This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

<div id="slider"> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisdP7VBy7OkYcmJ0YM0PDhTk-GhgSDXXs8rVPdMdp8HG2difgXNB4_1sUZzDUz9rpB78zMvu_snGiHgdKUELENNuQjml8c_iTXdge5BrfPHptLPEsXvc0ANYz_W3fkuedCcMpfDgmuwDE/s1600/toystory.jpg" title="This Is A Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZb9A64F_M4G0CiFWohJk8DGpkFOTEVNH6rdUPULcMX6lZ7OZiUwx0J34vOLfjE7jjEPfTcX8HZ3d2D6Eqp7pdixXYsppzawCFt-nXyeH_Wk3u5RQyuHVYnzYOdudLU6kbnhsvhrC6nUo/s1600/up.jpg" title="This Is Another Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDiQK9ZDERVD5EuDOJ1oxTKkKVRamZVsx8clW3oqECuwkVn62-8ggeXZShnBeo4iOvWTzOPB1zYRmq69S_q2G99esr94u10FMWQ8DZmzzFmbY7nx8W_ecsiC_iKXRBmK0a_hpKTWX1IZ8/s1600/walle.jpg" title="This is an example of a caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUzlio7FH9-Gu3EqOOi8NfPIBS7NOFxsBhn9USQURiccHz6j6eKk78_l3sYpcTKk7OJ0ry58RzZQOqPmyDjHJM_Ebf8iAvSPuCEZ9nsZNQULzuF0UHMs3lqaZzv6-aygfP7J6NflQ3lc/s1600/nemo.jpg" title="This is another Caption" /></a> </div>
Showing posts with label news. Show all posts
Showing posts with label news. Show all posts

Tuesday, 8 May 2012

‘Hangouts on air’: Get ready to go live on Google plus

Google’s social networking site, Google Plus, which the search engine has pitched against Facebook is getting big big makeover. The company today announced in an official blogpost, that Hangouts On Air feature was now available for all users.

The feature which was showcased last September, makes Google plus’ Hangouts a little than just a video-chat between two people or a group of people, it now gives users the option to ‘broadcast their chats’ live on the Google plus and later put up recorded versions on their YouTube channel or website.

While some might not be enthused by this idea, for celebrities and well-known personalities, this could be a great mode to connect with larger audiences.
Screengrab of Google Hangouts on air.


On the blogpost, Google spells out how and where you can use Hangouts on Air,

Broadcast publicly. By checking “Enable Hangouts On Air,” you can broadcast your live hangout—from the Google+ stream, your YouTube channel or your website—to the entire world.

See how many viewers you’ve got. During your broadcast, you can look inside the hangout to see how many people are watching live.

Record and re-share. Once you’re off the air, we’ll upload a public recording to your YouTube channel, and to your original Google+ post. This way it’s easy to share and discuss your broadcast after it’s over.

Google’s move could change the way videos are used on the Internet. Avid YouTube users can now see their chats loaded on the website.This could end up starting a whole range ‘chat’ memes for both Google and YouTube.

It also needs to be remembered that Google has been trying hard to monetise videos onYouTube by starting web-channels in a bid to get more audience. With Google Hangouts on Air, this will mean a bunch of new type of chat videos, absolutely free of cost to Google. Also celebrities on Google Plus would try and use the feature to connect with fans in a way that Facebook or Twitter can’t really offer.

Hangouts on Air looks like a very smart move on part of Google which will take social media into a different direction. Don't forget to leave your comments below. Subscribe and like :D PEACE.

Wednesday, 2 May 2012

Now, translate your Gmail messages into your language

Gmail users will now be able to translate e-mails in foreign languages into the their own, with Google introducing a new feature.

Google on its official Blog has said a new 'Translate message' header will be soon introduced in Gmail.

"Over the next few days, everyone who uses Gmail will be getting the convenience of translation added to their email. The next time you receive a message in a language other than your own, just click on Translate message in the header at the top of the message," Jeff Chin, Product Manager, Google Translate, said.

The idea mooted after Google introduced automatic message translation in Gmail Labs and prompted the labs team to go for a survey in which the teams found the necessity of Gmail message translation.

"Since message translation was one of the most popular labs, we decided it was time to graduate from Gmail Labs and move into the real world. Over the next few days, everyone who uses Gmail will be getting the convenience of translation added to their email," Chin added.

The feature also automatic translation feature. Google had recently announced that it is increasing everyone's free storage in Gmail from 7.5 GB to 10 GB.(see this post to know how to utilize that much free space). Subscibe and Like:) PEACE.

Tuesday, 1 May 2012

Ethical Hacking and Cyber Securit Boot Camp at Delhi

All you script kiddeis put your hacking hats on and get ready for a Boot camp on Ethical Hacking and Cyber security being arranged by The hacking News[THN] in New Delhi,India. Though its not just for the scriptkiddies only but for every aspiring hacker.Their Hacker Boot Camp training session will teach you how SYSTEM INTRUSIONS and many more stuff are done. You will be shown the techniques, tools and methods that the hacker uses. This insight will help you understand how to better protect your IT architecture and identify the vectors of attack that hackers use. 


CCSN is a revolutionary new certification in the field of information security training program for amateurs and professionals to help you gain the skills you need to become an expert in the field of information security. This specialized certification assures potential employers and customers that you have a level of advanced knowledge to detect and offer support for some of the most advanced security vulnerabilities. The CCSN is the only completely hands-on, real world oriented security certification.

Batches with limited Registrations in order to provide best Training Quality and Personal Interaction between students and Trainers. Course comes with a custom-built practical labs specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade.


To get Registration and Details, Please do Email to info@thehackernews.com

Course Outline:


  • Php, Database and Linux - These are Pre-Required Knowledge that students will learn within CCSN package.
  • Information Gathering and Scanning - Enumeration using various Backtrack Tools
  • Privacy is the number one issue facing by internet users. You will learn to use Proxy Servers, Anonymity Techniques, Various Tools, Tunneling & VPN usage and Concepts.
  • Email Hacking & Social Engineering - If you ever wonder how hackers actually hack into any email account? This Lesson is going to give each and every possible solution of this Question.
  • Cryptography and Encryption Basics, Understanding various Hashes and Encryption Algorithms and various password cracking techniques.
  • Camp will include various types techniques that can be used to Hack a System, Cracking system password, Using Stealers, Key loggers and Remote Administrations Tools (RATs) and Creating Undetectable Viruses using Crypters, Binders and Assembly Codes.
  • Web Application Hacking using - Advance SQL Injection, Cross Site Scripting, Local File Inclusion (LFI), Remote File Inclusion (RFI), Parameter Manipulation, Session and Cookies Hijacking, Click Jacking, Shell Injection, Brute force Attacks against Website login pages.
  • Server Hacking via Rooting Servers, Remote Code Execution, Buffers Overflows,  Brute force against Servers, Using Dos, DDos and Creating Botnets, Using various Exploits and Exploits Databases.
  • Understanding Wireshark, Cain & Abel and TCP Dump, Man in the middle attacks, Router Hacking, Sniffing Data and Passwords, ARP , DNS, DHCP Spoofing attacks,  DNS poising , DOS attack against an IP address, Flood the LAN with random MAC addresses, Packet Injection.
  • In labs of this lesson a CCSN student will learn practically to crack Wireless Encryptions and Prevention Techniques. The Complete Demonstration will have various real World scenarios to clear the Advantages of Wireless Hacking.
  • Using Wikto, Nessus , skipfish, w3af, SQLmap Websecurify for vulnerability Scanning and ExploitingII. Wordpress-scan , Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pen-testing.
  • Using Metasploit Framework for Exploitation, Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for various System/Network/web Attacks.
  • Using IP tables and Firewalls Policies to Protect Network/ System, Installing and Configuring Honeypots to trap hackers, Installing and Configuring IDS (Intrusion Detection System).
  • Computer Forensics and Incident Management.
Prerequisites : Dedication! Because Rest base programming and other things Students will learn within CCSN package.

Course Date
21th May 2012
No. of Seats
50
Course Duration
15 Days (6 Hours/Day)
Who can join this Course
Students, Professionals, Programmers, Developers, Security Enthusiasts

Venue : New Delhi, India

Contact :
Kislay Bhardwaj,
CTO - The Hacker News,
Ph: +91-9711223284

To get Registration and Details, Please do Email to info@thehackernews.com

Subscribe and Like:D PEACE.

Google Drive: How using it can be 'dangerous'

Search giant Google's new consumer service that allows users to store photos, videos, and other digital files in the Internet 'cloud', could allow US law enforcement agencies to access your data, without your knowledge and without the need for a warrant, an expert has claimed

David Asprey, the inventor of one of the first cloud computing services TrendMicro cloud evangelist, said that the terms of use of Google Drive "destroys any expectation of privacy because you license your data to a third party".

"You give Google full right to do whatever they want to do with your data and of course one of those things is to give your information to law enforcement without a subpoena," news.com.au quoted Asprey, as saying.

"By signing up to Google Drive, users give the tech giant a global license to use, host, store, reproduce, modify or create derivative works and to publish, publicly perform and distribute that content," he added.

Asprey said the new terms of service extended the reach and power of the Patriot Act - which was passed shortly after September 11, 2001, giving the US Government permission to look at people's documents without their knowledge or permission.

Meanwhile, Google said they comply with US laws and legal processes 'just like any law-abiding company'.

"We have a track record of advocating on behalf of user privacy in the face of law enforcement requests (including but not limited to US Dept of Justice subpoenas)," Google said in a statement.

"We look at each request to be sure they adhere to both the letter and the spirit of the law before complying. We do our best to notify the subject named in any such requests in order to give them the opportunity to object," it added.

Subscribe and Like:D and Dont't forget to comment below.PEACE.

Friday, 27 April 2012

Facebook strengthens security with Antivirus Marketplace

Facebook has launched Anti-Virus Marketplace , a new portal to protect the social network's users.Members are being encouraged to download anti-malware programs which they can use at no cost for six months.

Facebook is strengthening its security controls in an attempt to protect its 900 million users from spam and malicious content.Facebook said Wednesday that it will work with Microsoft Corp. and with computer security firms Trend Micro Inc., Sophos, Symantec Corp. and Intel Corp.'s McAfee to provide safeguards on Facebook.

"The Antivirus Marketplace was developed with industry partners to enhance protection for people on Facebook," Facebook wrote in a blog post. "This program will help us provide even better protections to those using Facebook, no matter where they are on the web."

Facebook's security push comes as social networks become an increasingly popular target for spammers and hackers, as Sophos suggests in a report on the top countries responsible for spam.

Facebook also plans to incorporate the various security firms' URL blacklists into its own anti-spam efforts. The company says the current blacklist limits spam to just four percent of all content posted on Facebook.

VMWare Source Code leaked by Anonymous Hackers

VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future. "The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers," VMware said in a statement.

"Hardcore Charlie" - who claims to have downloaded some 300 Megabytes of VMWare source code.

Anonymous tweeted:
@AnonymousIRC: Oops, VMWare source leaked? Not goodhttp://pastebin.com/JGxdK6vw to Anonymous contributors. May the Pirate Bay always sail strong!
The leaked documents include what appear to be internal VMWare communications, pasted onto CEIEC letterhead and with official looking stamps. One email exchange, dated June 5, 2003 is from Jeffrey Sheldon to an internal VMWare listserv and has the subject "code review:untruncating segments.

Given the large number of service providers that run vSphere, security issues in ESX could potentially have a broad and widespread impact, according to security researchers. VMware says it is looking into the matter and will be canvassing its industry partners and developers in order to determine the source of the breach.
Subscribe and Like:D PEACE.

Accidentally invented Dos attack using Google spreadsheets

Panos Ipeirotis, a computer scientists working at New York University,attack on his Amazon web service using Google Spreadsheets and Panos Ipeirotis checked his Amazon Web Services bill last week - its was $1,177.76 !

He had accidentally invented a brand new type of internet attack, thanks to an idiosyncrasy in the online spreadsheets Google runs on its Google Docs service, and he had inadvertently trained this attack on himself. He calls it a Denial of Money attack, and he says others could be susceptible too.

On his personal blog Ipeirotis explained that it all started when he saw that Amazon Web Services was charging him with ten times the usual amount because of large amounts of outgoing traffic.

As part of an experiment in how to use crowdsourcing to generate descriptions of images, he had posted thumbnails of 25,000 pictures into a Google document, and then he invited people to describe the images. The problem was that these thumbnails linked back to original images stored on Amazon’s S3 storage service, and apparently, Google’s servers went slightly bonkers. “Google just very aggressively grabbed the images from Amazon again and again and again,” he says.

After analyzing traffic logs he was able to determine that every hour a total of 250 gigabytes of traffic was sent out because of Google’s Feedfetcher, the mechanism that allows the search engine to grab RSS or Atom feeds when users add them to Reader or the main page.

After speaking with Google representatives, Ipeirotis believes that the company is trying to balance user privacy with a desire to present fresh content. It seems that Google doesn’t want to store the information on its own servers so it uses Feedfetcher to retrieve it every time, thus generating large amounts of traffic.

“Google becomes such a powerful weapon due to a series of perfectly legitimate design decisions,” Ipeirotis wrote in a blog posting on the issue. 
Subscribe and Like:D PEACE.

International Police Association defaced by Anonymous Hackers


Anonymous Hackers struck again and this time it was the International Police Association.Anonymous hackers deface International Police Association http://ipa-iac.org (IPA) on Friday afternoon and Anonymous hackers responsible left an angry message (hehehe,really interesting)  on the website's homepage, stating that they defaced the page "for the lulz" (for fun) but also warned that they might have stolen some "sensitive data."

A message posted at the top of the page reads,
 "oHai [hello]... International Police Association (International Admin Center) you will see we haz [had] some #LULZ at your expense maybe you will fix your security issues and of course... we always recommend you NOT store admin passwords in PLAINTEXT For a site like International Police Association... w3 [we] really expected moar [more]... #LULZ the thin..."

The International Police Association is the largest organization for police officers in the world according to Wikipedia, and is not connected to Interpol http://www.interpol.int/ . The IPA was founded by English police sergeant Arthur Troop in January 1950 under the model "Service Through Friendship" with the goal of creating friendly links to encourage cooperation between police officers across the world. The organization currently has around 400,000 members in 64 countries. Its main offices are based in Nottingham, England.

The message continues to boast that Anonymous cannot be stopped because "There is no head to cut off motherfu--kers!!!" Before concluding with the words, " F--k the police!!!!"

I think anonymous Rocks....what do you think about it? Leave your comments below and Don't forget to subscribe and like:D PEACE.

Thursday, 26 April 2012

Ubuntu 12.04 LTS Precise Pangolin hits the web, with HUD in tow


Image
It's here! Precise Pangolin or, as it's officially known, Ubuntu 12.04 LTS. Canonical's latest is now available in its final(ish) form and ready for you to download, burn and install. While LTS (Long Term Support) releases are generally more conservative in their application of new features, Pangolin does include some rather notable tweaks. The most immediately noticeable will be the new log in screen which, while largely the same, does have the slick new trick of changing wall papers to match the selected user. A more subtle change is revealed once you've logged on and press alt -- HUD. The new search-based menu system is quite a departure from traditional interaction models, and one that will come as a relief to those who constantly forget where a particular option is buried. Perhaps the most welcome change, though, is the vastly improved performance and power management. Ubuntu, for all of its finer points, has never been particularly battery friendly. But Canonical is promising that is going to change. We'll have to wait to find out once we get this bad boy installed on some machines of our own. You know the drill, hit up the source link to download it for yourself, for free.

Update: Well, looks like all you Ubuntu fanatics have taken out the site temporarily. We're sure it'll be back soon but, in the meantime, you can still download the latest version of the OS through the following link:
    http://www.ubuntu.com/download/desktop

Tuesday, 24 April 2012

Windows 8 "Release Preview" due in the first week of June


Traditionally, Microsoft has released "betas" and "release candidates" of in-development software. But Microsoft hasn't had an official beta release of Windows 8, —instead, the company has labelled it a "Consumer Preview." Now, Microsoft has announced it won't have a "release candidate" either, because that too has been renamed: Steven Sinofsky, president of the Windows Division, has announced that Windows 8 "Release Preview" will be released and freely downloadable in the first week of June.

Sinofsky made the announcement at a Windows 8 developer event in Japan. The news confirms previous rumors that the release candidate was due in June, and leaves Microsoft on track for a retail release in October.
Subscribe and like :D PEACE.

Friday, 20 April 2012

Google Earth : Yet another success story

'Impossible is nothing' , rightly describes this incident. I mean, if you have the determination and will to achieve the impossible, then you can do it. Just read the following incident :

A man who became separated from his family for 25 years has tracked down his birth mother using Google Earth.
Saroo Brierley was five when he went to help his nine-year old brother who worked on trains in Khandwa, India. He fell asleep on the train journey there and woke up hundreds of miles away in Calcutta.
Mr Brierly was able to find his Indian mother by scouring Google for four years and using the memories he still had of the town in which he used to live.

            Watch this news on BBC NEWS

This is the way technology should be used and not like hacking into someone's account and sucking the money out of it. I am a fan of Google and its work and now this incident has overwhelmed me with joy. Let me know what you think about Google and its products and definitely about this incident in the comments below.
Subscribe and like guys :D PEACE.

Wednesday, 18 April 2012

Windows 8 will have only 3 versions

Guys, this is final that windows 8 will have only 3 flavours.For those with Intel-compatible machines, the OS will be available in two versions - Windows 8 and Windows 8 Pro.And for those with devices, largely tablets, powered by ARM-designed chips there will be a Windows RT version.

Microsoft has called Windows 8 the most significant redesign of the Windows interface since its groundbreaking Windows 95 OS.The ARM version of the OS is the newest edition and reflects Microsoft's desire to unify the engine known for running desktop computers with that for tablets and smartphones. Windows RT will sit alongside Apple's iOS and Google's Android operating systems.It announced the new flavours on its Windows blog.


Many of those reacting to the announcement were unimpressed by the name for its ARM version.

"You guys are doing a phenomenal job with Windows Phone, Windows 8, etc, which makes the naming of 'Windows RT' all the more maddening. You're trying to simplify the rest of the 'Windows Live' properties, which I applaud, but then you go with Windows RT? Does. not. compute," said Michael Jenke, summing up the views of many responses to the blog."

The below chart breaks down key features by edition (this list should not be considered an exhaustive list of features):
Feature nameWindows 8Windows 8 ProWindows RT
Upgrades from Windows 7 Starter, Home Basic, Home Premium
x
x
Upgrades from Windows 7 Professional, Ultimatex
Start screen, Semantic Zoom, Live Tilesxxx
Windows Storexxx
Apps (Mail, Calendar, People, Messaging, Photos, SkyDrive, Reader, Music, Video)xxx
Microsoft Office (Word, Excel, PowerPoint, OneNote)x
Internet Explorer 10xxx
Device encryptionx
Connected standbyxxx
Microsoft accountxxx
Desktopxxx
Installation of x86/64 and desktop softwarexx
Updated Windows Explorerxxx
Windows Defenderxxx
SmartScreenxxx
Windows Updatexxx
Enhanced Task Managerxxx
Switch languages on the fly (Language Packs)xxx
Better multiple monitor supportxxx
Storage Spacesxx
Windows Media Playerxx
Exchange ActiveSyncxxx
File historyxxx
ISO / VHD mountxxx
Mobile broadband featuresxxx
Picture passwordxxx
Play Toxxx
Remote Desktop (client)xxx
Reset and refresh your PCxxx
Snapxxx
Touch and Thumb keyboardxxx
Trusted bootxxx
VPN clientxxx
BitLocker and BitLocker To Gox
Boot from VHDx
Client Hyper-Vx
Domain Joinx
Encrypting File Systemx
Group Policyx
Remote Desktop (host)x

This was just the overview of what we all are going to get in the next few months. And those who haven't experienced the magic of windows 8 can download the Windows 8 Consumer Preview from the following link:

Don't forget to leave your precious thoughts and views in the comments below. Subscribe and Like :D PEACE

Friday, 13 April 2012

"Reboot" - Upcoming Hacker Movie, Will Blow Your Minds Off

Rosa Entertainment and Jan-Ken-Po Pictures just announced that their cyberpunk thriller short film “Reboot” will launch with a Sneak Preview at DEFCON.

(LOOK FOR LINK OF FANMADE THEME FOR CHROME AT THE END OF THE POST)
Written and Directed by Joe Kawasaki, and Produced by Sidney Sherman, the film stars a bevy of hot up-and-coming actors including Emily Somers (Gabriele Muccino’s upcoming “Playing the Field”), Travis Aaron Wade (“War of the Worlds”), Martin Copping (Australian series “Neighbours”), Sonalii Castillo (“NCIS”), and Janna Bossier (Slipnot’s “Vermilion").

Set within a dystopian world that
is a collision between technology and humanity, “Reboot” touches upon many of the current social and political concerns
that arise from becoming more and more intertwined with the virtual. In contemporary Los Angeles, a young female hacker (Stat) awakens from unconsciousness to find an iPhone glued to her hand and a mysterious countdown ticking away on the display. Suffering from head trauma and with little recollection of who she is or what is happening, Stat races against time to figure out what the code means and what unknown event the pending zero-hour will bring.

The recent launch of their ARG (Alternate Reality Game) has caught the attention of hackers and cyberpunk fans via Twitter. Basically, some Easter Eggs are hidden in the film trailer for viewers to find. When a player thinks they have found anything, they simply send a direct message to@reboot_film on Twitter for confirmation. As players find things they are awarded points and the Top Ten players will be awarded some cool prizes. For more ARG details, please go to:www.rebootfilm.com/scoreboard. To view the trailer: www.rebootfilm.com/trailer.

The film is the product of a successful Kickstarter campaign and has been building momentum ever since it was first announced on kickstarter.com in August of last year. Kawasaki said, "It (the film) was originally designed to simply be a great little ride, but as real world events keep developing around us (regarding issues of cyber-freedom, online privacy, security, etc.); the connotation of the film evolves and changes with it."

"Reboot" is a co-production of Sherman's production shingle, Rosa Entertainment, and Kawasaki’s Jan-Ken-Po Pictures; and the filmmakers are aiming for international film festivals like Cannes, Locarno and Toronto, as well as distribution via the internet.

Don't Forget to leave your comments and Subscribe and like:D PEACE

     LINK: REBOOT THEME DOWNLOAD

AICTE to launch job portal

Placement companies like Monster.com and Naukri.com will soon have a rival as the All India Council for Technical Education (AICTE) is developing a job portal for the students of technical and professional institutions approved by it. The job portal will have a database of all the students of technical and professional institutions with their academic and other details, besides a large number of private sector employers.

While the students would be able to access the portal free of cost and post their curriculum vitae, companies registered with the portal, too, will have facility to log on to the portal and search for their prospective employees.

“The job portal is being developed to benefit the students pursuing technical and professional education in the country. We have already captured students’ semester wise results,” AICTE chairman S S Mantha said. A database of about 8000 companies from different sectors has also been created. This will be uploaded in the portal being developed, he added.

The job portals being run by various companies usually charge some fee against their services, but the portal being developed by the Council will be absolutely free of cost for the students of AICTE approved institutions.

“AICTE provides a mail ID to each of the students of the institutions approved by it.

Using their IDs, the students can log on to the portal and post their CVs (Curriculum Vitae) and search a suitable job. Similarly employers can also log on to the portal and look for prospective employees,” Mantha said.

While the portal could be accessed by the students free of cost, the AICTE has not yet taken any decision on whether it will be used by the employers, too, free of cost.

The Council has also collected e-mail IDs of human resource department of a large number of companies. “We will collect more ID’s of companies’ HRs and upload them in the portal. This will create a direct interface between employees and employers. This is not there in the job portals being run by various private companies,” an AICTE official said.

Dont forget to leave your views in the comments. Like and Subscribe :D PEACE

Tuesday, 10 April 2012

Airtel brings 4G services to India, tariff plans revealed


Super-fast mobile Internet connectivity makes its way to India through USB dongles; tariff plans won’t make you break the bank just yet...

While a bunch of mobile service providers are still haggling over 2G connections, one of them – Airtel – is going ahead and deploying 4G services in Kolkata. This will be the first leg of an eventual pan-India push on the high-speed Internet connectivity technology, starting with Bangalore.

Since the number of 4G handsets available in India is quite low at the moment, the company will be launching dongles (made by ZTE) with the SIM cards built in. The Airtel 4G site went live before the launch (although it has been taken down now) and revealed the tariff plans:

As you can see, the rates aren’t as exorbitantly high as you would have expected and easily rival 3G services – beating them in some cases. And when you add in the speed factor, it’s that much sweeter.

Theoretically, 4G can give you download speeds of up to 100Mbps and upload speeds of up to 40Mbps, but we wouldn’t bet the bank on getting those from Airtel’s network in India. Still, the speeds should be significantly higher than anything you have managed to get out of 3G connections.

Thursday, 8 March 2012

The Work Culture at Google



Google has come a long way since Sergey Brin and Larry Page networked a few computerstogether at Stanford. What started as a modest project is now a multibillion-dollar global organization that employs more than 19,000 people around the world. Brin and Page are still very much involved with Google's operations -- they're Presidents of Google's Technology and Products divisions, respectively.

In September 2008, Google'smarket capitalization figure (Google's stock price multiplied by the number of outstanding company shares) was more than $145 billion. Google's stock is listed in NASDAQ as GOOG, and in late 2008 Google had more than 314 million outstanding shares in the marketplace [source: Google Finance].

Google's headquarters are in Mountain View, Calif. Google cheekily calls its campus the Googleplex -- a combination of the words "Google" and "complex" and a play on the term googolplex: One followed by a googol of zeroes. Life at the Googleplex is pretty sweet. Here's just a small list of the amenities you can find there:
Several café stations where employees can gather to eat free food and have conversations
Snack rooms stocked with goodies ranging from candy to healthy foods like carrots and yogurt
Exercise rooms
Game rooms with video games, foosball, pool tables and ping-pong
A baby grand piano for those who enjoy tickling the ivories

In addition to these amenities, Google employees receive a comprehensive benefits package that includes not only medical and dental coverage, but also a host of other services. These include tuition reimbursement, a child care center, adoption assistance services, an on-site doctor, financial planning classes and lots of opportunities to gather with coworkers at special corporate events. Google's philosophy also places importance on nonprofit work, and so Google will match up to $3,000 of any employee's contributions to nonprofit organizations.

Google has asserted itself as one of the most dominant forces on the Internet. Still, the company says its mission is "to organize the world's information and make it universally accessible and useful" [source:Google]. With a goal that lofty, it's a good bet that the people behind Google feel their work is just beginning.

All about Google: Google Equipment

Back in 1998, Google's equipment was relatively modest. Co-founders Larry Page and Sergey Brin used Stanford equipment and donated machines to run Google's search engine duties. The equipment at that time included:
Two 300-megahertz (MHz) Dual Pentium II servers with 512 megabytes (MB) of memory
A four-processor F50 IBM RS6000 computer with 512 MB of memory
A dual-processor Sun Ultra II computer with 256 MB of memory
Several hard drives (some of which were housed in a box covered in LEGO bricks) ranging from 4 to 9 gigabytes (GB) for a total of more than 350 GB of storage space [source: Google Stanford Hardware]



Today, Google uses hundreds of thousands of servers to provide services to its users. Google's strategy is to use relatively inexpensive machines running on a customized operating system based on Linux. A program called Google File System manages the data on Google's servers [source: Google Cluster Architecture].

Google uses servers for different tasks. Web servers receive and process user queries, sending the request on to the next appropriate server. Index servers store Google's indexes and search results. Document servers to store search summaries, user information, gmail and Google Docs files. Ad servers store the advertisements Google displays on search pages.

Google divides the information on each index server into 64 MB blocks. There are three copies of each block of data, and each copy is stored on a different server running on a separate power strip. The blocks of data are distributed semi-randomly so that no two servers have the exact same collection of data blocks. That way, if there's a problem with one server, the data will still exist in other machines. Using multiple copies of data to prevent an interruption in service is called redundancy.


A master computer manages each set of servers. The master computer's job is to keep track of which servers hold each block of data in the event of a catastrophe. If one server goes down, the master computer redirects all traffic to the other servers containing the same data.
Subscribe and Like. Your thoughts and reviews are appreciated. Share your comments below. 

Saturday, 25 February 2012

Three Hackers From Anonymous Arrested In Greece


Earlier this month Greece faced massive cyber attack from Anonymous and after investigation Greek police said they had arrested an 18-year-old suspected of hacking into the justice ministry's website. Also two other suspect aged 16 17 also being sought over the case.  In the February 2nd hackers from anonymous performed a cyber-attack on the Greek Ministry of Justice website, and warned of plans to target a further 300 ministry and media sites. The hack was apparently a protest against the Greek government's signing of the Anti-Counterfeiting Trade Agreement (ACTA), which is designed to reduce Internet piracy. After that Greek police confirmed via twitter that they have started investigation and all the countermeasures have been taken. Indeed the output is in-front of us, 3 teenagers from Greece are behind the bar. The authority also said- The three youths have been linked to dozens of cyber attacks against Greek websites, using the alias Greek Hacking Scene and the nicknames "delirium", "nikpa" and "extasy". Authority also confirmed that these teens may have to face 1 year of imprisonment.
This the second time of this year when hackers from Anonymous get busted by police. In January a 22 year aged student arrested in south-western Poland for allegedly hacking the prime minister's website and local authority said that he was a part of Hactivist Anonymous.
Subscribe and like.:D

Friday, 24 February 2012

Comic Con India 2012 : Bigger and Better

Last month I was reading newspaper and I came across this article which said Comic Con India will be held in Feb and its going bigger than ever and I was surprised to read that it was happening in India . But  I was happy also because I would get to go there and it was something totally new that was happening in the city, though it happened last year also.According to the news, as I wasn't able to attend it, it was bigger & better and concluded during the weekend at Dilli Haat, New Delhi. The scale of the expo grew exponentially compared to last years Comic Con India 2011 (New Delhi) and Comic Con Express 2011 (Mumbai).


It was a sight not usually visible in the capital city. An array of colors with visitors dressed as their favorite comic character, grabbing copies of latest releases of the comics & graphic novels and thronging the expo area buying merchandise to show their love for comics & art.
Continuing the success was the CosPlay, the costume contest with attendees dressed as Shikari Shambhu, Suppandi, Poison Ivy, Superman, Wonder Women, Freddy Krueger, Wolverine, Chhota Bheem, Power Ranger, Shan Yu (which also won a prize), Two-Face, Magdalena and many more.
About 25 book releases happened this year while over 50 stalls were put up at the expo area for comic books, publishing & designing softwares, graphic artists, and merchandise, among others. As per the estimates over 35,000 people visited the expo while the sales touched Rs. 5 million jumping from around 15,000 visitors and sales of Rs. 2.5 million last year.

Though the event still can't be compared to the scale of the Comic Conventions being held outside India yet, the endeavor received overwhelming response from the audience, comprising a mixed bag of all ages & professions.