Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Saturday, January 31, 2015

Do you know series for sec asst exam ? National Institution For Transforming India ( NITI )

First Chairman of NITI Ayog ?
Ans : Narendra Modi


First Vice Chairman of NITI Aayog of India ?
Ans: Aravind Panagariya


_______ Replaced Planning Commission of India ?
Ans : NITI


Last Deputy planning Commission Chairman ?
Ans: Monteksingh Ahluvaliya





Reference Books for Sec Assistant Exam 2015

Year Books for GK

CSR and GK Today for Current Affairs

Computer Fundamentals and Cyber law for IT and Cyber law.

Books on Kerala History and Indian Histor


Tuesday, January 27, 2015

Repeated PSC Questions in Secretariat Assistant Exams

After analysing previous PSC Question papers we understand that some of the questions are repeating every time. Some of the questions are discussed here.

Q. About Right to Information ( RTI 2005 ).

Go through Year of commencement , Name the RTI commission , Rules Etc



Q. About Browsers used in computre

Go through various Browsers like Google chrome , Mozilla Firefox , Internet Explorer , Opera , Safari..etc


Q. About pollution making gases , Acid rain , Green house effect etc.


Q. About Information Technology Act , year of formation , varoius cyber crimes including hacking.

Monday, January 26, 2015

ഇന്ത്യയിലെ സൈബർ നിയമങ്ങൾ

സൈബർ കുറ്റകൃത്യങ്ങൾ  തടയാൻ ഇന്ത്യ ഗവണ്മെന്റ്  ഇൻഫർമേഷൻ ടെക്നോളജി ആക്ടിനു രൂപം നല്കി .  ഇത്  ഇൻഫർമേഷൻ ടെക്നോളജി ആക്ട്‌ - 2000 എന്ന് അറിയപ്പെടുന്നു . ഈ നിയമം 2008-ൽ ഭേദഗതി ചെയ്യപ്പെട്ടു .



In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both.

Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

We can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers.

e.g. Hacking, Virus/Worm attacks, DOS attack etc.

The computer as a weapon :-using a computer to commit real world crimes.

e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

Cyber Crime regulated by Cyber Laws or Internet Laws.

Technical Aspects

Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as

a. Unauthorized access & Hacking:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.

Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

By hacking web server taking control on another persons website called as web hijacking

b. Trojan Attack:-

The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.

The name Trojan Horse is popular.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well.

c. Virus and Worm attack:-

A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus.

Programs that multiply like viruses but spread from computer to computer are called as worms.

d. E-mail & IRC related crimes:-

1. Email spoofing

Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read

2. Email Spamming

Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.

3 Sending malicious codes through email

E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

4. Email bombing

E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.

5. Sending threatening emails

6. Defamatory emails

7. Email frauds

8. IRC related

Three main ways to attack IRC are: attacks, clone attacks, and flood attacks.

e. Denial of Service attacks:-

Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include

attempts to "flood" a network, thereby preventing legitimate network traffic

attempts to disrupt connections between two machines, thereby preventing access to a service

attempts to prevent a particular individual from accessing a service

attempts to disrupt service to a specific system or person.

Sunday, January 25, 2015

Happy Republic Day


Wishes a Happy Republic Day to all our Blog Readers and Followers.



Facts to remember : India is celebrating its 66th Republic Day on Monday. The chief guests, US President Barack Obama, his wife Michelle.



Friday, January 23, 2015

Thursday, January 22, 2015

IMMEDIATELY REQUIRED


• HSE Officer

• Air Freight Operations Officer


Attractive salary and benefits will be provided as per industry standards. Candidates with a transferable visa / NOC only need to apply.

Interested candidates should email their updated CV to career@gulfwarehousing.com mentioning the position applied for in subject line or fax to +974 4450 8555 on or before 26th January 2015 

IT & Cyber Law More Questions

?.Which of the following is not a search engine :
A) Tally (B) Google (C) Alta vista   (D) Bing

? An error in software or hardware is called a bug . What is the alternate computer jargon for it ?
(a) glitch b) Leech c) Squid d) patch

?. Information Technology act enacted on [ Sec . Asst 2013 ]
a) 19 Jan 2001 b) 30 June 2001 c) 9 June 2000 d) 15 July 1999

?.Any device connected in a network is called
 (a) Bridge  (b) Hub   (c) Node  (d) Router

?. Founder of Wiki Leaks
a). Julian Asange. b) Jimmy Wales c)Neumann d )Mark Zuckerberg e) Steve jobs

? Firmware are softwares stored in
a) RAM  (b) ROM  (c) CD  (d) Hard Disk

Secretariat Asst : IT and Cyber Law Questions

IT and Cyber Law Questions for Sec Asst Exam 


1. The digital security system that uses some unique characteristic of human biology to identify authorized users:
(A) Biometrics  (B) PIN Number  (C)Encryption  (D)Password

2. ‘Do no evil ‘ is the tag line of
    (a) Yahoo b) IBM c) Wipro d) Google

3. The concept of ‘stored program computer’ is first proposed by
 (a) John Von Neumann  (b) Charles babage (c) Lady Ada (d) George Bool

4.PDF is the acronym for
 (a) Personal digital assistant form  (b) Personal digital file   (c) Portable document Format  (d) Portable digital file

5. An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment.
(A) Virtual Reality (B)Digital Reality (C)Dream  (D)Artificial Reality


More Questions >>

Tuesday, January 20, 2015

SECRETARIAT ASST : NOTIFICATION : KERALA PSC : 2015

CATEGORY NO : 638 / 2014

NAME OF POST : ASSISTANT / AUDITOR GOVT SECRETARIAT / KPSC / ADVOCATE GEN OFFICE / LOCAL FUND AUDIT

SCALE OF PAY :  13900 - 24040 / -

AGE : 18 -36

QUALIFICATION  : ANY GRADUATION FROM A RECOGNIZED UNIVERSITY.

EXAM DATE : 16 - 05 - 2015

LAST DATE OF APPLICATION  : 04-02-2015

FOR MORE INFO VISIT OFFICIAL WEBSITE OF KERALA PSC. 

Secretariat Assistant Exam : Model Questions


Tuesday, January 13, 2015

SECRETARIAT ASSISTANT : A Wonderful Job for Graduates in Kerala

Why Secretariat Assistant Exam ?

Getting a job based on graduation is the dream of millions of job seekers in India. Assistant popularly known as Secretariat Assistant is such a job. It is a common rank list for appointment in a few major organizations in Kerala. They are Government Secretariat, Public Service Commission, Local Fund Audit, Advocate General’s Office and Anti Corruption Bureau.

Getting in the Rank List doesn’t guarantee a job in Secretariat. But majority of vacancies are filled in the three wings of Secretariat – Finance Department, Legislature, and General Administration of Secretariat. So once a candidate enters in the rank list, he has 60% chance to get into Secretariat Service. No one needs to be worried about this; other services are also equally attractive.
The most attractive feature of Secretariat Assistant is its promotion scope, growth, authority and power. 

Saturday, January 10, 2015

IT and Cyber Law Lessons & Questions for upcoming PSC Sec Asst Exam 2015

Spamming , Spoofing , Phishing , Hacking etc 
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.

Spoofing
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.

Types of Hackers & Ethical hacking
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.

Read More >>

Be Positive Every time !!!


PSC Exam : Online Preparation : Sec Asst Exam 2015

? The chemical name of Vitamin E is

 (A) Cyanocobaramin
 (B) Carotene
 (C) Riboflavin
 (D) Tocopherol


? Vegetables grown by the roadside have a higher content of which mineral?

 (A) Sodium
 (B) Potassium
 (C) Lead
 (D) All the above



? Sodium metal is kept under 

 (A) water
 (B) alcohol
 (C) petrol
 (D) kerosene


? Who is known as the Father of Internet?

 (A) Charles Babbage
 (B) Vinton G Cerf
 (C) Sabir Bhattia
 (D) Ray Tomilson


? Which game is associated with ‘Bulls Eye’?

 (A) Rugby
 (B) Shooting
 (C) Hockey
 (D) Tennis

Field Worker : Health Service : Solved paper

Answer Key Published

Kerala PSC FIELD WORKER (416/2013) - State Wide Exam - 10/01/2015

Question Paper 

Answer Key 

Field Worker : Health Service : Solved paper

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.