Sunday, August 29, 2010

In my last post i said about TCS openstone test in which a 35 questions will be alloted randomly from a large database of three lac questions to the persons taking the online test for entry level job in TCS. Most of the persons think that handling with a system rather than paper and pen is very tough in such type of test that will decide a person's life. To address their grievances TCS will provide a mock test called OPENSTONE test for the persons who registered for TOUCHSTONE test.
In my last post i said about TCS openstone test in which a 35 questions will be alloted randomly from a large database of three lac questions to the persons taking the online test for entry level job in TCS. Most of the persons think that handling with a system rather than paper and pen is very tough in such type of test that will decide a person's life. To address their grievances TCS will provide a mock test called OPENSTONE test for the persons who registered for TOUCHSTONE test.

Saturday, July 24, 2010

TCS- NEW RECRUITMENT PATTERN

TCS the largest software provider in Asia and also one of the largest recruiter in India has now changed the recruitment pattern.It conducts an online test with a software called TOUCHSTONE which was created by the students of IIT Chennai.There will be a large database of more than three lac questions from which 35 questions will be assigned randomly to all those who take the test.The total time for this test is one hour which consists of aptitude,puzzle and critical reasoning questions.There will be no verbal questions which is present in older pattern.The questions are very lengthy of 4 to 10 lines and consists of several irrelevant data just to kill the time.There will be negative marks of 0.33 for every wrong answer.

The preceding rounds are
Group Discussing
Technical Interview
HR
MR

Friday, July 23, 2010

A FUNNY MICROSOFT PUZZLE

Puzzles are part of the aptitude test which is a first round in every software industries recruitment process.We can expect some funny questions in this section.A typical example for this is the following puzzle.

A bear moves some km north and then some km east and some km south and now it reaches the place where it starts from.What is the colour of bear.

It seems to be wacky but it is a tricky question,as the bear reaches starting place in three moves it must be travelled in a triangular structure, which happens only in south pole.Consider the globe imagine travelling along the longitudes towards north from south pole and take diversion to east and travel towards south in the longitude.As the color of the bear in poles are white the answer to this question is white.

Sunday, July 18, 2010

Cookies-The authenticator

Cookies are the encrypted text file used for the authentication of a particular person.It is produced by the web server and consumed by web server.For example you cant login to your email account when the cookies are blocked in your browser and it will prompt you to turn on the cookies.This is because when you login from a particular browser in a system it will send a cookie for identification of a particular person and it will be required for every action such as opening of email.Cookies can also be a spyware but some websites are unusable without cookies.As cookies contain sensible information every cookie has am expiration time as decided by the web server.

Saturday, April 17, 2010

DIFFERENCE BETWEEN APPLET AND STANDALONE APPLICATION

Standalone application are created to execute in system where it is installed but applets are used to create dynamic pages of the website that is to be run by browser.Consider for example when you create an applet that contains the line
a=a+1;
the line is executed infinite number of times as far as the applet is running.We can convert any applet to standalone application by modifying the applet with main() function.Since java is a powerful language that can be able to take the control of whole system it denies some permissions for unsigned applets because applet are to be run on remote system in a browser.

Saturday, March 27, 2010

WINDOWS-BATCH FILE

Windows batch file is nothing but a line by line collection of commands that are executed in command prompt.To create a batch file open the notepad and type the commands line by line and save as of type .bat.For example consider the following example
cd c:\\images
del a.gif
and save the file as example.bat.
When you double click the above created batch file a.gif in the images folder is deleted.

Saturday, March 20, 2010

TRACE THE ORIGIN OF YOUR EMAIL

When you receive a email saying it come from London or USA you will be confused whether it really came from that location.The best way to verify it is to check with the IP from which it is was received.To know the IP from which the email is received use the following steps.

GMAIL
In gmail open the message and click the inverted triangle above the message and click show original.You can see the IP from which the email is received.

YAHOO
In yahoo click the see full header option to see the IP from which it is received.

Using the IP just search it with google to see the location or goto the url http:\\www.whatismyipaddress.com and click IP lookup to see the location.

Wednesday, March 17, 2010

EDITING THE SYSTEM FILES IN WINDOWS VISTA AND WINDOWS 7

When you are previously using windows xp and upgraded to windows vista or 7 you may have faced this situation.For example in windows vista and 7 when you open some system or administrative files such as c:\windows\system32\drivers\etc\hosts file in notepad for testing some tricks you are not able to save the edited file which is not a matter in XP.To edit such files drag that file to another location such as desktop and then edit and save.After saving move the file back to the original location then done.

Tuesday, March 16, 2010

DIFFERENCE BETWEEN BLOG AND WEBSITE

Though the blog and website are seem to be same there are many important differences between them.The main difference that differentiate the two is STATIC PAGES.The blog doesnt contain any static pages because it was initially invented to share the personal ideas of a person with his friends and relatives which is updated frequently.Also the blog doesnt contain the storage space and as a result it should provide external link for downloading of files.On the other hand websites contain static pages and also the storage space.The search engines will give high priority for blog compare to website as it is updated frequently.As a result the commercial organisation will employ both blog with a link to its website for better results.

Friday, March 12, 2010

KNOW THE IP ADDRESS OF A WEBSITE

As i have said in earlier posts that every website have an unique IP address and it is named only for our convenience.Sometimes you want to know the IP address of a particular site to hack or to make fool your friends.To satisfy your needs i tell the way to find the IP of a site from windows connected to internet.For example when you want to know the IP of google.com then goto run and type "cmd" the command prompt will open here type the following command.

ping google.com

and press ENTER.

Now you will see the a number of lines indicating the status of connection including the IP address of the site.You com find the IP of any site by using this method when you are currently connected to the internet.

Saturday, March 6, 2010

GOOGLE Search Techniques and Query Optimization

Google supports several syntax and optimisation for the queries by which the user can get the desired output.I summarize some important features.


1.There are certain circumstances when you require result from only a certain site excluding result from another sites.At that time try the following format using (site:) command.
For ex[site:foolishengineers.blogspot.com prakash]

Try the above query without the brackets and see the result.


2.Another important feature provided by google is built in calculator which performs mathematic operations.Try the following queries.


1+100
2*5

3.When you want to know the meaning of certain word then try the following query.
ex.[define word]
Use the above query by replacing the word with word you want to know the meaning without the bracket.


4.When you want to know the time of a certain city then use the following query.

ex.[time Chennai]

5.Google provides inbuilt unit conversion from one unit to another by simply providing a query in the following format.

ex. [60kg to gram]

Google supports many types of such a conversion from one unit to another.


Apart from this it provides many services especially for U.S such as fligt status etc.

Friday, March 5, 2010

Static ip vs Dynamic ip

When an ip address is assigned to you that enables you to connect to global network which doesnt change with time then it is STATIC IP.By doing so there is insufficiency in the number of ip addressed as the number of net users increase exponentially with time.To avoid this unfavourable situation DYNAMIC IP was introduced which dynamically assigns address to the client when requested.The dynamic addressing concept is based on the fact that the number of users online at any time is very less than the total number of net users.The ISP maintains a large pool of addresses from which one address is assigned to a host when requested and get back into the pool when that host is disconnected.This can be done by DHCP(Dynamic Host Configuration Protocol)which provides dynamic ip to a host.Check your ip address before and after(i.e different sessions)your ip will definitely vary.To overcome this type of problems ipv6 was introduced and the world is slowly migrating to it.Japan has completely implemented IPv6.

Thursday, March 4, 2010

Difference between read and write permission in windows

Whenever you are currently using a file(e.g. playing an audio or video file) check the properties before and after the usage by right click or pressing Alt+Enter) when the file is highlighted.You can notice that the read only property of that file is automatically marked and you are not able to delete that file at that time but still you can copy it to USB etc. and also you can open it with other application this is because copy or play option requires only read permission but delete operation requires write permission which is not available when read only is marked.Therefore you are not able to delete a file when it is currently in use and most of the viruses uses this concept to make the virus file undeletable.At that time you can change the properties of a specific file from the command prompt using attrib command to change the permission and delete that file.

Wednesday, March 3, 2010

Revealing Wikipedia

Most of the student and teaching community will opt for Wikipedia as the primary source of information.But most of us dont know many amazing facts about this fabulous site.The articles in this site are created and edited by billions of contributor like us around the world.
Due to the above fact it suffers from vandalism(i.e some persons will utilize it for publishing their ads and make a link to anonymous site)and some of its articles contain fake and unverified information.Therefore some persons will not accept the references from Wikipedia.

Despite of criticism and controversies by many experts around the world some of its features marked it apart.
1)Wikipedia is the fifth most viewed website in the world.This may be due to google which gives highest priority to Wikipedia in its search results.
2)It is non commercial which doesnt support ads of any kind in its pages.A survey discovered that when this site supports ads it will earn many billions per year.It will ask for voluntary donation once in a year for its expenses.
3)It is available in more than 200 languages and contains more than billion articles on almost every topic and it is ever increasing.
Last but not least it employs less than 35 persons for maintaining such a large site.
Wikipedia has taken many steps to ensure the reliability of its contents which includes the inclusion of talk page and history page for contributors which is capable of rollback to previous states when it is damaged by vandals.

Tuesday, March 2, 2010

DIFFERENCE BETWEEN PUBLIC IP AND PRIVATE IP

In ipv4 addressing ambiguity arises in deciding whether a given ip is assigned through ICANN(International Council for Assigned Name and Number)to connect to global network or it is assigned by the user locally for LAN.To avoid this confusion ICANN allocated certain set of address exclusively for private use.They are
1)10.0.0.0 to 10.255.255.255
2)172.16.0.0 to 172.31.255.255
3)192.168.0.0 to 192.168.255.255

we can use the above ip ranges without any permission from ICANN for local connection. The IP addresses which doesnt lie in the above category are called public IP obtained from ISP for connecting to global network and hence the name public IP.But most of the ISP will provide you a private IP due to insufficiency of addresses and this is possible due to NAT(Network Address Translation).

STEGANOGRAPHY

Steganography is defined as the art of hidden way of writing whereas the cryptography is the secret way of writing.By using cryptography the third person will know something is crypted.The major advantage of Steganography over cryptography is that it is almost impossible to know that something is hidden.We know that every image is made up of several bits.The data to be hidden is also a series of bits. Steganography replaces the least visible bits in the image by the data bits which is unidentified by the human eyes.The bits to be replaced is generated by an algorithm shared by sender and receiver.The receiver user the same algorithm to generate the bits where his message is hidden.The message is usually compressed and then encrypted before hiding inside a image.As the terrorists extensively use this method for conspiracy the government has involved in extensive research in this field to counteract the terrorists.

Monday, March 1, 2010

VIRTUAL PRIVATE NETWORK

Large organisation will usually have to employ two types of network.
1.PRIVATE NETWORK
2.GLOBAL NETWORK

PRIVATE NETWORK
This type of network doesnt require internet connection and it is used only to share information between the computers in a organisation.These organisation which have branches all over the world have to be connected through wires which constitute a WAN.

GLOBAL NETWORK
This internet connection is required for connecting to external world.

HYBRID NETWORK
To accomplish the above two needs the organisation employs two routers one to connect to the private and another to connect to external world.

NEED FOR VPN
The above method has major disadvantage that using a private network with WAN is very costly since it requires connection to branches in all parts with wires.Also the global network requires monthly payment.To integrate both the cost ICANN introduced VPN which provides both the private and global connection with a single connection.The data packets destined for private computer is encapsulated with IPsec such that it will be deciphered only by private computer.This process is called tunneling.As the network seem to be private it is not but it make use of global line for communication.Thats why the name VIRTUAL PRIVATE NETWORK.

Sunday, February 28, 2010

Tips to increase the page rank of your blog

I am writing this post with great joy because first time i saw my blog listed in the first page of google search engine results.When i first created the blog and try to catch it in google by trying with different queries i am frustrated with the results because i didnt find it.Search engines like google uses a number called page rank for all the sites.The results will be listed according to the page rank.Web designers use several techniques to increase the page rank and the study of latter is called Search Engine Optimisation.Here are few tricks to increase the page rank of your site.


1.Update your blog at regular interval daily if possible.
2.Send request via email to all the mail id you have with a link to your site.

3.Most importantly include the name of your college,organisation etc which will definitely pay to your expectation.


4.And not but not the least leave comment in the famous websites with a request with link to visit your blog.

Saturday, February 27, 2010

APTITUDE QUESTION IN GATE

I saw a question on previous year gate question paper that has attracted me very much.
HOW MANY FOUR DIGIT EVEN NUMBERS ARE THERE SUCH THAT THEIR DIGITS ARE DISTINCT?
Even number means their last digit is either 0,2,4,6 or 8
case 0:The first digit is a number from 1 to 9 because 0 is fixed and therefore 9 choices for first digit and 8 for the second and 7 for the third and last digit is fixed.According to combination number of four digit number ending with 0 is 9*8*7=504
care 2,4,6,8:This case is different because first digit cant be zero therefore 8*8*7=448 therefore for 2
4 6 and 8 we have 448*4=1792.Therefore in total 1792+504=2296 possibilities.Those who have doubt in this answer check it with the following C code which i did.

count=0
for(i=1;i<9;i++)
for(j=0;j<9;j++)
for(k=0;k<9;k++)
for(l=0;l<9;l++)

if(i!=j&&i!=k&&i!=l)
if(j!=k&&j!=l)
if(k!=l)
count=count+1;
This code will give 2296 as output.

Friday, February 12, 2010

DIFFERENCE BETWEEN PERCENTAGE AND PERCENTILE

Yesterday a man from entrance exam coaching centre came to advertise his centre.He told some valuable info about the mba colleges in India.He also explained the difference between percentage and percentile which i dont know till that time.Percentage we all know and percentile denotes the percentage of people scored below us.As CAT(Common Admission Test) has negative marks even if we score zero marks we will get ten percentile because ten percent people score negative marks.

Wednesday, February 10, 2010

JAVA HAS NO POINTERS

Most of us has a doubt why java has no pointers and it has only internal pointers. As java is mostly used in webs which will to reach many computers throughout the world.The use of pointers will breach the firewall of the system easily which is a threat to network security.Therefore keeping this in mind sun microsystems avoided pointers in java

Hack xp password

There are several methods to hack xp password but the most interesting i have learned is sticky key trick.In windows there is an option called sticky key which can be activated by pressing shift five times which will work from the log on screen even before entering the password.This will enable the user not necessary of clicking one os more keys at the same time.The .exe for this is in c:/windows/system32.If you like to try something different drag and drop the cmd file in same location to desktop and rename it to sethc(exe for sticky key).Then again drag the renamed file back to the system32 folder it will ask whether to rewrite click yes.What you have done is making the command prompt to open instead of sticky keys.Restart the system press shift key five times command prompt will open type compmgmt.msc click local users and groups in the left pane select the account you want to change the password and right click and select set password then done.It will not work in xp professional edition.You can make any exe file to run by renaming it to sethc and following the same procedure.

Saturday, February 6, 2010

NEED FOR CAPTCHA

When you creating an account in any website you are prompted to enter the words given in the picture in the box as it is.This is called captcha.It is necessary because some software will create numerous number of account which the account providers doesnt like therefore they provide captcha which will not be identified by the software.In gmail when you enter the wrong password for five times it will request to fill the captcha this is because there are softwares that will try all the combination of words and numbers to hack the account.

Friday, February 5, 2010

BLOCKING A WEBSITE

If you want to block a particular site in your system to tease your friends for fun then edit the following file with notepad.

c:/windows/system32/drivers/etc/hosts

then select the notepad to open the hosts file.

Every website in the world have a corresponding IP address and the URL is only for ease of memorizing.This hosts file contain the mapping of IP address to the domain name.In that file you can find a line


127.0.0.1 localhost


The local host indicates your own systemIf you replace the localhost with google.com then your system is checked for google.com when your browser requests for google.com the the google is blocked.Similarly if you map the IP address of yahoo with google.com then google is opened when you enter yahoo.com in browser.

In windows vista and 7 you are not able to save the edited file which is not a matter in XP.To edit such files drag that file to another location such as desktop and then edit and save.After saving move the file back to the original location then done.

Thursday, February 4, 2010

DIFFERENCE BETWEEN DUAL CORE AND CORE 2 DUO PROCESSORS

Some of you may get confused by dual core and core 2 duo as it seems to be entirely different concepts.Dual core processors are like two processors working in serial i.e the two processors do the same job at a given time.The core 2 duo is working in parallel i.e they divide the work between them.Now the latest processor by intel is i7 processors.

JAVA-PLATFORM INDEPENDENT PORTABLE LANGUAGE

Java is a platform independent portable language.Languages such as C and C++ etc will produce an executable file for every program you create.The executable file will work on particular platform only.As java applets are used in network it should run on every platforms.To implement this need java will create a file called class file.The class file is well optimized bytecode of your program.The class file is independent of the platform and therefore it will run on every platform.Only the java compiler is platform dependent but not the class file.We should consider platform only for the creation of compiler.

Tuesday, February 2, 2010

Googlle

Last october i attended technical symposium held at psg college of technology,Coimbatore.I participated in quiz competition in which a question which i will not forget in my lifetime.The question is "One day the google doodle(logo) was missspelt as googlle that is when and why?".Actually i have also seen that logo on that day and i was predi confused and doesnt try to know the reason behind it.I was disappointed at that moment but didnt give up and searched for the answer from my mobile from the venue.I got the answer that is sep 27 the 11 birthday of google that why intentionally missspelt to denote 11 with double l(ll).Since then i tried to research on every things that i came across.Not only on that day it google frequently changes its logo to mark the important events.

WINDOWS XP MODE

Windows vista and 7 doesnt support some of the softwares that you have worked with windows xp due to compatibility and many other issues.To overcome this problem microsoft has launched a software called WINDOWS XP MODE for windows 7.By using this software you can run the programs that are incompatible with windows 7.This is a free download from microsoft website.Unfortunately it not available for home basic and premium versions of windows 7.It is available only for ultimate and enterprise editions.This is a good idea which avoids the need for installing xp as a dual boot system or virtual installation.

Monday, February 1, 2010

DNS ADDRESS

DNS stands for Domain Name Server.The domain of each website has an ip address.As it is difficult remember the ip addresses each ip address is assigned a domain name.When we enter the url of our website in the browser the DNS will convert it into corresponding ip address then the page is loaded.To fool your friends change the DNS address into any other address.You can also simply type the ip address of the website instead of the url.

ANTI VIRUS WORKING TECHNIQUE AND iVDF

Those who are manually updating their anti virus software has been came across the term iVDF.It stands for incremental Virus Database File.iVDF will be added to the existing VDF file in antivirus.This file contains the signature and characteristics of different viruses,which is used to compare the files during scanning and identify the virus.I think now you are clear about the iVDF concept,it is nothing but is produced to identify the new type of viruses that are spreading from time to time.Every time the file is scanned it compares it with the VDF signatures it have to identify the virus.

Sunday, January 31, 2010

SPEED UP YOUR BOOT PROCESS

After your login into windows sometimes you may get annoying messages from softwares saying that it is going to expire and so many unwanted windows will open.you can overcome this problem by going to RUN type MSCONFIG a window will open then press the STARTUP tab it will list the softwares that os will load on startup itself,then unmark the against all the softwares you have installed other than the antivirus programs which is to kept marked.This procedure will increase your bootup time as well as saving the time in closing the unwanted windows.

TYPES OF CRYPTOGRAPHY

Cryptography is defined as the secret way of writing.It involves three steps such as encryption,transmission,decryption.The cryptographic process involves an element called key for encryption and decryption.The key is like a password for a folder. It is primarily divided into three different types.They are
1.Symmetric encryption
2.Asymmetric encryption
3.Hybrid encryption
SYMMETRIC ENCRYPTION
In this method the same key is used for both encryption and decryption.By doing so the key should be transmitted from sender to receiver through the network,which is easy for the hackers to obtain the key and decrypt it.This method is very faster because same key is used for both encryption and decryption but is very insecure.This method is on longer in use.


ASYMMETRIC ENCRYPTION
This is a very effective method since the receives will generate a pair of keys(private key and public key).He sends the public key to the sender from whom he wish to receive the data,hacking of this key will not effect because it will only be able to encrypt the data.The sender encrypt the data with public key and transmit over the lines to the receiver.Upon receiving the data the receiver decrypt the message with his private key.The two keys are designed in such a way that the private key will not be derived from public key with the algorithms such as RSA algorithm.This type of encryption is like a padlock where anyone can easily lock(encrypt) just by pressing but the key is required for opening(decrypt).The main disadvantage of this type is that it is atleast 1000 times slower than symmetric method.

HYBRID ENCRYPTION
This method combines the advantages of the above two methods.In this method the data is symmetrically encrypted and the symmetric key is asymmetrically encrypted with the public key of receiver.At the receiver end with the help of his private key the symmetric key is taken out and that key is used to decrypt the data.This method is as fast as symmetric method because here only the key is asymmetrically encrypted which is very small in size and also this method has the security features available in asymmetric method.

Saturday, January 30, 2010

Difference between forward slash(/) and backward slash(\)

Many of us has a confusion where to use forward slash and where to use backward slash.The backward slash is used to navigate to the resources out of our system for e.g consider the url http:\\www.google.com\adsense it is used to reach resource outside of your system.The forward slash is used reach the resource within your machine for e.g c:\windows\system32.I hope you understand the difference

Friday, January 29, 2010

Windows xp found no hard drive error

Last week my friend frustrated with the experience of using vista decided to downgrade his hp notebook computer to xp.while installing he was stopped by "windows doesnt found any harddisk" error.he approached me for help.After searching i found a solution and a very interesting fact behind the error.XP doesnt have driver for SATA hard disk,which has to embedded in live cd to recognize the hard disk.The solution for this is to disable SATA native support in bios setting before the system starts to boot.The above setting will disable SATA support and now your hard drive will be recognized by xp.To use xp with SATA you have to embed the driver for your sata with xp live cd using softwares such as nLITE etc.Also another friend of mine told after updating vista it is stable.Anybody who visits my blog please leave a comment even i havent viewed my blog i m typing this through mobile with opera browser.Viewers discretions are invited.

INTRODUCTORY POST

Hi
i have just created this blog just for fun from the mobile.With this blog i am gonna to share the tricks,news,hacks, etc what i read from books and blogs.This is only a sample post and i wil post valuable information in future.
Thank you keep visiting my blog.