Happy 31st Birthday to Computer Virus.

Elk Cloner

31 years ago the first computer virus was created today. It was a 400 lines of code on an Apple II machine, yes you read it correct Apple not Windows (or MS-DOS). The first virus for PC (personal computer) was on an Apple computer, in the year 1982. It was written by a then 15 year old kid Richard Skrenta on 1981 as a prank on his friends. The name of the virus was “Elk Cloner”

Richard Skrenta
Richard Skrenta with his Apple II computer.

So what did the first virus do to the computers? The virus was basically harmless, it did not delete or corrupt your data, nor did it steal your credentials. What it did was that on ever 50th boot of the computer it would show a message.

“Elk Cloner: The program with a personality


It will get on all your disks

It will infiltrate your chips

Yes, it’s Cloner!


It will stick to you like glue

It will modify RAM too


Send in the Cloner!

Note the first ever computer for MS-DOS machine came on January 1986, named Brain.

Hearing colours.

What if you were born as a complete colourblind? Would you even believe that something like color existed?  Well here the story of a guy named Neil Harbisson who was born with achromatopsia, a rare condition that causes complete colour blindness. In 2004, Harbisson and Adam Montandon developed the eyeborg, a device that translates colours into sounds.




Anonymous Hacks U.S. Government Site.Says they have access to warheads “Operation Last Resort” has begun.

At midnight Pacific time Anonymous defaces the website of  U.S. federal sentencing ussc.gov They claim mysterious code-based “warheads,” named for each of the Supreme Court Justices, are about to be deployed.

Anonymous  talks of planting “multiple warheads” on “compromised systems” on various unnamed websites, and encourages members to download a given file from ussc.gov that is “primed, armed and quietly distributed to numerous mirrors.” It has given the warhead “launch” the name of “Operation Last Resort,” the text said:

” There has been a lot of fuss recently in the technological media regarding such operations as Red October, the widespread use of vulnerable browsers and the availability of zero-day exploits for these browsers and their plugins. None of this comes of course as any surprise to us, but it is perhaps good that those within the information security industry are making the extent of these threats more widely understood.

Still, there is nothing quite as educational as a well-conducted demonstration…

Through this websites and various others that will remain unnamed, we have been conducting our own infiltration. We did not restrict ourselves like the FBI to one high-profile compromise. We are far more ambitious, and far more capable. Over the last two weeks we have wound down this operation, removed all traces of leakware from the compromised systems, and taken down the injection apparatus used to detect and exploit vulnerable machines.

We have enough fissile material for multiple warheads. Today we are launching the first of these. Operation Last Resort has begun…”



They further say:


“The contents are various and we won’t ruin the speculation by revealing them. Suffice it to say, everyone has secrets, and some things are not meant to be public. At a regular interval commencing today, we will choose one media outlet and supply them with heavily redacted partial contents of the file. Any media outlets wishing to be eligible for this program must include within their reporting a means of secure communications.

We have not taken this action lightly, nor without consideration of the possible consequences. Should we be forced to reveal the trigger-key to this warhead, we understand that there will be collateral damage. We appreciate that many who work within the justice system believe in those principles that it has lost, corrupted, or abandoned, that they do not bear the full responsibility for the damages caused by their occupation.

It is our hope that this warhead need never be detonated.”


They also released a video which says what it is all about, watch it before YouTube takes it down.


A new Arabic programming language, قلب (Alb, means “heart”) by Ramsey Nasser

Alb programming language-ahitagni_dot_com

If you are a programmer or even if you are not you may know that all the programming language in the World are written in Latin character set. But a computer scientist Ramsey Nasser, made a fully functional programming language in Arabic named قلب  (Alb, means “heart”), which use Arabic character set and not Latin character set ! As a programmer myself I think its a big break through..
See the video interview from the man himself below.


Update 1:

Changing the Title of the article[ from ” The World’s first Arabic programming language, قلب (Alb, means “heart”) ” to ” A new Arabic programming language, قلب (Alb, means “heart”) by Ramsey Nasser “] after reading a tweet from Ramsey Nasser. As this is not the first Arabic or non-latin programming language.

You can follow Ramsey Nasser on Twitter. You can also follow me @ahitagni

Source: Animal New York


India Government bans telecom equipment from foreign companies.

Indian Government has decided not to take any telecom equipment from foreign companies, like ZTE, Huawei,Ericsson, Nokia Siemens Networks, Alcatel Lucent and others.

This includes the 3.8 billion USD ,NOFN project (National Optical Fiber Network) by DoT (Department of Telecom). The NOFN project would have brought high-speed internet even to the rural parts of the country. This project is to be done along with BSNL and MTNL.



Government now says that,it will go 100% domestic sourcing on equipment. The companies they selected are Tejas Networks, Prithvi Infosystems, Center for Development of Telematics (C-DoT), VMC Systems, Sai Systems, United Telecoms, and SM Creative.



Americans are being kept in the dark about how and why they are being followed by the FBI.

Americans are being kept in the dark about how and why they are being followed by the nation”s security agency,FBI.Recently a civil liberties group in the U.S asked the online slots FBI to spell out what techniques it”s using when it tracks citizens. Here in a news video from online casino RT news channel you will see that, news reader Gayane Chichakyan explains, the reply raised more questions than answers.


Source: RT news channel.


TRENDNet security camera firmware bug.

Recently there has been a bug found in the TRENDNet IP security cameras, that allows anyone with a internet connection to view the live images from the camera without any kind of permission.

Although the company has posted a new version of firmware on the its website and asked everyone to update it, but it seems that many people have not yet done so. Some of them may have not registered their product so the company can not send them any message and ask them to update. So if you use this product in your office or home , you should update it here is the official link

and by any chance if you want proof here are few pics taken from the camera. I am only sharing pics that I think wont invade anyone’s privacy. (As there were many cam which streamed images from baby’s room and from inside houses) I am attaching image of what I think is an office. ( I took the screenshot when all the people move aside from the camera)

security cam-ahitagni_dot_com


security cam 2-ahitagni_dot_com