Hello Everyone Welcome to YUVA!

Friday, March 27, 2009

Description: The action game Dark Sector is unfolding in the territory of one of Eastern Europe. Biological weapons, the legacy of the Cold War, escaped out of control. An unusual virus has taken up the inhabitants of a city. The area of infection has been cut off from the rest of the world and was named «Dark Sector». The residents were subjected to mutation, becoming a grotesque, decaying monsters, and roam the streets in search of a handful of survivors. They - infected who do not know pity, hungry for human flesh predators. And somewhere in the depths of the city lies the secret biological weapons development, for which powerful organizations and corporations willing to risk all of humanity. The main hero of the game, secret agent Hayden TENNO, was wounded and infected during an operation to uncover the dark secrets of this. However, the body covered with plates of organic armor, sverhchelovecheskaya strength and speed, the destructive power of a very useful Haydenu on the streets and avenues forbidden and fatal for people Dark Sector. Now the main task - to stay alive, and once again become a man - that’s how it will turn out. System requirements Minimum: Operating system: Windows XP SP2 / Vista Processor: Pentium IV 2.4 GHz Memory: 1 GB Video: 3D-graphics adapter with 256 MB memory, compatible with DirectX 9.0c poderzhivayuschy shaders version 3.0 (GeForce 6600 or Radeon X1300) Sound: Sound card compatible with DirectX DAEMON Tools Space: 6.5 GB Game Download INSTRUCTIONS: extract files using 7zip 1.Burn or mount the image(DaemonTools) 2.unrar fs_3_3.zip in the new folder(named Starforce) 3.Following a next steeps: Go to the Control Panel>>Printers and other Hardware>>add Hardware>>Next>>Yes,I have already connected the hardware>>Next>>Add New Hardware>>Next>> Install The Hardware that I manually select from a list (advanced)>>next>>Show all devices>> Have disk>>click browse>> search file in Starforcefolder/dev000.inf>>Open >>OK >> Next>>Finish 4.Play a game EDIT: change the =ru option in the DS.cfg to =en the voices become English if the above method is not working then use below tools Daemon Tools Lite 4.30.3 + AntiStarforce Driver 3.3: Download NO DVD Crack: Download pass: www.freepcgames.kirod.com

IES Civil Engineering Previous Papers

2003 2004 2005 2006 2007 2008

Tuesday, March 24, 2009

NIC 2009 Interview Pattern

General Facts about NIC interview Pattern 1. Only 25-30 Candidates will be interviewed each day. 2. Around 15-35 Minute interview will be there. 3. Interview panel have 5-6 Interviewer 4. They ask Basic Questions in subject. 5. If you have any Research Paper or publication emphasis over that and mention it. 6. They ask for your 2 favorite subject. 7. Normally DO NOT ask any technical question for long time, HR is the IMPORTANT one. 8. If you are working they why u want to switch. 9. Prepare basic web technology and Protocols. 10. Make some research about NIC and its work such as National Data maintainable, Research, e-Governance and web portal management. 11. Go through website design basics. 12. Prepare for OS, Networking, Core Java, Web technology. 13. Be confidence Be positive . 14. ALL THE BEST....FOR INTERVIEW. NIC details

Sunday, March 22, 2009

GTA :Vice City

Description

Having just made it back onto the streets of Liberty City after a long stretch inside, Tommy Vercetti is sent to Vice City by his old boss, Sonny Forelli. But all does not go smoothly upon his arrival in the glamorous, hedonistic metropolis of Vice City. Tommy is set up and loses everything. Sonny wants his money back, but the biker gangs, Cuban gangsters, and corrupt politicians stand in the way. Most of Vice City seems to want Tommy dead. His only answer is to fight back and take over the city himself.

Hardware Requirements

Windows 98/2000/ME/XP ;Processor: Pentium III 800 MHz or Higher Video Card: 32 MB Video Card ;Hard Drive: 915 MB HD; CD-ROM: 8x or Faster ;RAM: 128 MB RAM;

Download

Saturday, March 21, 2009

How To Test Your Firewall?

The firewall is our gateway to the Internet. It is a piece of software or hardware that manages Internet connections to and from your computer. It monitors the applications that try to initiate connection with your computer from the Internet, and it controls which programs are allowed to use the Internet. Nowadays, Internet users are exposed to several kinds of Internet threats, such as software vulnerabilities, automated worms, viruses and random Internet attackers. Properly configured personal firewalls are the first line of defense to answer these threats. But how do you test your personal firewall? Security researchers have developed small, non-destructive, leak testers, that deliberately attempt to test different firewall capabilities. The idea behind them is simple: if the test can bypass your computer’s security, then so can a hacker. There are many leak-testing programs available. Each one designed to test a particular flaw and each using a particular technique to bypass a firewall’s standard protection mechanisms. We’ve compiled a list of tools we believe will be of value to both home users and advance users. 1. PCFlank Leaktest - PCFlank Leaktest is a small utility that tests any firewall’s ability to protect against unauthorized or illegal transmissions of data from a user’s computer that is connected to the Internet. It uses a special technique to impersonate another program, which your firewall has been set to trust. Get PCFlank Leaktest here. 2. Breakout - Breakout sends to the IE’s or Firefox’s address bar the URL to launch, via the ‘SendMessage’ Windows API. No code is injected. Usually very hard to detect by firewalls. If the test is a success, this means that your firewall does not check for the ‘messages’ sent to your applications windows. Get BreakOut here for IE / Firefox. 3. DNSTester - Starting from Windows 2000, a Windows service DNS client is running and handles all DNS requests. Thus, all DNS requests coming from various applications will be transmitted to the DNS client which will, itself, do the DNS request. This feature can be used to transmit data to a remote computer by crafting a special DNS request without the firewalls notice it. DNStester uses this kind of DNS recursive request to bypass your firewall. Get DNSTester here. 4. MBTest - MBtest send packets directly to the network interface to try to bypass firewall. To do this, it sends differents kind of packet of different size/protocoles/type. If the test is a success, this means that your firewall is stuck in high level network and doesn’t check low level. Get MBTest here. 5. Atelier Web Firewall Tester - AWFT probes the protection provided by your Personal Firewall software using six different tests. Each test uses a different technique for gaining access to the outside world. Techniques are differently rated, according to their sophistication, and your Personal Firewall is doing a great job if is able to score 10 points in total. Get Atelier Web Firewall Tester here. 6. ZABypass - Originaly was developed to bypass old versions of ZoneAlarm, but it may work against many other firewalls today. It uses a special technique called Direct Data Exchange to transfer data between Internet Explorer and the Internet. Get ZABypass here. 7. FireHole - FireHole attempts to launch the default web browser, inject its own DLL and try to establish a connection to the Internet. Get FireHole here. 8. Thermite - Thermite injects it’s code into the target process directly, by creating an additional malicious thread within that process. If the test is a success, this means that your firewall is vulnerable to process injection. Get Thermite here. Leak tests are designed to help identify security flaws and provide the invaluable function of informing the user whether or not their firewall is providing adequate protection. Unfortunately, malware programs are evolving rapidly. Many of such programs (will) have very advanced techniques to conceal their malicious activities so that they easily bypass firewalls and other protection mechanisms.

Friday, March 20, 2009

Recruitment in Delhi Metro Rail Corporation Limited

Delhi Metro Rail Corporation (DMRC), a joint venture company with equity participation from Govt. of India and Govt. Of National Capital Territory of Delhi has been entrusted with the responsibility of implementation of the rail based Mass Rapid Transit System for Delhi.

<

Applications are invited from young, dynamic and motivated persons of Indian nationality for the following category of Executive Trainees (DMRC, Bangalore Metro & other metros) & Non-Executive posts ( CRA ) in DMRC: -

Job Position : Executive Trainee

Education Qualification :B.Tech/B.E(Civil,Electrical,Electronics,Architecture)

Eligiblity:60% For B.Tech/B.E(Civil,Electrical,Electronics)70% for B.Tech/B.E(Architecture)

Age Limit :28 Years

Eligible and interested candidates (including Ex-Serviceman and J & K domicile) can download the application form through DMRC;s website and apply as per the given application Format by enclosing a non-refundable crossed Demand Draft for Rs.300/- for General & OBC candidates and for Rs.50/- for SC & ST candidates (for processing cost only) drawn only on State Bank of India in favour of DELHI METRO RAIL CORPORATION LIMITED, payable at Service Branch, New Delhi (Code No-7687) indicating on the reverse of the DD, their name & address, telephone no. if any, latest by 14/04/2009 through ordinary post addressed to “DMRC Ltd., Post Bag No- 9”, Lodhi Road, New Delhi-110003. The filled up application should be sent in the envelope super scribing on it prominently – “Post Code, Name of Post & Discipline”. Demand Drafts payable at locations other than Delhi / New Delhi will not be accepted. MO/PO or any other mode of payment is not acceptable. Candidates are advised to check the details of Demand Draft carefully, before enclosing it with the application Form.

For More Details :Click HERE

Monday, March 16, 2009

Asin Photo Gallery

Sunday, March 15, 2009

List of M.Tech Colleges

Click Here

M.Tech Admissions Guidelines -2009 and Previous Cut-offs Scores

Previous GATE Cut-off scores in various Institutes
Click here to download in word format

M.Tech Couselling And Admission GuideLines Click Here to download

Friday, March 13, 2009

Access & Control Your PC from Anywhere

For you, success means finding the perfect balance between work and life. You work hard and play hard. LogMeIn Pro gives you the edge you need: in the office, on the road or wherever you choose to go. Now with Remote Sound, Drag and Drop and so much more, you'll never come closer to actually being there.

Gain seamless and total access to your home or office PC from any computer with an Internet connection. If you are looking for increased flexibility and productivity, welcome to LogMeIn Pro.

Try LogMeIn Here

Advantages of LogMeIn Pro

Remote Sound Hear email notifications, check web based voice mail or listen to music and podcasts from your host computer
Drag & Drop Seamlessly transfer files and folders between connected PCs
Sharing Share files or photos instantly with others, even those too large for email
Remote Printing Automatically print files from your remote PC to your local printer
Direct Connect Save time and clicks by going directly from the My Computer's page into a remote control or file transfer session
Mini Meeting Invite a colleague or friend to your PC for an online meeting; view only or full control
File Transfer Move files quickly between PCs
File Sync Synchronize files and folders on both PCs in seconds
Drive Mapping Link your local drives to your target PC
Quick Clips Short format how to video clips on LogMeIn features and functions

Thursday, March 5, 2009

Ayesha Takia Wedding Reception Stills ,Photos

Wednesday, March 4, 2009

KeePass-Password Safe

What is KeePass? Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your homepage's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, homepage, etc. Unimaginable. KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). For more information, see this Page Download Here

Tuesday, March 3, 2009

Deepika padukone in love triangle

Lover birds Ranbir Kapoor and Deepika Padukone have ended up having their first major fight since the time, Ranbir proposed Deepika during the Filmfare Awards Nite, earlier this year. The reason for this fight has been Katrina Kaif. Sources inform, “Deepika had heard from her sources about Ranbir’s growing comfortability on and off the sets of Rajkumar Santoshi’s Ajab Prem Ki Ghazab Kahani during the two month long shooting schedule in Ooty. While Deepika never confronted Ranbir over it, she got very insecure when her sources from the sets of the same film reported fresh news about what was happening between the two in the Goa schedule. It is learnt that during the Goa shoot both Ranbir and Katrina appeared more than comfortable (Vijainder-read physical) with each other than before even in front of the unit members on the sets. Deepika headed to Goa straightaway after hearing from her source. During her one day trip she met her source and headed back to Mumbai after hearing it all in person. When Ranbir came to know about it, he called Deepika and they both had a huge argument over the phone which ended up in Deepika hanging up on him. Since that day, Deepika has been avoiding picking up Ranbir’s calls.” No we gotta see how Salman Khan reacts to this one! Ranbir calls Salman, Sir on and off the sets since the time they did Saawariya together. Katrina had earlier expressed to us her views on Ranbir as, “A very witty co-star and fun to be with on sets.”

Monday, March 2, 2009

Freida Pinto (Slumdog Millionaire Fame) Gallery

Disclaimer
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator of this site (www.yuvahotnspicy.blogspot.com) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute ordownload any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.