Thursday, April 22, 2010

Of SouthPark and Scarcasm.. Holy prophets and gingers

In the last week's episode SouthPark went on to identify the limits of portraying Muhammad, the supposedly last prophet in whom muslims believe. The plot was rather ingenious , with superstars wanting (only naturally), the power of Muhammad which makes him impervious to any remarks that anyone can make , and on the other side, gingers lead by CopperCab Cartman, wanting to know how Muhammad managed to make himself impervious to sarcastic attacks.

Cleverly enough the creators come up with a way to portray muhammad without actually showing who he was (and in turn "RE-MAKING" him into what they want him to be ). They made him a "BEAR" wearing prophet,with a very shrilly voice.

And now they wont air the episode due to various issues (death threats included).


I think islamic people need to sit back and not be so up tight (learn from buddha..who is shown smoking weed and chillin out ).


So basically the episode tries to find a commonality between the people who are pissed off by others... and by raking they are:
1. Muhammad (who basically cannot tolerate a single world, and only talks of death for those who do ).
2.Hollywood stars ( :)...... )
3.Gingers.


They are only going to worsen their case by repeatedly interrupting the ingeniously-negative-creativity of SouthPark.

Here are a few stars who know how to handle, and few who dont:

The fudge packer





And Muhammad now trying to use "DEATH-THREAT":


Another Orkut bug....

During mid Feb, I saw this bug that was recurrently mutating into new forms, yet the original code remained awfully similar. I think orkut had blocked processing of all that is html in their posts for a few days untill the issue was resloved.

I managed to make a local copy of that source in order to find out what it was really trying to do...
And as usual , firebug was a great help in making things rather discreet and easy to see...

The code made social engg request targeted to mobile users, offering them "fake-recharge " for life worths time, and in truth it added those guys who clicked into a predecided community, and posted comments on albums(of the victim).



I maintain a fake profile on orkut from which I do all such things , and I tested this one from it. Now it does work but I wonder how did the creator of this bug find out the exact parameters google's orkut webapp requires in order to successfully process the request ?

Its because of internal details like this, that I believe this guy would have worked on it internally at some point in time. And now that orkut is full of heare and there, its all the more difficult to see whats going on exactly whithout having access to the actual source that spwan those frames.

Asynch request /reply has definitely made the web all the more interesting .....

As a part of my grad coursework, I had demonstrated how flash can be used to override the browser's same origin policy (since flash works on flash's policy ,which is set by website owners,its not fixed like the browsers's same origin policy)...

It basically translates to this: If I have ability to upload an swf movie on your trusted domain, your pretty much screwed(if u run it, and you will, cause that is what social engg will make you do) !

:)

Lately I am busy doing this project on particle simulation, its awesome project , in which I basically try to do about a billion particles simulation in real time. So this field is rather unrelated to security as such, although its my second favorite topic "optimization".

Optimization problems are always interesting in a variety of ways, they basically mess with your brain so much that your consumed by searching for possibilities....and then mathematical tools come to your rescue telling you that you have wasted all your time in-vain , searching for a desert rose....

^_^

Till later, see ya!