Saturday 12 November 2011

Sachin(India Ki Shaaan)


Family  

Dad's Name : Ramesh Tendulkar 
Sister's Name : Savitai Tendulkar 
Brother's Name : Nitin Tendulkar & Ajit Tendulkar 
Wife's Name : Anjali Tendulkar 
Daughter's Name : Sarah 
Son's Name:Arjun



Tendulkar's Dream


Young Sachin had aspired of being a fast bowler. It was this dream that made him undertake trials at Chennai based MRF pace academy, but his small stature proved to be a major hindrance to his aspiring career. ( THANK GOD !!! else the WORLD would have been deprived of such a genius batsman. )

First step towards cricket
Tendulkar's sensational journey to cricket stardom sparked of when his brother Ajit made him meet Mr. R. Achrekar ( Cricket Coach ). Sachin failed to perform in the first go which made him very nervous but his brother's persuasion led Mr. Achrekar give him another chance.  

Turning point in his career
It was his change of school to Shardashram Vidya Mandir in Dadar - close to Shivaji Park on his coach's advice which marked a turn around in Sachin's career. He says," I use to bat in four nets at one strech. Whenever, I use to get tired, Achrekar use to keep a one rupee coin on top of the stumps and say, "Anyone who gets him out will take this coin. If no-one gets him, Sachin takes it." Tendulkar till date contributes this technique in being instrumental for enhancing his concentration. He still treasures the 13 coins earned by him during the practice sessions. 

Naughty Duo
Sachin and his best pal Vinod Kambli hold the World Record of 664 runs stand for Shardashram School in inter-school tournament in 1988. Tendulkar candidly admits that the total would have never assumed mammoth proportion had he and Kambli not ignored the man waving from the boundary with the coach's message to declare.
Tendulkar's Idol 
Tendulkar's idol is the American Tennis superstar-John McEnore. During his young age, he argued and fought for McEnore with his colony friends who supported Swedish Bjorn Borg. Sachin sported a head-band, sweat-band and a tennis racquet showing his staunch loyalty towards his idol. 


Family Quirks
Sachin's wife Anjali tends to become nervous while he bats, whereas  his brother has become so superstitious that he allows the family members to only watch the match recording.
His reactions to his dismissals
On pre-mature and early exits, Sachin likes to take out his anger somewhere. He prefers to be left alone, till he cools down.

God's Importance in his life
Tendulkar is a God fearing person, a staunch devotee of Sai Baba, Ganpathi and frequently visits temples during night when it's calm and quiet. He visualizes God in his parents. Religion to him is what his parents have inculcated in him, his upbringing and his way of life. Sachin strongly believes in the concept of re-birth, existence of Hell and Heaven. He loves celebrating Ganesh Chaturthi at home with his family and believes that it firms his ties with his loved ones.


Favourites of Tendulkar

Ground : Sydney cricket ground
Movie : Coming to America
Music : Pop
Hobby : Collecting CD's.
Car : Maruti
Actors : Amitabh Bacchan, Nana Patekar
Actresses : Madhuri Dixit
Cricket Heroes : Gavaskar, Viv Richards, Imran Khan and Sandeep Patil
Other Fav. Stars : Maradona, Borris Becker
Drink : Orange / Apple juice and water
Food : Steak
Pastime : Listening to peaceful music with friends
Clothes : Official jacket and tie, else jeans and T-shirt
Magazine : Sportstar
Newspapers : Times of India, Mid-day, Afternoon Dispatch
Restaurant : Bukhara, Maurya Sheraton
Holiday Resort : Yorkshire, Headingley
Hotel : Park Royal Darling Harbour, Sydney
Other Sports : Tennis

Funniest Moment

 
Once I (Sachin) was batting with Vinod Kambli for a school match. Vinod dropped his bat  in the middle of the game and started to fly a kite. It was so funny, I really can't forget that day in whole of my life.



Other's
Major Teams : India, Mumbai and Yorkshire
Memorable Day : Beating Pakistan in the 1992 World Cup
Worst Day : Losing the fist ODI in RSA in 1992
Greatest Influence  : Family
Ambition : To be number one in the world
Dream Woman : My wife
Current Players Admired : Vinod Kambli, Brian Lara and Jonty Rhodes
Embarrasing Moment : People asking for my autograph and then asking me my name
Hate : Rumors
Any Changes you desire to have : None



Monday 7 November 2011

My Project Idea:- Sec FS

Hi friends this is my project topic
here is the link.
Pls post your valuable comments on the topic
https://docs.google.com/open?id=0B3R5dNnhr-5sNGE0Y2FjODAtODI3YS00YzVhLTkzNjYtM2UzYTJmN2I3OTQy

IAS Question


UNIT I

Q. Distinguish between: i) Active and passive attacks ii) Authentication and authorization
Q. What is the difference between monoalphabetics and polyphabetics cipher?
Q. Why is it important to study Feistal cipher.
Q. If one-time pads are provably secure, why are they so rarely used in practice ?
Q. What are the two problems with one time pad cipher ?
Q. What is the difference between block and stream cipher?
Q. Explain the term ‘Cryptography’ Give examples of basic types of transposition and substitution ciphers.
Q. Find primitive roots of 19.
Q. What is mean by Modular arithmetic & Exponentiation ?
Q. Find  Greatest common Divisor gcd (120,70)
Q. Explain Euclidean algorithm and Extended Euclidean algorithm?
Q. How to compute Chinese Remainder Theorem.
Q. How to compute Discrete Logarithms .
Q. Explain Fermat’s and Euler’s Theorems.
Q. Comparison between Diffusion and Confusion.
Q. Explain use of secret splitting and sharing with working.









                                                            UNIT II
Q. What is mean by symmetric key algorithm and different types.
Q. What are the strengths of DES algorithm.
Q. With the help of the block diagram, explain the AES encryption and decryption processes in detail.
Q. Write notes on i) Blowfish and  ii) PGP.
Q. What is meant by Cryptanalysis. Explain the types of attacks on encrypted messages know to cryptanalyst.
Q. In a public key system using RSA, you intercept the cipher text c=10 sent to a user whose public key is e=5,n=35. What is the plaintext M?
Q. Distinguish between differential and linear cryptanalysis.
Q. Explain any one symmetric key algorithm in detail with an example and vulnerabilities.
Q.  Describe the advantages and disadvantages of symmetric and asymmetric key cryptography.
Q. Define hash function, requirements of hash function and compare MD4 and MD5 algorithm.
Q. Explain Avalanche effect.
Q. Compare and contrast public and symmetric key system.
Q. Comparison between MD5 and SHA-1.
Q. Explain Double DES and triple DES.
Q. What are the different types of cipher block modes of operation? (ECB, CBC, CFB, What Counter mode)
Q. Explain the term Birthday attack.
Q. What is the contribution of the S-boxes , P-boxes and permutations.
Q. Difference between strong and weak collision resistance.







                                                            UNIT III
Q. What is key management? How keys are distributed ?
Q. Compare and contrast. Digital signature and digital certificates.
Q. What is the role of a CA and RA in the creation of  digital certificate ?
Q. List and state 8 fields used for public key certificate X.509.
Q. What does it mean for a signed document to be verifiable, nonforgeable and nonrepudiable ?
Q. What is digital signature. Explain the steps to create a digital signature.
Q. With the example of Diffie-hellman algorithm explain man-in-middle attack.
Q. How does the PKI works in a world scenario.
Q. Explain Neeham Schroeder authentication protocol.
Q. Explain one way authentication and mutual authentication protocol.
Q. Explain the following with respect with X.509 : certificate renewal, revocation.
Q. What is a key distribution center ? What is a certificate authority.
Q. Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root  =2.











                                               
UNIT IV
Q. Differences between IDS and IPS.
Q. List the benefits of IPSec. What is the difference between transport and tunnel mode. What parameter identifies a security association (SA).
Q. List the goals of intrusion detection system.
Q. Draw header format for an ISAKMAP message.
Q. IPSec has two protocols – AH and ESP . Do you feel AH is necessary or can all functionality provided by AH be provided by ESP ? Explain.
Q. Explain SSL record protocol operation.
Q. What protocols comprise SSL ? What is the difference between SSL session and SSL connection ?
Q. What services are provided by SSL record and Handshake layer protocol ?
Q. What is mean by Internet key exchange protocol.
Q. Write a short notes on : Anomaly based, Signature based, Host based, Network based systems.














                                                            UNIT V
Q. Explain ISO 27001 security standard with purpose.
Q. What are the three stage audit process of ISO 27001.
Q. What is certification process of ISO 27001 and benefits .
Q. What do you mean by electronic payment. Explain different  types and list the characteristics.
Q. Explain electronic payment process (E-Payment).
Q. What is Smart Card ? Explain its different types ?
Q.  What is E-Cash (Electronic cash) ?
Q. What is mobile payment ? How it works ?
Q. Explain the process of SET (Secure Electronic Transactions)
Q. What is Electronic Wallets ?
Q. How can we secure e-payment ?
Q. Explain the term Payment over internet.
Q. Explain and draw a model for ISMS (Information security management system )of PDCA Cycle (Plan, Do, Check, Act Phase) .
Q. Stepwise list the payment authorization process.










                                                UNIT VI
Q. What is cybercrime? How do you define it?
Q. Explain in your own words what you understand about the global cooperation required in fighting against cybercrime.
Q. What are the different types of cybercriminals?
Q. What is identity theft? Explain different types with examples.
Q.  What is the meaning of the term ‘cyber law’?
Q. What do you understand by the salient features of the Indian IT Act ?
Q. In your view, do 2008 amendments to the Indian IT Act address the cybercrime issues that may emanate from cybercafé? Explain.
Q. What do you mean computer forensics ? List the uses.
Q. Which types of data and techniques used for computer forensics.
Q. What is internet fraud and its types ?
Q. What is an industrial espionage ? and how it is carried out ?
Q. What is cyber terrorism.
Q. Explain the rules and procedure for collecting and analyzing electronic evidence.
Q. What are the online investigative tool, tracing and recovering electronic evidence.