Random rants on a huge variety of (mostly) interesting topics.

Monday, November 28, 2005

Attenta! Important!

Alright! Quickly send me a list of all your favourite links (of websites) As Soon As Possible, okay?

While you're at it, you might like to visit MysticalBall.com, if you haven't already done so. It's quite eerie till you discover the trick, then of course you'll kick yourself for being so dumb.

And you can (once again, if you haven't done this before):
1. go to Google.com
2. type 'failure'
3. click on 'I'm feeling Luck' (this directly takes you to the first result without showing you the results page itselft)

p.s. Please do remember that the first thing is most important (the rest are just add-onns)!

Sunday, November 27, 2005

Weird Coincidences

Il est mon premier post... (This is my first page)
OK before reading this....
Do be ready to read alot
Once started dont miss antyhting out
And if you get tired do read the Kennedy And Lincon coincidences...(dats de best part..From"What were you doing?")
And monkeyman you forget about this anywayz..

Strange coincidences
Missing flight- and voice-recorders
Every commercial aircraft carries two black-boxes - the flight and voice-recorder. These are as close to indestructible as possible - and after a crash, they are recovered and used to find the exact reason for the accident.
Only one voice-recoder is known to be recovered, the one from flight UA93 which crashed in Pennsylvania - but the exact contents are being kept secret by the FBI.
Why is it being kept secret when there is nothing to hide? When it contains evidence of the passengers of the flight taking over the terrorists which supposedly lead to the crash, what is the secret?
3 theories:1. the plane has been shot down by an F-16 (this was authorized by President Bush) and the government wants to hide that fact and keep up the story of the 'hero flight'2. a bomb exploded in the plane (the terrorists may have had bombs according to some of the phone calls) 3. there was no plane / a different plane (drone? missile/bomb?)

Incomplete passenger lists
The passenger lists of the 4 flights do not match with the announced number of victims, and there are no Arab names on the list - especially not the names of the so-called hijackers.
It is still unclear how they could be so quickly identified (their DNA-samples could not be identified) after 9/11.
One reported phone call from flight 11 named the seat numbers of 4 hijackers, while the FBI reported 5 hijackers afterwards on different seat-numbers

Missing wreckage and bodies
Four crashes on one day - and all the planes have 'disintegrated' as well as the bodies.
This is probably the first time an airplane crashed and there was nothing left - no wreckage, no black-boxes, no bodies. And it happened 4 times in a single day!
The victims could be only identified by DNA-samples, and approximately 1000 will probably never be identified.
Planes have crashed into buildings before (e.g. El Al Cargo Flight No.: 1862 on 04 October 1992 in Amsterdam),
and planes have been destroyed by bombs - (e.g. Pan American Flight No.: 103 on 21 December 1988 at Lockerbie),
but never before there was no evidence of what had happened.

The found passport
Although the plane was totally destroyed and nothing else could be recovered, we are supposed to believe that that a passport of Mohamed Atta is practically the only thing that survived the crash into the World Trade Center.
And he reportedly used a passport from a fictional country, Conch Republic, to board the plane!
Hijackers still alive?
U.S. authorities have identified 19 men as the suspected hijackers aboard the four airliners that crashed on September 11 into the World Trade Center, the Pentagon and a field in rural Pennsylvania.
Authorities noted that the names used by the suspects may have been stolen identities.
So they have been identified on basis of stolen identities?!
The FBI asks anyone who has ever seen or has information about these individuals to immediately contact the nearest FBI office.
Seven of the men have been reported alive.
That means the FBI does not really know how the hijackers were.
But they knew (?) they were sent by Osama bin Laden quite fast - astonishing!

Black Boxes
Large commercial aircraft and some smaller commercial, corporate, and private aircraft are required by the FAA to be equipped with two "black boxes" that record information about a flight. Both recorders are installed to help reconstruct the events leading to an aircraft accident. One of these, the Cockpit Voice Recorder (CVR), records radio transmissions and sounds in the cockpit, such as the pilot's voices and engine noises. The other, the Flight Data Recorder (FDR), monitors parameters such as altitude, airspeed and heading. The older analog units use one-quarter inch magnetic tape as a storage medium and the newer ones use digital technology and memory chips. Both recorders are installed in the most crash survivable part of the aircraft, usually the tail section. Each recorder is equipped with an Underwater Locator Beacon (ULB) to assist in locating in the event of an overwater accident. The device called a "pinger", is activated when the recorder is immersed in water. It transmits an acoustical signal on 37.5 KHz that can be detected with a special receiver. The beacon can transmit from depths down to 14,000 feet.
Following an accident, both recorders are immediately removed from the accident site and transported to NTSB headquarters in Washington D.C. for processing. Using sophisticated computer and audio equipment, the information stored on the recorders is extracted and translated into an understandable format. The Investigator-in-Charge uses this information as one of many tools to help the Safety Board determine the Probable Cause of the accident.
SpecificationsFlight Data Recorder
Time recorded 25 hour continuous Number of parameters 5 - 300+ Impact tolerance 3400Gs /6.5ms Fire resistance 1100 degC/30 min Water pressure resistance submerged 20,000 ft Underwater locator beacon 37.5 KHz Battery: 6yr shelf life 30 day operation
Cockpit Voice Recorder
Time recorded 30 min continuous, 2 hours for solid state digital units Number of channels 4 Impact tolerance 3400 Gs /6.5ms Fire resistance 1100 deg C /30 min Water pressure resistance submerged 20,000 ft Underwater locator beacon 37.5 KHz Battery: 6yr shelf life 30 day operation

What were you doing?
Many of you who are around my age, will remember the the day President John F. Kennedy was assassinated. Many of you will have read the strange coincidences relating to his, and Abraham Lincoln's deaths. For those of you who may have forgotten, here is a list to remind you, and for those of you who were not born at the time, or have never heard about the coincidences, the list will get you thinking. They say that everyone who was old enough, remembers exactly what they were doing at the time Kennedy was shot. I can remember what I was doing when the news flash came on the TV as if it were yesterday. Even though I was doing nothing of any significance at the time, I could tell you my exact position in the room, what I was doing, and what I did afterwards. Even though I have never travelled to America those five or ten minutes are still as clear as ever in my head forty years after the event.
Coincidence's?
For those of you too young to remember the day the killing of John F. Kennedy took place, or any of you who do not know of the coincideces surrounding the two assassinations, I have printed them out again. These are the ones that I have managed to dig out. If anyone out there has any that I missed I would be grateful if you could let me know. I know that these may be just what they are recorded as; coincidences, and that there may be no dark, hidden meanings or supernatural elements, but they have always fascinated me by the sheer number. Some are just meaningless statistics when viewed separately but you must admit that when you see them all together they make strange reading. It seems that the interest has died down after all these years, in fact they are hardly mentioned at all now. I personally, find them very strange, but true!
John F. Kennedy...
Abraham Lincoln...
Elected to Congress 1946
Elected to Congress 1846
Became President in 1960
Became President in 1860
The legality of the election was questioned at the time.
Legality of the election was questioned at the time.
Lost a son during his term of office.
Lost a son during his term of office.
Kennedy's aide was named Lincoln.
Lincoln's aide was named Kennedy
He was advised by his aide not to go to Dallas
He was advised by his aide not to go to the theatre.
Shot from behind, on a Friday.
Shot from behind, on a Friday.
His wife, and another couple were with him at the time.
His wife, and another couple were with him at the time.
Kennedy was shot in a Ford Lincoln.
Lincold was shot in Fords theatre.
Lee Harvey Oswald, Kennedys assasin, was born in 1939.
John Wilkes Booth, Lincolns assasin, was born in 1839.
Treble barrelled name containing fifteen letters.
Treble barrelled name containing fifteen letters.
Oswald ran from a warehouse and was captured in a theatre.
Booth ran from a theatre and was captured in a warehouse.
Oswald was a Southener, and was killed before he could be tried.
Booth was a Southener, and was killed before he could be tried.
Kennedy's Vice President was a Southener named Johnson. Born 1908.
Lincoln's Vice President was a Southener named Johnson. Born 1808.
Before he was killed, Lincoln spent time in Monroe, Maryland.
Before he was killed, Kennedy was reputed to have spent time in Monroe, Marylyn!

A fable based on fact.
For centuries, there has been a legend of a lost city. A city that sank beneath the waves. A city that boasted the finest artwork and buildings. Plato, recalling the legend, wrote about this city, embellishing it with his own ideas. He called this city "Atlantis". People all over the world have heard of this great city. Some believe that it was an entire continent, but most believe it to be no more than a myth. But was it? Read on. A fairly recent discovery could finally unravel the mystery of how this legend came about, and could, if later searches are successful, prove the legend to be true! The research is still ongoing and I will try to update as soon as new information becomes available.
Ancient writings.
Helike.
A whole city disappearing under the sea, leaving no trace? Impossible! Or is it? The fact is that as stories are passed down over a period of many years, they get corrupted. Pieces are added on, and left out. Different people narrate in different ways, and the stories get altered as time goes by. But behind every legend or myth, there must have been something that happened at the time, bearing some resemblance to the stories we end up with today. There are some ancient documents that may help to uncover this mystery about the lost city of Atlantis. These ancient documents describing the events have been available for many years. It was only due to someone querying the meaning of a single word in recent years that amazing discoveries have been, and are continuing to be, made.
The writings tell us that in 373 BC the town of Helike, on the Corinthian Gulf, was covered by an enormous tidal wave and sank to the bottom of the sea. There is no doubt that the documents are genuine, and that the town did actually exist. There is also no doubt that it mysteriously disappeared, taking an estimated population of 5,000 with it, about 2,500 years ago. It is assumed by many that this was the basis for Plato's story of Atlantis. Helike was a religious centre to the god Poseidon, god of earthquakes and the sea. Around a hundred years ago a coin was found on the gulf bearing an image of Poseidon on one side, and the name Helike on the other. Since then many have searched the seas around the area the city was said to be located, without success.
Sonar.
Earthquakes.
The man who invented the sonar system for use on ships, Harold Edgerton, spent much time in the pursuit of Helike. He used the equipment to map out the sea bed looking for anything resembling the site of a destroyed city. He once discovered a formation containing straight lines 140 feet below the surface. After much time and expense bringing samples to the surface it was found to be a natural rock formation. In 1973, after nine years of fruitless searching, even he gave up the quest. For fifteen years after, no real attempts were made to uncover the mystery. Then, in 1988, a local female archaeologist, Dora Katsonopoulou, made a startling discovery while studying the ancient texts. The word "Poros" had been translated, and taken to mean the sea. It actually means a lagoon, or narrow passage of water. People had been searching in the wrong place, under the surface of the sea, for years.
The area around the Corinthian Gulf has always been prone to earthquakes, and due to a slanted fault in the earths crust the tremors cause sections of land on the plains to slide down and sink. In 1861 an earthquake had caused the whole plain in the area to sink by one metre. This could explain the town being swallowed up all those years ago, but why the references to sinking into the sea, and giant tidal waves? An expert on the effects of earthquakes was called upon to join the team. He made a study of the area and also looked at the only film footage available at the time, of a strange effect that happens during some major earthquakes, liquefaction. The expert studied the film of a Japanese earthquake which took place in 1964. After the massive earth tremors had caused the buildings to collapse an amazing thing happened. Water started spurting up from below the surface in vast quantities. It turned the earth into mud which caused the buildings to sink into it a couple of feet. Could this, if on a more massive scale, been the fate of Helike? This would certainly explain the description of it sinking into the sea.
Where is the lake?
If this was a case of an earthquake followed by liquefaction on a massive scale, where was the lagoon now, and why is reference made to a giant tidal wave? These were questions that Dora Katsonoloupou and her team were determined to find out. They came up with the theory that an earthquake of such magnitude, powerful enough to cause the land to slide down enough to take a whole city with it, would send shock waves out for miles around. These shock waves would have caused a collapse of large areas along the gulf coastal area. As the large body of land crashed into the sea it would cause an enormous wave to travel across the water, rebound off the other shore, and return with enough force to end up some distance inland, burying Helike underwater and leaving a great salt water lake to fill the crater made by the quake. This theory left one important detail out. Where was the lagoon?
The Bridge.
Crustacean clues.
From old maps they plotted out where the site should be. They used the distances from other towns given in the documents, some of them still in existence today, but their target always ended up on the plain, nowhere near the sea. It was at this time that they heard that a local man had investigated some strange rocks he had found nearby nearby. On investigation, the man realised that it was an old bridge buried deep in the earth. A bridge that was over 500 metres from the river! This gave them the idea that set them on course for the discovery they hoped to make. Laboratory tests on miniature artificial rivers were carried out. They learned that water on its own runs in a straight line, but when sand was added to the flow, random deposits were made which quite dramatically altered the course of the water and filling areas with sand. With the loose rocks and gravel caused by a history of earthquakes being washed down by the river as silt, a land mass began to form. Coupled with the annual floods washing more deposits down from the mountains, the whole plain could have formed here in the years since Helike vanished "into the sea".
In 1991 the team decided on the spot where Helike would have stood, they had found the cave of Heracles which had overlooked the city and combining this with the other distances from towns, they arrived at the site where the first probes were made. They pushed tubes deep down into the ground over a large area to bring up soil samples. After two years of sampling they hit what they thought was the jackpot, an ancient bottle fragment was contained in one of the tubes. Imaging instruments were brought in and magnetic mapping revealed what looked like buildings under the earth. The excavation work began and indeed, the tops of walls, pottery. All they needed to prove now, was the presence of sea water. Marine biologists found small crustaceans called ostrecods, and fish scales in the soil. An expert on the subject proclaimed that the ostrecods were the type found only in sea water. This proved that the plain was once a large body of salt water that had been filled in over the centuries. Disappointment however, was to be the reward for these findings. Although they had found a buried settlement, it was found to be 2000 years older, a prehistoric site.
Volunteers wanted.
This was not to be the end of it though, for forty metres away from this site more pottery started to appear with the soil samples. This time, it was the black glazed classic Greek design that was associated with Helike. The excavations started again, and three metres down they hit the walls they had hoped for. There were other artefacts and silver Greek coins from the period shortly before the disaster. The soil contained the same sea creatures, and more importantly, the layout of the walls showed that they had been toppled over with a great force. The force of a tidal wave. In 2002, they had found Helike, and possibly the key to the legend of Atlantis. Dora Katsonopoulou and her dedicated team are still hard at work on the site, and will be for years to come. She is also appealing for volunteers to help with the work.

Saturday, November 26, 2005

hmm.....more news......

Yesterday, I went, as promised to see Harry Potter and the Goblet of Fire. I cannot say that I liked it very much. There is one thing which I definitely did not like and that is that the director expects you to have read the book, which is not very nice of him.
Anyway, I also succeded in buying (finally) my very own copy of Linkin Park: Meteora, Tour Edition which has 'special' extra stuff and even some videos of the songs. I do believe that Arjun already has this 2-CD pack, but if you guys want it, you're more than welcome!
Also, Digvijay has been invited to this blog. Needless to say, he'll accept soon.

p.s. sorry for my terribly boring post.

Friday, November 25, 2005

"Is Your Son a Computer Hacker?"

It all started with Ankit Fadia's visit to our school on the day of the Exun 2005 prize distribution and his subsequent speech. In a fit of inspiration, some of us starting searching Google for something interesting about hacking. We saw a rather interesting link titled "Is Your Son a Computer Hacker?" and on clicking it, this is what I found: (this is just the better part, to see the entire thing, go to http://www.adequacy.org/public/stories/2001.12.2.42056.2147.html)

....When Peter(the guy's son) began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: "Peter is a computer hacker!"....
...To this end, I have decided to publish the top ten signs that your son is a hacker. I advise any parents to read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son's misbehaviour before a spanking becomes necessary...

1. Has your son asked you to change ISPs?

Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.

I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.

2. Are you finding programs on your computer that you don't remember installing?

Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.

3. Has your child asked for new hardware?

Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.

4. Does your child read hacking manuals?

If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.

If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

5. How much time does your child spend using the computer each day?

If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.

6. Does your son use Quake?

Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

7. Is your son becoming argumentative and surly in his social behaviour?

As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.

Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

8. Is your son obsessed with "Lunix"?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.

If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

9. Has your son radically changed his appearance?

If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.

10. Is your son struggling academically?

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.

I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.

Well, guys - since I qualify for the first 5, do you think my parents should be worried?
LOLZ!!

Wednesday, November 23, 2005

It's NOT sleeping time...

Hey, guys.........
Well it certainly seems as though we've all been sleeping for the longest time ever, right? This, you see, is not very nice. There haven't been any new posts from karky and divyanshu lately (the first page of the blog is completely dominated by 5 posts by me, 3 by arjun, and 1 by karky. Divyanshu had promised some posts, but somehow, I don't see them........
I've been pretty busy lately, we had our Exun 2005 symposium on Saturday and Sunday and I was in charge of updating the results on the website (to view my exquisite work for which I received a kinda 'prize' - visit exunclan.com/results.htm)(to know how exquisite my work was, visit lnexun.com n scroll down a bit) :-D
Anyhow, I'm gonna be posting some more stuff too. For now, here is the much-awaited list of NES ROMs.

1943
Alien 3
Arkanoid
Bad News Baseball
Baseball Simulator 3
Batman 3
Battle Toads
Blades of Steel
Bomberman
Burger Time
Captain America
Chip 'n' Dale
Contra Force
Contra
Darkwing Duck
Dig-Dug 2
Excite Bike
FF3
Field Combat
Flipull
Galaga (galaxian)
Heavy Barell
Hudson's Island Adventure
The Karate Kid
Kirby's Adventure Island
Megaman 3
Mike Tyson
RC Pro-AM
RCR * (not sure what this is!)
Smash TV
Spy vs Spy
Star Wars
Super Contra
Super Mario Bros.
Tetris
Teenage Mutant Ninja Turtles
Top Gun
Ultima - Warriors of Destiny
Ultra Base

Also Digvijay would like to join our blog - I hope no one has any objection on that account.

Saturday, November 05, 2005

Rashtrapati Bhavan

Ive just been to the Rashtrapati Bhavan.(not so special) but, i was allowed where other people were not cause of this friend my father had got.So anyway we went and saw the presidents dining and drawing room(yellow and some other drawing rooms) which were off limits to any people except some 6 odd people (of which my father knows one called an ADC).Ishaan my bro went and actually turned the key to the presidents room (totally off limits NO ONE only the president) we peeked inside and saw a painting of jawaharlal nehru and a huge sofa before the ADC caught us looking in. We saw the deer park and a huge amount of places( no photographs were allowed duh). And everything (except the gallary and the mughul gardens) were off limits.
And we snacked in the rashtrapati bhavan (served by some wierd looking butlers) Man i felt like a king ya . I sat on the throne of King George the fifth totally not allowed and Queen of England

Arjun

Tuesday, November 01, 2005

Holidayzzzzzzzzzzz........

Hey!
This is just to inform you guys that I'll be away from tomorrow till the 5th or the 6th. I'm going on a holiday to Ranthambore.

-- Sahil