Archive for the ‘Blog’ Category

Moving the blog to my new website

May 22, 2013

Hello everyone,

I regret the inconvenience caused all of the blog followers and the visitors due to the movement of a lot of contents to my new website. I would like you all to visit my new website http://blog.manoharbhattarai.com.np/ and follow for more interesting and helpful contents.

Please visit http://blog.manoharbhattarai.com.np/ to subscribe and follow the blog there to get updates on my new posts. Would love to see your presence there with your valuable comments.

Thank you.

Regards,
Manohar Bhattarai (मनोहर भट्टराई)
Personal Website : http://www.manoharbhattarai.com.np/
Personal Blog : http://blog.manoharbhattarai.com.np/
Website : http://www.logicinterpreter.com/

Happy New Year 2012 to you all.

January 1, 2012

Hi all,

I wish you all a very vary Happy and Prosperous New Year 2012. May God bless everyone and shower happiness and prosperity to all.


Regards,
Manohar Bhattarai (मनोहर भट्टराई)
http://about.me/manoharbhattarai
http://www.facebook.com/pages/Manohar-Bhattarai/130973796914160
Blogs:
https://manoharbhattarai.wordpress.com/
Microblogs:
Twitter :- http://twitter.com/mhrbhattarai
Identi.ca :- http://identi.ca/manoharbhattarai

Only 24 super techies out of 5000 cracked it so far – Techgig’s online coding contest

October 3, 2011

Hi friends,

Just wanted to share something with you. Sorry if you don’t find something about Linux or Java in this post.

I am in a good mood today. It is because I was featured in the Techgig.com’s ad with headline “Only 24 super techies out of 5000 cracked it so far” on today’s (i.e. October 3, 2011) newspaper Times Of India, Mumbai edition, page number 26. I was one of them.

Techgig's super techies

Techgig's super techies

I would not have known it as I live in New Delhi and Delhi’s edition din’t have the same. I came to know about this only someone(Edit : Nanda Kshirsagar) posted on my facebook page https://www.facebook.com/pages/Manohar-Bhattarai/130973796914160. The post was like this “Congratulation!!! SUPER TECHIES out OF 5000 ON CODING CONTEST”. I was surprised by the post because I dint have the slightest idea.

I participated in the Techgig.com’s online coding contest few days back. Just wanted to exercise my brain a bit because I had time. I was not too serious while coding. The “Easy” level was solved at once when I wrote the code in “Java” on the editor provided by the website. I din’t even try it on my computer before submitting. But “Medium” level took a while to solve. But finally got it right. And then I did the “Expert” level.

Please comment below on how you liked this post as in this post I am just sharing what I felt. Hoping to get a well paid job soon.

Edit : Thanks “Nanda Kshirsagar” for posting on my facebook page and letting me know.


Regards,
Manohar Bhattarai (मनोहर भट्टराई)
http://about.me/manoharbhattarai
http://www.facebook.com/pages/Manohar-Bhattarai/130973796914160
Blogs:
https://manoharbhattarai.wordpress.com/
http://manoharbhattarai.posterous.com/
http://manoharbhattarai.blogspot.com/
Microblogs:
Twitter :- http://twitter.com/mhrbhattarai
Identi.ca :- http://identi.ca/manoharbhattarai

Java 7 is here.

July 12, 2011

Hi all,

Java 7 (codename Dolphin) is an upcoming major update to Java, releasing on July 28, 2011(07.28.2011). The following links might help you know more about Java 7 :

Webcast on Java 7 : http://www.oracle.com/us/corporate/events/java7/index.html

Wiki on Java 7 : http://wikis.sun.com/display/JDK7/Home

Java se 7 : http://jdk7.java.net/

JDK 7 features : http://openjdk.java.net/projects/jdk7/features/

JDK 7 Java Docs : http://download.java.net/jdk7/docs/api/

I am looking forward to it. So stay tuned.


Regards,
Manohar Bhattarai (मनोहर भट्टराई)
http://about.me/manoharbhattarai
http://www.facebook.com/pages/Manohar-Bhattarai/130973796914160
Blogs:
https://manoharbhattarai.wordpress.com/
http://manoharbhattarai.posterous.com/
http://manoharbhattarai.blogspot.com/
Microblogs:
Twitter :- http://twitter.com/mhrbhattarai
Identi.ca :- http://identi.ca/manoharbhattarai

Remove question mark and add your own icon to the ubuntu 11.04 natty narwhal unity launcher

June 28, 2011

Hi everyone,

I have moved this post to my new blog site. Click here to get to the post.

Thank you.

Regards,
Manohar Bhattarai (मनोहर भट्टराई)

2010 in review

January 2, 2011

The stats helper monkeys at WordPress.com mulled over how this blog did in 2010, and here’s a high level summary of its overall blog health:

Healthy blog!

The Blog-Health-o-Meter™ reads Wow.

Crunchy numbers

Featured image

A Boeing 747-400 passenger jet can hold 416 passengers. This blog was viewed about 9,400 times in 2010. That’s about 23 full 747s.

 

In 2010, there were 28 new posts, not bad for the first year! There were 20 pictures uploaded, taking up a total of 13mb. That’s about 2 pictures per month.

The busiest day of the year was October 10th with 113 views. The most popular post that day was Ubuntu 10.10 Maverick Meerkat releasing on 10/10/10.

Where did they come from?

The top referring sites in 2010 were anuragbansal.wordpress.com, henneberke.wordpress.com, linux4all.net, google.co.in, and digg.com.

Some visitors came searching, mostly for echofon ubuntu, sudo passwd, sudo passwd root, mozille, and ubuntu chntpw.

Attractions in 2010

These are the posts and pages that got the most views in 2010.

1

Ubuntu 10.10 Maverick Meerkat releasing on 10/10/10 October 2010
2 comments

2

How to set different wallpapers on different workspaces in Ubuntu April 2010
3 comments

3

JBoss server unable to start within 50 seconds. How to increase the JBoss server start time. May 2010
12 comments

4

How to rotate or flip your ubuntu desktop upside down May 2010
1 comment

5

Remove Windows password using chntpw in Ubuntu March 2010

 

Regards,
Manohar Bhattarai (मनोहर भट्टराई)

http://manoharbhattarai.com.np/
http://about.me/manoharbhattarai

Happy New Year 2011 to you all

January 2, 2011

Hello everyone,

I wish you all a very very Happy and prosperous New Year 2011.

May God bless everyone and bring peace and happiness to all in this world.

Regards,
Manohar Bhattarai (मनोहर भट्टराई)

http://manoharbhattarai.com.np/
http://about.me/manoharbhattarai 

Why Free Software is More Secure

July 24, 2010

Hi all,

I found this article and thought of sharing with you all. I am posting an extract from the article and the link as well. Anyone interested in reading the full article can use the link. Hope it will be informative to all.

Why Free Software is More Secure

“Continuous and broad peer-review, enabled by publicly available source code, improves software reliability and security through the identification and elimination of defects that might otherwise go unrecognized by the core development team. Conversely, where source code is hidden from the public, attackers can attack the software anyway …. Hiding source code does inhibit the ability of third parties to respond to vulnerabilities (because changing software is more difficult without the source code), but this is obviously not a security advantage. In general, ‘Security by Obscurity’ is widely denigrated.” — Department of Defense (DoD) FAQ’s response to question: “Doesn’t Hiding Source Code Automatically Make Software More Secure?”

The DoD indicates that FOSS has been central to its Information Technology (IT) operations since the mid-1990’s, and, according to some estimates, one-third to one-half of the software currently used by the agency is open source.The U.S. Office of Management and Budget issued a memorandum in 2004, which recommends that all federal agencies use the same procurement procedures for FOSS as they would for proprietary software. Other public sector agencies, such as the U.S. Navy, the Federal Aviation Administration, the U.S. Census Bureau and the U.S. Patent and Trademark Office have been identified as recognizing the security benefits of publicly auditable source code.

To understand why free and open source software has become a common component in the IT systems of so many businesses and organizations that perform life-critical or mission-critical functions, one must first accept that software bugs are a fact of life. The Software Engineering Institute estimates that an experienced software engineer produces approximately one defect for every 100 lines of code. Based on this estimate, even if most of the bugs in a modest, one million-line code base are fixed over the course of a typical program life cycle, approximately 1,000 bugs would remain.

In its first “State of Software Security” report released in March 2010, the private software security analysis firm Veracode reviewed the source code of 1,591 software applications voluntarily submitted by commercial vendors, businesses, and government agencies. Regardless of program origins, Veracode found that 58 percent of all software submitted for review did not meet the security assessment criteria the report established. Based on its findings, Veracode concluded that “most software is indeed very insecure …[and] more than half of the software deployed in enterprises today is potentially susceptible to an application layer attack similar to that used in the recent …Google security breaches.”

Though open source applications had almost as many source code vulnerabilities upon first submission as proprietary programs, researchers found that they contained fewer potential backdoors than commercial or outsourced software and that open source project teams remediated security vulnerabilities within an average of 36 days of the first submission, compared to 48 days for internally developed applications and 82 days for commercial applications. Not only were bugs patched the fastest in open source programs, but the quality of remediation was also higher than commercial programs.

Veracode’s study confirms the research and anecdotal evidence into the security benefits of open source software published over the past decade. According to the web-security analysis site SecurityPortal, vulnerabilities took an average of 11.2 days to be spotted in Red Hat/Linux systems with a standard deviation of 17.5 compared to an average of 16.1 days with a standard deviation of 27.7 in Microsoft programs.

Sun Microsystems’ COO Bill Vass summed up the most common case for FOSS in a blog post published in April 2009: “By making the code open source, nothing can be hidden in the code,” Vass wrote. “If the Trojan Horse was made of glass, would the Trojans have rolled it into their city? NO.”

Vass’ logic is backed up by numerous research papers and academic studies that have debunked the myth of security through obscurity and advanced the “more eyes, fewer bugs” thesis. Though it might seem counterintuitive, making source code publicly available for users, security analysts, and even potential adversaries does not make systems more vulnerable to attack in the long-run. To the contrary, keeping source code under lock-and-key is more likely to hamstring “defenders” by preventing them from finding and patching bugs that could be exploited by potential attackers to gain entry into a given code base, whether or not access is restricted by the supplier. “In a world of rapid communications among attackers where exploits are spread on the Internet, a vulnerability known to one attacker is rapidly learned by others,” reads a 2006 article comparing open source and proprietary software use in government systems. “For Open Source, the next assumption is that disclosure of a flaw will prompt other programmers to improve the design of defenses. In addition, disclosure will prompt many third parties — all of those using the software or the system — to install patches or otherwise protect themselves against the newly announced vulnerability. In sum, disclosure does not help attackers much but is highly valuable to the defenders who create new code and install it.”

Academia and internet security professionals appear to have reached a consensus that open, auditable source code gives users the ability to independently assess the exposure of a system and the risks associated with using it; enables bugs to be patched more easily and quickly; and removes dependence on a single party, forcing software suppliers and developers to spend more effort on the quality of their code, as authors Jaap-Henk Hoepman and Bart Jacobs also conclude in their 2007 article, Increased Security Through Open Source.

By contrast, vulnerabilities often go unnoticed, unannounced, and unfixed in closed source programs because the vendor, rather than users who have a higher stake in maintaining the quality of software, is the only party allowed to evaluate the security of the code base. Some studies have argued that commercial software suppliers have less of an incentive to fix defects after a program is initially released so users do not become aware of vulnerabilities until after they have caused a problem. “Once the initial version of [a proprietary software product] has saturated its market, the producer’s interest tends to shift to generating upgrades …Security is difficult to market in this process because, although features are visible, security functions tend to be invisible during normal operations and only visible when security trouble occurs.”

The consequences of manufacturers’ failure to disclose malfunctions to patients and physicians have proven fatal in the past. In 2005, a 21-year-old man died from cardiac arrest after the ICD he wore short-circuited and failed to deliver a life-saving shock. The fatal incident prompted Guidant, the manufacturer of the flawed ICD, to recall four different device models they sold. In total 70,000 Guidant ICDs were recalled in one of the biggest regulatory actions of the past 25 years.

Guidant came under intense public scrutiny when the patient’s physician Dr. Robert Hauser discovered that the company first observed the flaw that caused his patient’s device to malfunction in 2002, and even went so far as to implement manufacturing changes to correct it, but failed to disclose it to the public or health-care industry.

The body of research analyzed for this paper points to the same conclusion: security is not achieved through obscurity and closed source programs force users to forfeit their ability to evaluate and improve a system’s security. Though there is lingering debate over the degree to which end-users contribute to the maintenance of FOSS programs and how to ensure the quality of the patches submitted, most of the evidence supports our paper’s central assumption that auditable, peer-reviewed software is comparatively more secure than proprietary programs.

Programs have different standards to ensure the quality of the patches submitted to open source programs, but even the most open, transparent systems have established methods of quality control. Well-established open source software, such as the kind favored by the DoD and the other agencies mentioned above, cannot be infiltrated by “just anyone.” To protect the code base from potential adversaries and malicious patch submissions, large open source systems have a “trusted repository” that only certain, “trusted,” developers can directly modify. As an additional safeguard, the source code is publicly released, meaning not only are there more people policing it for defects, but more copies of each version of the software exist making it easier to compare new code.

The original article link is : http://www.softwarefreedom.org/resources/2010/transparent-medical-devices.html


Regards,
Manohar Bhattarai (मनोहर भट्टराई)
Blogs:
https://manoharbhattarai.wordpress.com/
http://manoharbhattarai.posterous.com/
http://manoharbhattarai.blogspot.com/
Microblogs:
Twitter :- http://twitter.com/manoharmailme
Identi.ca :- http://identi.ca/manoharbhattarai

How to Install Chromium (Google Chrome) web browser in Ubuntu

May 24, 2010

Hi,

Here is how we can install google chrome (chromium) web browser in Ubuntu. It is an open-source browser project that is safer, faster, and more stable.

1) First you need to edit the /etc/apt/sources.list file

manohar@manohar-desktop:~$ sudo gedit /etc/apt/sources.list

2) Add one of the following

a) For ubuntu 9.10 (Karmic) Users add the following two lines

deb http://ppa.launchpad.net/chromium-daily/ppa/ubuntu karmic main

deb-src http://ppa.launchpad.net/chromium-daily/ppa/ubuntu karmic main

b) For ubuntu 9.04 (Jaunty) Users add the following two lines

deb http://ppa.launchpad.net/chromium-daily/ppa/ubuntu jaunty main

deb-src http://ppa.launchpad.net/chromium-daily/ppa/ubuntu jaunty main

c) For ubuntu 8.10 (Intrepid) Users add the following two lines

deb http://ppa.launchpad.net/chromium-daily/ppa/ubuntu intrepid main

deb-src http://ppa.launchpad.net/chromium-daily/ppa/ubuntu intrepid main

3) Save and exit the file

4) Now add the GPG key using the following command

manohar@manohar-desktop:~$ sudo apt-key adv –recv-keys –keyserver keyserver.ubuntu.com 0xfbef0d696de1c72ba5a835fe5a9bf3bb4e5e17b5

5) Update the source list using the following command

manohar@manohar-desktop:~$ sudo apt-get update

6) Install chromium using the following command

manohar@manohar-desktop:~$ sudo apt-get install chromium-browser

This blog written with the help from different sites. Thank you all.

Regards,

Manohar Bhattarai

JBoss server unable to start within 50 seconds. How to increase the JBoss server start time.

May 6, 2010

Hi everyone,

I have moved this post to my new blog site. Click here to get to the post.

Thank you.

Regards,
Manohar Bhattarai (मनोहर भट्टराई)


%d bloggers like this: