Thursday, December 19, 2013

indian govt's ,rajasthan state government websites were hacked by Pakistan hackers....

Over 30 Rajasthan Government websites 

hacked by Pakistan Hacker "H4x0r 

HuSsY" 

More than 30 India's state 'Rajasthan' Government websites has been hacked and defaced by a Pakistani hacker named as "H4x0r HuSsY 
The motivation of the hack is appeared to be increasing defacement notification in Zone-h.  The hacker claims he is the "person with the highest number of special (.IN) Notifs."

"Proved to be Hell For India!  I might Opt Out of the Cyber World As I don't get much time. But Here's a Peace Message.  To All Indian Hackers etc etc  U Gotta Look at my Zone-H Archive Whenever you have Intentions of hacking (.PK) Sites"  The defacement message reads.



It appears hacker does not like to deface the main page because it will be easily detected by admins.  He just uploaded 1337.html which contains the defacement contents instead.

This is not the first time these Rajasthan Government Government websites being hacked by Pakistani hackers; Last year, KhantastiC haXor defaced them.

The hacker also mentioned that the server was previously compromised by the Khantastic and he again compromised the server with another security flaw in the server.
H4x0r HuSsY also hacked more than 15 Goa government websites.

Full list of hacked websites:
http://dpipraj.gov.in/1337.html
http://bor.rajasthan.gov.in/1337.html
http://bpe.rajasthan.gov.in/1337.html
http://bpl.rajasthan.gov.in/1337.html
http://collegeeducation.rajasthan.gov.in/1337.html
http://doitc.rajasthan.gov.in/1337.html
http://dop.rajasthan.gov.in/1337.html
http://finance.rajasthan.gov.in/1337.html
http://ftmsdemo.rajasthan.gov.in/1337.html
http://governorhouseonline.rajasthan.gov.in/1337.html
http://gpck.rajasthan.gov.in/1337.html
http://gwpcjpr.rajasthan.gov.in/1337.html
http://igprgvs.rajasthan.gov.in/1337.html
http://jalabhiyan.rajasthan.gov.in/1337.html
http://jawaharkalakendra.rajasthan.gov.in/1337.html
http://jrrsanskrituniversity.ac.in/1337.html
http://krishi.rajasthan.gov.in/1337.html
http://lokayukt.rajasthan.gov.in/1337.html
http://mail.rajasthan.gov.in/1337.html
http://hcmripa.gov.in/1337.html
http://minorityaffairs.rajasthan.gov.in/1337.html
http://rajamb.com/1337.html
http://rerc.gov.in/1337.html
http://rajasthankrishi.gov.in/1337.html
http://rajeduboard.rajasthan.gov.in/1337.html
http://rajftms.rajasthan.gov.in/1337.html
http://rajind.rajasthan.gov.in/1337.html
http://rajpanchayat.gov.in/1337.html
http://rajsec.rajasthan.gov.in/1337.html
http://rfconline.org/1337.html
http://rhbonline.com/1337.html
http://ric.rajasthan.gov.in/1337.html
http://sdri.rajasthan.gov.in/1337.html
http://techedu.rajasthan.gov.in/1337.html
http://testrpsc.rajasthan.gov.in/1337.html
http://transport.rajasthan.gov.in/1337.html
http://ttctest.rajasthan.gov.in/1337.html
http://uitbhilwara.rajasthan.gov.in/1337.html 

Advanced Power" botnet attempts to hack website using victim's machine

  Advanced Power" botnet attempts to       

   hack website using victim's machine       

S ecurity researcher Brian Krebs has discovered a new Botnet that tests websites for vulnerabilities using the infected machines. 

The malware disguise itself as a legitimate Firefox add on called "Microsoft .NET Framework Assistant" is apparently using the infected machines to find SQL Injection vulnerability in any website visited by the victim.

Once the malware determine the list of vulnerable website, the cyber criminals behind the botnet will be able to exploit the vulnerability to inject malicious codes in the websites.  So, it will probably help the attacker to increase the number of infected websites and systems.

Advanced Power test SQL Injection vulnerability

The malware also capable of stealing sensitive information.  However, the feature is not appeared to be activated on infected systems.

Alex Holden, chief information security officer at Hold Security LLC, analyzed the malware and believes the malware authors are from Czech Republic, based on the text string available in the threat.


Wednesday, November 20, 2013

E! Online website hacked by Tesla Team


E! Online website hacked by Tesla Team


TeslaTeam, one of the infamous hacker group from Serbia, claimed to have hacked into one of the most famous celebrity fashion sites E!NEWS. E! News is one of the high profile website that has alexa rank around 600, provides entertainment news, celebrities, celeb news, and celebrity gossip. The group has discovered a SQL injection vulnerability in one of the subdomain of E News(br.eonline.com), the poc for this vulnerability has been provided along with the database dump(pastebin.com/2c28RJDe) The database dump contains the list of tables, username and password phone of admin and other users. The same group recently hacked into the Vevo website and leaked the database. - See more at: http://www.ehackingnews.com/2013/11/e-online-website-hacked-by-tesla-team.html#sthash.onKGRMUl.dpuf

2014 avast! Premier full version free download

          Avast! Premier full version free download  INC KEY






STEPS FOLLOW

1) DOWNLOAD TRAIL VERSION  AVAST PREMIER 
               CLICK HERE TO DOWNLOAD

2)DOWNLOAD KEY 

                CLICK HERE TO DOWNLOAD

4TH GENERATION


23 nov
2013

LATEST COMMUNIATION  TECHNOLOGY

C.BAYA PRAKASH REDDY



[4TH GENERATION]
2nd generation to 4th generations.



             LATEST TECHNOLOGY

The fourth generation of mobile communications, to nobody’s surprise, offers extremely high downlink rates and in the case of Long Term Evolution (LTE), this can theoretically reach 100 MB per second. The question is; what is LTE technology all about?

Enter 4G with LTE
LTE is a bundle of improvements to the Universal Mobile Telecommunications System (UMTS) being worked on by the third Generation Mobile Communications standards, one notch higher than the second generation (2G) of mobile communications. Usually, it is speed that determines the generation any technology falls in. Hence, one of the main benefits of HMTS is its speed.
What makes LTE faster than other mobile communications technologies? The answer lies within the access technique employed by LTE. One the fastest access technique in use for LTE is orthogonal frequency division multiplexing (OFDM) which increases the amount of information that can be carried over a wireless network.
In frequency-division multiplexing (FDM), multiple signals, or carriers, are sent simultaneously over different frequencies between two points. In OFDM, a mathematical formula is used to ensure that multiple carriers sent out are orthogonal (separated by an angel, so they do not overlap) to each other. Another tool used by LTE is a multiple-input multiple-output (MIMO) antenna. These are adaptive antennas that can select the best coverage path in real time and accordingly propagate signals.

Transfer seamlessly with NFC
Near field communication (NFC) is a form of high-frequency, wireless communication in which two devices – within 10 centimeters of each other – can exchange data. Some of us may recall electromagnetic induction from our high school physics course. The communication in NFC is carried out through magnetic induction between two loop antennas that interact with each other’s fields, forming an air-core transformer. The rate of communication is up to 848 KB per second.
The main difference between NFC and Bluetooth communication is simply that the latter requires authentication and a series of steps before a connection is established. Hence, it takes time. NFC, which does not need to authenticate, can established a connection within one-tenth of a second.

Bluetooth 3.0 – yes you can!
Bluetooth is a wireless technology that was developed by the Bluetooth Special Interest Group (SIG). The first version of Bluetooth (Bluetooth 1.0) was extremely slow and not very efficient. Later versions like Bluetooth 1.2 incorporated adaptive frequency hopping, which reduced interferences issues. Now with Bluetooth 3.0, consumers can expect a speed of 24 Mbps (crazy fast for Bluetooth!).

Upcoming Apple iPhone 5 and iPad 4
Apple is bringing some of the latest and fastest communication technologies in the form of iPhone 5 and iPad 4. Every time they are trying to bring something interesting and new in front of their fans. There is a lot of buzz around the release dates of both these Apple’s products, want to know further! Checkout the Apple’s  and features.

Conclusion
Starting with the 2G standards that made services like short messaging service (SMS) extremely popular and the rollout of 3G services with faster downlink speeds, research has paved the way for further innovations and improvements. 4G is not far off from becoming a popular world standard. Technologies like LTE and NFC will only serve to augment changes in the ways we use our mobile phones today. From mobile payments and downloading full-length movies, to transferring huge files via Bluetooth 3.0, the mobile world is drastically evolving.

Saturday, November 9, 2013

Livestream cues up Android app for the masses



Livestream cues up Android app for the masses

exclusive The company in a two-way race to be the Internet's prime live-event streamer catches up with Ustream by adding an Android app to watch and broadcast live video on the go.


    (Credit: Livestream)
    Fresh off powering the first live Internet video stream from the floor of the New York Stock Exchange for Twitter's initial public offering, Livestream is making a public offering of its own.
    The company, which is vying with Ustream to become the go-to place for live Web broadcasting and viewing, Friday launched an app for Android that lets users both broadcast live video and watch it in one program.
    The new app replaces and expands the company's previous app for Android, the Google operating system that holds more than 80 percent of the world's smartphone market. The former app, called Livestream for Producers, was designed only for broadcasting and was meant mostly for professionals.

    The new app is meant for anybody, and it integrates viewing of live or archived video with simple live filming and broadcasting. It introduces push alerts that let users know when one of the accounts they follow is starting to broadcast live, which will come in handy for people who have a favorite Kitten Cam they don't want to miss.
    The app's "featured video" page is populated by the top picks of the Livestream editorial team, and it has a homepage based on what an individual user follows.
    To broadcast an event, you press a camera icon, select either a pre-existing event or create an event right then, and tap a big red button to start streaming. The app instantly provides a URL to share your stream, and you can post a link to Facebook or Twitter while filming, which will create and insert a still frame from the video in your post. As soon as you start streaming, your followers get a notification on their devices, and people can chat with you or other watchers while it's happening.
    Co-founder and Chief Executive Max Haot touted the social integrations as expanding online networks to a new place.
    "There is no social network out there that has yet built that capability to show my friends what is going on right now with video," he said. "You have Skype and Google Hangouts, but that's more one-on-one."
    Except that Livestream's main rival allows that kind of sharing too.
    (Credit: Livestream)
    Livestream is in a two-way race with Ustream to become the predominant live-streaming platform, with companies like Netflix and YouTube already dominating the market for online video on demand. (YouTube has a live division, but it allows broadcasters to stream live only if their channel meets a threshold number of subscribers.)
    Live video has long been a trickier proposition than that of on-demand video, which has the benefit of lead time to prepare and polish its content and the technology behind it before video is viewed. Live-streaming must work toward the goal of getting the most popular content to the most people, while facing a more challenging technological feat: bringing high-definition video at an adaptive bit rate that won't look like a pixelated mess on 50-inch plasma.
    As its technology has advanced to the point at which making live video look good is no longer the biggest hurdle, Livestream and Ustream have been the main platforms emerging for popular use.
    Livestream gets more than 35 million unique visitors per month and has more than 75,000 events per month, with $18.8 million in revenue in 2012 and currently 144 workers.
    Ustream powers about 40,000 streams per day, and hit 2 billion viewer hours earlier this year. It expects to have 20 million registered users by year's end, and it has 200 employees.
    It also already has iPhone, iPad and Android apps that allow users to broadcast live video, with some of those social integrations Haot extolled.
    Livestream, which has an app for iPhone and iPad too, noted that its new Android app is free without ads, while Ustream requires payment for an ad-free experience. Livestream also trumpeted its reliability, saying its previous Android broadcasting app was "the only one Vice reporter/citizen journalist Tim Pool has ever been able to use in fluctuating 3G/4G conditions while covering protest in Turkey, Cairo and Brazil this year."
    "He has been using Ustream for years but switched to Livestream when he started working for Vice because ours was the only app that would work," the company said in an email.
    Livestream is hoping other Android users will too.

    Twitter shines on NYSE debut, stock closes 73 percent up on opening day

    Twitter shines on NYSE debut, stock closes 73 percent up on opening day

    twitter_wall_street_reuters.jpg
    Twitter Inc shares jumped 73 percent in a frenzied trading debut that drove the seven-year-old company's market value to around $25 billion and evoked the heady days of the dot-com bubble.
    The strong performance on Thursday is encouraging for the venture capitalists who have backed other consumer Web startups, such as Square or Pinterest, though it sounded alarm bells for some investors who cautioned that the froth was unwarranted.
    "@twitter opening at $45/share? Almost 50x revenues! We are officially in another tech bubble," tweeted financier and investment advisor Steve Rattner.
    The stock closed its first day of trade on the New York Stock Exchange at $44.90 a share after hitting a session-high of $50, nearly double the initial public offering price of $26 set late on Wednesday.
    Twitter could raise $2.1 billion if an underwriters' over-allotment is exercised, as expected, making it the second largest Internet offering in the United States behind Facebook Inc's $16 billion IPO last year and ahead of Google Inc's 2004 IPO, according to Thomson Reuters data.
    Fans believe that Twitter, which has 230 million users, has established itself as an indispensable Internet utility alongside Google and Facebook, and that it has only scratched the surface of its potential as a global advertising medium.
    "When people use Twitter they are following certain people, they're searching for specific information," said Mark Mahaney, an analyst at RBC Capital Markets. "There are powerful marketing signals that are almost Google-esque, something that Facebook doesn't really have."
    The IPO was shadowed for months by Facebook's troubled 2012 debut, in which the shares quickly fell below their offering price amid trading glitches and subjected the company and its lead banker, Morgan Stanley, to accusations that they had been greedy in pricing the deal.
    Twitter's opening appeared to go off without a hitch, prompting Anthony Noto, the Goldman Sachs banker who led the IPO, to write a simple Tweet: "Phew!"
    Still, Twitter may find itself subject to the opposite criticism, that it had priced the shares too low and left more than a billion dollars on the table.
    "In my mind they certainly could've raised the price on this thing and gone into the low 30s," said Ken Polcari, director of the NYSE floor division at O'Neil Securities. "From an outsider looking in I would say they were overly cautious because they didn't want a disaster on their hands ... I'm sure the company didn't want a Facebook debacle, I get that, but I think they were overly cautious and it cost them some money."
    The 70 million IPO shares represent about 13 percent of the company's common shares. Twitter was the most actively traded stock on Thursday, with around 117 million shares changing hands.
    Heavy demand for the IPO was apparent before the final pricing. Twitter was able to price the IPO above an already raised indicative range, and the deal still attracted investor subscriptions that totaled 30 times the number of shares on offer, according to market sources.
    In San Francisco
    At Twitter's headquarters in San Francisco, offices opened early and hundreds of employees flocked to the 9th floor cafeteria to watch the festivities on TV while eating "cronuts," a croissant-donut hybrid, made by Twitter's resident chef, Lance Holton.
    The IPO is the latest milestone for a service that was born out of a nearly-defunct startup in 2006 and was derided by many in its early years as a silly fad dominated by people talking about what they had for breakfast.
    But Twitter quickly began to penetrate popular culture in unexpected ways, with its open design and broadcasting format attracting celebrities, athletes, politicians and anybody who wanted to share short, punchy thoughts with a digital audience.
    Its business potential developed more slowly, and the company appeared to be floundering as recently as three years ago, when it was riven by management turmoil and frequently crippled by service outages.
    Under Dick Costolo, who took over as CEO in October 2010, Twitter has rapidly ramped up its money-making engine by selling "promoted tweets," messages from marketers that are distributed to a wide-ranging but targeted group of users. In the third quarter, Twitter had $168 million in revenue, it said, more than double from a year prior.
    The NYSE, which snatched the listing away from its tech-focused rival, Nasdaq, marked Twitter's debut with an enormous banner with the company's blue bird logo along its Broad Street facade.
    British actor Patrick Stewart, of Star Trek fame, rang the opening bell at the Big Board together with nine-year-old Vivienne Harr, who started a charity to end childhood slavery using the microblogging site.
    "I guess I represent the poster boy for Twitter," Stewart said, adding that he had only been tweeting for about a year.
    Costolo and Twitter's three co-founders - Evan Williams, Biz Stone and Jack Dorsey - appeared on the packed exchange floor to witness the beginning of trade.
    At current valuations, the stakes owned by Williams and Dorsey would be worth around $2.7 billion and $1.1 billion, respectively. Costolo, who invested $25,000 in the fledgling company in 2007, holds a 1.4 percent stake worth about $360 million.
    Sell rating
    Investor enthusiasm for the microblogging company defied traditional valuation analyses. The shares traded at about 22 times forecast 2014 sales, nearly double the multiple at social media rivals Facebook and LinkedIn Corp, even though Twitter is far from turning a profit and posted a loss of almost $70 million for its most recent quarter.
    The hefty valuations were cause for celebration for Twitter insiders and venture capital backers, such as Union Square Ventures, Spark Capital and Benchmark Capital. But some analysts warned that a correction may be in store.
    "With a price that pushes into the high 30s and beyond, Twitter is simply too expensive," Pivotal Research's Brian Wieser wrote in a note cutting his rating on the stock to "sell" from "buy".
    "One way to justify a $45 price in our model would involve presuming that Twitter could generate more than $6bn in annual revenue by 2018. However, we think that would seem overly optimistic."
    Fund managers who got small allocations at the IPO were hopeful the stock would trade down after Thursday's pop.
    "We have a target of $40 and we won't buy more as long as it is trading above that," said Mark Hawtin, portfolio manager of the GAM Star Technology Strategy.
    Jerry Jordan, manager of the $48.6 million Jordan Opportunity Fund, who got a small allocation, said he would buy more of Twitter if it trades down around $30-$35.
    "A lot of these sexy IPOs have a big pop on the first day and then they grind sideways," Jordan said.
    International growth
    As Twitter's stock soared after the opening, the company's market value, including restricted share units and other securities that could be exercised in the coming months, was over $28 billion.
    The company said in its investor prospectus that more than three-quarters of its users are outside the United States. Despite its early reputation as a hangout for Silicon Valley early adopters and tech geeks, some of its most active markets now include Japan, Indonesia, Brazil and Saudi Arabia.
    The fast-moving, mobile service was credited with fueling popular protests that upended the Arab world in 2011. It served as a lifeline to the outside world for its users during natural disasters like Hurricane Sandy, and also instantly relayed news such as early rumblings of the 2011 U.S. raid on Osama bin Laden's compound in Pakistan.
    "Twitter has, when coupled with the increasing distribution of smart phones and reach of the Internet, an impact on global connectivity and transparency," said P.J. Crowley, the former U.S. State Department spokesman. "It has definitely contributed to the acceleration of the news process and helped to expand the availability of information sources to a wide range of people."
    The three most-followed accounts belong to a trio of pop stars: Katy Perry, Justin Bieber and Lady Gaga. U.S. President Barack Obama comes in fourth.
    The 140-character messages have spawned an Internet culture of its own. The "hashtag," a pound symbol devised by early Twitter users to denote the topic of a conversation, has became ubiquitous, with the word even becoming an ironic expression parodied by the likes of "Saturday Night Live."
    Twitter's successful debut is likely to stoke interest in other up-and-coming consumer Internet companies such as ride service Uber, scrapbooking site Pinterest, accommodation service Airbnb and the payment start-up Square, all of which boast private-market valuations well north of a billion dollars and could go public in the coming years.
    Kevin Hartz, CEO of Eventbrite and an early investor in Pinterest and Airbnb, said the IPO floodgates might open now.
    "The pendulum is swinging back in a surprising way," Hartz said. "There's a pent-up supply of a lot of quality companies."
    Still, two early social media success stories, Groupon Inc and Zynga Inc, have suffered major reversals since going public. Groupon, despite big gains in its shares this year, still trades at less than half its 2011 IPO price. Zynga is worth about a third of its 2012 IPO price.
    And first-generation social media firms such as MySpace have all but vanished as fickle users moved on to the next big thing.

    How the NSA's MUSCULAR program collects too much data from Yahoo and Google

    How the NSA's MUSCULAR program collects too much data from Yahoo and Google

    This document is an excerpt from Special Source Operations Weekly, an internal National Security Agency publication dated March 14, 2013. It describes a common NSA problem of collecting too much information – and how the agency is attempting to control it.
    FOR MORE DETAILS CLICK HERE

    Friday, November 8, 2013

    Google engineers over surveillance scandal : NSA MIND GONE ,FOR THAT READ THIS STORY

    Google engineers over surveillance scandal : NSA MIND GONE ,FOR THAT 

    READ THIS STORY


    NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say



    In this slide from a National Security Agency presentation on “Google Cloud Exploitation,” a sketch shows where the “Public Internet” meets the internal “Google Cloud” where user data resides. Two engineers with close ties to Google exploded in profanity when they saw the drawing.
    The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.
    By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
    According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.
    The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.
    The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.
    The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.
    In a statement, the NSA said it is “focused on discovering and developing intelligence about valid foreign intelligence targets only.”
    “NSA applies Attorney General-approved processes to protect the privacy of U.S. persons — minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination,” it said.
    In a statement, Google’s chief legal officer, David Drummond, said the company has “long been concerned about the possibility of this kind of snooping” and has not provided the government with access to its systems.
    “We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” he said.
    A Yahoo spokeswoman said, “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”
    Under PRISM, the NSA gathers huge volumes of online communications records by legally compelling U.S. technology companies, including Yahoo and Google, to turn over any data that match court-approved search terms. That program, which was first disclosed by The Washington Post and the Guardian newspaper in Britain, is authorized under Section 702 of the FISA Amendments Act and overseen by the Foreign ­Intelligence Surveillance Court (FISC).



    Friday, October 25, 2013

    BEST AUTHORS FOR ECE GATE PREPARATIONS

                          BEST AUTHORS FOR ECE GATE PREPARATIONS

        Book List for GATE


    Subject  Author
    Network Analysis  Van Valkenburg
    Network and Systems  D. Roy Choudhary
    Integrated Electronics  Jacob Milman & C. Halkias; Millman & Grabel
    Integrated Circuits  K R Botkar
    Op. Amps & Linear Integrated Circuit  Gayakwad
    Digital Logic & Computer Design  Moris Mano
    Signals and System  Oppehum, Willsky & Nacob
    Automatic Control System  Benjamin C. Kuo
    Control System Engg.  Nagrath & Gopal
    Principle of Communication System   Taub & Schilling
    Communiation System  A. Bruu Carlson
    Electromagnetic Waves & Radiating Systems  Jardon & Balmain; JD Kraus

    GATE PREVIOUS EXAM SOLVED PAPERS FOR ECE

              GATE PREVIOUS YEARS EXAMS SOLVED PAPERS                                       FOR E.C.E   (1996-2013)



    GATE 2013                                                                             GATE 2007
                           CLICK HERE TO DOWNLOAD                CLICK HERE TO DOWNLOAD

    GATE 2012                                                                          GATE    2006
                         
                           CLICK HERE TO DOWNLOAD                CLICK HERE TO DOWNLOAD

    GATE 2011                                                                         GATE     2005

                           CLICK HERE TO DOWNLOAD                CLICK HERE TO DOWNLOAD
                           
    GATE 2010                                                                          GATE   2004

                            CLICK HERE TO DOWNLOAD               CLICK HERE TO DOWNLOAD
                                                                                               
    GATE 2009                                                                          GATE    2003


                            CLICK HERE TO DOWNLOAD                CLICK HERE TO DOWNLOAD
    GATE 2008                                                                        
                                                                                                  GATE   2002

                            CLICK HERE TO DOWNLOAD                 CLICK HERE TO DOWNLOAD


                                                          DOWNLOAD           GATE 2001
                                                            DOWNLOAD            GATE 2000
                                                             DOWNLOAD                GATE 1999
                                                                 DOWNLOAD               GATE 1998
                                                                     DOWNLOAD               GATE 1997
                                                                       DOWNLOAD               GATE 1996


    Download GATE Mathematics materials

    Thursday, October 24, 2013

    Gate 2014 materials free download

                                GATE study material
                                         click here to watch and download
    A great list of Study material collected from different sources like coaching centers and student surveys on this site.
                          GATE Video Lectures and Video Tutorials
    Engineering Mathematics and other courses 
    Civil Engineering (CE) Lectures and Tutorials 
    Computer Science & Engineering (CSE) Lectures and Tutorials
    Electrical Engineering (EE)Lectures and tutorials
    Gate ece 2013 question paper
    Gate ece 2012 question paper
    Gate ece 2011 question paper
    Gate ece 2009 question paper
    Gate ece 2008 question paper
    Gate ece 2007 question paper
    gate ece 2010 question paper
    Electronics and Communication Engineering Lectures and Tutorials 
    Gate ece 2013 question paper
    Gate ece 2012 question paper
    Gate ece 2011 question paper
    Gate ece 2009 question paper
    Gate ece 2008 question paper
    Gate ece 2007 question paper
    gate ece 2010 question paper
    Mechanical Engineering Lectures and Tutorials
    Ocean Engineering Lectures and Tutorials 
    Biotechnology Lectures and Tutorials
    Mining Engineering lectures and tutorials


                       

    Hacker stole $100,000 from Users of California based ISP using SQL Injection.

    Hacker stole $100,000 from Users of California based ISP using SQL Injection.




    Recently a hacking Group named 'TeamBerserk' claimed on Twitter that, they have stolen $100,000 by leveraging user names and passwords taken from a California ISP Sebastian (Sebastiancorp.com)to access victims' bank accounts.

    A video proof was uploaded on the Internet, shows that how hackers used a SQL injection attack against the California ISP Sebastian to access their customers' database includes  e-mail addresses, user names and clear text passwords and then using the same data to steal money from those customers.

    Let's see what SQL Injection is and how serious an attack like this actually can be.

    SQL Injection is a type of web application vulnerability in which the attacker adds Structured Query Language (SQL) code to web inputs to gain access to an organization's resources. Using this technique, hackers can determine the structure and location of key databases and can download the database or compromise the database server.
    SQL Injection bank hacked 4
    Hackers took just 15 minutes to hack into the website using SQLmap (Automated SQL Injection Tool) -- stole customers' database and then immediately accesses the victim's Gmail account, linked PayPal accounts and Bank accounts also.
    SQL Injection bank hacked 3
    It's so hard to remember multiple passwords, some people just use the same one over and over. Is your Facebook password the same as your Twitter password? How about the password for your bank's website?

    Now the hack explains that this us why it's extremely dangerous to use the same password on more than one Web site. In the POC video, hacker randomly chooses one Sebastian username and his relative password against Paypal, Gmail and even Citibank account logins and seriously that actually worked, because the victim is using the same passwords for all websites.
    SQL Injection bank hacked 2
    Hacker stole $100,000 from Users of California based ISP using SQL Injection
    Now that you've control of the situation, don't let this happen again! If you have a bank account, a few credit cards, and several other important sensitive accounts, conduct a thorough security audit on them. Be sure that you know when you last logged in. Be sure to keep using different and Strong passwords for each website.

    facebook frnds

    About Me