 @@ class Pdb(bdb.Bdb, cmd.Cmd):
     def do_whatis(self, arg):
         try:
             value = eval(arg, self.curframe.f_globals,
-                            self.curframe.f_locals)
+                           self.curframe_locals)
         except:
             t, v = sys.exc_info()[:2]
             if type(t) == type(''):

Note: This is not exactly a changeSet. You need to manually modify the code. Red code is existing code and should be removed and Green code should be replaced in those places.

Wednesday, November 27, 2013

Changing a local variable in the Python debugger

I know that there is some issue with pdb debugger when you try to change a local variable.
But while trying to get any possible workaround, encountered this.
Have a look at it.



In the above case, local variable x has been changed in pdb mode. All I did was not to stop at any point after changing this variable.

Now look at this.


Here local variable has not been changed. Here after changing its value to "hello" all I did was to go stepwise. Even tried again to change it to "exper" but that also didn't work.

This has been a long-standing issue, dating back at least to this 2004 post on this topic.  There must be some temporary patch available for this.

Look for my new post. As soon as I find the fix, will post that here.

Indirect Data Forwarding Tunnel

>> Indirect data forwarding is needed only in case there is no user-plane available between Source eNB to Target eNB/Target-Rnc.

>> Indirect tunnel is created between
Source eNB - Source SGW - Target SGW - Target eNB.

>> Used for forwarding the buffered traffic from old-eNB, Here MME can select a new SGW to forward this traffic.
i.e Source eNB -- New SGW - Target SGW - Target eNB.
The New SGW being selected acts just a next-hop router.

Saturday, November 23, 2013

The Mother India

Just finished reading a book on Indira Gandhi. I always liked her and appreciated her as one of the finest and the courageous leader our country ever had. Almost all(not all) her decisions were justified by our country situation and necessity at that time. She has always been my role model since the time I got my little brain functioning.

Given the power and chance to rewrite history I would like to change just one instance i.e. rewrite the page of 31st Oct 1984, the day Indira took her last breath, the day she got assassinated. I am least bothered or feel upset losing any political leader whether it is Gandhi or anybody, but have an emotional and compassionate feeling for losing her. To me, losing her hurts like losing my own mother.

Perhaps she felt the steps of coming death. "If I die today, every drop of my blood will invigorate the nation"- this was the last speech she gave on 30th Oct ’84.

I observe this date as analogous to Muharram for us Indians. She died protecting the integrity of our nation. 31st Oct- Rashtriya Sankalp Diwas (National Integration Day) that we observe every year, this name conveys everything.

 

Rest in Peace Mother Indira. We will always miss you and your presence. You will live forever in our heart.

Tuesday, November 19, 2013

Changing your vnc password

Your VNC password is not the same as your UNIX password. Your VNC password must be set yourself. Your VNC password is encrypted within the passwd file in your .vnc directory. You can try to decrypt it (not recommended), or you can replace it (recommended).

Your VNC password and Unix logon password are two separate entities, so it's wise to choose a VNC password that is different than your Unix password. You can use the pwhelp command on Unix to generate a secure password for the VNC server.

To change the VNC password you must first delete the existing password file. From your home directory on Unix use the rm .vnc/passwd command to do this. Once you've accomplished that all you need to do is restart your Unix VNC session (use vncserver). The VNC server will recognize that you don't have a password set and prompt you for a new password. This enables you to keep an existing session active without having to restart the VNC server.

hostname% rm .vnc/passwd
remove .vnc/passwd? y
hostname% vncserver
You will require a password to access your desktops.

Password: ********
Verify: ******** 

Sunday, November 10, 2013

Calculating Networks, Hosts and Broadcast Addresses

134.77.168.143 / 27

134.77.168.143
255.255.255.224

Binary 
134     .   77   .   168  .   143
10000110.01001101.10101000.10001111
255    .    255    .   255   .   224
11111111.11111111.11111111.11100000

Like Bits = Network
10000110.01001101.10101000.100 00000  /27
134     .   77   .   168  .  128
Broadcast = All Bits on
10000110.01001101.1010100.100 11111  /27
134     .   77    .  168 .   159

First Usable = First Bit on
10000110.01001101.1010100.100 00001  /27
134     .   77   .   168  .  129
Last Usable
10000110.01001101.1010100.100 11110  /27
134     .   77   .   168 .     158

.128 64 32 16 8 4 2  1
.X     X  X  X X X X X

Wednesday, October 23, 2013

Mail Tsunami

A tempestuous email thread, visualized to be unscathed but resulting in a useless loss of  resources. It's not like that I have never seen such email threads. A long time ago at some point, I also used to be a part of these chains. But nevertheless, this thread was really different involving thousands of people and was really tempting for each one to revert. It was tantalizing for me too but I preferred to be on shore.

Last week an email was sent which was intended only for a small set of managers to encourage their staffs to complete an online training by the end of the month. But, in a move reminiscent of other email storms*, the unnamed sender mistakenly included a "xyz_training" mailing list that contained the addresses of thousands of employees – presumably without a restricted senders' list.

Now while the managers were discussing if the training was relevant to their staff (keeping the mailing list in the 'To:' line), someone triggered the storm by asking to be removed from the mailing list. It gathered momentum, mainly from the Indian offices, with lots of 'unsubscribe' and 'me-too' requests, ultimately nettled by enormous vague mails popping up the inbox,most of the employees requested not to "reply all" ,although they themselves were helping the thread to proliferate.It ended up in a complete plethora of chain mails.

Just when it looked like the storm had ended, it quickly picked up the pace again as employees in the US opened their mails in the morning.

Now I made some calculation in this mayhem.
Lets assume there are approximately 35,000 people on that thread.
A rough approximation of 270 minimum new Useless emails in my inbox that day.
i.e. 35,000 x 270 ~= 9.5 million emails worth of traffic.
Going by a conservative 50 KB per email.
That’s 475 GB worth of junk on the server.
Going by the past trend(from when this last happened), that’s translates to > $600,000 for the company.

The easy way to avoid these storms is to just ignore those mails that you don’t find relevant instead of hitting the "Reply-All" button or if you find it to be too much intractable, then choose the "Ignore" button and you will not be getting any mails further from that source.
Take precautions while broadcasting a mail to a large audience, keep the group-mailer-id in Bcc field and in the end of mail body mention the Bcc:group-mailed-id to let people know which audience is being targeted.

Sunday, September 29, 2013

for-else loop in python

This is a very interesting constructor in python and I m quite impressed with this. A very intelligent way to combine a loop with a condition.

Example 1:
foo = [ 1, 2, 3 ]
for i in foo:
    print "inside for loop with value %d"  %(i)
else:
   print "inside else condition %d" %(i)

Output:
inside for loop with value 1
inside for loop with value 2
inside for loop with value 3
inside else condition 3

Example 2:
foo = [ 1, 2, 3 ]
for i in foo:
     if i = = 2:
           print "inside for loop with value %d"  %(i)
           break
else:
   print "inside else condition %d" %(i)

Output:
inside for loop with value 2

Example 3:
foo = [ 1, 2, 3 ]
for i in foo:
     if i = = 2:
           print "inside for loop with value %d"  %(i)
           continue
else:
   print "inside else condition %d" %(i)

Output:
inside for loop with value 2
inside else condition 3

Example 4:
foo = [ 1, 2, 3 ]
for i in foo:
     if i = = 3:
           print "inside for loop with value %d"  %(i)
           break
else:
   print "inside else condition %d" %(i)

Output:
inside for loop with value 3


for-else loop basically means "find some item in the iterable, else if none is found then look into else". In simple words, we can say when for loop gets fully exhausted(i.e; even after looking through all the iterables, if we don't find any item that can make us stop in those iterable item/s) then we should look into else condition. See Example 1 and 3.

If we find a condition in for loop, that can interrupt the for loop and terminate it earlier than it is supposed, then that means we have found something in for loop iterables that we were looking for(see Example 2 and 4), so there is no need to check into else condition.

Update (Dec 21, 2017): I guess I could simply summarize the for-ELSE loop as for-NoBreak loop. I mean when no BREAK is encounter in for loop, then only ELSE condition gets executed.

Update (Oct 12, 2020): Food for thoughts:
arr = [1, 2, 3, 4]
Question 1:
def f():
    for i in arr:
        if i == 4:
            break
        print(i, end=' ')
    else:
        print("else part")
Output: 1 2 3

Question 2:
def f():
    for i  in arr:
        pass
    else:
        print("else part")
Output: else

Saturday, February 16, 2013

Windows 7’s Secret GodMade Power

Well, it’s not really a mode. To be clear, it’s not quite as magical or all-powerful as the name implies. It only organizes administrators work more efficiently by dumping all the controls in one central location for easy access. But I find it quite useful from time to time.
  • Create a new folder anywhere (I set mine up on desktop)
  • Rename the folder and paste in the following text: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Once that is done, the folder's icon will change to resemble a control panel and will contain all the control options. 

You can also choose to sell your system’s soul to the devil. “GodMode” is just a prefix and you can choose any word you like. For ex:  DevilMode.{ED7BA470-8E54-465E-825C-99712043E01C}


Saturday, January 19, 2013

Protect your privacy in internet

Every time you connect to a website it simply scans the source IP address and hence your identity is exposed. You never know when your internet activity is no more private for you. When you surf the internet, Internet Protocol address is exposed. This might be used by hackers to gain access to your computer and all your personal information.

Being anonymous on the internet can benefit you in many ways. Few of them can be enlisted as:
1. Hiding your IP address helps you to protect your privacy from any kind of fraud.
2. You can also access the websites which previously you were banned from surfing using your Proxy IP address.
3. You can also protect your computer from spyware by hiding your IP address.
4. Hiding your IP address also protects your system from the constant display of popup ads.
5. The main benefits of hiding your IP address are to protect your system from others monitoring your system.

Changing your IP address is simply the basic way to hide your presence on the internet. If you can use and show a fake IP address, then you have now successfully protected your privacy and have become anonymous on the internet as shown in below figure.



This can be done in many ways:

1. Using Proxy sites to change your IP: There have been a lot of sites that allow you to browse anonymously. All you need is a web browser and a working internet connection. http://newipnow.com/ is such a website from where you can access any website with different IPs.

2. Using Proxy/Socks and Proxy tunneling applications: This method is a bit more technical than the previously mentioned. It requires the usage of proxies or IPs that you want to use. There are also different kinds of proxy, and a better one noted is the kind of SOCKs proxy.

3. Using Virtual Private Network (VPN): When you use VPN services, you simply connect to a different network and you get a different IP address that is set by the VPN server. This method is a better way to change IP address because VPN is able to give more reliable internet connection. That means almost all applications that connect to the internet can work without problems with VPN connections, without the need for extra configuration and applications. All are done automatically, it just looks like you are connecting under a normal internet connection. Hotspot Shield is such type of application.

4. Onion Routing: I personally like its algorithm. People who are serious about anonymity generally use things like onion routing through a bundled browser within a VM with a spoofed user agent. It takes very little to set up and, if done properly, it is nearly impossible to unmask.

In some cases, your IP address may be located all around the world. And if then you use a fake IP address located outside your country then it is possible that you will suffer from a slow browser. If you belong to such a category then it is advisable to look for the programs which offer the facility of providing IP addresses all over the world.

Looking back (May 02, 2020. After almost 7 years): For that one whole weekend, I kept playing with the router in our apartment and my room-mate, my friend and brother Sonal kept getting patiently mad because of disruption. On Sunday afternoon, he slept in his room and again I started doing my playing around with the router and unknown to me, I found him standing over my shoulder, where he was watching at me with a confused look, did his friend get possessed by a networking spirit. Did I get to know everything, I had intended to? Nope, just a tiny bit of theoretical but yeah I now knew how to f**k with the router and get it back from dead, that's all :-D