Tag Archives: security

A weird Google search bug

Last month, it was asked on quora –

> What does -4^(1/4)” mean and why is it connected to porn?

Still today, if you search for that equation on Google, it returns results with xxx titles. Some more contradictory search equations which return same type of results are

“1 2” -1

“1 2” -2

The explanation of the equation -4^(1/4)” is given as – we are asking Google to return pages containing a 1 next to a 4, but which do not contain a 4.

A Google engineer related with the search quality, justifies that this should return zero results, because it is impossible to satisfy both requirements. However, we have uncovered a bug that causes some web pages to “match” these contradictory queries. Since these are the only results that “match” the query, they are the results that get shown.

Its really a bizarre bug in the Google search, which needs to be fixed soon. Though its not affecting many of its users, it is benefiting the porn websites in getting higher ranks.


Common Security Threats

  • Smurf

Its a version of Denial of Service attack – floods the victim with spoofed broadcast pings. A large number of pings are sent to the IP broadcast address of the victim, it responds back with broadcast to all the hosts – and these hosts simultaneously reply – causing a major lock in the network.

  • Ping of Death

A funny ping – ICMP packet is sent to the victim – which floods its buffer, causing the system to reboot or the network getting hanged.

  • DoS

The Denial of Service attack does exactly as the name suggests – prevents the users from the service. Can be generally implemented with ICMP spoofing.

  • SYN Flood

The SYN packets are used for connection establishment – and these SYN packets are used here to take down a computer by sending a number of useless SYN packets, and the computer becomes too busy responding to the SYNs.

  • Virus

Tiny programs creating a variety of bad things to computers – and they can replicate itself! 

File virus – contained in executables like .exe, .dll, and .com.

Macro virus – A script to automatically carrying out a task – without the user initiating it.

Boot sector virus – They damage the booting process of a computer by over-writing the boot sector, creating problems like hard disk error or missing OS.

  • Worms

They are a lot like virus, and also they can actively replicate – without the user opening or executing them. They can propagate and destroy themselves.