DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple

Tuesday, December 6, 2011


DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple Hacker with nickname AlpHaNiX deface Google, Gmail, Youtube, Yahoo, Apple etc domains of Democratic Republic of Congo.

Hacker use strategy so-called DNS cache poisoning. DNS cache poisoning is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server's cache database that did not originate from authoritative DNS sources. It may be a deliberate...

Google is showing some love to math lovers

Monday, December 5, 2011

I still recall the day when my friend Yossi came to school and showed off his brand new graphing calculator. I was stunned by how easy it was to plot complicated functions -- meanwhile, the rest of us were still drawing them by hand on graph paper.

Today, I’m hoping to share that magical feeling with students around the world, with the introduction of graphing functionality on Google. Now you can plot mathematical functions right on the search result page. Just type in afunction and you’ll see an interactive graph on the top of the search results page.

An Evaluation of Google’s Realtime Search


How timely are the results returned from Google’s Realtime (RT) Search Engine? 
How often do Twitter results appear in these results? 
Over the weekend I developed a few basic experiments to find out and published the results below.

Key Findings

  • For location-based queries, there’s nearly a flip of a coin chance (43%) that a Twitter result will be the #1 ranked result.
  • For general knowledge queries, there’s a 23% chance that a Twitter result will be #1.
  • The newest Twitter results are usually 4 seconds old. The newest Web results are 10x older (41 seconds).

How to Choose a CS Research Topic?

Sunday, December 4, 2011


After a long search i came across this good post on choosing a CS Research Topic...

This post is motivated by questions from some of the new grad students looking for research topics. Here are a few things that can help you in this quest.

Follow your passion

Often, when you take an undergrad course, you wonder about a few things. Why is this system designed like this? Why can’t I use that sorting algorithm? etc. If you are more curious, you probably use Google to find more information, and you develop an interest. As you learn more, you realize that among the sea of questions, there are a few that you really want to go after. Go for it!

Best Resources to Learn about Linux Kernel Internals

Wednesday, November 30, 2011


The Source

The best resource is the kernel source.

Challenges in Mobile (Smart Phone) Virtualization


We have virtualization on servers, desktops, laptops and what’s next? Naturally, the “smart phone”. Today’s mobile phones have become quite powerful that one can easily virtualize them and run multiple operating systems. But,

Why do you need smart phone virtualization?

Similar to desktop virtualization, the use-case is not that clear, but there are some benefits that can be gained.
  1. Reducing vendor lock-in. Can you run iPhone applications on an Android phone? Currently, no, but with virtualization this might be possible. There are issues with Apple (or other vendors)’s mobile OS licensing that make it illegal to do so, right now. You can only run iOS on Apple approved devices, but this may change in the future. Many old phones have legacy applications and libraries that can be run in virtualized sandboxes as well.
  2. Mobile cloud computing. You can clearly access the so-called “cloud” from a smart phone, but if smart phones are virtualized, mobile applications can be migrated to a cloud and back seamlessly. This is still a pipe-dream and a few research platforms (MAUI and CloneCloud) are proposed to make this a reality. The benefits of doing this are enormous: one can potentially access infinite compute and storage resources on the smart phone.