Programming in Sushi

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

green code coming down from top of screen

A Matrix without Vectors

It’s been many moons since the movie The Matrix was released so I’m going to assume everyone has seen it. If you haven’t then shame on you and go fix that immediately because it’s a great movie.

For those of you who have, this question goes to you. Have you ever looked at any of their monitors when they were coding and wondered to yourself “what kind of language is that?”. While most people have no clue because they do not possess any computing experience, if you are a developer, you may have had a small chuckle because you 1) know The Matrix does not use an actual computer language and 2) that’s not how development with code works.

Ask any developer and they will tell you, most of your time when beginning is spent staring into the void of a black screen before any movement of the cursor. Even with code already existing, most of the time is spent staring at the screen.

They will also tell you, with many lines of code come many errors which if they can’t debug come hours if not days of frustration. Running to sources like Google, Stack Overflow, and GitHub to aid you in debugging only to find the root cause was a typo.

Real developer problems when you capitalize or add space to the wrong letter in your code. All that nonsense aside, let’s talk programming.

Quick thought: I was looking to research the computer language they used for The Matrix and found it they were sushi recipes. So, the link is below, and enjoy.

Link:  The iconic green code in The Matrix is just sushi recipes | The Independent | The Independent

the monkeys from see no evil, hear no evil, speak no evil

The Three Types

There are three main languages used which are machine (language consisting of binary or hexadecimal commands for a computer to respond to directly, easier for the computer to read but difficult for humans), assembly ( a type of low-level language intended to communicate directly with computer’s hardware, it’s not entirely like machine language but is designed to be more readable by humans), and finally high-level (is a more readable and user-friendly language that is away from the computer’s hardware).

I will not be going over those in greater detail now because that could be a post for another time. Leave a comment in the comments section if that’s something you would like me to cover in the days to come.

Also, we are not going to be going over all the possible languages as that would take all eternity and we don’t have that much time. So, we’re going to talk about Python. Why? Because it’s a high-level language, it’s what I started with, currently use, and has the easiest learning curve compared to other languages.

view of python the book

No, Not the Snake

As I previously mentioned, python is a high-level programming language which means it’s easier to read compared to mid and low-level. Python is also frequented for object-oriented programming and general purposes. Everyone from novice to experienced uses python whether it’s to do a simple algebraic expression or to create a crawler for web scraping. Side note: Web scraping (a process of using bots to collect content and data from a website) has a grey area when defining what is legal to scrape and what is not. Python also has a play in data science next to R as with most languages your choice boils down to the task at hand.   

To give you an idea of how simple python is:

1) go into your search bar wherever your toolbar is on your monitor

2) type “cmd” in the command prompt and select it

3) type python and hit enter

4) you should see the following symbol “>>>”

5) next to “>>>”, type x = “hello world” and hit enter

6) finally type “print(x)”

Congratulations, if you didn’t know how to program before then you do now and you have proof you can do it. Also, you may have just had your first experience with a variable (which is a container for the data) and data type (currently using a string but there are other types). A little warning, if you are doing this on windows and it’s in S-mode then this will not work since you do not have admin permission to access the command prompt.

Now if you were to try the same thing in a language like Java, it wouldn’t be that simple which is why python edges out a lot of languages. Printing a line out in Java would look like “System.out.println(“Hello World”)” which doesn’t look like much of a problem at first. You would need some other things to added before reaching this line to print out your result.

As you can already see with that little bit of instruction, you gained an understanding of what to do when you saw the word “print” in Java’s line of code. You could look at the printout statement for Java and map what its purpose was without having to read the entire sentence.

Hold on there, before you run out and start applying for junior python developer jobs, anyone with XP (experience) will tell you, it takes a ton more than being able to have the computer spit out “Hello World”. 

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

people cycling countryside

Whatever It Takes

Okay so you have made it this far and you may be feeling a little in the groove for learning to program. Programming is going to be an uphill battle. I remember my time trying to write functions only for the computer to return an error statement that had me balling my fist in frustration at the monitor because I couldn’t figure out what it meant. Remember when I mentioned sources from earlier? This is where they come to your aid.

Discussion boards will help a lot because being able to see how other people solved problems and how you could incorporate what they did into what you are doing. Spending time on sites like HackerRank had me gutted at some points because I couldn’t figure out what to do or what was asked of me but going to discussion boards and searching on Google and Stack Overflow kept me together because the key is not to know everything but understand what the code does.

Studying code and trying to commit it to memory is going to be an unnecessary headache. Python library is full of modules, and it would be insane to try and memorize each one and what it does. I’m sure there’s a special someone out there who has done it but for most people, especially people starting, trying to memorize is a dream killer.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Think you have what it takes to become a programmer?

Script a comment about what programming language you’re learning or looking to learn.

Hounds & The Morris Worm

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

man in dress shirt on the phone.
What do you mean “it’s illegal to drop a toaster onto Eric head”?
It’s not a crime if it was for science.
Photo by Andrea Piacquadio, please support by following @pexel.com

Outside of the longing to conduct social experiments, a popular one is dropping a toaster atop your co-worker’s head to test gravity and ensure it still works. You could say the internet has and can take us places we never thought possible.

We can go to many locations, stay in touch with people close and far, and have the ability to get our digital hands on anything provided we have the coin. So, with all the good, what’s the bad? Well, the bad is, again being able to get your digital hands-on certain items, most of which could be questionable, if you have the coin.

I mean, it shouldn’t be that easy but here we are. One of which is someone mails you a flash drive saying “Hot Nudes, your spouse will never know. Don’t worry.” You should worry and never put the flash drive into your system because your spouse will know when the computer starts acting wonky and a virus begins to run rampant on your machine and very soon, your network. Again, five minutes of fun could have you rooted, and I’ll go over how.

dog in greyscale.
I know that I am a cute dog. I do know what you want but I want you to know something. I have a particular set of teeth; I will find you… and I will bite you.
Photo by Sedat Ozdemir, please support by following @pexel.com

Capture and Release

Have you ever watched The Simpsons and heard the famous line from Mr. Burns, “Release the hounds”? If you haven’t here’s a brief overview, Mr. Burns is mainly an evil rich guy who employs Homer and a few of his friends, and when the mood strikes, he will tell his assistant Mr. Smithers to release the hounds to chase Homer off.

So in a sense, what every corporate boss wants to do but legal reasons stop them. I use this phrase because it’s symbolic of what happens after releasing a virus or what it is actual name is a worm. Computer worms are a subset of trojan malware that can self-replicate from one computer to another and eventually spread through a network without human intervention.

The original name was The Morris Worm, named after Robert Tappan Morris. Robert being a simple student at Cornell University created this worm with the intention to gauge the size of the precursor internet of the time “ARPANET” (Advanced Research Projects Agency Network)– the first public computer network mainly used for academics and research.

However, this testing resulted in a denial-of-service (DoS) for 60,000 machines back in 1988. But the fun doesn’t stop there, the United States v. Morris 1991, resulting Morris being the first convicted under the 1986 Computer Fraud and Abuse Act having a nice price tag of three years in prison, 400 hours of community service, and finally paying a fine of $10,000. This may have you thinking twice about trying to view spicy pictures of kittens on your family computer.

man holding 2 paint brushes
I think I caught Covid from this one last time.
Photo by Andrea Piacquadio, please support by following @pexel.com

Vectors of Infection

A worm, how is it different from a virus? Worms, as mentioned earlier, tend to be able to self-replicate and spread throughout linked computers and then onto the network.

Viruses, on the other hand, tend to be attached to files or programs and hide until transferred elsewhere unknowingly. So if you wanted this in nightclub terms, worms are crabs and viruses are herpes.

Some of the vectors used for infection are emails, file sharing, instant messaging, smartphones, flash drives, and if it’s connected to the internet in some fashion, game over man could be heard from everyone on your contact list and pretty much around the world. The six degrees of separation would no longer exist if a worm were never quarantined and dealt with.  

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

person in medieval armor
She said bring protection…girl just you wait. I got all the protection.
Photo by PhotoMIX Company, please support by following @pexel.com

Keeping safe via Updates

So, how would you be able to tell if you have a computer worm running around making its wormy babies on your PC (Personal Computer)? Some signs are files making like a deadbeat parent and just disappearing (I’m not going to single out deadbeat fathers, there are deadbeat mothers too).

Your computer begins to run slower close to sluggish, this could be caused by the worm taking up memory as it spreads leading to a large amount of free space being taken up. So at this point, you may be thinking “Wow this suck, I want to see spicy pictures of kittens, but I don’t want crabs.”

Well, you’re in luck, and don’t let your spouse know that Z-Daddy told you this. Some ways to prevent catching a worm or “crabs”, Deadliest Catch, staying away from downloading from unknown sources, verifying with your contacts if something is sent from them, keeping the operating system up to date, and having antivirus software and making sure that’s up to date as well.

Morris may have created a monster that caused a decent amount of chaos and was the first person to get freshly smacked with the Computer Fraud and Abuse Act (CFAA) but went on to cofound the online store Viaweb and later funded firm Y Combinator. So every cloud has a silver lining.

Mark: So what I got from this script is that I can create a virus open my own business.
Tina: That’s not what he meant Mark, stop skimming and actually read.
Photo by Anna Shvets, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Figure there’s some information I missed on computer worms. Scripted a comment below.

A Virus Built with Love

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Sean: I’m always here for you.
Samantha: That’s great but you only have $30 in your pocket, and I only have three more minutes left.
Photo by Ana Maria Moroz, please support by following @pexel.com

Here’s a strange question for you. Have you ever loved someone so much that you create something in their name? Not like a creepy shrine or anything like that, I mean create something and let it loose on the internet for it to wreak havoc on the world.

If you haven’t, then you’re a part of the unlucky club as most people haven’t experienced that kind of love. Well… I say love but it very well could be just wanting a good “fun hugging” time and things just didn’t work out because well, money.

It kind of makes the world go round. However, let me script to you someone who has and how the internet went ablaze with the “You got mail” era.

You pay, I slay.
Photo by Efigie lima Marcos, please support by following @pexel.com

50 Networks of Melissa

Back in the heyday of AOL (America Online), there once was a virus called “Melissa”. I know someone is probably offended and wondering why their name is a computer virus that may be oddly categorized wrong since worms replicate themselves throughout a network, which is what this “virus” did.

I’m not going to get into the politics of it. Just know this virus was created and released, and many people were upset. Melissa (sorry for anyone known by this name and reading this), is what is called a “macro virus” – meaning this virus was written in the same language Microsoft Word and Excel were developed in.

Melissa (again, sorry, I didn’t choose the name) would hide in spreadsheets and activate as soon as you open the file, once opened triggers malware made to wreak havoc on your machine and further spread the virus to the edges of your contacts list and theirs and so on and so on. Melissa was the kind of gal that kept on giving.

David: I told you already, her name is Melissa, and she loves me.
Dr. Paterson: David, we’ve been over this. A computer virus that you created can’t love you.
Photo by Timur Weber, please support by following @pexel.com

Breaking AOL and Beyond

You may be wondering, who was this madman or madwoman, it’s wrong to assume the gender nowadays, that created this virus in the name of love. Look at no other person than David Lee Smith.

David chose to make use of the confusion surrounding the internet and email at the time since the internet or web1 was in its early stages. I don’t see how there was that much confusion, it was either you have mail or you don’t have mail. It seems pretty straightforward if you ask me, but you didn’t so whatever. Rambling aside, David, in late March of 1999, hijacked an AOL account and used it to post a file on an Internet newsgroup name “alt. sex”.

The post was promising a really good time because it offered over a dozen free passwords to websites where you had to pay for adult content. Posting like that nowadays wouldn’t have much of an effect since most of what you want to watch is free however, I am aware there are a number of you out there who are broken and may need to find some “harder material”. Like cats being shuffled around in duffle bags, Z-Daddy isn’t judging.

Oh, and he chose to name this virus Melissa after a stripper that he was into. I’m guessing the story is, he fell in love, and she said you don’t have any more money, he got depressed and created a virus, giving it her name to make her famous.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Hello from the other side, I’ve must’ve called a thousand times.
Photo by Hebert Santos, please support by following @pexel.com

Setting Fire to the Network

So, what were the effects of Melissa’s presence? Well aside from overloading email servers at more than 300 corporations, government agencies included, no the government is not happy when you mess with them however they are giddy when they get to mess with you, it ended up shutting them down entirely along with costing $80 million in damages.

The virus functionality worked in the form of phishing, where you would open an email and click on an attachment, the infected file would then activate and read to the computer’s storage where it would create an Outlook Global Address. After this, the virus would then send copies of itself to the addresses read.

So in a nutshell, this would get into your machine, find your list of contacts, and begin its great journey spreading itself down everyone’s cornhole. Psychotic ex strippers…am I right?

I will siren your bank account and beyond.
Photo by Somewherewith Tom, please support by following @pexel.com

Protection Against Sirens

You don’t need to worry about this Melissa getting into your life and mucking it up anymore, well for the most part. The news spread fast enough to slow the spread allowing cybersecurity professionals to contain and restore their networks. However, this doesn’t mean that you’re free to run around clicking on links promising you a good time.

There is a wide array of viruses out on the internet that have the same attributes as Melissa. But ways you could prevent her from ever knocking on your door…well, one way is not forgetting to tip your bartender and close your tab.

Always follow good bar patron best practices. When checking your email, if you find you have to take a double look because something seems grammatical or misspelled, for example, “h0w ar e    you” versus “how are you”. If the email you received came from someone you know, it’s always a good thing to double-check with them to confirm that they sent it.

Always use an antivirus/antimalware/antispyware and make sure your operating system is up to date as patches for any vulnerabilities would include improving the safety of not only your computer but your wallet as well.

But to protect yourself entirely is just to use common sense and if it looks phishy, then don’t engage, and delete it immediately. On the internet Melissa has friends and they can do the same thing as her, if not better, just when you thought she was one of a kind.

Seth: The latest script was like OMG, and it made me ten times happier to be with you.
Tina: I know, Z-Daddy made me feel the same way.
Photo by cottonbro studio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think there was something I missed or may have gotten wrong about Melissa? Script a comment about it down below.