Friday, 30 August 2013

Bank Coaching Institute

Best coaching center for BANKING in Hyderabad


MERIT
A PREMIER INSTITUTE FOR COMPETITIVE TESTS
ADJ. HERO HONDA WORK SHOP,
MUSARAMBAGH, DILSUKNAGAR,
HYDERABAD.

By Purna chandra rao

PHONE: 040-6636 7827

Established in 1979

***
COPY-WRITE OWNED BY PRAMOD KUMAR

Various Operating Systems

Operating Systems:

Free O.S:

These are the list of free operating systems. That are available to be downloaded free of cost.


1) UBUNTU OPERATING SYSTEM

2) CENT OPERATING SYSTEM

3) HAIKU OPERATING SYSTEM

4) BSD OPERATING SYSTEM

5) BACK TRAC- LINUX OPERATING SYSTEM

6) FEDORA OPERATING SYSTEM



7) DEBAIN OPERATING SYSTEM

8) OPENSUSE OPERATING SYSTEM

9) PARDUS OPERATING SYSTEM

10) SUSE OPERATING SYSTEM

11) MORPHOS-TEAM OPERATING SYSTEM

12) SINGULARIT.CODEPLEX OPERATING SYSTEM
http://singularity.codeplex.com/ (Microsoft research project)

13) TAJ OPERATING SYSTEM


In addition these there are various paid operating systems like Microsoft, Solaris etc.

***COPY-WRITE OWNED BY PRAMOD KUMAR

Graduate Record Examination (GRE) Training Institute

Best coaching institute for GRADUATE RECORD EXAMINATION (GRE) in Hyderabad:


PROMAC
By Sir, Narsi Reddy

PHONE NUMBERS:
+(91)-(40)-27019584
+(91)-9948404648

Address:
Flat No 208, 2ND Floor, Mehtab Arcade,
Beside Sanman Hotel, Opp Ganesh Temple,
Main Road, Tarnaka,
Hyderabad - 500017

***
COPY-WRITE OWNED BY PRAMOD KUMAR

Thursday, 29 August 2013

How to Face Interview Questions

FACE TO FACE INTERVIEW:

Tell me about yourself?

Hello Respective,

I am XXXXX. I am from XXXX. My father is a Government Employee and my mother is House wife. I have two siblings, an elder brother and younger brother. My hobbies are XXXXXXX. My goal is to get into a managerial position with best accomplishments. My most memorable day in my life was the day on which I XXXXXXX. And my motto is” XXXXXXXX”. I am an easy going person and proactive in nature that works well with everyone and more or less I usually bond with ethical values and morals.

Strengths?
I am a hard and smart worker and because of this ability I can work for additional hours to accomplish my tasks. I am commitment oriented and hence I always enjoy the trust and confidence of my team mates which enables me to perform my duties very easily.

Why should we hire you?
You should hire me because – as an individual I am the best person for the job. I realize that there are likely other candidates who also have the ability to do this job Yet I bring an additional quality that makes me the best person for the job.

**Special statement: How ever if you would like to select me for a specific strength then the prerogative is yours sir.

Weakness?
One of my weakness is I perceive occasional compromise on time and quality for perfection.

What kind of salary are you looking for?
I am sure that the company has already established a salary range for this position and as I am ready to work for this company I expect it competitively.

What made you choose your major?
From the very beginning I always had a lure towards electronics field. During my school days I participated a lot in Science Exhibitions and used to play with electronic item like remote cars, etc. This gave me interest to ward electronics. When I completed my Intermediate I got a chance and I grabbed it with both hands. Hence I would say my Interest made me to choose electronics as my major.

What is your project role?
My role in project is to
To design an architecture and develop specifications,
To identify codes for each block,
To verify it by testing.
 
 ***

COPY-WRITE OWNED BY PRAMOD KUMAR

Hackers and Its Types

What is Hacking?

Hacking means breaching in to a computer or in a system or into software in which the access is private. It means getting in and maintaining access in a cyber place where you don’t have rights to enter.

Types of Hackers:
 There are three types of hackers and are:

1.       White hat hackers:

They are ethical hackers and just work as a security expert in any bank/society/online company etc. They just find vulnerabilities and possible attack in a system and make that system more secure. They have permission to make testing of vulnerabilities in the system and they do there self attack and tell what the vulnerability is. These people never harm any thing.

2.                   Black hat hackers:

They are unethical hacker and they breach into a system for fun or money. There is no specific reason or issue for which they do hacking.

3.                   Red/Grey hat hacker:

They are those people who do hacking for money. These people will have high knowledge that they can break through any thing if you pay money.

SCRIPT KIDDIE: A person who use tools with no contribution to hacking community, kiddies don’t know how to create their own tools or use advanced tools and constantly use the same tools to hack a  server or system, often not effectively. To some degree all hackers are script kiddies, but a good hacker has the ability to make intelligent decisions such as determining false positives from virus scans.

VULNERABILITY:  A weakness that could lead to compromised security. It may be discovered accidentally. Somebody may write a script to exploit this vulnerability.

WAR DRIVERS: People who take some kind of portable device, for example a USB drive or a laptop and just go to a public location. Then they pick up a wireless signal and possibly see what software it is running and may be find exploits for that software, but war drivers are not limited to this. They often just use this for free internets in the case they don’t have access to it themselves.

BLACK BOX ATTACKS: Security testing with no knowledge of the network infrastructure, for example attacking a company from the internet.

WHITE BOX ATTACKS: Security testing with complete knowledge of the network infrastructure.

KEYLOGGER: A key logger is a program usually runs secretly in the background that record what user type, then the typed output is usually sent via email or uploaded by the key logger.

IP Address

Exploiting IP address:

What is IP address?

a) Netstat –n:
Or find by going to whatismyip.com

Tracing route of the website: tracert website-name
((Blue color indicates the address of that website, In some places you will see * this implies that there are firewalls in that hop ip))

b) nslookup

You may see written there that you are not authenticated two this route. Now for getting ip address and for getting more information about a website you may also use these websites.
Samspade.com -> dnsstuff.com -> whois.net

Proxy websites: www.hidemyass.com
You can also search in google by typing public proxy servers.

***
COPY-WRITE OWNED BY PRAMOD KUMAR

Port Numbers

Port Numbers and their Services:


Port Number
Protocol
Service
0
TCP/UDP
Reserved
7
TCP/UDP
Echo
9
TCP/UDP
Discard
11
TCP
Systat
13
TCP/UDP
Daytime
17
TCP/UDP
Quote of the day
19
TCP/UDP
Chargen (character generator)
21
TCP
FTP
23
TCP
Telnet
25
TCP
SMTP
37
TCP/UDP
Time
38
TCP/UDP
Route Access Protocol
42
UDP
Name Server
43
TCP
Whois
49
TCP
Login Host Protocol
53
TCP/UDP
DNS
60
TCP/UDP
Unassigned
67
UDP
Bootstrap Protocol Server
68
UDP
Bootstrap Protocol Client
69
UDP
Trivial File Transfer (TFT)
70
TCP
Gopher
80
TCP
HTTP
88
TCP
Kerberos
101
TCP/UDP
NIC host name server
109
TCP
POP2
110
TCP
POP3
111
TCP/UDP
Sun remote procedure call (Sun RPC)
119
TCP
NNTP
137
TCP/UDP
Netbios name service
138
TCP/UDP
Netbios datagram service
139
TCP/UDP
Netbios session service
161
UDP
SNMP
512
TCP
Remote process execution
513
TCP
Remote login via telnet
514
TCP
cmd
749
TCP
Kerberos administration port


***
COPY-WRITE OWNED BY PRAMOD KUMAR

Olympics

OLYMPIC GAMES 2012:

SHORT DESCRIPTION ABOUT OLYMPICS:

As per history the Olympic is started in 776 BC . This continued for 12 centuries.

Olympia:

Olympia the site of ancient Olympic games, which in greek mythology is the island of “pelops”. The central part of Olympia was dominated by the majestic temple of Zeux, with temple of Hera parallel to it.


The Games and religion:

The Olympic games were closely linked to religious festivals of the cult of Zeus, but were not an integral part of a rite.

Victory Ceremonies:

The official award ceremony would take place on the last day of the games.
Official website: www.olympic.org

London 2012 Olympics: www.london2012.com

***
COPY-WRITE OWNED BY PRAMOD KUMAR

Network Commands

Network Commands:
 

This generally means gathering information about domain by using commands like telnet, nslookup,ping, tracert, netstat etc

ping: is a part of internet control message protocol(ICMP), which is used to know whether the host is alive or not.

Example: ping hostname.com

netstat: shows protocol statistics and current tcp/ip network connections that is local, remote address, port number etc.

Example: netstat -n

telnet: is a program which runs on tcp/ip. By this we can connect to remote computer on particular port. When connected it grabs the daemon running on that port.

Example: telnet hostname.com
that is telnet hostname.com port
by default telnet connects to port 23 of remote computer.

Tracert: is used to trace the route taken by packet from source to destination.

Example: tracert hostname.com
here “*** means request timed out” indicated that fire wall installed on that system block the request and hence we can’t obtain its IP address.


                                           ***Have a nice day***

COPY-WRITE OWNED BY PRAMOD KUMAR

Mobile Communications

Generations of mobile communication: 1G, 2G, 3G, 4G, 5G


Here, I have given you some basic details of communication technology and their specifications.


The large number of different mobile phone or cell phone systems that are talked about today can be very confusing. Whilst not all are in use today, some of the older systems have been superseded and some of the newer systems have not all been rolled out yet, nevertheless many different names and technologies are talked about. The table below gives a summary of the main systems that have been used, are being used or are due for introduction.



Cellphone  System
Generation
 Channel Spacing
 Access Method
     Comments
 AMPS
1G
30 kHz
FDMA
Advanced Mobile Phone System, this analogue system first developed and used in the USA
NAMPS
1G
10 kHz
FDMA
Narrow band version of AMPS chiefly used in the USA and Israel based on a 10 kHz channel spacing.
TACS
1G
25 kHz
FDMA
Analogue system originally in the UK. Based around 900 MHz, this system spread world wide. After the system was first introduced, further channels were allocated to reduce congestion, in a standard known as Extended TACS or ETACS
NMT
1G
12.5 kHz
FDMA
Nordic Mobile Telephone. This analogue system was the first system to be widely used commercially being launched in 1979. It was used initially on 450 MHz and later at 900 MHz. It was used chiefly in Scandinavia but it was adopted by up to 30 other countries including Oman.
NTT
1G
25 kHz
FDMA
Nippon Telegraph and Telephone. The system used in Japan, using a 900 MHz frequency band, and 55 MHz transmit receive spacing. (A high capacity version is known as HICAP).
C450
1G
20 kHz
FDMA
The system adopted in West Germany (East Germany was separate at this time). It used a band in the region of 450 MHz along with a 10 MHz receive / transmit spacing.
GSM
2G
200 kHz
TDMA
Originally called Groupe Speciale Mobile, the initials later stood for Global System for Mobile communications. It was developed in Europe and first introduced in 1991. The service is normally based around 900 MHz although some 850 MHz allocations exist in the USA.
DCS 1800
2G
200 kHz
TDMA
1800 MHz derivation of GSM and is also known as GSM 1800.
PCS 1900
2G
200 kHz
TDMA
1900 MHz derivation of GSM, and is also known as GSM 1900.
TDMA
2G
30 kHz
TDMA
Although it was originally known as US Digital Cellular (USDC) and was introduced in 1991. It is sometimes called North America Digital Cellular and also known by its standard number IS-54 that was later updated to standard IS136. It is a 2G digital system that was designed to operate alongside the AMPS system.
PDC
2G
25 kHz
TDMA
Pacific or Personal Digital Cellular. The system found only in Japan where it has gained very widespread use. It has many similarities with IS-54 although it uses a different speech coder and a 25 kHz bandwidth.
GPRS
2.5G
200 kHz
TDMA
General Packet Radio Service. A data service that can be layered onto GSM. It uses packet switching instead of circuit switching to provide the required performance. Data rates of up to 115 kbps attainable.
EDGE
2.5 / 3G
200 kHz
TDMA
Enhanced Data rates for GSM Evolution. The system uses a different form of modulation (8PSK) and packet switching which is overlayed on top of GSM to provide the enhanced performance. Systems using the EDGE system may also be known as EGPRS systems.
CdmaOne
2G
1.25 MHz
CDMA
This is the brand name for the system with the standard reference IS95. It was the first CDMA system to gain widespread use. The initial specification for the system was IS95A, but its performance was later upgraded under IS95B which the cdmaOne specification actually uses. Apart from voice it also carries data at rates up to 14.4 kbps for IS95A and under IS95B data rates of up to 115 kbps are supported.
CDMA2000 1X
2.5G
1.25 MHz
CDMA
This system supports both voice and data capabilities within a standard 1.25 MHz CDMA channel. CDMA2000 builds on cdmaOne to provide an evolution path to 3G. The system doubles the voice capacity of cdmaOne systems and also supports high-speed data services. Peak data rates of 153 kbps are currently achievable with figures of 307 kbps quoted for the future, and 614 kbps when two channels are used.
CDMA2000 1xEV-DO
3G
1.25 MHz
CDMA
The EV-DO stands for Evolution Data Only. This is an evolution of CDMA 2000 that is designed for data only use and its specification is IS 856. It provides peak data rate capability of over 2.45 Mbps on the forward or downlink , i.e. from the base station to the user. The aim of the system is to deliver a low cost per megabyte capability along with an always on connection costed on the data downloaded rather than connection time.
CDMA2000 1xEV-DV
3G
1.25 MHz
CDMA
This stands for Evolution Data and Voice. It is an evolution of CDMA2000 that can simultaneously transmit voice and data. The peak data rate is 3.1 Mbps on the forward link. The reverse link is very similar to CDMA2000 and is limited to 384 kbps.
UMTS
3G
5 MHz
CDMA / TDMA
Universal Mobile Telecommunications System. Uses Wideband CDMA (W-CDMA) with one 5 MHz wide channel for both voice and data, providing data speeds up to 2 Mbps.
TD-SCDMA
3G
1.6 MHz
CDMA
Time Division Synchronous CDMA. A system developed in China to establish their position on the cellular telecommunications arena. It uses the same bands for transmit and receive, allowing different time slots for base stations and mobiles to communicate. Unlike other 3G systems it uses only a time division duplex (TDD) system.


***
COPY-WRITE OWNED BY PRAMOD KUMAR