| ||||||||||||||||
Dad's Name : Ramesh Tendulkar Sister's Name : Savitai Tendulkar Brother's Name : Nitin Tendulkar & Ajit Tendulkar Wife's Name : Anjali Tendulkar Daughter's Name : Sarah Son's Name:Arjun | ||||||||||||||||
Tendulkar's Dream | ||||||||||||||||
Young Sachin had aspired of being a fast bowler. It was this dream that made him undertake trials at Chennai based MRF pace academy, but his small stature proved to be a major hindrance to his aspiring career. ( THANK GOD !!! else the WORLD would have been deprived of such a genius batsman. )
| ||||||||||||||||
Favourites of Tendulkar | ||||||||||||||||
Ground : Sydney cricket ground Movie : Coming to America Music : Pop Hobby : Collecting CD's. Car : Maruti Actors : Amitabh Bacchan, Nana Patekar Actresses : Madhuri Dixit Cricket Heroes : Gavaskar, Viv Richards, Imran Khan and Sandeep Patil Other Fav. Stars : Maradona, Borris Becker Drink : Orange / Apple juice and water Food : Steak Pastime : Listening to peaceful music with friends Clothes : Official jacket and tie, else jeans and T-shirt Magazine : Sportstar Newspapers : Times of India, Mid-day, Afternoon Dispatch Restaurant : Bukhara, Maurya Sheraton Holiday Resort : Yorkshire, Headingley Hotel : Park Royal Darling Harbour, Sydney Other Sports : Tennis | ||||||||||||||||
Funniest Moment | ||||||||||||||||
Once I (Sachin) was batting with Vinod Kambli for a school match. Vinod dropped his bat in the middle of the game and started to fly a kite. It was so funny, I really can't forget that day in whole of my life. | ||||||||||||||||
Other's | ||||||||||||||||
Major Teams : India, Mumbai and Yorkshire Memorable Day : Beating Pakistan in the 1992 World Cup Worst Day : Losing the fist ODI in RSA in 1992 Greatest Influence : Family Ambition : To be number one in the world Dream Woman : My wife Current Players Admired : Vinod Kambli, Brian Lara and Jonty Rhodes Embarrasing Moment : People asking for my autograph and then asking me my name Hate : Rumors Any Changes you desire to have : None |
Saturday, 12 November 2011
Sachin(India Ki Shaaan)
Monday, 7 November 2011
My Project Idea:- Sec FS
Hi friends this is my project topic
here is the link.
Pls post your valuable comments on the topic
https://docs.google.com/open?id=0B3R5dNnhr-5sNGE0Y2FjODAtODI3YS00YzVhLTkzNjYtM2UzYTJmN2I3OTQy
here is the link.
Pls post your valuable comments on the topic
https://docs.google.com/open?id=0B3R5dNnhr-5sNGE0Y2FjODAtODI3YS00YzVhLTkzNjYtM2UzYTJmN2I3OTQy
IAS Question
UNIT I
Q. Distinguish between: i) Active and passive attacks ii) Authentication and authorization
Q. What is the difference between monoalphabetics and polyphabetics cipher?
Q. Why is it important to study Feistal cipher.
Q. If one-time pads are provably secure, why are they so rarely used in practice ?
Q. What are the two problems with one time pad cipher ?
Q. What is the difference between block and stream cipher?
Q. Explain the term ‘Cryptography’ Give examples of basic types of transposition and substitution ciphers.
Q. Find primitive roots of 19.
Q. What is mean by Modular arithmetic & Exponentiation ?
Q. Find Greatest common Divisor gcd (120,70)
Q. Explain Euclidean algorithm and Extended Euclidean algorithm?
Q. How to compute Chinese Remainder Theorem.
Q. How to compute Discrete Logarithms .
Q. Explain Fermat’s and Euler’s Theorems.
Q. Comparison between Diffusion and Confusion.
Q. Explain use of secret splitting and sharing with working.
UNIT II
Q. What is mean by symmetric key algorithm and different types.
Q. What are the strengths of DES algorithm.
Q. With the help of the block diagram, explain the AES encryption and decryption processes in detail.
Q. Write notes on i) Blowfish and ii) PGP.
Q. What is meant by Cryptanalysis. Explain the types of attacks on encrypted messages know to cryptanalyst.
Q. In a public key system using RSA, you intercept the cipher text c=10 sent to a user whose public key is e=5,n=35. What is the plaintext M?
Q. Distinguish between differential and linear cryptanalysis.
Q. Explain any one symmetric key algorithm in detail with an example and vulnerabilities.
Q. Describe the advantages and disadvantages of symmetric and asymmetric key cryptography.
Q. Define hash function, requirements of hash function and compare MD4 and MD5 algorithm.
Q. Explain Avalanche effect.
Q. Compare and contrast public and symmetric key system.
Q. Comparison between MD5 and SHA-1.
Q. Explain Double DES and triple DES.
Q. What are the different types of cipher block modes of operation? (ECB, CBC, CFB, What Counter mode)
Q. Explain the term Birthday attack.
Q. What is the contribution of the S-boxes , P-boxes and permutations.
Q. Difference between strong and weak collision resistance.
UNIT III
Q. What is key management? How keys are distributed ?
Q. Compare and contrast. Digital signature and digital certificates.
Q. What is the role of a CA and RA in the creation of digital certificate ?
Q. List and state 8 fields used for public key certificate X.509.
Q. What does it mean for a signed document to be verifiable, nonforgeable and nonrepudiable ?
Q. What is digital signature. Explain the steps to create a digital signature.
Q. With the example of Diffie-hellman algorithm explain man-in-middle attack.
Q. How does the PKI works in a world scenario.
Q. Explain Neeham Schroeder authentication protocol.
Q. Explain one way authentication and mutual authentication protocol.
Q. Explain the following with respect with X.509 : certificate renewal, revocation.
Q. What is a key distribution center ? What is a certificate authority.
Q. Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root =2.
UNIT IV
Q. Differences between IDS and IPS.
Q. List the benefits of IPSec. What is the difference between transport and tunnel mode. What parameter identifies a security association (SA).
Q. List the goals of intrusion detection system.
Q. Draw header format for an ISAKMAP message.
Q. IPSec has two protocols – AH and ESP . Do you feel AH is necessary or can all functionality provided by AH be provided by ESP ? Explain.
Q. Explain SSL record protocol operation.
Q. What protocols comprise SSL ? What is the difference between SSL session and SSL connection ?
Q. What services are provided by SSL record and Handshake layer protocol ?
Q. What is mean by Internet key exchange protocol.
Q. Write a short notes on : Anomaly based, Signature based, Host based, Network based systems.
UNIT V
Q. Explain ISO 27001 security standard with purpose.
Q. What are the three stage audit process of ISO 27001.
Q. What is certification process of ISO 27001 and benefits .
Q. What do you mean by electronic payment. Explain different types and list the characteristics.
Q. Explain electronic payment process (E-Payment).
Q. What is Smart Card ? Explain its different types ?
Q. What is E-Cash (Electronic cash) ?
Q. What is mobile payment ? How it works ?
Q. Explain the process of SET (Secure Electronic Transactions)
Q. What is Electronic Wallets ?
Q. How can we secure e-payment ?
Q. Explain the term Payment over internet.
Q. Explain and draw a model for ISMS (Information security management system )of PDCA Cycle (Plan, Do, Check, Act Phase) .
Q. Stepwise list the payment authorization process.
UNIT VI
Q. What is cybercrime? How do you define it?
Q. Explain in your own words what you understand about the global cooperation required in fighting against cybercrime.
Q. What are the different types of cybercriminals?
Q. What is identity theft? Explain different types with examples.
Q. What is the meaning of the term ‘cyber law’?
Q. What do you understand by the salient features of the Indian IT Act ?
Q. In your view, do 2008 amendments to the Indian IT Act address the cybercrime issues that may emanate from cybercafé? Explain.
Q. What do you mean computer forensics ? List the uses.
Q. Which types of data and techniques used for computer forensics.
Q. What is internet fraud and its types ?
Q. What is an industrial espionage ? and how it is carried out ?
Q. What is cyber terrorism.
Q. Explain the rules and procedure for collecting and analyzing electronic evidence.
Q. What are the online investigative tool, tracing and recovering electronic evidence.
Friday, 7 October 2011
How to trace an E-mail
Learn how to trace an email address
Trace an email address in the most popular programs like Microsoft Outlook, Hotmail, Yahoo, Gmail, AOL, by finding the headerWhat is an email header?
Each email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message. Not all electronic messeges you receive will allow you to track them back to the originating point and depending on how you send messages determines whether or not they can trace an email address back to you. The headers don't contain any personal information. At most, the results of the trace with show you the origination IP and the computer name that sent the email. After viewing the trace information, the initiating IP can be looked up to determine from where the message was sent. IP address location information DOES NOT contain your street name, house number, or phone number. The trace will most likely determine the city and the ISP the sender used.How do I get the header to start the trace email process?
Each electronic messaging program will vary as to how you get to the message options. I'll cover the basics to start the trace...the rest is up to you.- Outlook - Right click the message while it's in the inbox and choose Message Options. A window will open with the headers in the bottom of the window.
- Windows Live - Right click the correspondence while it's in the inbox, choose Properties, then click the Details tab.
- GMail - Open the correspondence. In the upper right corner of the email you'll see the word Reply with a little down arrow to the right. Click the down arrow and choose Show Original.
- Hotmail - Right click the memo and choose View Message Source.
- Yahoo! - Right click the note and choose View Full Headers.
- AOL - Click Action and then View Message Source.
I've got the header, now how do I start the trace?
The next step to trace an email address is to find the first IP listed in the header. This is most likely the IP initiating point. However, there are exceptions to this. You'll have to look at the information logically to deduce the originating IP.Can you trace any email address?
Yes and No. For example, someone who sends a message to your hotmail account shows in the X-Originating IP section of the headers. However, someone who sends you a message from GMail will ONLY trace back to Google IP addresses.We've got more information in our Trace An Email forum
Saturday, 3 September 2011
Subscribe to:
Posts (Atom)