Thursday, October 29, 2009
Tuesday, October 13, 2009
A division bench of Chief Justice Jagdish Bhalla and justice M N Bhandari yesterday stayed the reservation given by the state government to these communities as it exceeded the 50 per cent limit fixed for total reservation.
The order was passed on a letter petition filed by some students of University of Rajasthan.
The division bench in the order observed that "we have examined the letter in the light of the order of Supreme Court in the light of Indra Shwayani's judgement and find that the reservation granted by the government to Gurjar community and EBCs is not in consonance to the settled legal provisions and hence the excess reservation is stayed".
source : PTI NEWS
Thursday, October 8, 2009
Venkatraman Ramakrishnan, MRC Laboratory of Molecular Biology, Cambridge,
Thomas A. Steitz, Yale University, New Haven, CT, USA
Ada E. Yonath, Weizmann Institute of Science, Rehovot, Israel
"for studies of the structure and function of the ribosome"
Tuesday, October 6, 2009
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing, probably influenced by phreaking, and alludes to baits used to "catch" financial information and passwords.
Sunday, October 4, 2009
"Creative Commons is a non-profit that offers an alternative to full copyright."
You let others copy, distribute, display, and perform your copyrighted work - and derivative works based upon it - but only if they give you credit.
You let others copy, distribute, display, and perform your work - and derivative works based upon it - but for noncommercial purposes only.
No Derivative Works means:
You let others copy, distribute, display, and perform only verbatim copies of your work, not derivative works based upon it.
Share Alike means:
You allow others to distribute derivative works only under a license identical to the license that governs your work.