Monday 26 May 2014

Narendra Modi became 15th prime minister in INDIA

New Delhi, May 26: Narendra Modi, India's 15th prime minister, took oath on Monday at a ceremony held in the open at Rashtrapati Bhavan and attended by the Who's Who of the nation - including political leaders, business honchos, celebrities and leaders of religious faiths - as well as leaders of neighbouring countries.
 The oath of office and secrecy was administered in Hindi to Modi by President Pranab Mukherjee.
There was a certain poignancy to the momentous occasion as the inauguration of a new prime minister happened exactly 50 years after the death of India's first prime minister, Jawaharlal Nehru.
Present on the occasion of the change of guard was the outgoing prime minister Manmohan Singh, who remained 10 years at the helm when the general election left the Congress battered and reduced to its lowest tally of 44 seats in the Lok Sabha.
A council of ministers, numbering around 45, also took oath.
Among the foreign leaders who attended the ceremony at the forecourt of the presidential palace were Pakistan Prime Minister Nawaz Sharif, Afghanistan President Hamid Karzai and Sri Lankan President Mahinda Rajapaksa.
Also present were Mauritius Prime Minister Navinchandra Ramgoolam, Nepal Prime Minister Sushil Koirala, Prime Minister Tshering Tobgay of Bhutan and Bangladesh parliament Speaker Shirin Sharmin Chaudhury.
Congress president Sonia Gandhi, her son and party vice president Rahul Gandhi and former presidents A.P.J. Abdul Kalam and Pratibha Patil were among the over 4,000 people who gathered on the occasion.

The list of Indian Prime Ministers

1. Jawaharlal Nehru (Aug 15, 1947 - May 27, 1964/Four terms)

2. Lal Bahadur Shastri (June 9, 1964 - Jan 11, 1966)

3. Indira Gandhi (Jan 24, 1966 - March 24, 1977;
                            Jan 14, 1980 - Oct 31, 1984)

4. Morarji Desai (March 24, 1977 - July 28, 1979)

5. Charan Singh (July 28, 1979 - Jan 14, 1980)

6. Indira Gandhi (Jan 14, 1980 - Oct 31, 1984)

7. Rajiv Gandhi (Oct 31, 1984 - Dec 2, 1989)

8. Vishwanath Pratap Singh (Dec 2, 1989 - Nov 10, 1990)

9. Chandra Shekhar (Nov 10, 1990 - June 21, 1991)

10. P.V. Narasimha Rao (June 21, 1991 - May 16, 1996)

11. Atal Bihari Vajpayee (May 16, 1996 - June 1, 1996;
                                       March 19, 1998 - May 22, 2004/Three terms)

12. H.D. Deve Gowda (June 1, 1996 - April 21, 1997)
 
13. Inder Kumar Gujral (April 21, 1997 - March 19, 1998)

14. Manmohan Singh (May 22, 2004 - May 17, 2014/Two terms)

15. Narendra Modi (May 26, 2014-

(Gulzari Lal Nanda served as acting prime minister twice - after the death of Nehru and then Shastri.)

Narendra Modi became 15th prime minister in INDIA

India's new Prime Minister Narendra Modi has sought people's help in fulfilling his dream to make it a developed and inclusive nation.

'Kochadaiiyaan'

'Kochadaiiyaan' is the first film in India to use motion capture technology.

 For the first time in the history of Indian Cinema, the much-awaited period film "Kochadaiyaan" featuring Tamil superstar Rajinikanth and Bollywood actress Deepika Padukone in the lead, would be released in six different languages.


Eros International and Media One Global Entertainment, are the producers of the movie, which is directed by Rajinikanth's daughter, Soundarya R Ashwin. The music is scored by double Oscar winner A R Rahman and sound recording by another Oscar winner Resul Pookutty.

The movie also has National Award-winning Tamil film actor Nagesh, Bollywood actor Jackie Shroff, Tamil actors Sarathkumar, Adhi, Nasser, actress danseuse Shobhana.
 

Friday 23 May 2014

About Rosetta - EUROPE'S COMET CHASER

In November 1993, the International Rosetta Mission was approved as a Cornerstone Mission in ESA's Horizons 2000 Science Programme.

Since then, scientists and engineers from all over Europe and the United States have been combining their talents to build an orbiter and a lander for this unique expedition to unravel the secrets of a mysterious 'mini' ice world – a comet.

Initially scheduled for January 2003, the launch of Rosetta had been postponed due to a failure of an Ariane rocket in December 2002. The adventure began March 2004, when a European Ariane 5 rocket lifted off from Kourou in French Guiana.

During a circuitous ten-year trek across the Solar System, Rosetta will cross the asteroid belt and travel into deep space, more than five times Earth’s distance from the Sun. Its destination will be a periodic comet known as Comet 67P/Churyumov-Gerasimenko.

The Rosetta orbiter will rendezvous with Comet 67P/Churyumov-Gerasimenko and remain in close proximity to the icy nucleus as it plunges towards the warmer inner reaches of the Sun’s domain. At the same time, a small lander will be released onto the surface of this mysterious cosmic iceberg.
More than a year will pass before the remarkable mission draws to a close in December 2015. By then, both the spacecraft and the comet will have circled the Sun and be on their way out of the inner Solar System.
The Rosetta mission will achieve many historic firsts.

HISTORIC MISSION
The Rosetta mission will achieve many historic firsts.
  • Rosetta will be the first spacecraft to orbit a comet’s nucleus.
  • It will be the first spacecraft to fly alongside a comet as it heads towards the inner Solar System.
  • Rosetta will be the first spacecraft to examine from close proximity how a frozen comet is transformed by the warmth of the Sun.
  • Shortly after its arrival at Comet 67P/Churyumov-Gerasimenko, the Rosetta orbiter will despatch a robotic lander for the first controlled touchdown on a comet nucleus.
  • The Rosetta lander’s instruments will obtain the first images from a comet’s surface and make the first in situ analysis to find out what it is made of.
  • On its way to Comet 67P/Churyumov-Gerasimenko, Rosetta will pass through the main asteroid belt, with the option to be the first European close encounter with one or more of these primitive objects.
  • Rosetta will be the first spacecraft ever to fly close to Jupiter’s orbit using solar cells as its main power source.
Scientists will be eagerly waiting to compare Rosetta’s results with previous studies by ESA’s Giotto spacecraft and by ground-based observatories. These have shown that comets contain complex organic molecules - compounds that are rich in carbon, hydrogen, oxygen and nitrogen.

Intriguingly, these are the elements which make up nucleic acids and amino acids, the essential ingredients for life as we know it. Did life on Earth begin with the help of comet seeding? Rosetta may help us to find the answer to this fundamental question.

Wednesday 21 May 2014

An Inspiring Story on Friendship….Touching….This will touch your heart!!!!!!

In a battle, a soldier prepared 2 bring this wounded friend back from the field.

His captian said,
“Its of No use! ur friend must be dead”.


But soldier still goes & brings back his friend.
Seeing the dead body, Captain says


“I told u its of no worth. He’s dead”.

The soldier replies with moist eyes:
“No sir, it was really of worth…..


When i got to him, my friend saw me, smiled & said his last words:


“I KNEW YOU WOULD COME”……
——————————————–

Heart Touching Story- with a Moral

A doctor entered the hospital in hurry after being called in for an urgent surgery. He answered the call asap, changed his clothes & went directly to the surgery block.

He found the boy’s father pacing in the hall waiting for the doctor.

On seeing him, the dad yelled: “Why did you take all this time to come? Don’t you know that my son’s life is in danger? Don’t you have any sense of responsibility?”

The doctor smiled & said: “I am sorry, I wasn’t in the hospital & I came as fast as I could after receiving the call…… And now, I wish you’d calm down so that I can do my work” 

“Calm down?! What if your son was in this room right now, would you calm down? If your own son dies now what will you do??” said the father angrily

The doctor smiled again & replied: “I will say what Job said in the Holy Book “From dust we came & to dust we return, blessed be the name of God”. Doctors cannot prolong lives. Go & intercede for your son, we will do our best by God’s grace”

“Giving advises when we’re not concerned is so easy” Murmured the father.

The surgery took some hours after which the doctor went out happy, “Thank goodness!, your son is saved!” And without waiting for the father’s reply he carried on his way running. “If you have any questions, ask the nurse!!”

“Why is he so arrogant? He couldn’t wait some minutes so that I ask about my son’s state” Commented the father when seeing the nurse minutes after the doctor left.

The nurse answered, tears coming down her face: “His son died yesterday in a road accident, he was at the burial when we called him for your son’s surgery. And now that he saved your son’s life, he left running to finish his son’s burial.”


MORAL : Never judge anyone….. because you never know how their life is & what they’re going through”

Thursday 15 May 2014

"The Stroke"

Now everybody
Have you heard
If you're in the game
Then the stroke's the word
Don't take no rhythm
Don't take no style
Gotta thirst for killin'
Grab your vial and

Put your right hand out
Give a firm handshake
Talk to me about that one big break
Spread your Ear Pollution
Both far and wide
Keep your contributions
By your side and

Stroke me, stroke me
Could be a winner boy you move mighty well
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
You got your number down
Stroke me, stroke me
Say you're a winner but man
You're just a sinner now

Put your left foot out
Keep it all in place
Work your way
Right into my face
First you try to bet me
You make my backbone slide
When you find you've bent me
Slip on by and

Stroke me, stroke me
Give me the reason this is all night long
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
Get yourself together boy
Stroke me, stroke me
Say you're a winner but man
You're just a sinner now
(Stroke, stroke, stroke, stroke, stroke, stroke, stroke)

Better listen now
Said it ain't no joke
Don't let your conscience fail ya'
Just do the stroke
Don't ya' take no chances
Keep your eye on top
Do your fancy dances
You can't stop you just

Stroke me, stroke me
(Stroke, stroke)
Stroke me, stroke me
(Stroke, stroke)
Stroke me, stroke me
(Stroke, stroke)
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
(Stroke)
Stroke me, stroke me
Say you're a winner but man
You're just a sinner now.

                                     -BILLY SQUIER LYRICS


Pirates of the Caribean 3 : At World's End - Hoist The Colours

Yo, ho, haul together,
hoist the colors high.
Heave ho,
thieves and beggars,
never shall we die.
The king and his men
stole the queen from her bed
and bound her in her Bones.
The seas be ours
and by the powers
where we will we'll roam.
Yo, ho, haul together,
hoist the colors high.
Heave ho, thieves and beggars,
never shall we die.
Some men have died
and some are alive
and others sail on the sea
– with the keys to the cage...
and the Devil to pay
we lay to Fiddler's Green!
The bell has been raised
from it's watery grave...
Do you hear it's sepulchral tone?
We are a call to all,
pay head the squall
and turn your sail toward home!
Yo, ho, haul together,
hoist the colors high.
Heave ho, thieves and beggars,
never shall we die.

Tuesday 13 May 2014

Cool and Weird Fun Facts that you should know!

You breathe on average about 5 million times a year.
You are born with 300 bones, by the time you are an adult you will have 206.


 

Blow, Blow, Thou Winter Wind

Blow, blow, thou winter wind
Thou art not so unkind
As man's ingratitude;
Thy tooth is not so keen,
Because thou art not seen,
Although thy breath be rude.

Heigh-ho! sing, heigh-ho! unto the green holly:
Most freindship if feigning, most loving mere folly:
Then heigh-ho, the holly!
This life is most jolly.

Freeze, freeze thou bitter sky,
That does not bite so nigh
As benefits forgot:
Though thou the waters warp,
Thy sting is not so sharp
As a friend remembered not.
Heigh-ho! sing, heigh-ho! unto the green holly:
Most friendship is feigning, most loving mere folly:
Then heigh-ho, the holly!
This life is most jolly. 

                        
                          - William Shakespeare

Friday 9 May 2014

What Are The Disadvantages Of Computer Viruses?




71%Helpful
A computer virus is a type of malware infection that can harm your computer - by altering or destroying parts of your software system, or even by causing your hard drive to destroy itself.

A virus is composed of one or more dangerous files, which can form part of a downloaded package or can even masquerade as a genuine program.

Computers are easily infected without their users realising that it has happened. This is why it is so important to install anti-virus software, which actively monitors for suspicious files.

Computer viruses have a variety of disadvantages, some of which are discussed below:

Loss of Software Functionality

When a virus infects your computer, it is highly likely it will alter your system so that you will no longer be unable to access certain functionality. It is quite possible that you will no longer be able to install anti-virus software, even if you already have it installed.

It is likely that the virus will prevent any program from detecting and removing the infection it has caused. Naturally, the creators of the virus don't want you to be able to get rid of it.

Exploitation

Some computer viruses are created by Internet criminals seeking to make money out of people. The virus is likely to display messages stating there is a problem with the computer, and suggest that this can be fixed by providing a payment to a repair company.

Of course, in reality this 'company' is operated by the criminals and the payment will not rid the software of the virus - or if it does, then this will be because there was never a real problem in the first place.

What is Computer Virus?




A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer. A virus might corrupt or delete data on your computer.
By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments.
When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.
A virus program contains instructions to initiate some sort of "event" that affects the infected computer. Each virus has an unique event associated with it. These events and their effects can range from harmless to devastating. For examples:
·         An annoying message appearing on the computer screen.
·         Reduced memory or disk space.
·         Modification of data.
·         Files overwritten or damaged.
·         Hard drive erased.


The 9 Types of Computer Viruses



The 9 Types of Computer Viruses To Watch Out For & What They Do


Add caption
Everyone dreads being the recipient of a computer virus, but not everyone minds studying them. There are researchers who spend a lot of time looking into different types of computer viruses and related security threats in order to determine how they’re programmed, how they do damage, and how they spread. Personally, I find this field interesting, and I enjoy reading about the different types of viruses in existence.
But even if you don’t know much care, basic knowledge about security threats can be useful. It’s sometimes hard to know how a risk must be dealt with before you know its consequences. With a computer virus, however, the consequence is sometimes complete loss of your data or identity theft – so it’s best to learn sooner rather than later!
1. Boot Sector Virus
The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device.
Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.
2. Browser Hijacker
This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements.

There are a lot of such viruses, and they usually have “search” included somewhere in their description. CoolWebSearch may be the most well known example, but others are nearly as common.
3. Direct Action Virus
This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again.
Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.
4. File Infector Virus
Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re-write the file so that the virus is executed rather than the program the user intended.
Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.
5. Macro Virus
A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document.
Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself.
6. Multipartite Virus
While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.
7. Polymorphic Virus
Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met.
The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.
8. Resident Virus
This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected.
A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed.
9. Web Scripting Virus
Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface.
Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge.
Conclusion
I’ve included every type of computer virus in this article that I felt was relevant, but this isn’t a list of every type of virus known to man. Also, I did not include any worms or trojans, two common threats that are similar to viruses but technically not the same. If there is a specific type of virus that you feel was missed and is important, let us know in the comments.