Tuesday, 30 July 2013

Highlights of Distance Learning Program Syllabus by i3indya Technologies

Learn Embedded Systems & Robotics in 15 Days
Make your Robotics & Embedded System Projects at your Home
i3indya’s Distance Learning Kit (DLK)
Embedded Systems & Robotics

Course: Embedded Systems & Robotics
Certification: Participation Certificate from i3indya Technologies
Fees: INR 6000/- (including courier charge)
Projects: 15 Projects Covered
Delivery: DLK will be delivered to you in 10 working days after receiving your payment

Special Pre-Launch Discount Offer
Book your order before 7th August 2013 and get special discount of INR 1500

Now you can start learning embedded systems & robotics at your home, with i3indya’s Distance Learning Kit for Embedded Systems & Robotics. It is a 15 days module and it will cover following Practicals & Projects:

BASIC MODULE - Embedded Systems & Robotics

Introduction to i3indya & Robotics
Introduction to Embedded System
AVR Series Micro-Controllers & ATMEGA 16
Drivers & Software Installation

LED Interfacing with ATMEGA 16 – Theory
Practical 1: Glowing LEDs in a pattern of your choice
Seven Segment Displays – Theory
Practical 2: Displaying Digits on Seven Segment Displays
LED Matrix – Theory
Practical 3: Generating Patterns on LED Matrix
Practical 4: Display Alphabets on LED Matrix

LCD Interfacing with ATMEGA 16 – Theory
Practical 5: Displaying Text on LCD

LCD Interfacing Continued..
Practical 6: Scrolling Text on LCD
Practical 7: Creating Simple Animation on LCD
Project 1: Digital Clock

DC Motor Interfacing with ATMEGA 16 – Theory
L293D IC & Its Need - Theory
Practical 8: Learning Interfacing of Motor with LEDs & LCD
Practical 9: Controlling Direction of Rotation of a Motor
Stepper Motor Interfacing with ATMEGA 16 - Theory
Practical 10: Rotation in forward and backward direction
Practical 11: Controlling speed of stepper motor
Practical 12: Rotating stepper motor at given angle/distance

Working of IR Sensors – Theory
Digital IR Sensors – Theory
Practical 13: Detecting White and Black surface with Digital
IR Sensors.
Practical 14: Controlling Motor with Digital IR Sensor.
Practical 15: Calculating Speed of a moving robot.
Introduction to ADC – Theory
Analog IR Sensors - Theory
Practical 16: Measuring Distance of an object using Analog IR Sensors.
Practical 17: Controlling Motor using Analog IR Sensor.

Project 2: Line Follower Robot
Project 3: Wall Follower Robot
Project 4: Tachometer Prototype
Project 5: Visitor Counting Application
Assignment & Revision

Buzzer interfacing with ATMEGA 16 – Theory
Practical 18: Generating Beep through Buzzer
Interfacing of Temperature Sensor – Theory
Practical 19: Calibrating Sensor value with Temperature Range
Project 6: Digital Thermometer
Project 7: Temperature Controlled Fan
Project 8: High Temperature Alarm

Keypad Interfacing with ATMEGA 16 – Theory
Practical 20: ON\OFF LED\Motor\Buzzer using single key
Linear Keypad - Theory
Practical 21: Controlling Motor (ON\OFF, Direction of Rotation) using Linear Keypad
Practical 22: Writing text on LCD using Linear Keypad
Project 9: Stop Watch

Matrix Keypad Interfacing – Theory
Project 10: Keypad Operated Robot
Project 11: Mobile Phone Keypad prototype
Project 12: Password Controlled Application – ATM Prototype
Project 13: Calculator

PWM – Theory
Practical 23: Controlling brightness of a LED.
Speaker Interfacing with ATMEGA 16
Practical 24: Generating different frequencies from Speaker
Practical 25: Integrating Keypad with Speaker
Practical 26: Integrating IR Sensor with Speaker
Project 14: Digital PIANO

Interfacing RGB LED
Practical 27: Generating different colours from RGB LED
Practical 28: Integrating Keypad with RGB LED
Practical 29: Traffic light prototype using single LED
Interfacing LDR Sensor with ATMEGA 16
Practical 30: Colour detection using LDR sensor in Analog Mode
Project 15: Colour Changing Spy Bot using LDR & RGB LED*

More Projects You can do

Exam – Theory & Practical

You can give exam anytime within 6 Months

Certificate of Participation will be given by i3indya Technologies

Note: Certificate will be issued only if you have 60% or above marks in exam

Register Here

Monday, 29 July 2013

Email Privacy Tips for You - Mr OoPpSs

To maintain privacy of your Email and to Protect your Email ID from being Hacked we must follow some basic steps as follows,

1. Enable two step verification in you Email accounts.

2. Enable Login-notification for you email and get notification in your mobile whenever you login.

3. Set a strong password with a mix of alphabets, numbers and special characters.

4. Enable login- notification for you Facebook accounts to prevent unauthorized access.

5. Enable HTTPS in your email settings and your Facebook account settings.

6. Never share your password with anyone. Even to your closest person.

7. Setup a recovery question which is difficult to answer and never setup an easy & guessable answer to your security question.

8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.

9. Always check your address bar for proper website address before logging in.

10. Whenever you Need to Forward an Email to More than One Person use the BCC Option to Write Addresses.

11. If you are Unable to Access Your Email Account Immediately Report it to the Service Provider. They Give You a Option of Forgot Password/Account Hacked etc.

12. Avoid Using FREE WIFI Access At Public Places.

Source:OoPpSs Group

Wednesday, 24 July 2013

Distance Learning Program (DLP) Kit by i3indya Technologies

The rising demands for Robotics and Ethical Hacking courses within student and working professionals, influence i3indya Technologies to introduce
Distance Learning Program 
(DLP) kits

Courses Offered
- Ethical Hacking & Cyber Security.
- Embedded Systems and Robotics.

For Whom
Students and Working Professionals

For More Details and Registration

For any Further Query Mail Us

 Book Your order before 7th August and GET DISCOUNT of Rs 1500

i3indya Technologies has been Awarded 
"Best Company for Embedded System and Robotics Training of the Year 2013" - by TIME RESEARCH
"Best Company for Ethical Hacking & Cyber Security Training of the Year 2013" - by PRIME TIME

Tuesday, 23 July 2013

Tips-Secure Yourself Now!! How you can be Hacked !!

Make Sure It Wasn’t the IT Guy. Before jumping to conclusions, you need to verify that the user actually did it. The user isn’t always responsible for all computer activity. For example, company IT departments often automatically and remotely perform system and email backups, which can appear as a massive file transfer by the user. These backups, antivirus software, or other automated programs can often be the cause and should be considered.

Check the Ex-Employee’s Computer Usage History. If an ex-employee deleted a bunch of computer files the day before leaving his job, that activity may be suspicious. But always make sure to examine the user’s deletion history and look for patterns. Did he delete the same volume of data on a daily or weekly basis? Were these the same types of files (either file names or file extensions) that he typically deleted? Deletion activity is not always nefarious.

Make Sure the Ex-Employee Didn’t Have a Legitimate Reason to Download Files Remotely. Where there’s smoke, there’s fire, right? Forensic information is only meaningful in context. To get the facts straight, it’s important to know whether the ex-employee routinely worked remotely, had job responsibilities that made access to source code or password-protected databases necessary, or was authorized to use the networks he accessed. This type of information is critical in understanding whether computer activity is suspicious or ordinary.

Correlate Stolen File Sizes With Storage Device Sizes. You need to use common sense when evaluating computer forensic data. Sometimes forensic artifacts don’t conclusively show that data was transferred, but do support the inference. For example, artifacts may show that a portable hard drive or USB drive was connected at the same time files were rapidly accessed on the computer, suggesting that the files were copied. But don’t stop there; compare the size of the file you suspect was stolen with the size of the removable storage device, and make sure the device actually has enough capacity!

Don’t Read Too Much Into Incomplete Forensic Data. While forensic evidence provides valuable information, it also has limitations and can raise just as many questions as it answers. For example, a computer may store webpage fragments, providing a snapshot in time of what the user viewed, but not the entire story. Or in the case of jumplists (lists of files recently accessed), the target files may not be recoverable. Similarly, a file’s metadata (information about a file’s history, including author and creation date) may suggest that the user last accessed the file on a particular date and time, but this data also could be based on unrelated events such as you turning on his laptop and digging around to investigate. So while this is powerful information, at times it can only give you inferences of wrongdoing. Be careful not to overstate its meaning.

Source: Lexology

Monday, 22 July 2013

20 Brand New Workshops for You !! Register Now !!

With the increasing demand of engineers in the field of INFORMATION SECURITY and EMBEDDED SYSTEM & ROBOTICS, i3indya has taken an initiative to explore students with the Latest Technology in market.

i3indya Technologies feels proud to

20 Brand New Workshops 
in the field of 

for the students as well as for the faculties

So what are you waiting for ??

Explore the technology with i3indya 

It gives 
 immense pleasure to inform
 that i3indya Technologies has recently received 2 awards for ::

Best Company for Embedded System and Robotics Training of the Year 2013"
"Best Company for Ethical Hacking & Cyber Security Training of the Year 2013" - by PRIME TIME

Friday, 19 July 2013

Worm Attacks on Facebook

Your Fb Account Can Be Hacked Facebook currently has 4 worm (virus) Attacks. These attacks can lead to loss of your personal information or in worse casescan
get your Facebook Account Hacked

Worm 1 :- If you get a notice of a PHOTO TAG . Do not open it.

Worm 2 :- If you get a notification that a friend reported you for offensive behavior etc.. Do not open it.

Worm 3 :- Is a Video saying 99% of People can not watch this for more the 15 Sec. Do not open it.

Worm 4 :- All Messages from your friends via chat saying click this
link .. Do not open. All these worms are made to take your personal information and even to hack your accounts. The onlyway to protect yourself from these is to ignore them and not to click on them.

Source : Mr OoPpSs

Wednesday, 17 July 2013

20 Best Ways to become a Better Ethical Hacker - Tips From Mr OoPpSs

1) Learning scripting languages such as Python, Perl and ruby can help you automate your tasks and for sure
improve your skills.

2) Understanding all possible user inputs is the fastest way to hack into the systems.

3) When u gain access to an account or whatever u hacking in to, best practice do not alter anything. just monitor the activity and continue fetching information u need.

4) Travel and see different countries, it will make you better.

5) Never hesitate for usage of Google and other resources available i.e. exploit-db, and be updated with versions and bugs in each versions, for example, if I talk about WordPress, then one who is looking to hack WordPress website or pentest, then he should be well aware of at least 3.0+ versions updating, so whichever version is being used on the website, he should know the vulnerabilities in that and their exploitation 

6) RTFM, don't expect handouts. Educated questions, gets you educated answers 

7) Move to Linux, learn Programming Languages C, Pearl, Lisp, Java and Html and write open source programs. Improve your functional English. 

8)The most important factor for becoming a good hacker is, you must have your personal interest with computers. Additionally, you have to be definite in your work, such that you should take exactly interest in One thing at a single time. After covering the appropriate level of theory, the learner should try it practically as much as his satisfaction level. Watching Tutorials only for taking points, not really for following them from a to z exactly, because you have to be a good learner only if you have your personal intention for doing the things creatively.

9) One thing , Learn how old Hackers Started don't focus on new Programs like BACKTRACK , METASPLOIT , Learn Manual Hacking , Learn Coding and be patient ! Knowledge will come with time ! and practice all methods 

10) Do not rely on tricks for hacking. As they will keep you a script kiddie, get deep understanding about stuffs. And also don't rush from one topic to another. All those combined will make you a better hacker. "Slow and Steady wins the race" 

11) A support will always lift you up. Join groups, forums. Keep yourself updated with latest hacking news by reading blogs [Like this ;)], tweets etc. 

12) Understand what programming language to use at what moment. You're time is valuable so don't waste it writing something that could have been done faster! (and understand the difference between a scripting language and a programming language, python for example is a programming language. 

13) During hacking remain mentally intact and focus on your each step. During a step always remember your next steps and the way you have to link them. Dont always use old methods and tricks, try new one and use your own mind too. and remember one thing that there is no shortcut of Hacking, to became a hacker, you have to give your whole passion to hacking. "Hacking is an Art, and Hacker is an Artist". 

14) This Attitude should be there within "SWEAT MORE IN PRACTISE, SO YOU BLEED LESS IN WAR"‪#‎defensive‬ ‪#‎offensive‬ ‪#‎B31212Y‬

15) Whatever you're going to test,start it with a basic stuff. If you dont know any,start learning.

16) Enumeration is the key to pwnage, the more you enumerate the more attack surface you get 

17) Be patient! Learn different protocols and read the RFCs to understand how they work and if there are some "security by design" issues. After that you should try to understand the context you're in and therefore develop an exploit for this particular context. 

18) Sleep less, read more. Learn & Think & Try & Fail & Never give up. Remember, "...imagination will take you everywhere". 

19) Don't compete anyone, never think you are the best, just compete "the you in the past". There will always be a vulnerability waiting for being discovered, by someone who thinks different. Understanding human logic makes things easier. "Hackers realize, kiddies memorize"

20) Learn your own systems inside out, before moving on to other systems. The better you know your own, the more capable you will find yourself when it comes time to make your system work for you.

Source : Mr OoPpSs

Monday, 15 July 2013

FREE Workshops by i3indya Technologies!!! Register Now


 Ethical Hacking & Cyber Security
 Mobile Controlled Robotics


i3indya Technologies
(India’s Best Training Provider Company#)

i3indya Technologies has taken an initiative to deliver Free Workshops for Engineering students across India.



Now you can organize FREE workshop on ROBOTICS or ETHICAL HACKING at your
college with
 i3indya Technologies

i3indya Technologies offers you a grand opportunity to conduct 1 day (7 hrs) free workshop at your college campus for the first time on the following topics:
1. Ethical Hacking & Cyber Security (Cyber Disease)
2. Mobile Controlled Robotics (Short Circuit V 1.1)

Hurry !! Limited Offer Only !!

Registration for FREE workshops starting: 15 July 2013

Free Workshops will start from 20 July 2013 till 31 August 2013

To Know More about FREE Workshop

For More Information Call Us at
+91 95 6060 5666


#i3indya Technologies has been awarded
"Best Company for Embedded System and Robotics Training of the Year 2013" - by TIME RESEARCH

"Best Company for Ethical Hacking & Cyber Security Training of the Year 2013" - by PRIME TIME