Monday, July 27, 2009

Management Education Topics

1. Managerial skills learnt in the classroom can never match those learnt from experience.
2. Democracy is hampering India progress
3. MBA in India is highly overrated.
4. Religion is a private affair and should be of no concern for the state.
5. Decreasing defense expenditure and increasing social expenditure is the need of the hour.


POLITICAL TOPICS

1. reserving seats for women in Panchayat has not only been a farce but has distracted from

developing a more genuine voice of women.
2. Have the nuclear tests of 1998 benefited or harmed India?
3. Voters, not, political parties are responsible for the criminalization of politics.
4. The voters are required to be well informed and educated about their candidates so that they

can elect the right aspirant by their own assessment.
5. India should go for the presidential form of democracy.

ECONOMIC TOPICS

1. In our economic matters, there is an excessive tendency towards the thinking rather than

doing.
2. Every cloud has a silver lining
3. Can the economy achieve an 8 percent growth rate?.
4. is disinvestment really that good for India or is a rethink in order?
5. Are co-operatives relevant in today’s globalizing environment?
6. Foreign aid is a dangerous drug that can stimulate in small doses but become fatally addictive

in larger doses.
7. Modern day sport in industrialized society is an industry, as anything else.
8. Government should clean its own hands before pointing finger at the private sector for

corruption.
9. is the NPA ordinance too harsh?
10. Reforms have to grow up.
11. The future lies with globalization.
12. Is the consumer really the king in India?
13. Globalization versus nationalism
14. Conditional access system for cable TV watchers: boon or bane?
15. If India is poorly governed, the reason is that we have designed our system of governance for

protecting, if not encouraging corruption?
16. Commercialization of health care: Good or Bad?
17. for globalization to succeed in India people must be able to see what is in it for them.
18. Is the US economy headed the Japanese economy way?
19. Economic freedom not old fashioned theories of development will lead to growth and

prosperity.
20. Markets left to themselves encourage greed.
21. for globalization to succeed in India people must be able to see what is in it for them.
22. Should businessmen run the finance ministry
23. Should important services like transport be left to market forces?.
24. Is there any point in having a business strategy when the world changes from month to

month?
25. Is the patents bill good for India?
26. is the business of business only business?
27. Globalization is good for developing countries
28. Public sector being a guarantor of job security is a myth.
29. Is industry less growth here to stay?
30. Capitalism is a very flawed system but the others are so much worse?
31. How can business get rid of the bad name that it has earned?
32. Government pumping money into the economy is not the solution for our economic problems
33. Business ethics are no longer a luxury for corporate but a necessity?
34. How should privatization proceeds be utilized?
35. Is the budgeting exercise of any use?
36. Should agricultural subsidies be stopped?
37. Will Mumbai's film industry ever evolve into a truly modern corporative one?
38. Will market reforms enrich rich states further, while poorer ones lag further?.
39. Why do we lag behind China?
40. Who says MNCs are superior to Indian companies?.
41. Why not use a brand index to measure national prosperity?
42. What we need to reduce scams is better regulatory bodies.
43. War rhetoric is misplaced in a country like India which is trying to globalize its economy.
44. Trade can help the poor?
45. The power ministry should cut off supplies to all the defaulting SEBs.
46. Steal a few lakhs and you're a criminal. Steal a few hundred crores and you become an

industrialist.
47. Should PSUs be divested through strategic sale or public offer? 48. The state is above the

law?
48. Developing countries need trade, not aid.
49. Why do we lag behind China?
50. Capitalism is a very flawed system but the others are so much worse.
51. Flexibility of labor laws is the key to attracting more Foreign Direct Investment.
52. is the business of business only business?

Creative Topics

1.The Wheel is Turning Round and Round.
2. If I was the Finance Minister/Prime Minister.
3. There is no right way to do a wrong thing.
4. Group Task: How can we have Mount Everest in India?
5. Do Beauty and Brains Go Together?
6. When I woke up in the morning I saw…
7.A ship docked in harbor cannot face the storms.
8. up the Down Staircase.
9. Just as we have smoke free zones, we should have child free zones.
10. Marriage is a social trap.

Management Topics

1.Is management an art or a science?
2. The Rush for MBA is really a rush for big money.
3. Ethics in Business are just a passing fashion.
4. The objective of Management is to maximize profits.
5. Do professional managers have a chance in our family run businesses?
6. The Internet is an exercise in hype.
7. Is an MBA necessary to succeed in life?
8. Family owned business vs. professionally run businesses.
9. Smaller businesses and start-ups have more scope for professional growth.
10. Dot com or doubt com?

Social Topics

1.Are Big Dams Necessary?
2.Films are corrupting the Indian Youth
3.A Gandhian State selling liquor is an anomaly
4.Bride burning and dowry may look bad, but are an
integral part of
India.
5.Our Culture is Decaying
6.We are not serious about saving Wildlife/Environment
7.The education system needs serious reforms
8.The impact of MTV on our psyche
9.Showing Violence and Crimes should not be allowed in
films and on
television.
10. Let us legalize gambling

Current Topics

1.A Unipolar World spells disaster for underdeveloped countries like India.
2. Is Globalization Really Necessary?
3. What shall we do about our ever-increasing Population?
4. Corruption is the price we pay for Democracy.
5. Foreign Television Channels are destroying our culture.
6. What India needs is a Dictatorship.
7. with media publishing and telecasting trivia, censorship is the need of the hour.
8. Kaun Banega Krorepati is less about knowledge but more about money and personality.
9. Beauty contests degrade womanhood.
10. The rise of regional blocs threatens independent nations like India.
11. Six billion and one bronze!
12. Is dependence on computers a good thing?
13. Should the public sector be privatized?
14. China and India are similar nations with contrasting ways.
15. Is India a Soft Nation?
16. Value based politics is the need of the hour.
17. Religion should not be mixed with politics.
18. How to deal with high oil prices.
19. Our cricketers are not to blame for match fixing.
20. Why can’t we be world players in industry as we are in software?
21. Multinational corporations: Are they devils in disguise?
22. Should there be limits on artistic freedom (the controversy on Fire).
23. Should there be private universities?
24. Does banning fashion shows and New Year parties save our culture?

Hot Topics:

1.How to deal with international terrorism.
2. Should we pursue our policy of dialogue with Pakistan?
3. Is peace and non-violence outdated concepts?

BPO GD Topics

• Is coalition politics here to stay?
• Does India need a dictator?
• What ails Indian sports?
• Success is all about human relations
• Borderless worlds - Dream or reality?
• Quality is a myth in India
• Will China overtake India in IT
• India - the back office to the world by 2020
• Does Indian IT industry need to focus on products rather than services
• The BPO age - heralding a new employment revolution
• The BPO revolution and its impact on the society
• Education and success - Is there a correlation?
• We don't learn from history, we repeat it
• Do we need a global policeman?
• Indian villages - our strength or our weakness?
• Management Education - Is it necessary to succeed in business
• Kids today are not what they used to be
• Repeated elections - Who should pay for them
• Indian bureaucracy - foundation strengths or colonial hangovers?
• In India, the whole is less than the parts - Do we lack in team spirit?
• "Dot.com" companies - Is there room for everyone?
• Artificial Intelligence - Will man be ever replaced by machines?
• Materialism - Have we sold our souls to the Devil?
• Role of ethics in tobacco industry, liquor industry etc.
• Are we unfit for Democracy?
• Survival tools for the new millennium
• Examinations - has it killed education
• Should doctors be tried in Consumer Courts
• Is E-Commerce the best thing for India

MBA GD Topics

• Is India moving away from a secularist state?
• Education in India - or the lack of it
• What ails Indian sports?
• The Age of Information
• Is Philosophy just an armchair theory?
• Success is all about human relations
• Borderless worlds - Dream or reality?
• Quality is a myth in India.
• Education and success - Is there a correlation?
• We don't learn from history, we repeat it
• Do we need a global policeman
• Indian villages - our strength or our weakness?
• Agrarian Economy in India - boon or bane
• If there were no armies in the world......
• Indian customs - are we in a time warp?
• "How green was my valley........". Is nature paying the price?
• Management Education - Is it necessary to succeed in business
• The role of NGOs in economics and politics
• NGOs - Do they serve peoples interests or are they pressure groups?
• Death of Socialism
• Role of women in development
• Kids today are not what they used to be
• Casteless India - A pipe dream
• Should Trade Unionism be banned in India
• Repeated elections - Should taxpayers pay for it?
• Indian bureaucracy - foundation strengths or colonial hangovers?
• In India, the whole is less than the parts - Do we lack in team spirit?
• Generation X - Drivers of our future or are they our lost souls?
• Do we need a cut in the defense budget?
• "Dot.com" companies - Is there room for everyone?
• Artificial Intelligence - Will man be ever replaced by machines?
• If I were to choose my person of the millennium...
• The entire world is a stage....
• When managers become Hamlets...
• If Patel were our first Prime Minister.......
• Materialism - Have we sold our souls to the Devil?
• You've come a long way, baby - The rise and rise of feminist power.
• Role of ethics in tobacco industry, liquor industry etc.
• Should gambling be legalized in India?
• Are we unfit for Democracy?
• Survival tools for the new millennium
• Examinations - has it killed education
• Cultural Invasion through the air waves
• Should doctors be tried in Consumer Courts
• Abortion and Euthanasia - Is it morally right for society
• Are beauty pageants necessary?
• The relevance of Gandhism today
• India and the WTO
• Did India handle the hijack issue properly?
• Is E-Commerce the best thing for India
• Managerial skills learnt in the classroom can never
match those learnt from experience
• Democracy is hampering India progress
• MBA in India is highly overrated.
• Religion is a private affair and should be of no concern for the state
• Decreasing defense expenditure and increasing social expenditure is the need of the

hour

Current GD Topics

• A Unipolar World spells disaster for underdeveloped countries like India
• Is Globalization Really Necessary?
• What shall we do about our ever-increasing Population?
• Corruption is the price we pay for Democracy
• Foreign Television Channels are destroying our culture
• What India needs is a Dictatorship.
• With media publishing and telecasting trivia, censorship is the need of the hour.
• Kaun Banega Krorepati is less about knowledge but more about money and

personality

• Beauty contests degrade womanhood.
• The rise of regional blocs threatens independent nations like India
• Six billion and one bronze!
• Is dependence on computers a good thing?
• Should the public sector be privatized?
• China and India are similar nations with contrasting ways
• Is India a Soft Nation?
• Value based politics is the need of the hour.
• Religion should not be mixed with politics
• How to deal with high oil prices
• Our cricketers are not to blame for match fixing
• Why cant we be world players in industry as we are in software?
• Multinational corporations: Are they devils in disguise?
• Should there be limits on artistic freedom (the controversy on Fire).
• Should there be private universities?
• Do banning fashion shows and New Year parties save our culture?
• Public sector is more a hindrance than help to promote socialism.
• Economic betterment of the poorer nations is as important as disarmament to ensure

lasting world peace.
• From public sector to privatization as in the U.K., is the right answer for India's

instant economic breakthrough.
• The doctrine of "limited nuclear war" is an ill-convinced, ill- logical, irrational and

extremely dangerous concept.
• Some simple but effective electoral reforms will enable us to retain the present

parliamentary system and ensure the preservation of democracy in India.
• Nuclear war cannot be won and should not be fought.
• Private enterprise and not public sector will contribute to faster and higher economic

growth in India
• Inflation is inevitable in our developing country.
• The policy of reservation is a legacy of the British and it has done more harm than

good.
• For a marketing post graduate, without prior work experience working in a big

marketing firm is a disadvantage when compared with working in a small firm. Discuss.
• Consumerism is destroying the social fabric of Indian culture
• Free market is a prerequisite for growth.
• Cricket as a national obsession is a detriment to other sports.
• To develop India has to empower women.
• .Formulate the government's health policy to control the spread of AIDS.
• Advertising is a waste of resources.
• Privatization will lead to less corruption.
• State is the biggest violator of human rights.
• There can never be a classless society.
• Beauty pageants are a marketing gimmick.
• Voting rights to illiterates in India is illogical because it is widely misused.
• Joint family is a blessing in disguise
• Higher education should be made possible only for those who can pay for it.
• Women cannot successfully combine both career and home
• Women are good managers.
• Executive should be allowed to form unions.
• Effect of liberalization on poverty.
• Indians perform better as individuals rather than in groups.
• Business and ethics go hand in hand, or do they?
• Developing countries should spend more on development than on defense.
• Political parties have outlived their utility.
• Is Swadeshi relevant for India today?
• Money is required to earn more money.
• Foreign trade is necessary for any country to survive
• Presidential Vs Parliamentary form of government of India.
• Technology: The Ism' Of the New Millennium?
• Religion And Politics Should Not Mix
• TRIPS Controversy And The Patent Act Amendment
• Should India Sign The CTBT
• State Interventions In Market Kind Or Mixed Economy
• Science Is A Boon Or Bane.
• Is Swapping Terrorists For Hostages An Encouragement For Plane- Hijackers?
• Nice Guys Finish Last.
• All Work And No Play Makes Jack A Dull Boy
• Individual Freedom And Civil Society
• Conventionalism And Modernity: The Ever going Debate
• Should There Be a Restriction on Permissiveness being propagated by The MTV

Culture and Foreign Media?
• Marxism And Its Future All Over The World
• The Growing Menace Of Casteism And Regionalism
• Presidential Form Of Government Is Needed In India
• Bullet For Bullet: Is It The Right Policy?
• Capitation Fees Should Be Abolished
• Brain-Drain Has To Be Stopped
• Business And Ethics Can't / Don't Go Together
• Are women as good as Men or Inferior?
• Nothing Succeeds Like Success.
• The Malthusian Economic Prophecy Is No Longer Relevant
• Secessionism In The North-East: Who's To Blame?
• Should India Break Diplomatic Ties With Pakistan?
• Age and Youth: Experience And Young Talent
• East Is East & West Is Where All The Action Is': Mark Twain
• Freedom Of _Expression And the State Authority.

Engineering GD Topics

• Is China a threat to the Indian software industry?
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software?
• Govt contribution to IT
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• water resources should be nationalized
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• What is the effect of movies on youth? is it good or bad)
• Are studies more beneficial in India or in Abroad?
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Who’s Responsibility".
• US war on Iraq-justified or not.
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India.
• Can America occupy Iraq
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts?
• A Unipolar World spells disaster for underdeveloped countries like India.
• Is Globalization Really Necessary?
• What shall we do about our ever-increasing Population?
• Corruption is the price we pay for Democracy.
• Foreign Television Channels are destroying our culture.
• What India needs is a Dictatorship.
• With media publishing and telecasting trivia, censorship is the need of the hour.
• Kaun Banega Krorepati is less about knowledge but more about money and

Management Topics

• Is management an art or a science?
• The Rush for MBA is really a rush for big money.
• Ethics in Business are just a passing fashion.
• The objective of Management is to maximize profits.
• Do professional managers have a chance in our family run businesses?
• The Internet is an exercise in hype.
• Is an MBA necessary to succeed in life?
• Family owned business vs. professionally run businesses.
• Smaller businesses and start-ups have more scope for professional growth.
• Dot com or doubt com?

Social GD Topics

• Are Big Dams Necessary?
• Films are corrupting the Indian Youth
• A Gandhian State selling liquor is an anomaly
• Bride burning and dowry may look bad, but are an integral part of India.
• Our Culture is Decaying
• We are not serious about saving Wildlife/Environment
• The education system needs serious reforms
• The impact of MTV on our psyche
• Showing Violence and Crimes should not be allowed in films and on television.
• Let us legalize gambling

General GD Topics

• US war on Iraq-justified or not.
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software?
• Should SONIA Gandhi be made the PM.
• BPOs in INDIA.
• Govt contribution to IT
• Will punch lines rule the Advt.?
• Premarital sex.
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• Water resources should be nationalized.
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• Is it necessary to ban COCO COLA in India?
• What is the effect of movies on youth? is it good or bad)
• Are studies more beneficial in India or in Abroad?
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Who’s Responsibility".
• Is China a threat to the Indian software industry?
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India
• Can America occupy Iraq
• Cricket should be banned or not.
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team.
• Love marriage/Arranged marriage.
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts?

what is Group Discussion

Definition:
A GD is a methodology used by an organization to gauge whether the candidate has certain

personality traits and/or skills that it desires in its members. In this methodology, the group of

candidates is given a topic or a situation, given a few minutes to think about the same, and then

asked to discuss among themselves for 15-20 minutes.
Types of GD:
Normal - A topic is given to the group. The GD coordinator and the students are asked to discuss

it for duration of 15-20 minutes. A variation could be a GD where the students are asked to

decide the topic amongst them. In either case, the students will normally be given a time of 2-3

minutes for preparation before the GD actually starts. The students will be seated in a circular

or a semi-circular pattern.
Case Study- A printed case study is given to the group and the candidates are allowed a time

limit of 3-4 minutes to read and comprehend the passage. Then the group is asked to discuss the

questions based on the case study given. Here again the students are given a time of about 20

minutes to discuss the topic. Case studies normally pertain to standard business situations and

are full of facts and figures. Thus the GD coordinator attempts to examine the comprehension

power of a candidate along with the communication skills.
Role Play - A role-play type of GD is one where a situation is described and each person in the

group is asked to assume a specific role in a situation. In such cases, you must completely step

into the role and your reasoning will have to be consistent with role you have assumed. The

participation, in this specific case, needs to appreciate the gravity of the situation and generate

appropriate reasoning to facilitate decision making for the group.
Factual Topics:-
Factual topics are about practical things, which an ordinary person is aware of in his day-to-day

life. Typically these are about socio-economic topics. These can be current, i.e. they may have

been in the news lately, or could be unbound by time. A factual topic for discussion gives a

candidate a chance to prove that he is aware of and sensitive to his environment.
E.g. The education policy of India, Tourism in India, State of the aged in the nation.

Controversial Topics: -
Controversial topics are the ones that are argumentative in nature. They are meant to generate

controversy. In GDs where these topics are given for discussion, the noise level is usually high,

there may be tempers flying. The idea behind giving a topic like this is to see how much maturity

the candidate is displaying by keeping his temper in check, by rationally and logically arguing

his point of view without getting personal and emotional.
E.g. Reservations should be removed, Women make better managers.
Abstract Topics: -
Abstract topics are about intangible things. These topics are not given often for discussion, but

their possibility cannot be ruled out. These topics test your lateral thinking and creativity.
E.g. A is an alphabet, Twinkle twinkle little star, the number 10
Case-based GDs:-
Another variation is the use of a case instead of a topic.
The case study tries to simulate a real-life situation. Information about the situation will be

given to you and you would be asked as a group to resolve the situation. In the case study there

are no incorrect answers or perfect solutions. The objective in the case study is to get you to

think about the situation from various angles.

Why do we have GD?
To know you as a person and gauge how well you will fit in their institute. The Group discussion

tests how you function as a part of a team. Managers have to work in a team and get best results

out of teamwork. The GD is to check how you behave, participate and contribute in a group, how

much importance do you give to the group objective as well as your own, how well do you listen

to viewpoints of others and how open-minded are you in accepting views contrary to your own.

The aspects which make up a GD are verbal communication, non-verbal behavior, and

conformation to norms, decision-making ability and cooperation.
Reasons for having a GD
• It helps you to understand a subject more deeply.
• It improves your ability to think critically.
• It helps in solving a particular problem.
• It helps the group to make a particular decision.
• It gives you the chance to hear other students' ideas.
• It improves your listening skills.
• It increases your confidence in speaking.
• It can change your attitudes.
How to Face GD
A group discussion consists of:
Communication Skills
The first aspect is one's power of expression. In a group discussion, a candidate has to talk

effectively so that he is able to convince others. For convincing, one has to speak forcefully and

at the same time create an impact by his knowledge of the subject. A candidate who is successful

in holding the attention of the audience creates a positive impact.
It is necessary that you should be precise and clear. As a rule evaluators do not look for the

wordage produced. Your knowledge on a given subject, your precision and clarity of thought are

the things that are evaluated. Irrelevant talks lead you nowhere. You should speak as much as

necessary, neither more nor less. Group discussions are not debating stages.
Ability to listen is also what evaluator’s judge. They look for your ability to react on what other

participants say. Hence, it is necessary that you listen carefully to others and then react or

proceed to add some more points. Your behavior in the group is also put to test to judge whether

you are a loner or can work in a group.
You should be able to convey your thoughts satisfactorily and convincingly before a group of

people. Confidence and level headedness in doing so is necessary.
Knowledge and Ideas Regarding a Given Subject:

Knowledge of the subject under discussion and clarity of ideas are important. Knowledge comes

from consistent reading on various topics ranging from science and technology to politics.

In-depth knowledge makes one confident and enthusiastic and this in turn, makes one sound

convincing and confident.
Leadership and Coordinating Capabilities:

The basic aim of a group discussion is to judge a candidate's leadership qualities. The examiner

becomes a silent spectator once the discussion starts. A candidate should display tactfulness,

skill, understanding and knowledge on varied topics, enterprise, forcefulness and other

leadership qualities to motivate and influence other candidates who may be almost equally

competent.
Exchange of Thoughts:

A group discussion is an exchange of thoughts and ideas among members of a group. These

discussions are held for selecting personnel in organizations where there is a high level of

competition.
The purpose is to get an idea about candidates in a short time and make assessments about their

skills, which normally cannot be evaluated in an interview. These skills may be team

membership, leadership skills, listening and articulation skills.
A note is made of your contributions to the discussion, comprehension of the main idea, the

rapport you strike, patience, assertion, accommodation, amenability, etc. Body language and eye

contact too are important points which are to be considered. .
Addressing the Group as a Whole:

In a group discussion it is not necessary to address anyone by name. Even otherwise you may not

know everyone's names. It better to address the group as a whole.
Address the person farthest from you. If he can hear you everyone else too can. Needless to add,

as for the interview, attend the group discussion in formal dress. The language used should also

be formal, not the language used in normal conversations. Confidence and coolness while

presenting your viewpoint are of help. See that you do not keep repeating a point. Do not use

more words than necessary. Do not be superfluous. Try to be specific. Do not exaggerate.
GD Preparation
Thorough Preparation
the competition is very tough; Only 460 candidates make it to the final list from 2.75 lakhs

civil service aspirants each year.
These tips would help you prepare for GDs:
Reading: This is the first and the most crucial step in preparation. This is a never ending

process and the more you read, the better you are in your thoughts. While you may read anything

to everything, you must ensure that you are in good touch with current affairs, the debates and

hot topics of discussion and also with the latest in the IT and ITES industry. Chances are the

topics would be around these. Read both for the thoughts as well as for data. Also read multiple

view points on the same topic and then create your point of view with rationale. Also create

answers for counter arguments for your point of view.
Mocks: Create an informal GD group and meet regularly to discuss and exchange feedback. This

is the best way to prepare. This would give you a good idea about your thoughts and how well

can you convince. Remember, it is important that you are able to express your thoughts well. The

better you perform in these mocks the better would be you chances to perform on the final day.

Also try to interact and participate in other GD groups. This will develop in you a skill to

discuss with unknown people as well.
Points to Remember
• Knowledge is strength. A candidate with good reading habits has more chances of

success. In other words, sound knowledge on different topics like politics, finance, economy,

science and technology is helpful.
• Power to convince effectively is another quality that makes you stand out among

others.
• Clarity in speech and expression is yet another essential quality.
• If you are not sure about the topic of discussion, it is better not to initiate. Lack of

knowledge or wrong approach creates a bad impression. Instead, you might adopt the wait and

watch attitude. Listen attentively to others, may be you would be able to come up with a point or

two later.
• A GD is a formal occasion where slang is to avoid.
• A GD is not a debating stage. Participants should confine themselves to expressing

their viewpoints.
• Language use should be simple, direct and straight forward.
• Don't interrupt a speaker when the session is on. Try to score by increasing your size,

not by cutting others short.
• Maintain rapport with fellow participants. Eye contact plays a major role. Non-verbal

gestures, such as listening intently or nodding while appreciating someone's viewpoint speak of

you positively.
• Communicate with each and every candidate present. While speaking don't keep

looking at a single member. Address the entire group in such a way that everyone feels you are

speaking to him or her.
Initiate a GD
There are different techniques to initiate a GD and make a good first impression:
I. Quotes.
ii. Definition.
iii. Question.
IV. Shock statement.
v. Facts, figures and statistics.
VI. Short story.
vii. General statement.
~ Quotes
Quotes are an effective way of initiating a GD.
If the topic of a GD is: Should the Censor Board be abolished?, you could start with a quote like,

'Hidden apples are always sweet'.
~ Definition
Start a GD by defining the topic or an important term in the topic.
For example, if the topic of the GD is Advertising is a Diplomatic Way of Telling a Lie, why not

start the GD by defining advertising as, 'Any paid form of non-personal presentation and

promotion of ideas, goods or services through mass media like newspapers, magazines, television

or radio by an identified sponsor'?
~ Question
Asking a question is an impact way of starting a GD.
It does not signify asking a question to any of the candidates in a GD so as to hamper the flow. It

implies asking a question, and answering it yourself.
Any question that might hamper the flow of a GD or insult a participant or play devil's advocate

must be discouraged.
For a topic like, Should India go to war with Pakistan, you could start by asking, 'What does war

bring to the people of a nation? We have had four clashes with Pakistan. The pertinent question

is: what have we achieved?'
~ Shock statement
Initiating a GD with a shocking statement is the best way to grab immediate attention and put

forth your point.
~ Facts, figures and statistics
If you decide to initiate your GD with facts, figure and statistics make sure to quote them

accurately. Approximation is allowed in macro level figures, but micro level figures need to be

correct and accurate. Stating wrong facts works to your disadvantage.
~ Short story
Use a short story in a GD topic like, Attitude is everything.
~ General statement
Use a general statement to put the GD in proper perspective. This will help us reach the

conclusion in a more objective and effective manner.'
Summarization Techniques
Most GDs do not really have conclusions. A conclusion is where the whole group decides in

favour or against the topic.
• Avoid raising new points.
• Avoid stating only your viewpoint.
• Avoid dwelling only on one aspect of the GD.
• Keep it brief and concise.
• It must incorporate all the important points that came out during the GD.
• If the examiner asks you to summarize a GD, it means the GD has come to an end. Do

not add anything once the GD has been summarized.
Some Positive Task Roles in a Group Discussion:
• Initiator
• Information seeker
• Information giver
• Procedure facilitator
• Opinion seeker
• Opinion giver
• Clarifier
• Social Supporter
• Harmonizer
• Tension Reliever
• Energizer
• Compromiser
• Gatekeeper
• Summarizer
Negative Roles to be Avoided
• Disgruntled non-participant
• Attacker
• Dominator
• Patronizer
• Clown
GD FAQ's
What is the normal duration of a GD?
A GD is generally of 15-20 minutes duration.
How many panel members are there to evaluate?
There are usually 3-4 panel members to evaluate.
Is there time given for preparation after the topic is given and before starting the GD?
Usually some time (2-5 minutes) is given to collect one's thoughts, but there could be instances

when this does not happen.
Should I address the panel or the group members?
Don't ever make the mistake of addressing the panel members. The GD is between you and the

other members, not the panel members. You must avoid even looking at the panel members while

the GD is in progress. Just ignore their existence.
What is the seating arrangement like?
It could be semi-circular, or circular, or seating along side a rectangular table, depending upon

the venue.
How should I address the other group members?
If you are initiating the discussion, you could do so by collectively addressing the group as

"Friends". Subsequently, you could use names (if the group has had a round of self-introduction

prior to starting the discussion and you remember the names) or simply use pronouns like "he"

or "she".
Suppose I have a lot to say on the topic, should I say all of it?
The person who talks the most is not necessarily the one who is judged the best. The quality and

not the quantity of your contribution is the success factor.
Should I encourage others to speak up?
Do not directly put someone who is consistently silent on the spot by asking him/her to speak up.

If someone has been trying to speak and has a good point but is cut off constantly, you may

encourage him/her to continue.
Are the group members supposed to keep track of the time or will the panel keep track?
It would be good if you are conscious of the time, but not to the point of getting so distracted

looking at your watch that you do not contribute to the discussion.
Are we allowed to carry a piece of paper during the GD for noting down important points?
Normally you are, but there may be instances when it is specifically forbidden to carry paper.
Is there any particular seating arrangement, which is favorable to the participants?
If participants are asked to sit in a circle or a semi circle, one position is as good as another. But

if you are asked to sit on either side of a rectangular table, then choose a position as close to the

centre as possible.
Should we begin the GD by appointing a leader amongst ourselves?
No. You should not. Leadership in a GD is established implicitly through one's performance in a

GD.
Should we distribute the total time available to all the participants to ensure that everybody

gets a chance to speak?
Since a GD is not a debate or elocution, the participants should not resort to the strategy of

distributing time amongst themselves.
Can we take a definite stand in the GD and then later on during the GD, switch over to another

stand?
Yes, provided you do it the right way. In a GD it is quite likely that some other participant's

counter-argument convinces you to your point. If this happens, then it is best if you accept his

argument and explain to the group how your previous argument was true within a narrow range,

and how the new argument is applicable to a broader range. Naturally, it is safer not to make

any rash statements for or against a topic before you learn the facts of the argument. Blindly

taking a stand will definitely lead you to trouble.
If we do not understand the meaning of the topic, should we ask the moderator to explain it to

us?
No. You cannot. Instead of displaying your ignorance in this manner, it is better to wait for some

other participant to explain the meaning of the topic. So listen to the discussion carefully for the

first few minutes and when you have figured out what the topic is about, start participating in

the discussion.
Should we address the other participants by their names or their assigned numbers?
As far as possible, you should try and avoid names or numbers. It is better to use pronouns such

as "he", "she", "you" etc. while referring to the members of the group.
Are we expected to stick to the normally accepted line of thought or can we come up with

something radical?
By all means you can. It would demonstrate your creativity and originality. Just make sure it is

relevant to the topic.
If I feel strongly about an issue, should I voice my feelings?
It is important to be cool and emotionally objective in a GD. If you react emotionally you are

likely to lose control over yourself during the group discussion. You have to be calm and logical,

not emotional in a GD.
Can I use technical terms or jargon, which is clear to me, but not to the group?
If you have to use technical terms, please do not use abbreviations. After mentioning the term in

full take time out to explain to the group what it means. It is quite likely that other participants

of the group have a different academic background from you, and you should make sure you are

all on a level playing field.
Do I begin my participation by requesting the group's permission to do so?
It is not likely that you will get a chance to ask for such permission. It may also go against you.
What is the right time to enter a GD to ensure that I am heard properly?
In any GD, there are crests and troughs during the discussion. The crest is when the noise level

is at its peak. The trough is when there is almost total silence. Ideally, you should enter the GD

during the trough period. But in competitive GDs, the crests occur more often and troughs may

not occur at all. In such cases, you could identify the stages in the GD, where ideas dear to you

are being discussed and enter the GD irrespective of the noise level.
How do I participate when the noise level is too high?
You could try the following strategy - Identify the most powerful speaker in the group, and note

down the points that he/she is making. The moment the noise level reduces a little, enter

supporting the powerful speaker. You will have made a strong ally who will carry you through

the noise.
Do I have to be cautious about other participants' feelings (on sensitive issues like religion,

caste etc)?
You certainly do. Insensitivity to others displays a lack of maturity and viciousness. It will act

against your favour.
Is it beneficial to be the first speaker in a group discussion?
Being the first speaker is a high risk, high return strategy. If you can make a good opening

statement, which is relevant and sets the tone for the GD, it will go in your favour. If you do this

well, you may automatically become the group leader. However if you bungle, it will be

remembered and will go against your favour.
How critical is my fluency in English to my performance?
Command over English is certainly advantageous but will not compensate for lack of good

content. If your content is good, then even if your English might not be great, you must speak it

out, rather than be inhibited by lack of good English.
How necessary is it to use examples for illustrating an idea?
Use of examples is helpful in elaborating your point, and helping others understand your idea

better. But please remember to keep it short and simple because in a competitive GD nobody has

the patience to listen to long, drawn out examples.
How much or for how long should I participate?
In a 20 minute GD with 10-12 participants, you should try and participate at least 4 times with

each entry lasting at least 25-30 seconds. You could participate more depending on your comfort

level and the need for participation.
Is it good to be humorous in a GD?
Depends on the situation. In a GD that is fairly relaxed, it may be acceptable. But in a

competitive situation, where the participants are tensed up, your attempts at humour may fall

flat.
Should we make an interim summary?
An interim summary is a way of directing the group mid-way through the GD. It helps the group

to pick out and focus on the most important points and thus use the remaining time more

effectively. However it is not necessary to make an interim summary, if the discussion is already

well focused.
What do I do if someone else has already said what I wanted to say?
You have two choices:
1. Agree with the point made by that person and add on to it by displaying the

applicability of the argument to different situations. By doing this you will have broadened the

scope of the argument.
2. Drop the point and think of fresh points.
To avoid getting into a situation where someone else has already spoken your points, do speak

up in the first 4-5 minutes of the GD. If you wait longer, it is almost inevitable that someone

would have spoken your points.
Is the use of slang/colloquialism permitted?
It is best to avoid using slang.
Can I use a language other than English to drive home my point?
No. You will have to stick to English.
How is aggression taken and measured in a GD?
The moment you notice people reacting to you negatively or strongly, you may take it that you

are being too aggressive. The degree of the reaction is the measure of your aggression.
What level of aggression is seen acceptable?
There is a very thin line between aggression and assertiveness. You should always aim to sound

assertive and not stubborn.
Is it true that the person who speaks the most in a GD is the one who is most successful?
This is a myth. Generally the person who has a sound knowledge of the topic and is a clear

thinker speaks more.
Will I be quizzed about my (or others) participation in the GD?
You may be. Therefore it helps to be alert all through the GD.
Is it true that the GD is used more as an elimination technique rather than as a selection tool?
Depends on the institute. In most premier institutes it is used as a selection tool, not as an

elimination technique.
What is the level of accuracy desired in the facts and figures you quote during the GD?
An error margin of 5% is acceptable.
Is motivating other people in the group to speak looked upon favorably?
Depends on how it is done. If you openly request someone to speak, you may be putting the other

person in a difficult spot, and the evaluators will not look that upon favorably. It is therefore

better to use other means of motivation, such as agreeing with a halting speaker, adding on to

their points, implicitly supporting and giving them direction.
Does the moderator have any biases or preconceived notions about the topic?
Ideally the moderator is supposed to be unbiased and neutral. But being a human being, the

moderator cannot be totally free from bias.
Can we expect the moderator to stop or cut short the GD much before the stipulated time is

over?
This may happen if the GD becomes too noisy and if the level of discussion deteriorates

abysmally.
Can I be aggressive with a lady participant?
A GD is not the place to demonstrate chivalry. Being rude to any participant (male or female) is

downright unacceptable. You need not extend any special privileges to a lady.
Is it all right to ask pointed questions to other participants during a GD?
It is alright to ask questions for the purpose of clarification but not for the purpose of playing

the devil's advocate and proving them wrong. By playing the devil's advocate you hamper the

flow of the GD. The pointed questions unsettle the other participant and the quality of the GD

deteriorates. This would reflect badly on you and will go against your favour.
Is it necessary that a group should arrive at a conclusion in the stipulated time?
Ideally a group is supposed to reach a conclusion. Normally the time constraints do not allow the

group to do so.
Is an end-summary absolutely essential?
No. If the group has not reached a conclusion, then it would be good if someone puts the whole

discussion into perspective by summarizing. But if there isn't sufficient time, a summary may be

avoided.
Do we have to write a synopsis of the GD once it is over?
Some institutes insist on this, but it is not universal.
Is voting an acceptable method of reaching a consensus?
Certainly not. A GD is not a debate.
How should a group select a topic if asked to?
The group should brainstorm for about two minutes and narrow down the list of topics to 3-4.

After this the group should prioritize them based on the comfort level and ease of discussion of

the topics. This could be done by asking each participant to rank the 4 topics and the most

popular choice should be taken.
Are the topics decided on the basis of the academic background of the participant?
No. Topics are usually general in nature to give a level playing field to everyone.
What do I do if one member is very stubborn and aggressive?
You could use any of the following methods.
• Ignore him and address the other members of the group.
• Be assertive and tell him that his argument is faulty.
• Point out to him that his point is well taken and that the group must progress further

by discussing the ideas presented by others.
What are the acceptable ways of interrupting somebody else, so that I may make my point?
You can interrupt in any of the following ways:
• "Excuse me, but I feel that what you are saying isn't universally true ..."
• "Yes, I agree with your idea, and I would like to add on to it …"
• "Yes, I think you are right when you say that, but could you clarify what if …"

• How do I take my chance to speak: Trying to interrupt others while speaking would

only harm your chances. Instead, you may try to maintain an eye-contact with the speaker. This

would show your listening skills also and would help you gauge from his eye-movement and pitch

of voice that he is about to close his inputs. You can quickly take it from there. Also, try and link

your inputs with what he has spoken whether you are adding to or opposing his arguments. This

would reflect that you are actually being participative rather than just doing a collective

monologue.
• How to I communicate in a GD: Be crisp and to the point. Be fact based and avoid

making individual opinions that do not have a factual base. Make eye contact with all the

members in the group and avoid looking at the panelists while speaking. The average duration of

the group discussion provides an average of about 2-3 minutes per participant to speak and you

should try to speak about 3-4 times. Hence, you need to be really crisp to reflect the most in

those 30-40 sec. slots.
• How do I convince others and make them agree to my view point: A lot of candidates

make it their mission to make the group reach to a conclusion on the topic. Do not forget that

some of the topics have been eternal debates and there is no way you can get an agreement in 15

mins. on them. The objective is not to make others toe your line but to provide fact based,

convincing arguments which create an impact. Stick to this approach.
• Do leadership skills include moderating the group discussion: This is a myth and many

people do try to impose their order on the GD, ordering people when to speak and when not to.

This only reflects poor leadership. Leadership in a GD would be reflected by your clarity of

thought, ability to expand the topic in its different dimensions, providing an opportunity to a

silent participant to speak, listening to others and probing them to provide more information.
• Listening: This is a key quality assessed during the GD about which many participants

forget. Active listening can fetch you credit points and would also provide you with data to

discuss. Also, if you have an average of 2-3 minutes to speak, the rest of the 20-25 minutes is

required to spend in active listening. For this, maintain eye contact with the speakers, attend to

them (like nodding, using acknowledging words like -I see ok, fine, great etc.). This would also

make you be the centre of attraction as you would appear non-threatening to the speakers.
• Behavior during the GD: Be patient; don't get upset if anyone says anything you object

to. Stay objective and don't take the discussion personally. Also, remember the six C's of

communication - Clarity, Completeness, Conciseness, Confidence, Correctness and Courtesy. Be

appreciative & receptive to ideas from other people and open-minded but do not let others to

change your own viewpoint. Be active and interested throughout. It is better to participate less

if you have no clue of the topic. You may listen to others and take clues from there and speak.

You would be assessed on a range of different skills and you may think that leadership is key,

you need to be careful that you don't dominate the discussion.
• Quality Vs Quantity: Often, participants think that success in group discussions

depends on how much and how loudly they speak. Interestingly, it's the opposite. Also, making

your point on the topic, your views are important and the group needs to know. This will tell you

are knowledgeable and that you participate in groups

Ten Tough Interview Questions and Ten Great Answers

The following are some of the most difficult questions you will face in the course of your job

interviews. Some questions may seem rather simple on the surface--such as "Tell me about

yourself"--but these questions can have a variety of answers. The more open-ended the question,

the wider the variation in the answers. Once you have become practiced in your interviewing

skills, you will find that you can use almost any question as a launching pad for a particular

topic or compelling story.


1. Tell me about yourself.
My background to date has been centered around preparing myself to become the very best _____

I can become. Let me tell you specifically how I've prepared myself . . .

2. Why should I hire you?
Because I sincerely believe that I'm the best person for the job. I realize that there are many

other college students who have the ability to do this job. I also have that ability. But I also

bring an additional quality that makes me the very best person for the job--my attitude for

excellence. Not just giving lip service to excellence, but putting every part of myself into

achieving it. In _____ and _____ I have consistently reached for becoming the very best I can

become by doing the following . . .

3. What is your long-range objective? Where do you want to be 10 or 15 years from now?
Although it's certainly difficult to predict things far into the future, I know what direction I

want to develop toward. Within five years, I would like to become the very best _____ your

company has. In fact, my personal career mission statement is to become a world-class _____ in

the _____ industry. I will work toward becoming the expert that others rely upon. And in doing

so, I feel I will be fully prepared to take on any greater responsibilities that might be presented

in the long term.

4. How has your education prepared you for your career?
As you will note on my résumé, I've taken not only the required core classes in the _____ field,

I've also gone above and beyond. I've taken every class the college has to offer in the field and

also completed an independent study project specifically in this area. But it's not just taking the

classes to gain academic knowledge--I've taken each class, both inside and outside of my major,

with this profession in mind. So when we're studying _____ in _____, I've viewed it from the

perspective of _____. In addition, I've always tried to keep a practical view of how the

information would apply to my job. Not just theory, but how it would actually apply. My capstone

course project in my final semester involved developing a real-world model of _____, which is

very similar to what might be used within your company. Let me tell you more about it . . .

5. Are you a team player?
Very much so. In fact, I've had opportunities in both athletics and academics to develop my skills

as a team player. I was involved in _____ at the intramural level, including leading my team in

assists during the past year--I always try to help others achieve their best. In academics, I've

worked on several team projects, serving as both a member and team leader. I've seen the value

of working together as a team to achieve a greater goal than any one of us could have achieved

individually. As an example . . .

6. Have you ever had a conflict with a boss or professor? How was it resolved?
Yes, I have had conflicts in the past. Never major ones, but certainly there have been situations

where there was a disagreement that needed to be resolved. I've found that when conflict occurs,

it's because of a failure to see both sides of the situation. Therefore, I ask the other person to

give me their perspective and at the same time ask that they allow me to fully explain my

perspective. At that point, I would work with the person to find out if a compromise could be

reached. If not, I would submit to their decision because they are my superior. In the end, you

have to be willing to submit yourself to the directives of your superior, whether you're in full

agreement or not. An example of this was when . . .

7. What is your greatest weakness?
I would say my greatest weakness has been my lack of proper planning in the past. I would

overcommit myself with too many variant tasks, then not be able to fully accomplish each as I

would like. However, since I've come to recognize that weakness, I've taken steps to correct it.

For example, I now carry a planning calendar in my pocket so that I can plan all of my

appointments and "to do" items. Here, let me show you how I have this week planned out . . .

8. If I were to ask your professors to describe you, what would they say?
I believe they would say I'm a very energetic person, that I put my mind to the task at hand and

see to it that it's accomplished. They would say that if they ever had something that needed to be

done, I was the person who they could always depend on to see that it was accomplished. They

would say that I always took a keen interest in the subjects I was studying and always sought

ways to apply the knowledge in real world settings. Am I just guessing that they would say these

things? No, in fact, I'm quite certain they would say those things because I have with me several

letters of recommendation from my professors and those are their very words. Let me show you .

. .

9. What qualities do you feel a successful manager should have?
The key quality should be leadership--the ability to be the visionary for the people who are

working under them. The person who can set the course and direction for subordinates. A

manager should also be a positive role model for others to follow. The highest calling of a true

leader is inspiring others to reach the highest of their abilities. I'd like to tell you about a

person who I consider to be a true leader . . .

10. If you had to live your life over again, what would you change?
That's a good question. I realize that it can be very easy to continually look back and wish that

things had been different in the past. But I also realize that things in the past cannot be

changed, that only things in the future can be changed. That's why I continually strive to

improve myself each and every day and that's why I'm working hard to continually increase my

knowledge in the _____ field. That's also the reason why I want to become the very best _____

your company has ever had. To make positive change. And all of that is still in the future. So in

answer to your question, there isn't anything in my past that I would change. I look only to the

future to make changes in my life.

Important:

• Do not reproduce the answers verbatim.
• Do not repeat the same answer in each and every company, as this might put you in a

tight situation. Research the company well before attending the interview.
• If possible, try to know the area in which you are expected to work and model your

answers accordingly.
• Give a small pause before you start answering a question and also in between your

answers. This conveys a fact to the interviewers that you are thinking before answering, and not

just blurting out the mugged up answers.

If this work of mine has really helped you in any way or if you think this is a very useful

reference tool, please send me an e-mail. I will be looking forward for all those gratitude mails.

BYE.

CHEERS!!!!!!!!

HOW TO CRACK ANY TYPE OF CD PROTECTION

In this tutorial, I’m gonna show you, how to crack any type of CD Protection,
using W32Dasm, and HIEW.

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an

error message.
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . ( -, is the
game you want to crack). Anyway, if you can’t remember it,
write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to

Disassembler ->Open file to Disassemble. A menu will pop up. Select
the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go

for shitting.

OK, it finished its process.
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t

worry, the only thing we have to do, ( If you want, you can change the font), is to click on the

String Data References, the button next to the print button (Strn.REF).
You can see a window which is called String Data Items. Scroll down, and try to
find the game’s error message. When you’ll find it, double click on it, and then,
close the window, to go back to the Win32Dasm text.
As you can see you are somewhere in the CD check routine. This is the message’s
place. Now comes the interesting and difficult part, so, be careful.
We don’t know what all these shits mean, BUT we must know the @ offset of
every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the
OPBAR change its used color to green). You need the number behind the @offset without the h.

Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe.
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved

the game’s exe, we want to crack, and click on the exe. Click F4,
and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on
Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you

will be placed at the number’s place. The cursor is placed on a command.

Before I’ll continue, I want to explain you something. For example, if the command where our

cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes.
OK, if you understood it, you can continue.

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection of the - . Congratulations.

Thursday, July 23, 2009

MICROCONTROLLER BASED PROJECTS

1. FASTEST-FINGER-FIRST USING 89C51
2. MICRO PROCESSOR BASED REVERSIBLE D.C. MOTOR CONTROL
3. MOVING MESSAGE DISPLAY 8085 MICROPROCESSOR
4. PC16F84- BASED CODED DEVICE SWITCHING SYSTEM
5. STEPPER MOTOR CONTROL USING 89C51
6. MIC-89C51 MONITORING SYSTEM
7. MANUAL AT 89C51 PROGRAM
8. AT 89C2051 BASED COUNTDOWN TIMER
9. MICROCONTROLLER BASED CODE LOCK USING AT 89C2051
10. LCD FREQUENCY METER USING 89C2051
11. CALLER ID UNIT USING MICRO-CONTROLLER
12. PIC 18 F 84 MICRO-CONTROLLER BASE CODE DEVICE SWITCH SYSTEM
13. MICROPROCESSOR-BASED HOME SECURITY SYSTEM
14. STEPPER MOTOR CONTROL USING 89C51 MICRO-CONTROLLER
15. MICRO CONTROLLER BASED TEMPERATURE METER
16. MICRO CONTROLLER BASED HEARTBEAT MONITOR
17. RS232 ANOLOG TO DIGITAL CONVERTER USING AT89C51 MCU
18. ULTRASONICRANGEFINDER USING PIC MICRO CONTROLLER
19. CALLER- ID UNIT USING MICRO CONTROLLER

PC Interface Projects

1. PC TO PC COMMUNICATION USING IR/FIBER OPTIC CABLE
2. PWM CONTROL OF DC MOTOR USING C++
3. COMPUTERISED ELECTRICAL APLAINCE CONTROL
4. DATA ACQUISITION CARD FOR P.C.
5. SIMPLE ANALOGUE INTERFACE FOR P.C.
6. P.C. BASED FUNCTION GENERATOR
7. PC BASED SUN SEEKER
8. COMMUNICATION BETWEEN PC’S USING IR, LASER
9. SIMPLE RELAY AND SENSOR INTERFACE FOR P.C.
10. P.C. BASED DIGITAL CLOCK
11. INTERFACE YOUR PC WITH LIGHT AND FANS
12. P.C. BASED VISITOR COUNTER
13. P.C. BASED TOKEN NUMBER DISPLAYER
14. PC BASE TRANSISTOR LEAD IDENTIFIER
15. PC BASED STEPPER MOTOR CONTROLLER
16. PC BASED DC MOTOR SPEED CONTROLLER
17. P.C. BASED 7-SEGMENT ROLLING DISPLAY
18. PC. BASED DC MOTOR SPEED CONTROLLED
19. PC BASED ROBOTIC ARM
20. P.C. BASED TIMER
21. P.C. BASED MULTILEVEL CAR PARKING

Microcontroller Project List

1. DIGITAL COMBINETION LOCK
2. SAFETY GUARD FOR THE BLIND (PROXIMITY BASE)
3. LIGHT COTROLLED DIGITAL FAN REGULATOR
4. LOW-COST ENERGY METER USING ADE 7757
5. HOME AUTOMATION AND SECURITY CONTROL INTERFACE WITH TELEPHONE
6. LINE TRACKING ROBOT/MOUSE
7. REMOT CONTROLLED STEPPER MOTOR
8. ULTRASONIC SWITCH
9. DEVICE SWITCHING USING PASSWORD
10. SPEED CHECKER FOR HIGHWAYS
11. ULTRASONIC PROXIMITY DETECTOR
12. ULTRASONIC MOVEMENT DETECTOR
13. VEHICLE SEED MEASUREMENT CONTROL PC BASED
14. SMART CARD FOR ENTRY EMPLOY
15. SECURITY ACCESS CONTROL SYSTEM
16. RADAR SYSTEM
17. PRI-PAID ENERGY METER
18. PRI-PAID CAR PARKING SYSTEM
19. ULTRASONIC DISTANCE METER
20. DATA SECUIRTY SYSTEM
21. DESIGN OF A BUS STATUS IDENTIFICATION SYSTEM
22. CALLING NUMBER IDENTIFICATION USING CALCULATOR
23. OPTICAL REMOT SWITCH
24. LOAD PROTECTOR WITH REMOTE SWITCHING
25. DISITAL WEIGHT ACCUMULATOR
26. REMOT CONTROLLED LAND ROVER
27. TELEPHONE ANSIRING MATCHING
28. AUTO CAR PARKING
29. AN INTELLIGENT AMBULANCE CAR WHICH CONTROL TO TRAFFIC LIGHT
30. WATCHMAN ROBOT
31. SUN SEEKER
32. AUTO BRAKING SYSTEM
33. TOUCH SCREEN
34. DTMF REMOTE CONTROL SYSTEM
35. AUTOMATIC RAILWAY CROSSING GATE CONTROLLER
36. HOME SECURITY SYSTEM WITH SENDING MESSAGE ON OUR CELL PHONE
37. FASTED FINGER FIRST
38. MOBILE CONTROL ELECTRICAL APPLIANCES
39. RF CONTROL ELECTRICAL APPLIANCES
40. MIND READER
41. DIGITAL COMBINATION LOCK
42. SAFETY GUARD FOR THE BLIND
43. DIGITAL SPEEDOMETER
44. RADIO CONTROLLED REMOTE CONTROL
45. MICRO PROCESSOR-BASED DC MOTOR SPEED CONTROL
46. 31/2 DIGIT VOLTMETER WITH LED
47. 31/2 DIGIT VOLTMETER WITH LCD
48. 31/2 DIGIT THERMOMETER
49. DTMF 5-CHANNEL SWITCHING VIA POWER LINE
50. DEVICE SWITCHING USING PASSWORD
51. LASER-BASED COMMUNICATION LINK
52. VIOCE & DATA COMMUNICATION WITH FIBER LINK
53. BUDGET DIGITAL OSCILLOSCOPE
54. WIRELESS HOME SECURITY
55. BEND STOP FILTER
56. A VERSATILE FUNCTION GENERATOR
57. DIGITAL DOOR BELL
58. TRANSFORMER LESS 12V DUAL POWER SUPPLY
59. INFRARED BURGLAR ALARM WITH TIMER
60. AUTOMATIC VOLTAGE STABILIZER USING AUTOTRANSFORMER
61. DIGITAL CODE LOCK
62. TELEPHONE CALL METER
63. EMERGENCY LIGHT USING CFL
64. WIDE RANG SQUARE WAVE GENERATOR
65. 1 HZ CLOCK GENERATOR
66. REMOTE MUSICAL BELL
67. ELE. TELEPHONE DEMONSTRATOR
68. TELEPHONE CALL COUNTER
69. LED VOLTMETER FOR CAR BATTERY
70. QUALITY FM TRANSMITTER
71. DIGITAL VOLUME CONTROL
72. 99.99 SEC. STOP-CLOCK
73. MULTIPURPOSE DIGITAL COUNTER
74. VERSATILE ON/OFF TIMER
75. SUPER SIMPLE TRIANGULAR TO SINE WAVE GENERATOR
76. DIGITAL FAN REGULATOR
77. TEMPERATURE DISPLAY
78. FREQUENCY GENERATOR
79. SOUND LEVEL INDICATOR FOR STEREO SYSTEM
80. SINGLE-GATE SQUARE WAVE GENERATOR
81. QUICK 741 AND 555 TESTER
82. REGULATE DUAL POWER SUPPLY
83. SENSITIVE FM TRANSMITTER
84. LIGHT CONTROLLED DIGITAL FAN REGULATOR
85. MOVING MESSAGE DISPLAY EPROM BASE
86. PROGRAMMABLE DIGITAL TIME SWITCH
87. PROGRAMMABLE DIGITAL TIMER CUM CLOCK
88. REMOTE CONTROL AUDIO PROCESSOR
89. HEART BEAT MONITOR
90. AROPLANE DIRECTION INDICATOR
91. VOICE TRANSMITTER IN POWER LINE AND SWITCHING
92. A SINGLE-CHIP TIMER WITH DIGITAL CLOCK AND CALENDER
93. IMPEDANCE METER
94. REMOTE AUDIO LEVEL INDICATOR
95. MULTICHANNEL TOUCH SWITCH
96. SAW TOOTH WAVE GENERATOR
97. TEMPERATURE CONTROLLED FAN
98. 1 HZ MASTER OSCILLATOR
99. REMOTE TV TESTER
100. CORDLESS INTERCOM
101. REMOT CONTROLLERED LAND FOVER –A DIY ROBOTIC PROJECT
102. DIGITAL WEIGHT ACCUMULATOR
103. IR- TO- RF CONVERTER
104. FM RECEIVER USING CXA1619
105. HEAT SENSITIVE SWITCH
106. TRANSISTOR TESTER
107. AUTOMETIC SCHOOL BELL
108. DIGITAL STOP WATER
109. INFRARED INTERUPTION COUNTER
110. AUTOMATIC ROOM LIGHT CONTROLLER

ELECTRONICS Project List

1. S.M.S REMOTE CONTROL
2. PC TO PC CONNECTIVITY WITH LASER/INFRARED
3. SMART CARD 1 (P.C CONNECTIVITY)
4. SMART CARD 2
5. F.M JAMMER (5 BANDS JAMMER)
6. VIDEO TRANSMISSION THROUGH LASER
7. VOICE TRANSMISSION THROUGH LASER/INFRARED
8. COMMUNICATION THROUGH OPTICAL FIBRE (VOICE)
9. UC BASED ACCESS CONTROL SYSTEM
10. DTMF REMOTE MONITORING AND CONTROL SYSTEM
11. STEPPER MOTOR CONTROL THROUGH LASER
12. TELEPHONE LINE BASED SWITCHING SYSTEM
13. DIGITAL CODE LOCK
14. TRAFFIC AND STREET LIGHT CONTROLLER
15. L.E.D BASED C.R.O
16. SIMPLE I.C TESTER
17. PORTABLE OZONE GENERATOR
18. REMOTE VIA POWER LINE
19. MAINS FREQUENCY MONITOR
20. D.C MOTOR CONTROLLER
21. FUNCTION GENERATOR
22. S.M.S THROUGH LANDLINE
23. SENSOR & RELAY INTERFACE TO P.C PARALLEL/SERIAL PORT
24. MAINS FREQUENCY METER
25. INFRARED REMOTE CONTROL
26. TELEPHONE CONTROL REMOTE SWITCH
27. MANUAL EPROM PROGRAMMER CUM VERIFIER
28. F.M TRANSMITTER
29. INTERCOM
30. NOISE DETECTOR
31. SECRET CODE TRANSMISSION
32. ROBOTIC HAND
33. UP 8085 BASED ELEVATOR CONTROL SYSTEM
34. uP 8085 BASED WATER LEVEL INDICATOR
35. uP 8085 BASED TRAFFIC LIGHT CONTROL SYSTEM
36. uP 8085 BASED AC/DC MOTOR SPEED CONTROL.
37. uP 8085 BASED STEPPER MOTOR AXIS CONTROL.
38. uP 8085 BASED VISITOR COUNTER.
39. uP 8085 BASED ELECTRICAL APPLIANCES CONTROL
40. uP 8085 BASED UNDER/OVER VOLTAGE CONTROL
41. THERMISTOR INTERFACED WITH UP 8085
42. TEMPERATURE INDICATOR AND CONTROL uP 8085 BASED
43. UP 8085 BASED ELECTRONIC LOCK
44. UP 8085 BASED WAVEFORM GENERATOR
45. UP 8085 BASED REVERSIBLE DC MOTOR CONTROL.
46. FUNCTION GENERATOR (PC INTERFACE)
47. LIFT (PC INTERFACE).
48. LIGHT, FAN CONTROL (PC INTERFACE).
49. RELAY SWITCHING (PC INTERFACE).
50. RELAY SWITCHING TO OPERATE MOTOR (2/3/4)(PC INTERFACE).
51. DATALOGGER ANY EVENT (TURBO C).
52. 4-AXIS STEPPER MOTOR CONTROL (PC INTERFACE).
53. UC BASED HEART BEAT MONITOR.
54. TEMPERATURE INDICATOR CUM CONTROLLER.
55. uC BASED DTMF SWITCHING CONTROL.
56. uC BASED REMOTE TEMPRATURE MONITORING & DATA LOGGING.
57. EPABX SYSTEM.
58. VOICE AND DATA COMMUNICATION THROUGH OPTICAL FIBRE.
59. TEMPERATURE MONITORING SYSTEM.
60. HOME SECURITY SYSTEM.
61. WATER LEVEL MONITORING & CONTROL SYSTEM.
62. ADVANCED TRAFFIC LIGHT IMPLEMENTATION.
63. FLOPPY DISK DRIVE CONTROL SYSTEM.
64. HI-TECH HOME SECURITY SYSTEM.
65. AUTOMATIC BOTTLE FILLING MACHINE CONTROL SYSTEM.
66. DC LAMP CONTROL USING PWM TECHNIQUES.
67. ELECTRONIC WEIGHING SCALE.
68. ELECTRONIC BILLING SYSTEM.
69. IR BASED ROBOTICS CONTROL.
70. RF BASED HOME AUTOMATION SYSTEM
71. FIBER OPTICS BASED ELECTRICAL APPLIANCE CONTROL.
72. PASSWORD BASED DOOR SECURITY SYSTEM.
73. SMART CARD BASED HOME SECURITY SYSTEM.
74. TELEPHONE BASED HOME AUTOMATION CONTROL.
75. DTMF RECEIVER.
76. TELEPHONE BASED HOME SECURITY SYSTEM.
77. TELEPHONE BASED TEMPERATURE CONTROL SYSTEM.
78. BATTERY POWER MONITORING SYSTEM.
79. TEMPERATURE BASED FAN CONTROL.
80. ELECTRONIC STABILIZER.
81. AUTOMATIC WASHING MACHINE CONTROLLER.
82. TEMPERATURE CONTROLLED AIR COOLER.
83. AUTOMATIC REFRIGERATOR COOLING SYSTEM.
84. ELECTRONIC HEAT CONTROL OF IRON BOX.
85. ANTENNA POSITION CONTROLLER.
86. POSITION CONTROL OF AC/DC MOTOR.
87. DIGITAL METERS (FREQUENCY A.C).
88. TWO WHEELER SIDE STAND INDICATOR
89. 3- PHASE MAINS MANAGER.
90. CRANE CONTROL SYSTEM.
91. RAIN SENSED VEHICLE VIPER CONTROL.
92. AUTOMATIC FIRE EXTINGUISHER SYSTEM.
93. AUTOMATIC HUMAN SENSED ROOM APPLIANCES.
94. AUTOMATIC WASH BASIN WATER CONTROL.
95. TELEPHONE / WIRELESS OPERATED MOTOR SPEED CONTROL SYSTEM.
96. MOTOR MONITORING SYSTEM.
97. 89C51 BASED TEMPERATURE CONTROLLER.
98. SIMPLE BOILER CONTROL SYSTEM.
99. AUTOMATIC FLOW CONTROL SYSTEM.
100. SIMPLE OBJECT COUNTER.
101. CLOSED LOOP THERMAL CONTROL SYSTEM.
102. PC BASED LIQUID LEVEL MONITORING SYSTEM.
103. DIGITAL POSITION CONTROLLER.
104. DIGITAL VIBRATION INDICATOR.
105. DIGITAL TEMPERATURE INDICATOR USING DIFFERENT THERMOCOUPLES.
106. PRESSURE ON\OFF CONTROLLER.
107. OP-AMP BASED LEVEL ON \OFF CONTROLLER.
108. MCU/MPU BASED ELECTRICAL APPLIANCES CONTROL.
109. MCU/MPU BASED HOME AUTOMATION.
110. MCU/MPU BASED POWER-SAVER AND ROOM MONITORING SYSTEM.
111. MCU/MPU BASED DATA LOGGER FOR PHYSICAL QUANTITIES (TEMP,
PRESSURE ETC).
112. MCU/MPU TO MCU/MPU DATA COMM. USING IR.
113. MCU/MPU TO MCU/MPU DATA COMM. USING DTMF.
114. MCU/MPU TO MCU/MPU DATA COMM. USING LASER.
115. MCU/MPU BASED AUTOMATED JOB FOLLOWER DC DRIVES.
116. MCU/MPU BASED IR TRACKING SYSTEM.
117. MCU/MPU BASED SOLAR LIGHT TRACKER OR SUN-SEEKER.
118. MCU/MPU BASED STEPPER MOTOR SPEED, DIRECTION, ANGLE & POWER
CONTROL.
119. MCU/MPU BASED TELE-REMOTE SWITCHING.
120. MCU/MPU BASED TELE-REMOTE CODE LOCK & RECORD LOGGER.
121. MCU/MPU BASED SEASONAL TIMER FOR DIFFERENT APPLIANCES CONTROL.
122. MCU/MPU BASED WIRELESS MACHINE MONITORING & CONTROL.
123. TELE-REMOTE HOME APPLIANCE CONTROL AND DATA LOGGER BY USING PC.
124. SATELLITE TRACKING SYSTEM.
125. EPROM DUPLICATOR (2732).
126. POWER LINE CARRIER COMMNICATION (PLCC)
127. MULTI STOREY CAR PARKING SYSTEM (2 FLOORS)
128. TRAIN TRACKING SYSTEM
129. LINE TRACER W/ AND W/O PIC MICROCONTROLERS
130. STORAGE AND RETRIEVAL SYSTEM POSITIONING
131. STORAGE AND RETRIEVAL SYSTEM POSITIONING
132. ROBOTIC WELDER GUARDING
133. ROBOTIC WELDER GUARDING
134. TUBE FORMING GUARDING
135. TO GUARD AN AREA AROUND A LIFT USED TO RAISE AND LOWER AUTO
BODIES
136. CLEAR BOTTLE DETECTION
137. MEASUREMENT OF RETURNABLE BOTTLES
138. COLOR SORTING
139. CLEAR WEB CUTOFF REGISTRATION
140. PRINT VERIFICATION
141. PRODUCT ORIENTATION INSPECTION
142. BEAM-ARRAY LINEN COUNTING
143. BEVERAGE BOTTLE CAP DETECTION
144. COUNTING INTEGRATED CIRCUIT CHIPS
145. COUNTING REFLECTIVE RINGS
146. STACK HEIGHT VERIFICATION
147. WIRE BREAK DETECTION
148. CENTER DETECTION
149. SMALL PARTS COUNTING
150. PARTS COUNT
151. 2-AXIS CRANE POSITIONING
152. HOPPER LEVEL MONITORING
153. SORTING OF MATERIALS DEPENDING UPON HT. AND WIDTH

Sunday, July 19, 2009

History Of Viruses

part 1

Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.


part 2

This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.

pat 3

This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.

part 4

In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this

part 5

Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

- Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

- The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.

part 6

Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.

part 7

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.