The importance of managing ego for the better self.

We should all be well aware that, where to apply our ego and where not. That’s called managing ego. The control part comes when our ego is hurt and we are looking to regain ego. There we should control our feelings and act wisely.

“Though ahaṃkāra is generally a state of illusion, once in that state, Vak tattva (one of the 36 tattvas) can appear. When it does, then, for the first time, individual will, determination, a sense of morality and ethics come into play – which is the first step on the path to spiritual development/enlightenment. Without a sufficiently harmonious and powerful ahaṃkāra (personality), it is thought to be impossible to exert the level of effort necessary to accede to a higher spiritual level.

The position of ahaṃkāra and buddhi are sometimes presented in reversed order because, as the principle of “I-ness”, ahaṃkāra is allowed control over the manas (sensorial mind) and buddhi (superior intellect, intuition). Yet, buddhi is a superior tattva, and ahaṃkāra is thus only able to be in a superior position to buddhi from a functional point of view. From an absolute point of view, ahaṃkāra is created by buddhi and thus subordinate to it.”


Further reading:

Copyright: Text (except the Wikipedia text) is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit



My love story – First and failed proposal to a girl. An autobiography.


It was my 10th class. I was 17 years of age. Year was 2006-2007. That girl was my neighbour and I used to borrow note books from her when I missed to attend the school.

One day, she started to stare at me for making eye contact! You know that girlish type of stare!

At first I avoided that. But she continued to stare at me even when teacher was in classroom and actively teaching. She was very brilliant not to catch teacher’s attention while staring.

After a month of continued eye contact, I decided to propose her. I think most of guys would do the same.

I’m a great planner then and now too. I wrote very long paragraphs about how to propose her. That time, I didn’t have any Internet connection to research more about female psychology.

One day, I gathered all my courage and tried to propose her. Because it was my first time, all my written paragraphs on proposing gone in vain and none came off because of my anxiety. Anyhow, I managed to tell ‘I love you’ to her. She then left me without even looking at me or replying me.

The next day onwards she again began to stare at me. Because I’m a fool, I thought she was worried to reply me when I proposed her. Her staring continued and finally that academic year was over.

We both passed and got promoted to 11th class.

Because I’m a fool again, in the newly promoted 11th class, I chose the same subject which she chose just to sit in the same class room with her. There too she continued the old staring.

I decided to propose her one more time. After the school in the evening, with all my courage, I proposed her once more. There she replied. But it was not a positive one, but a negative.

She said, “If this happens one more time, I’ll tell to my parents!” She then left.

On arriving at her home, she told everything to her parents. She’s is a rich girl and I’m little poor one.

On hearing the note, her mother got worried and came to my house the next day itself. I was not at home that time. My mother had to hear all the rubbish things her mother said, instead of me.

Because her father and brother are gentlemen, they didn’t come to scold me with her mother.

Now the real character of her starts to reveal.

The next day, I went to school. She was there at the other end of the class room. Teacher was teaching, and right there, she started to stare at me! That old staring!

I got very angry and ‘aphonically’ whispered some swear words. You know, without making the sound, we move our lips to say something, right? That way I expressed my anger. I think she got what I said, but she didn’t care.

Now her real identity was starting to reveal. Earlier, it was only her who was staring at me. Now her full bunch of girl gang started to stare at me. Not just her girl gang in the class room, but most of her girl gang in other class rooms of the school also started to make fun of me. Because of that, I had fewer female friends in my 11th and 12th classes.

I can accept the mindset of her and her friends making fun of me. But how about her mother too started to make fun of me with her elderly female friends?

The mindset of a 16 year old girl and a 40 year old lady should be different right? But here, her mother too started to make fun of me!

After sometime, she withdrew making eye contacts with me after I continuously started to avoid her eye contacts. But the fun making with her female friends continued.

Months passed. She revealed this incident to her one of her male friend. That male friend of her was a bully at school especially towards me. She knew that and yet she told him the incident.

Her male friend came and started to beat me. Because he was strong, he overpowered me.

Some nice male friends of mine pushed him back and tried to stop the beating and calm the situation. He got cooled off after my male friends convinced him.

She was watching all this and she didn’t do anything to stop this mess. That was she.

I hate such type of females who make two men collide with each other without a valid cause. She told the incident to her parents. And that issue got over when her mother came to my house. Fine! Normal thing, no issues!

But what was the reason to tell her friend about the proposing incident even after several months after her mother came to my house? Clearly, the guardian of her is not her friend, but it’s her parents and relatives right? I can understand when parents and relatives come to ask about the incident. They have to ask and they did the right thing. But I can’t understand the credibility of an outsider like her friend to ask about the incident occurred, even after her parents already did the asking part.

I called off all relations with her after that incident. And when we meet now in Bus Stops and other public places, we won’t talk or even smile at each other.

It was my honest love to her. I didn’t love her just for a time pass. But I was intended to marry her later if she agreed. But I just don’t exactly understand why she did this. Does she ever know how much pain she caused to me for her little fun? 10 years passed and now it is 2016. I still love her but I’m trying to move on. I’m looking for a geek girl from anywhere around the world to date/marry.

Many of my friends told me to do revenge. But I won’t do that because I believe revenge is not a wise thing to do. Ruining someone’s life is against my policies.

What should we call such females?

That is life I think! 🙁

Ladies and gentlemen, please don’t play with someone else’s feelings.

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit




Wi-Fi – Demystifying the myth about overlapping wireless channels.

Contrary to most people’s belief, every Wi Fi channel is best for use. Most people believe that, only 1, 6 and 11 channels are best for use. I disagree to that. Actually every channel is best to use unless it doesn’t overlap with each other.

I’m using channel 7 for my home Wi Fi. Let me post a screenshot here.

Wi Fi Channels

Wi Fi Channels

As you can see in above screenshot, the Channel 7 overlaps with 5 other Channels. That is, channel 7 overlaps with channel 5 to 9. Yes, that is the simple thing in here and the most misunderstood part too.

Let me explain. No matter which channel we use, that channel overlaps with 5 other channels.

The source of this confusion is some sort of misunderstanding about a particular Wikipedia image. People refer Wikipedia for knowledge. And when they see this image taken from Wikipedia, they take in the wrong meaning.


No, I’m not suggesting the above Wikipedia image is wrong. In essence, the Wikipedia image is 100% correct actually. But it’s the laypeople who interpret the image in a much different and wrong way.

In that image which is taken from Wikipedia which describes overlapping channels, most people notice only the direct lines. But most people don’t notice the dotted lines in that image which also shows other overlapping channels. And that’s why most people have misunderstanding about Wi Fi channels. They think, according to that image, only the channels 1, 6 and 11 are the best because it doesn’t overlap (straight line). They don’t notice other dotted lines in between. That’s the reason they have this common misunderstanding about Wi Fi channels.

So in-order to choose a best channel for Wi-Fi network, we should count up to 5 channels in order to avoid overlapping.

In my screenshot above, I chose channel 7 for my Wi-Fi network. And it overlaps with 5 and 9.

Let’s choose channel 8. Now when we inspect with inSSIDer for Windows, we can see that, channel 8 overlaps with channels 6 and 10. That is, channel 8 overlaps with 5 other channels.

If there are so many Wi Fi networks in the area, we should find out which channel is the least overlapping one and we should set that channel for our Wi Fi network.

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit

Facebook Porn Malware scams. Is Facebook really infected with malwares and hackers? Of course not!

I wonder how many stupids are there in Facebook.

All I see now days in Facebook is some random share by random people about some vague and purported info about Facebook Sex Videos. According to those people who share that ‘illegitimate’ info, some virus and hackers are posting those sex videos!!

For your information, there is no virus infection in Facebook and Hackers are not responsible for posting those sex videos. Then who is posting those? Read on.

Have you heard about Phishing, Cross-site scripting (XSS) and Clickjacking type of attacks? If not, be aware of it now on. Those are the technical terms and also the basis of the origin of these sex videos.

Check out the below links for more information.

Check out all the screenshots in this album.

Read these articles about the same.

Share this post instead of those ‘hackers are posting’ type of things.

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit

An onlook into the concepts and differences of ‘Hacking’ and ‘Cracking’!

Ethical or Unethical, Hacking or Cracking – That all depends upon the respective license of softwares.

If the software is open-source, and someone made modifications to it, we may call it as ‘hacking’.

If the software is closed source aka proprietary, then modifying or reverse engineering that software can be referred to as ‘cracking’.

In short, it all depends upon the licenses of the software programs.

If the license permits something, it’s ethical. If the license does not permit something, it’s unethical to act otherwise.

Pentesting is of the same principle too. Pentesters have some form of ‘right’ to act on something ‘unethical’ that may ‘ethical’ just for them only. If others which don’t have rights granted as ‘pentesters’ did the same ‘unethical’ thing, it’ll remain as ‘unethical’ only.

It’s all about access rights.


Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit

Word Cloud "Big Data"

Big Data – An analysis into the underlying basic concepts. Layman friendly guide!

Word Cloud "Big Data"

Big Data illustration

Many people have misunderstanding about Big Data. They think it’s something that which beyond understand. Colloquially, the ‘concept’ of ‘Big Data’ itself is a ‘Big Data’ for them! 😀

The concept of Big Data is very much simple.

Actually, Big Data is not a new term or a new concept. Actually, that concept was there since many years ago even before the concept of modern computing.

In computing, if we say in simple terms, big data means, some (raw) data which is so big that it can’t be easily turned into processed data!

Assume, a person 1 (we can call him P1) have 160 GB of Hard Disk in his computer. Friend of his, (we can call him Person 2 or P2), came to his house to share 500 GB of movies and other data. Recall, P1 only has 160 GB of HDD. But P2 have 500 GB of HDD. So, P2 can’t share his entire 500 GB of data into 160 GB of HDD. We can call this data processing. That is according to this example, copying raw data to another medium, is another instance of data processing.

That’s a simple case.

Let’s look forward into bigger cases.

For instance, Facebook, Microsoft, Google, Yahoo and many other companies might be able to generate PBs (Peta Bytes) of data per day. That’s a very much ‘Big Data’ for anyone even though storage mediums are becoming so cheap. And to process such huge data, they need Data Scientists to dig into the raw data, process it and retrieve only the useful data.

That’s all about computing! If we look at our non-computer dependent daily life, we could see some instances of big data there too.

Assume a student is studying in high school. He’s very much lazy and he does not do his homework and study the lessons taught in the class in a regular way. After a few months, board exams arrived. Only just a few days ahead of board exams, he decided to study. The moment he opened all those notebooks and text books, he suddenly might feel, it’s all a ‘Big Data’ for him.

That’s what Big Data is.

In other words, Big Data is nothing but some unprocessed raw data which is quite hard to store or process which is beyond ones’ usual capability.

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy of this license, visit




DreamHost Promo D0D4C76E

DreamHost Promo Code: Get up-to three free domains for lifetime from DreamHost

DreamHost Promo D0D4C76E

DreamHost Promo D0D4C76E

DreamHost Shared Hosting Promotion: Get 3 Domains Free For Lifetime Along With Hosting

DreamHost Coupon Code: D0D4C76E

Instead of copying the coupon code, you can also click the above link to go directly to DreamHost signup page.

For just 119.40 US$/year at the rate of 9.95 US$/month* (7,475 Rs/year) for the hosting, you’ll get:
  • Unlimited Storage Store as many document as you like on your server.
  • Unmetered Bandwidth – Get truly unmetered bandwidth.
  • SSD Based Storage – SSD (Solid State Drive) offer 200% performance boost than HDDs to load your site almost instantly.
  • Free WHOIS Privacy – Never reveal domain registration private information to anyone. 
  • One Click Installation Support – Install Web Services and Applications very easily which includes popular CMSs like WordPress, Joomla etc.
  • Free IPv6 for every domain hosted – Get ready for the next generation of Internet with IPv6.
  • 10 gb/s (giga bits/second) Connection Speed – Avail up-to blazing fast speed of 1 GB/s (Giga Bytes/second). [Note: gb/s and GB/s values are different. To get Giga Byte (GB) from Giga Bit (gb), divide the value of gb by 10. That means, 10 Giga Bit/10= 1 Giga Byte].
  • Unlimited Domain Hosting – Host as many domains as you like.
  • Unlimited Email Accounts – Create as many email accounts as you like.
  • Unlimited FTP Users – Host as many domains on as many user accounts. No worries!
  • 97 Day Money Back Guarantee – Didn’t like the service?  No worries, you can request your money back.
  • 100% Uptime Guarantee – Thanks to superior Data Centres, your site will never go down.
  • Unlimited 24/7 Support – Want any help? No worries, DreamHost Customer Service Personnel will help you out 24/7.
  • Free Private SSL Secure Server – Get a SSL/TLS cert and include it in your website for free.
  • PHP5 Support – Build your website on-top of latest PHP.
  • Unlimited MySQL Databases – Modern websites run on Databases.
  • 18 years of Trusted Hosting – Started in 1997, it’s been 18 years of trustworthy service.
  • Open-Source – Based on truly open-source technologies.
  • Support for CDNs – CDNs (Content Delivery Networks) like CloudFlare are just an essential part of Internet.
  • Green Hosting Purely Carbon Neutral.

I’m proudly hosting at DreamHost. According to my research, only the DreamHost offers such a low cost solution providing the features of a premium. That doesn’t mean DreamHost is a cheap hosting provider. DreamHost is run by geeks, for geeks. DreamHost is actually a premium hosting provider with 18 years of very successful service and counting.

According to my research, other vendors provide the same solutions offered by DreamHost but at very high rates compared to DreamHost. DreamHost offers its premium hosting solutions for low cost compared to others. That’s what makes DreamHost unique and innovative among others.

For the curious minds, do you know, the free storage platform Ceph, is actually the brainchild of one of the DreamHost founder Sage Weil? Red Hat, Inc. later acquired Inktank for $175 Million. For those who don’t know, Inktank was a professional services and support company for the open source Ceph file system. The company was incubated and initially funded by DreamHost  and later supplemented by Mark Shuttleworth, before it was acquired by Red Hat. Sage Weil is now an employee at Red Hat. 

 DreamHost is run by geeks for geeks. 

Don’t take my words for it. Just research yourself. 

*Footnote: If you’re paying upfront for 2 years, the rate will further reduce to 8.95 US$/month (214.80 US$ for a 2 year term).

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy of this license, visit

Screenshot of

Free Joomla Blogging Service Announced

Here’s good news to all those who wish to try out Joomla but can’t afford premium webhosting services.

As we all know, Automattic Inc. (the company behind WordPress) offers a free blogging service through

Taking a leaf out from Automattic Inc.’s book, Open Source Matters Inc. (the company behind Joomla) is also offering the same though!

That means you can experiment with Joomla through their free blogging service just like we does through

To sign-up to the service and for more details, please visit

Binary Notations

Are there any difference between kB (kilobyte), MB (megabyte), GB (gigabyte) and KiB (kibibyte), MiB (mebibyte), GiB (gibibyte)?

Yes of course, there are differences.

1 kB = 1000 bytes
Whereas, 1 KiB = 1024 bytes
1 MB = 1000 kB
Whereas, 1 MiB = 1024 KiB
1 GB = 1000 MB
Whereas, 1 GiB = 1024 MiB

Let me clarify this with another example.

1 kB = 1024 bytes (Wrong)
1 MB = 1024 kB (Wrong)
1 GB = 1024 MB (Wrong)
1 KiB = 1000 bytes (Wrong)
1 MiB = 1000 KiB (Wrong)
1 GiB = 1000 MiB (Wrong)

The correct values are:
1 kB = 1000 bytes (Correct)
1 MB = 1000 kB (Correct)
1 GB = 1000 MB (Correct)
1 KiB = 1024 bytes (Correct)
1 MiB = 1024 KiB (Correct)
1 GiB = 1024 MiB (Correct)

What all these means?
The traditional kilobyte, megabyte, gigabyte values (otherwise called as ‘SI prefixes’) are based on power of 10. Whereas, kibibyte, mebibyte, gibibyte values (otherwise called as ‘IEC binary prefixes’) are based on power of 2.

Digital storage manufacturers and most *nix (Unix-like) operating systems (generally) use the SI prefixes to report the values. Whereas, MS Windows uses the IEC binary prefixes to calculate the values but report the values in SI prefixes. In other words, MS Windows computes file size in mebibytes, but report the number as MB!

Now you know the reason behind the formatted capacity of HDDs, for example, 1 TB HDD, differs on a *nix system and MS Windows system.

On most *nix systems, the formatted capacity of a 1 TB HDD is generally reported as 1 TB (1,000,000,000,000 bytes). To compute this value, the system used SI prefixes.

On MS Windows, the formatted capacity of a 1 TB HDD is reported as 931 GB (953,674 MB). To compute this value, MS Windows used IEC binary prefixes. But as you can see, the system reported the calculated value in SI prefixes (GB) but not in IEC binary prefixes (GiB)!

In a similar way, consumer confusion also exists in kbit (kilobit), Mbit (megabit), Gbit (gigabit) and Kibit (kibibit), Mibit (mebibit), Gibit (gibibit) values. But that’s another story to tell!

Copyright: Text is licensed to Robin Mathew Rajan under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy of this license, visit