Tuesday 25 October 2011

Ramayan by A Computer Engineer!!


This is a small riddle kind of a thing. Just imagine a Computer Engineer narrates Ramayana.

LAN, LAN ago, in the SYSTEM of I/O-dhya, there ruled a PROCESSOR named DOS-rat. Once he EXECUTED a great sacrifice PROGRAM after which his queens gave an OUTPUT of four SONs - RAM, LSIman, BUG-rat and SED-rughana.

RAM the eldest was a MICROCHIP with excellent MEMORY. His brothers, however, were only PERIPHERAL ICs. Once when RAM was only 16MB, he married princess C ta.

12years passed and DOS-rat decided to INSTALL RAM as his successor.However,Queen CIE/CAE(Kayegayee), who was once offered a boon by DOS-rat for a lifesaving HELP COMMAND, took this opportunity at the instigation of her BIOSed maid and insisted that her son Bug-rat be INSTALLED and that RAM be CUT-N-PASTED to the forest for 14 years. At this cruel and unexpected demand, a SURGE passed through DOS-rat and he CRASHED like unstable version of AI MSN does in intel.

RAM agreed to LOG INTO forest and C ta insisted to LOGIN with him. LSI-man also resolved on LOGGING IN with his brother. The forest was the dwelling of SPARCnakha, the TRAN-SISTOR of RAW-van, PROCESSOR of LAN-ka. Attracted by RAM, she proposed that he should marry her. RAM, politely declined, perceiving C ta to be his SOURCE CODE. She hastened to kill her but LSI-man cut her nossile PERIPHERAL. Weeping, SPARC-nakha fled to LAN-ka, where RAW-van, moved by TRAN-SISTOR s plight, approached his uncle MAR-icha. MAR-icha REPROGRAMED himself to form a golden stag and drew RAM deep into the forest. Finally, RAM shot the deer, which, with his last breath, cried out for LSI-man in voice of RAM s SOUND CARD. Fooled by this VIRTUAL RAM SOUND,
C ta urged LSI-man to his brother said. Catching the opportunity, RAW-van DELINKED C ta from her LIBRARY and changed her ROOT DIRECTORY to LAN-ka.

RAM and LSI-man started SEARCHING for the missing C ta all over the forest. They made friendship with the forest SYSTEM ADMINISTRATOR Akshat sorry… SU-greev and his powerful
co-processor Ha-NEUMAN . who agreed to help RAM. SU-greev ordered his PROGRAMMERS to use powerful SEARCH techniques learnt in GOOGLE to FIND the missing C ta. His PROGRAMMERS SEARCHED all around the INTER-NETworked forests. Many tried to EXCITE the birds and animals not to forget the WEBCRAWLERS (Insects) and tried to INFOSEEK something about C ta. Some of them even shouted YAA-HOO but they all ended up with NO FOUND MESSAGES Google, Lycos nothing was left untouched. The only thing they forgot was to mail iitcse01 & get PTI s help. Ha-NEUMAN then devised a RISCy TECHNOLOGY and used it to cross the seas at an astonishing CLOCK SPEED. Soon Ha-NEUMAN DOWNLOADED himself into LAN-ka. Ha-NEUMAN found C ta under a brown - green (as Brahma will call it) TREE STRUCTURE Ha-NEUMAN used the LOGIN ID (ring) to identify himself to C ta. After DECRYPTING THE KEY, C ta asked him to send STATUS_OK MESSAGE to RAM.

Meanwhile all raakshasa BUGS around C ta captured Ha-NEUMAN to DELETE him using everything including Ctrl-Alt-Del. But Ha-NEUMAN spread chaos by spreading VIRUS Fire . Ha-NEUMAN pressed ESCAPE from LAN-kaand & conveyed all the STATUS MESSAGES to RAM and SU-greev. RAW-wan decided to take RAM head-on. One of the RAW-wan s SUN almost DELETED LSI-man with a Brahma -astra. But Ha-NEUMAN resorted to some ACTIVE-Xgradients and REFORMATTED LSI-man. RAM used the SOURCE CODE secrets of RAW-wan and wiped out RAW-wan’s presence on earth. Later, RAM got INSTALLED in I/O-dhya and spreaded his USER FRIENDLY PROGRAMS to all USERS and everyone lived happily ever after, playing & enjoying.
Monday 24 October 2011

What actually viruses are??


==============================
Everything about viruses and spywares.
==============================

==============================
What is a virus ?
==============================

A virus is a malicious software written in order to replicate on other computers.
It can also have the effect, desired or not, interfere in more or less seriously disrupting the functioning of the infected computer.
It can spread throughout a medium of exchange of digital data such as the Internet, as well as floppy disks, CD-ROMs, USB keys, etc..
A virus is a small program, which, when run, loads itself into memory and executes the instructions that the author has programmed. The definition of a virus may be:

"Any computer program capable of infecting another program
computer by modifying it so that it can in turn reproduce."

The actual name given to the virus or CPA Self-propagating code, but by analogy with the medical field, the name of "virus" was given to them.
Viruses residents (also know as TSR, Terminate and Stay Resident) deal in the RAM of the computer to infect executable files launched by the user. Non-resident viruses infect programs on the hard drive from their execution.
Since there are a wide range of viruses with diverse actions as diverse as the viruses are not classified according to their damage, but according to their mode of spread and infection.

==============================
Different type of viruses.
==============================

======================
Virus called "mutant".
======================

In fact, most viruses are clones, or more precisely "mutant virus", that is to say the virus has been rewritten by other users to change their behavior or signature.

The fact that there are several versions (called variants, like if you use a botkiller, "Variants of CyberGate", etc) of the same virus makes it more difficult to spot in that antivirus companies have to
add the new signatures to their databases.

======================
Virus called "polymorphic".
======================

To the extent that the antivirus detect such viruses by their signature (the sequence of bits that identifies them), some virus writers have thought to give them the ability to automatically change their appearance, like a chameleon, by providing the virus based encryption and decryption of their signature, so that only these viruses are able to recognize their own signature. This type of virus is called "polymorphic virus".

======================
Virus called "retro".
======================

Called "retrovirus" or "bounty hunter", a virus with the ability to change the antivirus signatures to make them ineffective.

======================
The boot sector virus.
======================

Called "boot sector virus" (or boot viruses), a virus able to infect the boot sector of a hard disk (MBR or master boot record), that is to say an area the copied disc into memory to boot the computer, then run to begin the startup of the operating system.

======================
Virus called "Trans-application" (macro viruses).
======================

With the proliferation of programs that use macros, Microsoft has developed a common scripting language that can be inserted into most of the documents may contain macros, this is VBScript, a subset of Visual Basic. These viruses are now arriving to infect macros in Microsoft Office documents, that is to say that such a virus may be located inside an ordinary Word document or Excel, and perform a piece of code to the open it allowing one hand to spread the files, but also access to the operating system (usually Windows).
However, more and more applications support Visual Basic, these viruses can be imaginable on many other applications that support VBScript.
The beginning of the third millennium was marked by the appearance frequency of Visual Basic scripts distributed by mail as an attached file (identifiable by their extension. VBS) with a title of pushing open the mail poisoned.This type of virus called worm.

======================
Different type of spyware.
======================

The family of spyware is made up of many types of malicious programs that operate according to different procedures and for specific purposes.

======================
Hijacker browser.
======================

The browser hijacker is a diversion program or a change in parameterization responsible for changing the behavior of the browser as the change (with inability to delete the selection imposed by the browser hijacker) of the home page, the browser preferences, etc...
There are also Search Hijacker that redirect users without the knowledge of their connection requests on certain sites to redirect to other websites, often malicious dedicated to the collection of information.
There are also Homepage Hijacker who specialize in modifying and / or redirection without the knowledge of the user to the home page of the browser to other websites, often malicious dedicated to the collection of information.

======================
BHO - Browser Helper Objects.
======================

BHOs are small programs that extend the functions of a parent program such as Internet Explorer. For example, the BHO can create navigation bars that piggyback on Internet Explorer (like navigation bars, Yahoo or Google) but can operate via diverted from its main objective to perform actions not documented without the knowledge of users. BHOs can thus serve ads, redirect Internet connections of users to different sites than those proposed or even cause the display of pages other than those requested. In addition, a view of espionage activities, the BHOs have access to all web pages visited and are able to convey much information about the habits of Internet users to third-party companies that will benefit, unfortunately often malicious purposes. BHOs are especially used in Internet Explorer.
The vast majority of toolbars for Internet Explorer BHOs exploit for their operation.

======================
LSP - Layered Service Provider.
======================

LSPs are network drivers that control all data entering and leaving the computer in network connections as is the case on the Internet. Spyware is also able to control the LSP.
Spyware LSP type are simply sniffers who have access, record and transmit to third parties any data exchanged (pages visited, information sent such as passwords for different services or even the account identifiers)

======================
Trojan horse.
======================

In this context, the spyware Trojan horse allows the "owner" of spyware to take remote control of infected computer.

======================
Keyloggers, RATs.
======================

Keyloggers, RATs are small spy programs that record all keystrokes on a keyboard connected to an infected computer. Periodically, the keylogger sends the collected information to the attacker. The most sophisticated keyloggers do not just record keystrokes but also perform screen captures.
So-called spyware monitoring are also designed. They aim to use all the facilities available to them on the computer of the slave such as:

1. Web camera - video capture of the environment around the computer.
2. Microphone - capture audio and communications environment around the computer.
3. Screenshots - capturing images of the activity of the computer
4. Capture diverse information - passwords, connection identifiers.

======================
Tracking cookies.
======================

The tracking cookies are the basis of cookies, nothing more than normal on the Internet, but unlike traditional cookies that are accessible and dedicated them to the only website that has passed, the tracking cookies are available at several Internet sites that which has the effect of allowing sites associated with these tracking cookies to track user activity on the Internet, the sites visited and actions made on each site visited.
As such, tracking cookies are not a risk to the computer system on which they are located but can be a strong attack on the privacy of Internet users.
Companies that exploit the tracking cookies are usually set up shop and are often advertising.


==============================
Stealer.
==============================

A Stealer is a virus very popular. If the flight computer virus has infected your system, it steals all your passwords saved by your system
When the virus has completed to steal all information, they are sent to an email where the creator of the virus has access or on a Cpanel.
Finally, it completely destroys your system.

==============================
Rootkit.
==============================

A rootkit (the name "rootkit activity" is also used), sometimes simply "kit" is a set of technics implemented by one or more software, which aims to achieve and sustain access (generally not allowed) to a computer in the most stealthy as possible unlike other malware. The term can refer to the technics of concealment or, by metonymy, a particular set of data objects implementing this technics.

Their stealth is achieved through several mechanisms of concealment (see below) deletion of traces, hide the activity and communication, etc.. A rootkit can be installed in another program, library or in the nucleus of an operating system. Some may change the hypervisor running on top of systems or firmware embedded in hardware. Most rootkits are used to install malicious software on machines where access is granted. Some suppliers of computer hardware, such as Sony, use them to ensure compliance with the terms and conditions of their products by their customers. Some kits do not play on discretion but on the fact that removing the kit would be a difficult operation.

For the "attacking" the value of a rootkit is to be available system resources (CPU, network connections, etc.). On one or even multiple machines (see below), sometimes using the "target "as an intermediary for another attack, or to spy, to access data stored or in transit on the targeted machine.

They are generally classified as malware, but not always, they can use "viral technics" to be transmitted (eg, using a virus or trojan horse). There are tools for detection and protection methods to counter them but they are not fully effective.

==============================
Dialer.
==============================

A dialer is a small program, usually installed without any action on the part of the future slave. Once installed, the dialer disconnects the active connection to automatically reconnect, usually by a premium rate number to another provider to offer access offering other types of content (games, mp3, cracks, sex...)
In general the re-connection via dial is invisible to users.
It should be noted that the act dialers by switched telephone lines (PSTN via a modem) and have no impact on DSL lines in the absence of PSTN modem connected.


hey guys here it is
Ruchi mam's m.o.s 1st n 2nd assignment
You can download it frm hereAssignment 1 2 (Ruchi mam).pdf

Amazing Facebook Trick...Lolz






Amazing Facebook trick u can easily edit the facebook login page by writing that code in the address bar..
Just checkout the video for the code..............
You can edit the login page of facebook as you like and Fool out your friends...:D

Internal exams Question paper of previous years..


Here are the sample internal question paper for the 1st year students..
This is just to show how questions are asked in the internal exams.
So download it and start preparing for your internal exams.










The File contains papers of  following subjects:
1.C.P.U(17-10-2008)
2.C.S(15-10-2008)
3.E.G(18-10-2008)
4.Mathematics I(13-10-2008)
5.Mathematics I(20-10-2008)
6.M.O.S(16-10-2008)
7.Physics(14-10-2008)