Can Business Model Simulation predict unpredictable business models ?

Predicting your start up fate

Predicting your start up fate

Can Business Model Simulation predict unpredictable business models ? While surfing over web I come across a effort of data science to predict business survival or failure. A interesting project and at least a way to overcome the most common question of start-ups. Lets see what they speak.

Some initial thoughts..

Business is never a + b = c

Business is works on complex market dynamics and if you ignore some factors you can never solve the complete puzzle. There are tons of examples of failure, even if they are backed by Phd’s

Every Second makes us smarter.

We are human beings and our brain always collects information & process that keep the meaningful data and through away the garbage. This cycle is perfectly designed that we keep getting smarter. We can not be same personality even before one second. The reasons is pretty simple the last second passed (People call it experience) is added to our personality. This is why human brain is much better engineering then any data analysis available.

Algorithms can never overcome human intelligence

I know this could sound annoying but I can prove with multiple examples that algorithms are broken as time passes. Humans are much intelligent then any algorithm available. Ok let suppose algorithm are intelligent Then why every day we find those zero days attacks. Why the shares of best company (recommended by business pundits ) looses in a single day ?

Yes algorithm can be best fit in one niche. But when you compare human intelligence w.r.t. multiple factors. Human intelligence is far better.

Reason is very simple any algorithm is designed by single or some bunch of programmers. But when algorithm deals with end humans. Algorithm can’t compete with mass intelligence. Although I am not a fan of group intelligence but one who is capable of connecting the dots can easily by pass any algorithm .

If  you want to understand how crowd sourced forecasting platform works. Take a look at which deals with forecasting science and technology and

So Why this project matters ?

But after all in the era of mass data collection anything can be predicted :) . One only needs a better analysis tool and vision to see the future. After all predicting the unpredictable is some thing people hardly can think of. This tool can make wave. Let see how..

With love to script kid

Although I tried my best requesting script kids to stop doing nasty DDOS. But despite of my politeness They are continuously bombarding my domain with their bad crawlers. Today again a kid crawled heavily.

Hacking effort by some script kid

Hacking efforts by some script kid

Some times people understand in different learning curves. some understand by words..some needs magic. This time I thought to dig the kid.

Use your own IQ

Use your own IQ: Image Courtesy

After a couple of minutes I found the scrip kid information clear and louder. The proof is attached here so he can see himself.



Although I can go much further. But hope the script kid will stop doing notorious activities.

Rest of all can enjoy the Dakis

What is chrome speech recognition bug ?

Like all exploring people, I like to do experiments. One day I was checking old fundamental of text to speech. You probably heard of dragon speech. That was a classical speech recognition program I used years back. The idea was so click even a entry level guy can type text by simply speaking. Let suppose you don’t know how to type it can type for you. That’s a great idea.

Use It or Not ?

While communicating with one of my peer, I found the ground level reality. Yes It might be a point of concern how to justify the use of this technology in country like India where huge mass of entry level workers need job. And they are mainly involved in notes taking activities in local bodies. My answer is technology always comes with possibilities and future problems [ technical or social ]. May be that mass can better utilize their skills in some more productive areas.This is how the world evolves.

Speech API Over web & Google Chrome

The web is also developing speech recognition technology for you. A great example is latest speech API.The new JavaScript Web Speech API makes it easy to add speech recognition to your web pages. This API allows fine control and flexibility over the speech recognition capabilities in Google chrome browser version 25 and later. This is certainly the good feature. You may also check the demonstration of Web speech API.

What’s the problem with Google Chrome ?

Chrome Bugs Lets Sites Listen to Your Private Conversations

Chrome Bugs Lets Sites Listen to Your Private Conversations

 for Full description of problem you can visit official broadcast by Tal Ater  See the detailed analysis in the video and chrome-is-listening source code is available at git.

This bug is already reported to Google Folks by him. But Until this is fixed. It can create some more buzz on your way..

What you need to know on Surveillance Technology ?

Care for your privacy,Sharing a great video with a talks on surveillance Technology and how it exists in various forms around us today, everything you need to know from CCTV Surveillance, cellphone tracking to remote drones. Worth a watch for those who are interested in privacy. Enjoy..

See How stingray works

Cell phone spying using stringray

WatchHound Cell Phone Intercepter

Cellebrite UFED

Initial reviews on Netra

So finally Indian System had waked up and planning internet surveillance project Netra which will capture & monitor network traffic including VOIP calls like skype, gtalk. Netra is currently under testing by the Indian Intelligence Bureau and Cabinet Secretariat, it was designed by the Centre for Artificial Intelligence and Robotics (CAIR) lab.This is nice efforts or I should call it a “propaganda”.

Why this is clearly a propaganda ?

There is no need to tell what you are doing for security. Security is security until some one knows about it. The formula is very clear the more people knows about your security model, the less effective your intelligence strategy is.So declaring such effort is non-sense idea.People will never like surveillance.Although internet monitoring is common practice in big brothers league.


Tiny allocation of storage space.Really ?? Useless garbadge


How you come to such conclusion that text filtering is the best way to trap the guys ? Qualified guys knows this very well they never put such idiotic messages on public platforms.  All you are trying to capture kids. who frequently uses such languages.The result will be tons of garbage. If you really wants to trap the things hire some qualified professionals (Beyond your hiring gimmicks, You already knows what I want to say.. ). Who knows beyond TCP/ IP or common engineering taught in Indian engineering colleges. Dealing with Internet security without knowing it properly can creates tons of hazards that you guys never thought of. Let suppose you use such system to track such suspicious activities. What if some qualified then you, enters in your own system and use the same tool to monitor those innocents / culprits .

Please don’t gives excuses. The internet biggest players had faced this.  Just thought what’s your strategy in that case ? Do you recalled BARC ( who is known for most respected and qualified engineers ). Despite of tons of security BARC was also hacked . Check out recent hack event targeting of ISRO,BARC and ECIL on aug 28,2013 

What’s the problem ?

Baseboard management controllers (BMC’s) present in most servers are vulnerable to a half dozen critical vulnerabilities that could enable an attacker to gain remote control over the host machine.
The vulnerabilities are in the Intelligent Platform Management Interface protocol that defines how BMC’s communicate locally and across networks. The issues range from the ability to bypass authentication mechanisms, steal password hashes that can be brute-forced offline, to UPnP-based vulnerabilities that cannot be disabled and could lead to remote root compromises. And almost all modern companies and governments use IPMI for system management.

security holes in server management system

security holes in server management system

Don’t worry read this

I hope the trends chart will give you a clear understanding where you need to focus your efforts.
BTW You should read How the NSA nearly destroyed the internet

Post Analysis of Snapchat Hack

screenshot of snapchatdb

username and password of snapchat was hacked

So Snapchat is hacked finally..
Even after getting a warning call from security researcher GibSec. They Didn’t do anything. read this

Below is a response by their dev.

Snapchat devs explained how to create the database on Dez 27th

.. and Snapchat devs explained how to create the database on Dez 27th 2013

Well If you are a developer I think you must check this video.

UPDATE: Youtube  folks had removed this video. Although domain authorities had blocked the domain .But still the data was captured in between and shared in torrent sites & some VPS.  One good point is this data is just a proof of hack.
So fellow developers if you are developing some thing for mobile. understand the security concept very well and always understand what pros says. And please exploits are not theoretical.

How to fix exgocgkctswo hack?

Few days ago after completing my very long session with a to be entrepreneur “X” over SEO efforts.  We get some good results. We are able to see good ranking in few days.

One day the X called me and gives me bad news. The site is hacked. Ah welcome to reality. I already told him to take care of security but site get hacked while a little work is left by developer team. Actually some other developer team is doing the task. I was only helping them clear the mess.The issue is the site is shown in Google ranking but while clicking on that search result it points to Crap-ware.

Its basically redirecting the traffic. Great! it means server goes hacked. The itchy part is developer team gives a funny excuse.

“If Google is pointing to some crapware its google’s fault. So you guys  should claim Google”. 

Within fraction of seconds I come to some conclusion. Those who knows me can understand what ?

Anyway for those who are still trying to fix this issue. simply check your .htaccess file you will see code like below:

This time with another 302 redirect trick. I never understand why people set easy FTP password. Anyway the issue is the hacker had inserted this code in the .htaccess file.  Now the funny but irritating  part is the developer had turned off seeing the hidden file while cPanel asked him. So I again need to check my skills.

Anyway guys if you are trapped with such puzzle simple pass &showhidden=1 at the end of url call.It will turn on the hidden file in cPanel then you can remove the exgocgkctswo .htaccess hack


# exgocgkctswo
RewriteEngine On
RewriteCond %{HTTP_REFERER} ^(http\:\/\/)?([^\/\?]*\.)?(google\.|yahoo\.|bing\.|msn\.|yandex\.|ask\.|excite\.|altavista\.|netscape\.|aol\.|hotbot\.|goto\.|infoseek\.|mamma\.|alltheweb\.|lycos\.|search\.|metacrawler\.|rambler\.|mail\.|dogpile\.|ya\.|\/search\?).*$ [NC]
RewriteCond %{HTTP_REFERER} !^.*(q\=cache\:).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(bing|Accoona|Ace\sExplorer|Amfibi|Amiga\sOS|apache|appie|AppleSyndication).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Archive|Argus|Ask\sJeeves|asterias|Atrenko\sNews|BeOS|BigBlogZoo).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Biz360|Blaiz|Bloglines|BlogPulse|BlogSearch|BlogsLive|BlogsSay|blogWatcher).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Bookmark|bot|CE\-Preload|CFNetwork|cococ|Combine|Crawl|curl|Danger\shiptop).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Diagnostics|DTAAgent|ecto|EmeraldShield|endo|Evaal|Everest\-Vulcan).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(exactseek|Feed|Fetch|findlinks|FreeBSD|Friendster|Fuck\sYou|Google).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Gregarius|HatenaScreenshot|heritrix|HolyCowDude|Honda\-Search|HP\-UX).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(HTML2JPG|HttpClient|httpunit|ichiro|iGetter|iPhone|IRIX|Jakarta|JetBrains).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Krugle|Labrador|larbin|LeechGet|libwww|Liferea|LinkChecker).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(LinknSurf|Linux|LiveJournal|Lonopono|Lotus\-Notes|Lycos|Lynx|Mac\_PowerPC).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Mac\_PPC|Mac\s10|Mac\sOS|macDN|Macintosh|Mediapartners|Megite|MetaProducts).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Miva|Mobile|NetBSD|NetNewsWire|NetResearchServer|NewsAlloy|NewsFire).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(NewsGatorOnline|NewsMacPro|Nokia|NuSearch|Nutch|ObjectSearch|Octora).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(OmniExplorer|Omnipelagos|Onet|OpenBSD|OpenIntelligenceData|oreilly).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(os\=Mac|P900i|panscient|perl|PlayStation|POE\-Component|PrivacyFinder).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(psycheclone|Python|retriever|Rojo|RSS|SBIder|Scooter|Seeker|Series\s60).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(SharpReader|SiteBar|Slurp|Snoopy|Soap\sClient|Socialmarks|Sphere\sScout).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(spider|sproose|Rambler|Straw|subscriber|SunOS|Surfer|Syndic8).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Syntryx|TargetYourNews|Technorati|Thunderbird|Twiceler|urllib|Validator).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Vienna|voyager|W3C|Wavefire|webcollage|Webmaster|WebPatrol|wget|Win\s9x).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Win16|Win95|Win98|Windows\s95|Windows\s98|Windows\sCE|Windows\sNT\s4).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(WinHTTP|WinNT4|WordPress|WWWeasel|wwwster|yacy|Yahoo).*$ [NC]
RewriteCond %{HTTP_USER_AGENT} !^.*(Yandex|Yeti|YouReadMe|Zhuaxia|ZyBorg).*$ [NC]
RewriteCond %{HTTP_COOKIE} !^.*xccgtswgokoe.*$
RewriteCond %{HTTPS} ^off$
RewriteRule ^(.*)$ I HAD REMOVED THE LAST LINE :HttpOnly]
# exgocgkctswo

Simply remove that junk.and don’t forget to check security holes of FTP,Your own application specially those file uploading functions where you trusted your users blindly.  That’s all Enjoy..