ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Sunday 1 September 2013

PPT ON INTRODUCTION TO CYBER CRIME


Download

Introduction To Cyber Crime Presentation Transcript: 
1.Introduction 
Types of cyber crime 
How do we become a victim?
Examples.
Prevention of being a victim.
Conclusion . 

2.Modern age
Like there was a Stone Age and ice age, currently we are
 living in information age. We are surrounded by information,
 weather it is a school college university industry hospitals or
 government agencies very one is dealing with information. 

3.Digitalized information
 Next import thing to understand is that this information is no more a paper based information. It has been digitalized. We have been storing information on computers hardisks, flash drives and many other storage mediums. 

4.New era of internet
Until then it was not quite an issue 
but then we step into the era of internet, where the
 information happens to be flying over offices cities 
countries and continents. All the information transfer 
started using transfer protocols like http ftp and their 
were Ip and subnets involved. We grew our network to
 large extent and this leads us to vulnerability. 

5.Security of digitalized information
With all this evolving around us by 
time we understood the importance 
of information security. It became a 
great deal to secure all digitalized 
information. Information security 
raised many issues. Secure and 
encrypted transfer of data or 
communication over the wires and 
wireless mediums, Individual or 
personal data integrity and many 
other such stuff was needed to be 
tackled. 

6.What is a cyber crime?
With all this happening the world was introduced with a
 cyber crime. World first ever virus was developed by 
Pakistanis world was known to another threat to
 information i.e. Cyber Crime. Cyber crime is termed as
 any crime that 
involves a computer
 and a network,
 where the computers
 may or may not
 have played an
 instrumental part in the 
commission of a crime. .

7.Types of cyber crime
• HACKING:An illegal intrusion into computer without  
permission of owner  is called hacking
• Email bombing :This kind of activity refers to sending 
large numbers of mail to the victim, which may be an
 individual or a company or even mail servers there by
 ultimately resulting into crashing.
Phishing: 

8.Types of cyber crime
Salami Attacks: In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. 
Denial of service attacks:The computer of the victim is flooded with more requests than it can handle which cause it to crash. 
• SPOOFING

9.Virus: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it.
Trojan attacks:     In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme.

10.HOW DO WE BECOME A VICTIM ?

11.How do we become a victim?
1.Beware of Phishing
Phishing is a new model cyberspace attack, in which the attacker masquerades a genuine entity and tricks you into providing important user information such as credit cards, account user names, passwords, etc.
Usually phishing starts with an email or an instant message, asking you to furnish important details or to ‘verify’ your account with the genuine entity Unsuspecting users, thus, may provide the original user name and password in this website and make themselves victims of the
 phishing attack (and may still remain
 unsuspecting). Once given, the phishing
 entity has a direct door opened to your
 personal information and your identity

12.How do we become a victim?
 2.IDENTITY THEFT
The term identity theft is used to refer to a fraud, wherein an individual pretends to be someone else, in order to gain some or the other benefits he is not rightfully entitled to. people using the Internet for financial transaction give out personal information, such as the date of birth or social security number, online. Sometimes they click on suspicious links or e-mails promising a hefty prize money which in turn provides way for identity 
theft

13.3.EMAIL SCAM
A person is first informed about a large amount of money languishing in some bank account in a remote country. This first contact is made via phone calls, fax and now, through e-mails. They are then told that the amount has to be transferred into the country, and asked whether they would let them use his or her bank account. Once a person agrees to such a transaction, they are then informed of delays due to government red tape. Finally, they are asked for a loan to pay off some bribes to government officials. After months of paying off small and large amounts, it finally transpires that there was never any money, gold or any other valuables that were first described in the original e-mail. mail. The person therefore stands to lose vast amounts of money. In some cases, people have also provided their bank passwords, only to have their entire accounts cleaned out

14.4.MAIL BOMBS
Sometimes  users get an e-mail account that seems to have come from a company they regularly do business with, and  asking for information that users. have already given them, in such cases users don’t try to contact with company ignoring that it can be fraudlent note and, the sender will
    then know that user’s  e-mail 
    address is a valid one
    and he may be opening himself up 
    to still moreunwanted e-mails from 
    strangers. 

15.TROJAN HORSE
A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading 
     and executing it on their systems"

Source: Power Point Presentations
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top