Thursday, December 20, 2012

CLSA Aptitude paper with Recruitment Process

CLSA is the leading company in Asia when it comes equity, broking and asset management.
The company has high standards and offers high compensation to the students.

The following details are for the post of Software developer in Pune, Mumbai in India.

The aptitude test is divided into three parts.
  • Arithmetic/Numerical
  • Logical Reasoning
  • Data Interpretation
The marks are divided equally and your performance in all the areas matters.
The test duration is of 60 minutes.
After clearing the aptitude test there is group discussion round.
The students after passing through the GD round have to go for technical round.
The Technical and the HR round are held at the company office.
HR round is the toughest one to pass. Sound knowledge of C,Java and especially SQL is very necessary.
Then there are two Hr rounds. The final one with the vice president of the company.
The company has awesome hospitality. They provided us with heaps of sandwiches and chips, gallons of juices and beer. 
The provide with good feedback to students who are not selected and tell them there deficiencies.
Do attend the process its a good experience.

Related Post: Zycus technical Paper

Sunday, December 16, 2012

Increase Ram and so the System Speed


1). Start any application, say Word. Open some large documents.


2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

How to recover MOST of scratched CD data discs



I learn an old technique to how to recover damaged or scratched disks
with some lost of data. In this case i have one borrowed game - MAX PAYNE 2
with a chunk of 4 mb lost with a scratch in CD1 Install. Here we cover some
special technique of how to create a full working CD from the scratched one.

First some tools will be needed:

1. Alcohol 120%
2. UltraISO
3. Windows XP
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD

Get the cotton and drop some water, start cleaning vertically the surface of CD.
Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece
of cotton, drop some oil for cooking and start to wet the surface like you are
washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the
micro surface of the scratch. It's okay. Seems the oil helps the laser of the CD/DVD driver
to read the surface again. Sure this will work with small unreadable scratch - some hard
scratch loose parts of the surface of the CD where we have data and it's lost forever.
But if it is loosed try anyway. With this tip 80% of the small scratched CD's could be
recovered.

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can
read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.
This is not enough. Have tried other appz, they do not recover all the data. But the
CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

Autorun Viruse Killer!


Further for more information you can visit the site!

http://oldmcdonald.wordpress.com/

and review the completer description about software!

Tuesday, December 11, 2012

Increase Virtual Ram


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

Saturday, December 8, 2012

Best And 100% Tested Proxy Sites



www.kproxy.com
http://www.shadow.com/
http://miss.info/
http://4proxy.com/
http://conqueror.info/
https://proxify.com/
http://www.morepress.info/
http://nyclife.org/
http://www.pagewash.com/

Linux Security


1) Firewalls are your guardian angels.

First of all, keep a software firewall active on your system, and restrict access to ports that allow remote access into your system, a good idea is to allow only a few select hosts access to ports used by services such as ssh (port 22) or telnet (port 23).

Password Hacking



Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

Tuesday, December 4, 2012

Address Resolution Protocol (ARP) Attacks


What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

Hide EXE File into JPG



This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

Sunday, December 2, 2012

Remove shortcut arrow from desktop icons completely


To remove shortcut arrow from desktop icons in any type of document:

a) Perform instructions described under ‘Remove shortcut arrow from desktop icons’. For your convenience, steps 1 to 3 are reported here.

Tips for Wireless Home Network Security


1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Rapidshare Hack



-: Rapidshare Hack :-

There are two hacks to beat Rapidshare download limits and waiting time.

1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

Google Hacking


Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.