Friday, October 31, 2014

9th and 10th Muharram All Pakistan Cites Procession routes 2014-15




9th and 10th Muharram All Pakistan Cites Procession routes 2014-15


The main procession of 9th Muharram will be taken out from Nisar Havaily and after passing through its traditional route will culminate at the Karbala Game Shah before Maghrib prayers. - Rangers and police have been deployed outside Mosques and Imam Bargahs and other sensitive areas and the route of main procession has been sealed. -



9th and 10th Muharram Lahore Procession routes Map November 2014

Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online


Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online



Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online Dawn Newspaper Sunday Job advertisement 2nd November  2014 online new jobs in govt 2nd November 2014 
Sub Station Operators, Laboratory Assistant and others required at National Transmission & Despatch Company Limited



Dawn Newspaper Sunday Jobs Ads 2nd November 2014 online

Prize Bond Draw Result 25000 Rs Dated 3rd November 2014



 Prize Bond Draw Result 25000 Rs Dated 3rd November 2014


Draw Prize Bond 25000 Rs live update Complete List 3rd November 2014 on Monday.Prize Bond 25000 Rs live update Complete List 3rd November 2014 Held at Hyderabad.online live check Prize Bond Draw result list 25000rs held at Hyderabad 03-11-2014



Thursday, October 30, 2014

Authentication Technique with OTP cs619 vu final project




Authentication Technique with OTP cs619 vu final project





Authentication Technique with OTP



One time password (OTP) is just what the name gives you an idea about a password that is only applicable for one login. The advantage of OTPs is that it proposes much higher security than static password also called conventional way of authentication. OTPs is protected against password sniffing attacks, if an hacker use software to collect your data traffic, video  records when you type on your keyboard, or use social engineering, it doesn’t matter since the password that the attacker gets hold on will not be valid to use. An OTP can be generated using different methods and is often used in combination with a device that is synchronized with an authentication server.



Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.



The user’s mobile phone will work as the authentication device, in which the user have to enter a 4-digit PIN code to generate an OTP that can be used for login. This is done by any mobile supported application running on the phone.

The OTP that is generated on the mobile phone is based on three components which will be hashed together with MD5 or any well known encryption algorithm.



Functional Requirements:

1. 4-digit PIN code that the user enters.



2. A secret random number that was created during device-initialization (Init-secret) that only exists on the user’s mobile device.



3. The OTP algorithm simultaneously executes the code at mobile as well as Server and generates one time password that will be valid defined session /time stamp.



4. Make log file (Data base) manage all record of specific user id.



5. After the login application operates any other operation.



Application Type:



It will be a native mobile application; you can use any modern mobile OS platform (e.g. Android, Apple, Windows Mobile etc) for mobile application and PHP/Dot net frame for server side languages.



The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.



http://www.miraclesalad.com/webtools/md5.php

http://en.wikipedia.org/wiki/MD5







Figure 1. One MD5 operation. MD5 consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function; one function is used in each round. Mi denotes a 32-bit block of the message input, and Ki denotes a 32-bit constant, different for each operation. s denotes a left bit rotation by s places; s varies for each operation.  denotes addition modulo 232.



MD5 processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks (sixteen 32-bit words); the message is padded so that its length is divisible by 512. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits fewer than a multiple of 512. The remaining bits are filled up with 64 bits representing the length of the original message, modulo 264.



The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. These are initialized to certain fixed constants. The main algorithm then uses each 512-bit message block in turn to modify the state. The processing of a message block consists of four similar stages, termed rounds; each round is composed of 16 similar operations based on a non-linear function F, modular addition, and left rotation. Figure 1 illustrates one operation within a round. There are four possible functions F; a different one is used in each round:

denote the XOR, AND, OR and NOT operations respectively.
Scratch the card and insert 14 digit number for card loading is normal and regular activity for mobile users. In this project user will just take picture for mobile card and it will be automatically recharged.



This MD5 hash generator is useful for encoding passwords, credit cards numbers and other sensitive date into MySQL, Postgress or other databases. PHP programmers, ASP programmers and anyone developing on MySQL, SQL, Postgress or similar should find this online tool an especially handy resource.



What is an MD5 hash?

An MD5 hash is created by taking a string of an any length and encoding it into a 128-bit fingerprint. Encoding the same string using the MD5 algorithm will always result in the same 128-bit hash output. MD5 hashes are commonly used with smaller strings when storing passwords, credit card numbers or other sensitive data in databases such as the popular MySQL. This tool provides a quick and easy way to encode an MD5 hash from a simple string of up to 256 characters in length.



MD5 hashes are also used to ensure the data integrity of files. Because the MD5 hash algorithm always produces the same output for the same given input, users can compare a hash of the source file with a newly created hash of the destination file to check that it is intact and unmodified.



An MD5 hash is NOT encryption. It is simply a fingerprint of the given input. However, it is a one-way transaction and as such it is almost impossible to reverse engineer an MD5 hash to retrieve the original string.



Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.

Project: Authentication Technique with OTP cs619 vu final project For Sale please contact 03009520262

Wednesday, October 29, 2014

VU MS(CS) Fall 2014 Course Selection




All MS(CS) students are required to select courses for Fall 2014 semester from the following list of offered courses and email their selected courses till November 05, 2014. Students may add/drop course(s) on or before November 12, 2014.

Fall 2014 Semester Courses
Course Code
Course Title
Pre-requisite
Credit Hours
Specialization
CS701
Theory of Computation
CS402
MTH202
3
Core
CS702
Advanced Algorithms Analysis and Design
CS301
CS502
3
Core
CS710
Mobile and Pervasive Computing
CS610
3
Computer Networks
CS718
Wireless Networks
CS610
3
Computer Networks
CS723
Probability and Stochastic Process
MTH101
STA301
3
Computer Networks
CS706
Software Quality Assurance
CS504
3
Software Engineering
CS709
Formal Methods for Software Engineering
CS504
MTH202
3
Software Engineering
CS712
Distributed DBMS
CS403
CS610
3
Databases
CS713
Object Oriented DBMS
CS403
CS304
3
Databases
CS720
Thesis

6
Optional

General Rules 
  1. In order to fulfill MS(CS) degree requirements, a student is required to pass all the four core/requisite courses, at least three courses from his/her selected area of specialization, and
    1. With-thesis option: complete his/her research thesis (six credit hours) and possibly one course from any specialization area.
    2. Course-work-only option: remaining courses from any specialization area(s).
2.      A student can enroll in an MS level course only if he/she has passed all pre-requisites for that particular course.
1.      The credit hour limits are as below:
                                i.            For each of the first three semesters, maximum three MS level courses (nine credit hours) are allowed.
                              ii.            For the fourth and any subsequent semester(s), maximum four MS level courses (12 credit hours) are allowed.
                            iii.            There is no limit on the maximum pre-requisite courses in a semester.
4.      A student may attempt to improve a 'C' or 'D' grade in a course at most once.
5.      A student is eligible for the merit list of thesis if he/she has completed seven MS level courses (21 credit hours) with CGPA ≥ 2.75.

Commencement of Classes
Please note that MS(CS) Fall 2014 semester will start from November 05, 2014.


Draw Result of Prize Bond 7500 Rs Dated 3rd November 2014





Draw Result of Prize Bond 7500 Rs Dated 3rd November 2014


Draw Prize Bond 7500 Rs live update Complete List 3rd November 2014 on Monday.
Prize bond List Rs 7500 Dated 3rd November 2014 Rawalpindi 

Read More and Download Result Updates 


Check Prize Bond Rawalpindi list of 7500rs on Monday 3rd November 2014

Pu Revised First and Second Year, M.Sc. I.T, Annual Examination, 2014







Pu Revised First and Second Year, M.Sc. I.T, Annual Examination, 2014

In continuation of notification No. 408/Cond.D.S dated 17-10-2014, it is hereby notified that the Admission Forms and Fee for First and Second Year, M.Sc. I.T, Annual Examination, 2014 will be received according to the following revised programme:-
With Single Fee: 29-10-2014
With Double Fee: 31-10-2014
Commencement date of Examination will be announced later.