Thursday, December 20, 2012

CLSA Aptitude paper with Recruitment Process

CLSA is the leading company in Asia when it comes equity, broking and asset management.
The company has high standards and offers high compensation to the students.

The following details are for the post of Software developer in Pune, Mumbai in India.

The aptitude test is divided into three parts.
  • Arithmetic/Numerical
  • Logical Reasoning
  • Data Interpretation
The marks are divided equally and your performance in all the areas matters.
The test duration is of 60 minutes.
After clearing the aptitude test there is group discussion round.
The students after passing through the GD round have to go for technical round.
The Technical and the HR round are held at the company office.
HR round is the toughest one to pass. Sound knowledge of C,Java and especially SQL is very necessary.
Then there are two Hr rounds. The final one with the vice president of the company.
The company has awesome hospitality. They provided us with heaps of sandwiches and chips, gallons of juices and beer. 
The provide with good feedback to students who are not selected and tell them there deficiencies.
Do attend the process its a good experience.

Related Post: Zycus technical Paper

Sunday, December 16, 2012

Increase Ram and so the System Speed


1). Start any application, say Word. Open some large documents.


2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

How to recover MOST of scratched CD data discs



I learn an old technique to how to recover damaged or scratched disks
with some lost of data. In this case i have one borrowed game - MAX PAYNE 2
with a chunk of 4 mb lost with a scratch in CD1 Install. Here we cover some
special technique of how to create a full working CD from the scratched one.

First some tools will be needed:

1. Alcohol 120%
2. UltraISO
3. Windows XP
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD

Get the cotton and drop some water, start cleaning vertically the surface of CD.
Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece
of cotton, drop some oil for cooking and start to wet the surface like you are
washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the
micro surface of the scratch. It's okay. Seems the oil helps the laser of the CD/DVD driver
to read the surface again. Sure this will work with small unreadable scratch - some hard
scratch loose parts of the surface of the CD where we have data and it's lost forever.
But if it is loosed try anyway. With this tip 80% of the small scratched CD's could be
recovered.

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can
read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.
This is not enough. Have tried other appz, they do not recover all the data. But the
CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

Autorun Viruse Killer!


Further for more information you can visit the site!

http://oldmcdonald.wordpress.com/

and review the completer description about software!

Tuesday, December 11, 2012

Increase Virtual Ram


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

Saturday, December 8, 2012

Best And 100% Tested Proxy Sites



www.kproxy.com
http://www.shadow.com/
http://miss.info/
http://4proxy.com/
http://conqueror.info/
https://proxify.com/
http://www.morepress.info/
http://nyclife.org/
http://www.pagewash.com/

Linux Security


1) Firewalls are your guardian angels.

First of all, keep a software firewall active on your system, and restrict access to ports that allow remote access into your system, a good idea is to allow only a few select hosts access to ports used by services such as ssh (port 22) or telnet (port 23).

Password Hacking



Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

Tuesday, December 4, 2012

Address Resolution Protocol (ARP) Attacks


What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

Hide EXE File into JPG



This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

Sunday, December 2, 2012

Remove shortcut arrow from desktop icons completely


To remove shortcut arrow from desktop icons in any type of document:

a) Perform instructions described under ‘Remove shortcut arrow from desktop icons’. For your convenience, steps 1 to 3 are reported here.

Tips for Wireless Home Network Security


1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Rapidshare Hack



-: Rapidshare Hack :-

There are two hacks to beat Rapidshare download limits and waiting time.

1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

Google Hacking


Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

Monday, November 26, 2012

Speed up Internet




Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

You can get it back:

Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy

Easiest way to get traffic to your web site


Easiest way to get traffic to your web site | Digg and StumbleUpon

For your information ,Stumbleupon and DIGG are social bookmarking websites which are useful to catch upon some new websites and other things in whichever category you want.They can be, if properly used, a very potent weapon for getting a good amount of traffic for your website.

Deleting System Software



XP hides some system software you might want to remove, such as Windows Messenger, but

Changing password of a remote PC




Using the below given tips you can change the password of an user account in your friend’s system.

1. Open notepad.

Monday, November 12, 2012

Windows Genuine Hack


Windows Genuine Hack – 100% Works

Windows Genuine Hack :-

1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.

windows genuine

Download :
http://rapidshare.com/files/115531401/Windows.Genuine.Advantage.Validation..rar

Run Firefox inside Firefox


Run Firefox inside Firefox

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul


Following is the screenshot of this trick (firefox in firefox in firefox, which is again in another firefox)-

The Play Book by Barney Stinson


The Play Book by Barney Stinson

DOWNLOAD

BRO CODE By Barney Stionson


Download Barney Stions BRO CODE



DOWNLOAD

Mobile hack to call your friends:


Mobile hack to call your friends:


Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack  today I am
 sahring With you a extremely Nice Prank or you can simply say Hack
 i.e "How To Call Your Friends From THeir Own Cell Number".
I was asked by many Friends to Write Tutorials about mobile hacks and Pranks .
 So I am Sharing My Second Mobile Extreme Prank With You all.

Create An Ftp Server On Your PC


 Create An Ftp Server On Your PC



Process-1:
First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..

Folder Lock Without Any Software


-: Folder Lock Without Any Software :-




Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.

Wednesday, November 7, 2012

Convolution Decoder in Matlab


clear all;
close all;
f=input('Enter the number of fliflops:');
x=input('Enter the number of outputs:');

CONVOLUTIONAL ENCODER in Matlab


-%CONVOLUTIONAL ENCODER
clear all;
clc
m=input('enter the message vector ');

Cyclic Code Generator in C


%cyclic code generator
clear all;
clc;
n=input('enter the length of codeword=');

Cyclic Decoding in C


Cyclic Decoding-
clear all;
clc;
n=input('enter the length of codeword=');
k=input('enter the length of message=');

Information Rate in C


#include<stdio.h>
#include<conio.h>
#include<math.h>
 void main()
{ int i,n,r;
float I[10],p[10],H[10],s,TI,TH,IR;
clrscr();

LBC Decoding in C


%LBC DECODING
clear all;
clc;
n=input('enter the length of codevector=');
k=input('enter the message codevector=');
p=input('enter the parity matrix=');
r=input('enter the received codevector=');
a=p';

LBC encoding In C


#include<stdio.h>
#include<conio.h>
void main()
{
int i,j,n,k,M[10],C[10],G[10][10],par[10][10];
clrscr();

Shanon Fano In C


#include<stdio.h>
#include<conio.h>
#include<math.h>
#include<string.h>

Saturday, October 27, 2012

Matlab code for convolution Decoder


clear all;
close all;
f=input('Enter the number of fliflops:');
x=input('Enter the number of outputs:');
trellis=struct('numInputSymbols',2,'numOutputSymbols',4,'numStates',4,'nextStates',[0 2;0 2;1 3;1 3],'outputs',[0 3;3 0;2 1;1 2]);
n=input('Enter the number of messages:')

Channel Capacity code in c


#include<stdio.h>
#include<conio.h>
include<math.h>
void main()
{
int i,j,k,1,m,n,x,y,cim,row;
float sumr,sume,cs,p;

BCH decoding in Matlab


clear all;
clc;
n=input('accept n=');
k=input('accept k=');
m=input('message bit=');
msg=gf([m]);
c=bchenc(msg,n,k);

decoded=bchdec(c,n,k)

BCH encoding in Matlab


clear all; clc;
n=input('accept n=');
k=input('accept k=');
m=input('message bit=');
msg=gf([m]);
c=bchenc(msg,n,k)

Friday, October 26, 2012

99 Ways to Make Your Computer Blazingly Fast


There are probably a lot of great tweaks and performance hacks that I’ve missed here, so feel free to chime in with comments! Enjoy!
1. Defragment your computer hard disk using free tools like SmartDefrag.

Thursday, October 25, 2012

Matlab code for Spatial Domain Filtering


clc;
clear all;
close all;
a=imread('pout.tif');
figure;
imshow(a);
title('Original Image');
b=im2double(a);

Matlab Code for Pseudo Colouring


clc;
clear all;
close all;
a= imread('cameraman.tif');
[row col]=size(a);
for x=1:1:row
    for y=1:1:col

Matlab Code for OPENING - Erosion after Dilation


%opening

clear all
clc
a=imread('circbw.tif');
p=size(a);


%%% Writing program
w=[1 1 1;1 1 1;1 1 1];
for x=2:1:p(1)-1
    for y=2:1:p(2)-1

Matlab Code for Image filtering from Gaussian Noise using Median and Wiener filter


clc;
clear all;
I= imread('liftingbody.png');
I2=imnoise(I,'gaussian');
subplot(2,2,1);

Matlab Code for Logarithm Transformation


%Logarithm

a=imread('cameraman.tif');
subplot(1,2,1);
imshow(a);
b=im2double(a);
[m,n]=size(a);
for i=1:m-1
for j=1:n-1
r=b(i,j);
c(i,j)=log(1+r);
end;
end;
subplot(1,2,2);
imshow(a);

Matlab Code For DCT-IDCT


i=imread('cameraman.tif');
[r c]=size(i);
ID=double(i);
if(r==c)
    N=c;

Matlab Code For Histogram Equalization


% Histogram Equalization
clc; clear all;

img = imread('rice.png');
 if(size(img,3) > 1)
    img = rgb2gray(img);
end;

Matlab Code For Power Law Transformation


%Power law

a=imread('cameraman.tif');
subplot(1,2,1);
imshow(a);
[m,n]=size(a);
for i=1:m-1
for j=1:n-1
s(i,j)=a(i,j).^4;
end;
end;
subplot(1,2,2);
imshow(a);

Matlab code for Negative Transformation


%Negative transformation

a=imread('cameraman.tif');
subplot(1,2,1);
imshow(a);
[m,n]=size(a);
for i=1:m-1
for j=1:n-1
s(i,j)=256-1-a(i,j);
end;
end;
subplot(1,2,2);
imshow(a);

Matlab Code for Edge Detection Robert, Prewitt, Sobel


%%%% EDGE Detection

clc;
close all;
clear all;
a=imread('C:\Documents and Settings\student\Desktop\lenna1.bmp');

Matlab code for Dilation and Erosion


%dialation and erosion

clear all
clc
a=imread('circbw.tif');
p=size(a);

%%% using in built MATLAB function %%%

Matlab code for Closing - Erosion after Dilation


%closeing

clear all
clc
a=imread('circbw.tif');
p=size(a);

%%% using in built MATLAB function %%%

C code for determining the statistical Properties of Image


/*Statistical Properties of Image*/
#include<stdio.h>
#include<conio.h>
#include<stdlib.h>
#include<math.h>

C code for Smoothing Filter


/* Smooth Filter */

#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<graphics.h>
#include<math.h>

C code for sharpening filter


/* Sharp Filter */

#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<graphics.h>
#include<math.h>

C code for Histogram


#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<graphics.h>
#include<stdlib.h>
#include<math.h>

C code for Grey Level Transformation


/*Gray Level Transformation*/
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<graphics.h>
#include<math.h>

C code for Bit Map


/*BMP Attributes.C*/
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<graphics.h>

typedef struct bmp_header {
unsigned char ft[2];
unsigned long fsz;