Category Archives: Software

NASA and the blood-stained Missiles

Standard

NASA and the blood-stained missiles

NASA and the blood-stained missiles


The ancient mariner had killed the Albatross. Later he repented.

What happened afterward? The fiery storm damaged the ship. The monster waves drowned the children.
They tried to escape from the fire-spitting missiles. They tried to escape from the claw of death. The children from Afghanistan, Libya, Syria, Iraq, tried to escape the fire, destruction, and death.
But, tell me one truth. How did the US military build the pin-pointed missiles? It flew a thousand miles and struck the hideouts of the terrorists in Iraq, Afghanistan, Syria, and Libya.
Sometimes, they fell on the wrong targets. Houses, where children were playing.
And, boom! The cloak of darkness.
Geodetic or geometric data fired the salvo.
What is that? It is scientific data. The scientific community needs it. Measuring the shape and size of this planet is difficult. The geodetic or geometric data helps us.
But, the US military builds the missiles, using the same data. The published declassified documents tell us the inside story.
NASA did not want this. Tight cooperation between NASA and the US military agencies allowed them to use the same geodetic data.
NASA wanted for scientific endeavor. Military wanted them for building missiles, killing terrorists and common people at same breath.

NASA wanted documents to remain unclassified. So, they bickered and bickered. The conscience roared at the silent ears.
The US missiles used the NASA technology to build the missiles. NASA used their cameras to photograph the moonwalk.
Pause. Human civilization.
Who cares?

Spies in the Skies

Spies in the Skies

Standard
NASA's disgraceful role in sky spying

From the very beginning NASA scientists, engineers and technologists take part in indirect sky-spying activities.

Declassified documents released by US government agencies like CIA, NRO are saying so. The truth has an official seal. NASA had designed shuttles that carried US spy satellites to orbit. Declassified documents depict a disgraceful relationship between NASA and CIA, the US Department of Defense (DoD), and National Reconnaissance Office (NRO). These agencies took part in designing NASA’s Shuttles throughout the 1970s.

I have recently written a cover story in Tehelka magazine, on the same topic.
You can read the full article here below:

Spies in the Skies

Ransomware: How can I save my SOUL from cyber attacks?

Standard

It sounded like science fiction when we have first learned about the Ransomware. Cyber attackers swooping on computer network and lock the essential files encrypting them and demanded for a ransom that you had to pay in bitcoin – a currency that runs in the dark web. In the first part of this series of articles we also came to know how denial of service – an old tactic hackers use to jam the network – had been morphed into a new avatar.
Read the rest of this entry

Ransomware is the new Threat: Pay the Kidnappers a Ransom and Obtain your Essential Files

Standard

The real life kidnapping model has just morphed into a new avatar in the virtual world encrypting your essential files, demanding money, holding you as a hostage. Cyber criminals have now adopted the same ‘real-life’ kidnapping technique to snatch your valuable documents holding you for a hostage to make a deal. In such situations you need to buy your freedom for exchange of a ransom.
It sounds bizarre and almost like a science fiction but it starts taking place in our day-to-day life.
Read the rest of this entry

How to Install adobe flash player on Ubuntu 14.04

Standard

Installing flash player on Ubuntu 14.04 is not a very complex scenario. I frequently face it because you need to update it in a regular interval. Adobe flash player is one of the most essential applications you need to play video.
For Ubuntu 32 bit you can either manually add it through the software centre or you can better add it through the command line.
Read the rest of this entry