Tuesday, 10 March 2015


With the rise in online money transactions worldwide from recharging your mobile balance to purchase or money transfer of thousands of rupees. We should aware of online ‘thugs’. Recent study shows that every online user owes 2.80 $ to the hackers so we should know that how different mobile apps, websites try to protect our transaction details from the hackers.
These are nothing but the encryption techniques. The most commonly used is the AES ( Advanced Encryption Standards),AES-128,192, and 265 for governments, banks and other popular apps.
Encryption systems are of two types
1.     Symmetric-key
2.     Public –key
In symmetric –key encryption ,two communicating computers have a secret key which is used to encrypt the code . and believe me AES-128 bitkey for instance can have more than 300,000,000,000,000,000,000,000,000,000,000,000. Key combinations and cracking it with a state-of-the-art supercomputer would take longer than the presumed age of the universe i.e 4500 million years. And current systems uses AES-256 so its impossible to crack AES-256.

Ø  IT’S Algorithm.
The algorithm is based on several substitutions, permutations and linear transformations which creates 16 byte block. Operations are repeated several timesand results into ‘rounds’. During each round a unique key is calculated out of the encryption key, and incorporated in the calculations.

Sunday, 22 February 2015


(1) Williamson labs. 

it has collection of more than 400 urls in over 90 related subject areas. this website helps you to understand and imagine electronics with the help of animations and 3D pictures.

(2) electronics tutorials.

offering free,comprehensive basic electronics tutorials in amplifiers,antennae,filters,oscillators,power supplies,receivers,radio and electronics designes. it covers over 120 individual topics with links to datasheets,reference books and projects.

(3) raspberry pi tutorials.

this website offers free,comprehensive raspberry pi tutorials. helps you to program your device . tutorials are targeted at anyone who can read and has access to a computer programming language python.


(4) mytutorialcafe.

this website is dedicated to the MCS51 microcontroller and related products. it includes the traditional 8052,8051,8032,8031 along with more modern derivatives such as the Atmel AT89S8252, andmany derivatives by silicon laboratives,philips and others.

Monday, 9 September 2013

join indian air force

                                                                  Join Indian air force
For challenging career and a bright future
 Caree prospects
Flying branch
Branch/type of entry

Age limit
(a)National defence academy (NDA)
 (pc for men only)
10+2 with physics and maths.
(b)combined defence service(CDSE)
 (pc for men only)
Any graduate degree/BE/B Tech
(c) NCC special entry
Any graduate degree/BE/B Tech with min. 60% marks
(appearing/final semester/year student
can also apply)

Technical branch
(a)Aeronautical engineer
Engineering degree with min.60% marks
(b)university entry scheme
Pre final year in engineering

Ground duty branches
(c) accounts
Graduate degree with min. 60% or post graduation degree with min 50% as per ads published
(d) education
(e) meteorology
Post graduation degree

Friday, 26 July 2013

tips for avoiding mobile radiation harms...!!

Recently the supreme court of india had given the instructions not  exceed the no. of telephone towers on particular  building more than two , by considering the health related issues. The WHO has also issued a precautionary principles to avoid genotoxic effects,EM allergic effect & cognitive effect by the mobile phones magnetic radiations.
Tips for reducing danger by the mobile phone radiation.
  • 1.       Use wired headset or speakerphone mode and keep the cell phone as far away from your as possible. In particular , use air-tube headset with ferrite beads as they don’t work as antenna so the risk of exposure to EM radiations also reduced.

  • 2.       Don’t allow children to use cell phone ,under 18 because the radiations can badly affect the development and maturation of the central nervous system,immune system and critical organ.

  • 3.       U can also use the patented cell phone radiation protection device.
  • 4.       Prefer the cellphone with low SAR

  • 5.       Avoid using mobile phones in a close proximity with the metals surrounding it, because the metal structures increases the radiation output of the device.

  • 6.       Don’t use the cell phones when u are travelling with fast moving vehicles, as in this case mobile sends and receives the extra signals.

Saturday, 23 March 2013


Passwords are so difficult to manage, and nowadays everything needs a  passwords. you dozens of passwords,they all have to be dissimilar, you have to keep changing them frequently , and all have to keep changing them frequently ,and you cannot even write them down ! if this problem occurs with you , then myIDkey is sure to catch your attention.
     myIDkey is a voice activated , fingerprint-authenticated USB drive that stores passwords,e-mails , IDs ,numbers and such personal information and displays it on it's built-in-screen. it is handy and secure tool, which will be launched this year and is likely to cost around US$ 120.


it includes voice search , secure 16 GB storage, a cloud-based password management platform, auto deletion of information on multiple wrong accesses , atmel microcontroller with high-performance ARM cortex-M3 322-bit RISC core operating at up to 96 MHz.