Dear Applicant,
Ref: “VIDEOCON” Direct Recruitments offer.
It is our good pleasure to inform you that your Resume has been selected for our new
plant. The Company selected 62 candidates list for IT, Administration and Production
Departments, as well as Company offered you to join as an Executive/Manager post in
respective department. You are selected according to your resume in which Project you
have worked on according to that you have been selected in Company. The Company is
dealing in Electronics manufacturing business in India The Company is recruiting the
candidates for new plants in Delhi, Bangalore and Pune.Your interview will held at
Company Corporate office on – 29th September 2010 at 11.30 You will be pleased to know
that Company has advise you in the selection panel that your Application can be
progress to final stage. You will come to Company corporate office in Delhi.
Your offer letter with Air Ticket will be send to you by courier before date of
interview. The Company can be offer you as salary with benefits for this post 30, 000/-
to 2, 00, 000/- P.M. + (HRA + D.A + Conveyance and other Company benefits). The
designation and Job Location will be fix by Company HRD. At time of final process. You
have to come with photo-copies of all required documents.
REQUIRED DOCUMENTS BY THE COMPANY HRD.
1) Photo-copies of Qualification Documents.
2) Photo-copies of Experience Certificates (If any)
3) Photo-copies of Address Proof
4) Two Passport Size Photograph
You have to deposit the (Cash) as an initial amount in favor of Company HRD.
Department. for Rs. 8,500/- through any [STATE BANK OF INDIA]Branch from your Home City
to Company Senior HRD
BANK NAME: STATE BANK OF INDIA
ACCOUNT NAME:
ACCOUNT NUMBER:
(Contact via email for complete details)
This is refundable interview security. Your offer letter with Air tickets will be send
to your Home Address by courier after receiving the confirmation of interview security
deposited in STATE BANK OF INDIA. Company will pay all the expenditure to you at the
time of face-to-face meeting with you in Company. The Job profile, salary offer, and
date -time of interview will be mention in your offer letter. Your offer letter will
dispatch very shortly after receiving your confirmation of cash deposited in STATE BANK
OF INDIA. We wish you the best of luck for the subsequent and remaining stage.
The last date of security deposited in bank - 27/09/2010 You have to give the
information after deposited the security money in bank to Company HRD – direct
recruitment email ID: - mr.rajsharma_videocon@rediffmail.com Your Letter with
supporting documents will be dispatch same time by courier to your postal address after
receiving your security deposited confirmation in bank. The interview process and
arrangement expenditure will be pay by Company. Lodging, traveling and local conveyance
actual will be paid by Company as per bills. The candidate has to deposit the initial
refundable security as mentioned by HRD.
If the candidate wants to come with his parents or friends, the Company will arrange
all facilities only for female candidate.
Thanks
Mr Raj Sharma
Videocon Electronics Ltd.,
UNITED KINGDOM.
CONTACT EMAIL: mr.rajsharma_videocon@rediffmail.com
but unfortunately it's PHISHING MAIL...:(
Monday, October 4, 2010
Monday, September 13, 2010
sm more to know abt Google...
Googlebot uses an algorithmic process: computer programs determine which sites to crawl, how often, and how many pages to fetch from each site.
Googlebot was designed to be distributed on several machines to improve performance and
scale as the web grows. Also, to cut down on bandwidth usage, we run many crawlers on machines located near the sites they're indexing in the network.
Once you've created your robots.txt file, there may be a small delay before Googlebot discovers your changes. If Googlebot is still crawling content you've blocked in robots.txt, check that the robots.txt is in the correct location. It must be in the top directory of the server (e.g., www.myhost.com/robots.txt); placing the file in a subdirectory won't have any effect.
If you want to prevent Googlebot from following any links on a page of your site, you can use the nofollow meta tag. To prevent Googlebot from following an individual link, add the rel="nofollow" attribute to the link itself.
Test that your robots.txt is working as expected. The Test robots.txt tool in Webmaster Tools lets you see exactly how Googlebot will interpret the contents of your robots.txt file. The Google user-agent is (appropriately enough) Googlebot.
The Fetch as Googlebot tool in Webmaster Tools helps you understand exactly how your site appears to Googlebot. This can be very useful when troubleshooting problems with your site's content or discoverability in search results.
The IP addresses used by Googlebot change from time to time. The best way to identify accesses by Googlebot is to use the user-agent (Googlebot). You can verify that a bot accessing your server really is Googlebot by using a reverse DNS lookup
More to know-:In search engine optimization (SEO) terminology a backlink is a hyperlink that links from a Web page, back to your own Web page or Web site. Also called an Inbound Link (IBL) these links are important in determining the popularity (or importance) of your Web site. Some search engines, including Google will consider Web sites with more backlinks more relevant in search results pages. May also be written as two separate words, back link.
Googlebot was designed to be distributed on several machines to improve performance and
scale as the web grows. Also, to cut down on bandwidth usage, we run many crawlers on machines located near the sites they're indexing in the network.
Once you've created your robots.txt file, there may be a small delay before Googlebot discovers your changes. If Googlebot is still crawling content you've blocked in robots.txt, check that the robots.txt is in the correct location. It must be in the top directory of the server (e.g., www.myhost.com/robots.txt); placing the file in a subdirectory won't have any effect.
If you want to prevent Googlebot from following any links on a page of your site, you can use the nofollow meta tag. To prevent Googlebot from following an individual link, add the rel="nofollow" attribute to the link itself.
Test that your robots.txt is working as expected. The Test robots.txt tool in Webmaster Tools lets you see exactly how Googlebot will interpret the contents of your robots.txt file. The Google user-agent is (appropriately enough) Googlebot.
The Fetch as Googlebot tool in Webmaster Tools helps you understand exactly how your site appears to Googlebot. This can be very useful when troubleshooting problems with your site's content or discoverability in search results.
The IP addresses used by Googlebot change from time to time. The best way to identify accesses by Googlebot is to use the user-agent (Googlebot). You can verify that a bot accessing your server really is Googlebot by using a reverse DNS lookup
More to know-:In search engine optimization (SEO) terminology a backlink is a hyperlink that links from a Web page, back to your own Web page or Web site. Also called an Inbound Link (IBL) these links are important in determining the popularity (or importance) of your Web site. Some search engines, including Google will consider Web sites with more backlinks more relevant in search results pages. May also be written as two separate words, back link.
Bypass techniques
BYPASS FILTERS....
1.Typing IP address instead of domain name
check out the site baremetal.com where you can look up the IP address of just about any site
a better approach is to ignore the IP/URL altogether and examine the data on the web page itself. This is a little more resource intensive, but far more effective. It's much more accurate since a web ite such as Google or Yahoo can call data from other sites
2: Finding a cached version
Search providers, like Google, cache websites on a regular basis - which basically means that they save a version of the site on Google's servers. You can navigate to a cached site in Google by clicking the 'cached' button after the search result and you are still at an address run by Google that may be unblocked.The strategy for the security department here is the same as with IP addresses: Disregard the URL and inspect the content itself
3: Hiding behind encryption
Entering HTTPS in front of the web address will often give you a stripped down version of the restricted site and can be used as another technique to gain verboten access.
"There is also SSH, encrypted SOCKS, all of these different alternative channels that masquerade as web traffic on not-so-intelligent network devices
, many companies are now opting to implement web proxies and gateways that allow this type of content to be analyzed by creating a pit stop along the way
4: Using proxy servers and other privacy-friendly tools
Employees can setup their browser so that their web queries go through an encrypted tunnel to an external server which may give them unrestricted online access.GhostFox, a Firefox browser extension, has a privacy bar just below the URL bar where users can select a proxy that is privacy friendly.
If the proxy server is unencrypted, then you can inspect the traffic and block either by blocking proxy connections at your firewall and/or by looking at web page content
There may be ways to fingerprint Tor with something like an Intrusion Detection System,
5: Using smartphones
"Devices such as Blackberries that are owned and managed by the business can be restricted through group policies and proxy servers, much the same way that laptops and desktops are,"
1.Typing IP address instead of domain name
check out the site baremetal.com where you can look up the IP address of just about any site
a better approach is to ignore the IP/URL altogether and examine the data on the web page itself. This is a little more resource intensive, but far more effective. It's much more accurate since a web ite such as Google or Yahoo can call data from other sites
2: Finding a cached version
Search providers, like Google, cache websites on a regular basis - which basically means that they save a version of the site on Google's servers. You can navigate to a cached site in Google by clicking the 'cached' button after the search result and you are still at an address run by Google that may be unblocked.The strategy for the security department here is the same as with IP addresses: Disregard the URL and inspect the content itself
3: Hiding behind encryption
Entering HTTPS in front of the web address will often give you a stripped down version of the restricted site and can be used as another technique to gain verboten access.
"There is also SSH, encrypted SOCKS, all of these different alternative channels that masquerade as web traffic on not-so-intelligent network devices
, many companies are now opting to implement web proxies and gateways that allow this type of content to be analyzed by creating a pit stop along the way
4: Using proxy servers and other privacy-friendly tools
Employees can setup their browser so that their web queries go through an encrypted tunnel to an external server which may give them unrestricted online access.GhostFox, a Firefox browser extension, has a privacy bar just below the URL bar where users can select a proxy that is privacy friendly.
If the proxy server is unencrypted, then you can inspect the traffic and block either by blocking proxy connections at your firewall and/or by looking at web page content
There may be ways to fingerprint Tor with something like an Intrusion Detection System,
5: Using smartphones
"Devices such as Blackberries that are owned and managed by the business can be restricted through group policies and proxy servers, much the same way that laptops and desktops are,"
Thursday, July 15, 2010
DEP-data execution prevention
Modern processor hardware can be instructed to designate regions of memory as non-executable. This means that the memory can be used to store reference data to be read and written, but that the processor cannot treat the contents of the memory as program code to be directly executed. Intel calls this capability in their newer processors XD for “eXecute Disable” and AMD refers to it as NX for “No eXecute.” AMD's marketing materials also sometimes refer to this capability by the annoying marketing term EVP for Enhanced Virus Protection.
As a hardware capability of modern processors this addition is important, but its use depends entirely upon support from the operating system. So when Microsoft introduced support for this into their operating systems, they termed it Hardware DEP for Data Execution Prevention. Support for hardware DEP was introduced into the 32-bit versions of Windows XP with Service Pack 2, into Windows 2003 Server with Service Pack 1, and has always been present in windows vista.
When hardware DEP support is active, an XD/NX-aware operating system running on an XD/NX-capable and enabled processor will mark all memory regions not explicitly containing executable code as non-executable. This protects the system's “heaps”, “stacks”, data and communications buffers from inadvertently running any executable code they might contain.
Why would data or communications buffers ever contain executable code? . . . because so-called “Buffer Overrun” attacks are the predominant way Internet-connected computers have historically been remotely hacked and compromised. Hackers locate obscure software vulnerabilities which allow them to “overrun” the buffers with their own data. This tricks the computer into executing the hacker's supplied data (which is actually code) contained within that buffer. But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started. Instead, the operating system will display a notice to the user that the vulnerable program is being terminated BEFORE any of the hacker's code has the chance to run.
64-bit-capable processors have the ability to run the 64-bit versions of Microsoft's substantially more secure XP, Windows 2003, and Vista operating systems. Those operating systems are more secure because Microsoft, having learned many lessons from mistakes in the past, made the firm decision to lock-down their 64-bit OS kernels. The 64-bit Windows kernels actively police themselves to guard against many rootkit-style and other kernel attacks that have caused so many problems for users of the 32-bit Windows operating systems.
hardware support for virtual machine technology introduces the possibility of creating a “hypervisor” to operate at a hardware-enforced level below the operating system “supervisor” which opens many exciting possibilities for further enhancing the system's security
SecurAble includes a built-in “kernel-mode module” that empowers it to determine with enhanced accuracy which features of the processor may be present, and whether any features have been disabled or “suppressed” by previous actions of the system's BIOS or operating system.
Intel and AMD processors provide the means for “masking” the presence of their XD and NX capabilities from application code running in “user-mode.” But the operating system is always able to determine the truth. Since application software can be misled into believing that processor features are not present
As a hardware capability of modern processors this addition is important, but its use depends entirely upon support from the operating system. So when Microsoft introduced support for this into their operating systems, they termed it Hardware DEP for Data Execution Prevention. Support for hardware DEP was introduced into the 32-bit versions of Windows XP with Service Pack 2, into Windows 2003 Server with Service Pack 1, and has always been present in windows vista.
When hardware DEP support is active, an XD/NX-aware operating system running on an XD/NX-capable and enabled processor will mark all memory regions not explicitly containing executable code as non-executable. This protects the system's “heaps”, “stacks”, data and communications buffers from inadvertently running any executable code they might contain.
Why would data or communications buffers ever contain executable code? . . . because so-called “Buffer Overrun” attacks are the predominant way Internet-connected computers have historically been remotely hacked and compromised. Hackers locate obscure software vulnerabilities which allow them to “overrun” the buffers with their own data. This tricks the computer into executing the hacker's supplied data (which is actually code) contained within that buffer. But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started. Instead, the operating system will display a notice to the user that the vulnerable program is being terminated BEFORE any of the hacker's code has the chance to run.
64-bit-capable processors have the ability to run the 64-bit versions of Microsoft's substantially more secure XP, Windows 2003, and Vista operating systems. Those operating systems are more secure because Microsoft, having learned many lessons from mistakes in the past, made the firm decision to lock-down their 64-bit OS kernels. The 64-bit Windows kernels actively police themselves to guard against many rootkit-style and other kernel attacks that have caused so many problems for users of the 32-bit Windows operating systems.
hardware support for virtual machine technology introduces the possibility of creating a “hypervisor” to operate at a hardware-enforced level below the operating system “supervisor” which opens many exciting possibilities for further enhancing the system's security
SecurAble includes a built-in “kernel-mode module” that empowers it to determine with enhanced accuracy which features of the processor may be present, and whether any features have been disabled or “suppressed” by previous actions of the system's BIOS or operating system.
Intel and AMD processors provide the means for “masking” the presence of their XD and NX capabilities from application code running in “user-mode.” But the operating system is always able to determine the truth. Since application software can be misled into believing that processor features are not present
Related articles by Zemanta
- Microsoft Ends Support For Windows XP SP2 (pcworld.com)
Wednesday, April 7, 2010
hacking challenges
hi guys just check out the list of hacking challenges dat i got from port8080..just check it out..have fun while learning
Test-hack
Hackr.org
Smash The stack
Hacker games net
Bright shadows
Crypto-world
Dare your mind
Hack this
Hackits
Hackquest
IHTB
Intruded
Mod-x
Crack MEs
Try2Hack
TrythisOne
HaxTor
Virtualsecurity
team-vs-team server security wargames
Thisislegal
nullcon Goa 2010 Hacker Challenge
Test-hack
Hackr.org
Smash The stack
Hacker games net
Bright shadows
Crypto-world
Dare your mind
Hack this
Hackits
Hackquest
IHTB
Intruded
Mod-x
Crack MEs
Try2Hack
TrythisOne
HaxTor
Virtualsecurity
team-vs-team server security wargames
Thisislegal
nullcon Goa 2010 Hacker Challenge
Tuesday, April 6, 2010
Things to watch out for phishing
->a real site will never scare you into providing usernames or passwords.
->check out for the suspicious url's.
->spelling mistakes on the web pages.
->ssl icon should appear on the browser not on the webpage
and a page shuld use https instead of http
->one more extended way to avoid hooked by phishing sites.it is called Extended Validation(EV)SSl.a site secured with EV SSL turns the address bar turns green to help you immediately identify that the site is genuine.
referred to http://www.phish-no-phish.com/
->a real site will never scare you into providing usernames or passwords.
->check out for the suspicious url's.
->spelling mistakes on the web pages.
->ssl icon should appear on the browser not on the webpage
and a page shuld use https instead of http
->one more extended way to avoid hooked by phishing sites.it is called Extended Validation(EV)SSl.a site secured with EV SSL turns the address bar turns green to help you immediately identify that the site is genuine.
referred to http://www.phish-no-phish.com/
Subscribe to:
Comments (Atom)
