Erase eSignature Form Mobile
Make the most out of your eSignature workflows with airSlate SignNow
Extensive suite of eSignature tools
Robust integration and API capabilities
Advanced security and compliance
Various collaboration tools
Enjoyable and stress-free signing experience
Extensive support
Sign PDF for HR Mobile
Keep your eSignature workflows on track
Our user reviews speak for themselves
Erase eSignature Form Mobile. Investigate the most consumer-helpful knowledge about airSlate SignNow. Deal with your entire document digesting and discussing system digitally. Move from hand-held, papers-based and erroneous workflows to computerized, electronic digital and flawless. It is simple to produce, provide and indication any documents on any product anyplace. Be sure that your essential organization situations don't slip overboard.
Learn how to Erase eSignature Form Mobile. Keep to the simple guideline to get going:
- Build your airSlate SignNow accounts in mouse clicks or log in along with your Facebook or Google bank account.
- Benefit from the 30-day trial offer or go with a pricing strategy that's ideal for you.
- Discover any legitimate format, build on the web fillable types and reveal them safely.
- Use superior functions to Erase eSignature Form Mobile.
- Signal, modify signing order and collect in-person signatures ten times speedier.
- Set up automated alerts and obtain notifications at every move.
Moving your tasks into airSlate SignNow is simple. What comes after is a straightforward method to Erase eSignature Form Mobile, together with tips to maintain your co-workers and lovers for greater collaboration. Empower your workers with all the very best instruments to stay along with organization procedures. Increase efficiency and range your company faster.
How it works
Rate your experience
-
Best ROI. Our customers achieve an average 7x ROI within the first six months.
-
Scales with your use cases. From SMBs to mid-market, airSlate SignNow delivers results for businesses of all sizes.
-
Intuitive UI and API. Sign and send documents from your apps in minutes.
A smarter way to work: —how to industry sign banking integrate
FAQs
-
What is the eligibility criterion for UPSC?
Eligibility Criteria For IAS(i) Age limits :21-32 years as on 1.7.2017. (Upper age limit relaxable for SCs/STs, OBCs and certain other categories as specified in Para 3(ii) of Notice).(ii) Educational Qualifications :Bachelor’s degree of a recognised university with at least one of the subjects namely Animal Husbandry & Veterinary Science, Botany, Chemistry, Geology, Mathematics, Physcs, Statistics and Zoology or a Bachelor's degree in Agriculture, Forestry or in Enginerring or an equivalent qualification (Para 3(iii) of Notice).(more content follows the advertisement below)A D V E R T I S E M E N T(iii) No. of permissible attempts :Four (Seven attemps of OBCs and no limit for SCs/STs (Para 3 (iv) of Notice)(iv) Fee :Rs. 100/- (Rupees one hundred only) (No fee for SCs/STs/Physically disabled only)Instructions to candidates for filling up the Application Form for the Indian Forest Service Examination, 2017.Side 1 of Application FormColumn 1 : Examination for which applying Darken the circle against "IFS", in the box pertaining to Name of examination, write IFS starting from the first box on the left. Also write 2017 in the boxes meant for year of examination.Column 2 : FeeIf you have paid the requisite fee of Rs. 100/- (Rupees One hundred only), darken circle 1 and write 1 in the box; or If you have not paid the fee and are claiming fee remission as SC, ST or Physically Handicapped, darken circle 2 and write 2 in the box.N.B. : Fee is payable only in the form of Central Recruitment Fee Stamp, as per instructions against Column 12.Column 3 : (I) Whether Physically Handicapped?If you are not a physically handicapped person, darken circle 1 for No and write 1 in the box; or If you are a physically handicapped person, darken circle 2 for yes and write 2 in the box. (II) If yes, indicate categoryFill up this Column only if your answer to Column 3(I) is yes. If you are Orthopaedically handicapped, darken circle 1 and write 1 in the box; or If you are Blind, darken circle 2 and write 2 in the box; or If you are Deaf-Mute, darken circle 3 and write 3 in the box.Column 4 : Community If you belong to SC, darken circle 1 and write 1 in the box; or If you belong to ST, darken circle 2 and write 2 in the box; or If you belong to OBC, darken circle 3 and write 3 in the box; or If you belong to General Category (Others), darken circle 4 and write 4 in the box.Note 1 : Candidates belonging to OBCs but comming in the Creamy Layer and thus not being entitled to OBC reservation should indicate their community as "General Category (Others) Code No. 4". Note 2 : Candidates belonging to neither SC, ST, nor OBC communities should write Code No. 4 (General Category) against the Column for Community and not leave it blank. Note 3 : No change in the community status indicated by a candidate in his/her application form for the Examination will ordinarily be allowed by the Commission at a subsequent stage.Column 5 : Sex If you are Male, darken circle 1 and write 1 in the box; or If you are Female, darken circle 2 and write 2 in the box;Column 6 : NationalityIf you are an Indian national, darken circle 1 and write 1 in the box; or If you are not an Indian national, darken circle 2 and write 2 in the box.Column 7 : Name of the candidate For filling up this column, first write in the boxes your full name (in English) in capital letters exactly as recorded in your Matriculation/High School/Secondary or equivalent examination certificate. Write a single letter in a box. Leave a box blank between any two parts of the name. Then darken the corresponding circle below each letter. Do not darken a circle below a blank box. Do not overshoot the boxes. Abbreviate name only if necessary. Do not use any prefix such as shri, Kum., Dr. etc with your name. See sample filled up form in the brochure for guidance.Column 8 : Date of Birth Darken the appropriate circles for the day, month and year of your birth as recorded in your Matriculation/High School/Secondary or equivalent examination certificate. Then write in the boxes using numerals 01 to 31 for day; numerals 01 to 12 for month and the last two digits for the year of birth. See sample filled up form in the brochure for guidance.Column 9 : Father’s Name Write your father’s name (in English) in capital letters. Write a single letter in each box. Leave a box blank between any two parts of the name. Do not use any prefix such as Shri, Dr. etc.Column 10 : Address Write your complete mailing address including your name in English capital letters or Hindi within the box provided for the purpose. Also write the PIN Code therein. Write with blue or black ball pen only. Do not write outside the box. Please note that this address will be photocopied as such in all letters to be sent to you and therefore, it should be very clearly and legibly written. If you make any mistake in writing the address, cover the whole box with an exact sized white paper slip and rewrite your address on that.Column 11 : Photograph Paste firmly in the space provided your recent photograph of 4 cm. x 5 cm. size (preferably in Black & white). Do not staple the photograph. Photograph should neither be signed by you nor it should be got attested.Column 12 : Space for CRF StampFee to be paid for the Indian Forest Service Examination is Rs. 100/- (Rupees One hundred only). SC/ST and Physically Handicapped candidates are not required to pay any fee. No fee exemption is however available to OBC candidates and they are required to pay the prescribed full fee.Fee is payable only through Central Recruitment Fee Stamp (Not postage stamps). No other mode of payment is acceptable. Obtain only one single CRF Stamp of Rs. 100/- denomination from the post office and paste it firmly within the box. After pasting the CRF Stamp on the form, get it cancelled from the post office of purchase in the space provided. Do not staple the CRF Stamp.Side 2 of Application FormColumn 13 : (I) Are you residing in a remote area or abroad If you are residing in a remote area specified in Para 6 of the Notice of the Examination or abroad, darken circle 1 against Yes and write 1 in the box; or If you are not residing in a specified remote area/abroad, darken circle 2 against No and write 2 in the box.N.B. : Candidates residing in a remote area specified in the Notice of the Examination or abroad are entitled to one week’s additional time for submission of application form. (II) If yes, indicate area code : Darken the appropriate circles for the area code as given below and then write the same code in the boxes.AreaCodeAreaCodeAssam01Sikkim08Meghalaya02Jammu & Kashmir09Arunachal Pradesh03Lahaul and Spiti District and Pangi Sub Division of Chamba District of Himachal Pradesh10Mizoram04Manipur05Andman & NicobarIsland11Nagaland06Lakshadweep12Tripura07Abroad13Column 14 : Examination Centre Code Choose the Examination Centre from the list given below where you wish to appear and see its code. Darken the appropriate circles and then write the same code in the boxes. Do not indicate more than one centre.List of Centres of ExaminationCentreCodeCentreCodeCentreCodeAgartala45Gangtok42Panaji (Goa)36AhmedabadHyderabad10Patna15Aizawal47Imphal44Port Blair37Allahabad02Itanagar48Raipur49Bangalore03Jaipur11Ranchi41Bareilly54Jammu34Sambalpur53Bhopal04Jorhat46Shillong16Chandigarh35Kochi24Shimla17Chennai12Kohima43Srinagar18Cuttack07Kolkata06Thiruvananthapuram19Dehradun14Lucknow26Tirupati50Delhi08Madurai40Udaipur52Dharwar39Mumbai05Vishakhapatnam51Dispur09Nagpur13Column 15 : Educational Qualification CodeCodes prescribed for educational qualification are as follows :CodeEducational qualification01If you have already passed the requisite qualifying Examination, with prescribed subject;02If you have appeared/appearing at the requisite qualifying Examination, with prescribed subject;Choose the correct code applicable in your case and darken the appropriate circles. Write the same code in the boxes. Note: For prescribed subjects see para 3 (iii) of Notice. Column 16: (I) Whether claiming age relaxation If you are claiming age relaxation, darken circle 1 for Yes and write 1 in the box; or If you are not claiming age relaxation, darken circle 2 for No and write 2 in the box. (II) If Yes, indicate category code Fill up this Column only if your response to Column 16(I) is Yes. Darken the appropriate circles for category codes given below and then write the same code in the boxes. Category - Codes for Claiming Age Relaxation (Refer Para 3(ii) (b) of Commission’s Notice published in the Employment News/Rozgar Samachar)Code No.CategoryExtent of Age Relaxation Permissible01.SC and ST5 years02OBC3 years03Blind, deaf-mute and Orthopaedically handicapped persons.10 years04Blind, deaf-mute and Orthopaedically handicapped persons + SC/ST15 years05Blind, deaf-mute and Orthopaedically handicapped persons + OBC13 years06Defence Services Personnel disabled in operations during hostilities with any foreign country or in a disturbed area and released as a consequence thereof.3 years07Defence Services Personnel(as against Code No. 06) + SC/ST8 years08Defence Services Personnel(as against Code No. 06) + OBC 6 years09Ex-Servicemen including Commissioned offices and ECOs/SSCOs who have rendered at least five years Military Service as on 1st January, 2017 and have been released (i) on completion of assignment (including those whose assignment is due to be completed within one year from 1st January, 2017) otherwise than by way of dismi-ssal or discharge on account of misconduct or inefficiency;or (ii) on account of physical disability attributable to Military Service; or (iii) on invalidment.5 years10Ex-Servicemen including Commissioned Officers and ECOs/SSCOs (as against Code No. 09) + SC/ST10 years11Ex-Servicemen including + OBC Commissioned Officers and ECOs/SSCOs (as against Code No. 09)8 years12ECOs/SSCOs who have completed an initial period of assignment of five years of Military Service as on 1st January,2017 and whose assignment has been extended beyond five years and in whose case the Ministry of Defence issues a certificate that they can apply for civil employment and that they will be released on three months notice on selection from the date of receipt of offer of appointment.5 years13ECOs/SSCOs (as againstCode No. 12) + SC/ST10 years14ECOs/SSCOs (as againstCode No. 12) + OBC8 years15Candidates who had ordinarily been domiciled in the State of Jammu & Kashmir during the period from 1st January, 1980 to 31st December, 19895 years16Candidates who had ordinarily been domiciled in the State of J & K (as against Code No. 15) + SC/ST10 years17Candidates who had ordinarily been domiciled in the State of J & K (as against Code No. 15) + OBC8 years(I) Optional subject Choose any two optional subject from the list given below and see their codes. Darken the appropriate circles and then write the same code in the boxes.(II) No. of attempts already made? Write the number of attempts already made by you in the Indian Forest Services Examination in the boxes and darken the appropriate circles. If no attempt has been made by you earlier, darken circles 00 and write ‘00’ in the boxes.Columns 21 and 22 : Candidates appearing for the Indian Forest Services Examination 2017 are not required to fill any of these columns. They should, therefore, leave these Columns blank.Column 23 : Declaration The candidate must read the declaration carefully before signing. In Sub-para (i), the candidate must fill up the Examination Notice number viz. 06/2017 and date of publication of Notice in Employment News/Rozgar Samachar viz., 05.02.2017 in the spaces provided before the asterisk marks.Column 24 : Signature of candidate Make your usual signature in blue or black ball pen within the box provided. Your signature must not overflow or touch the border of the box provided. Do not merely write your name in capital letters in place of signature. Unsigned applications will be rejected. Also write the place and date of signing the form in the spaces provided for the purpose.Verify the following before mailing the application 1. That you have used the application form purchased from the designated Head Post Offices/Post Offices only.2. That you have filled in all the relevant columns of the application form by blackening the appropriate circles and also writing the corresponding code(s) in boxes. It may be carefully checked that there is no variation between the entries made by you by darkening the circles and those written in the accompanying boxes.3. That you have pasted your recent photograph preferably in black & white (unsigned and unattested) in column 11 of the application form.4. That in case you are required to pay fee, you have affixed a Central Recruitment Fee Stamp of Rs. 100/- denomination in column 12 of the application form and have got it cancelled from the Post Office.5. That you have signed in column 24 of the application form.6. That only one application form and one acknowledgement card is being mailed in the envelope supplied to you with the Brochure and no other enclosure is attached therewith.7. That you have written the name of examination viz., "Indian Forest Service Examination, 2017" on the envelope meant for despatch of application form and acknowledgement card. SPECIAL INSTRUCTIONS FOR CANDIDATESSpecial instructions to Candidates for Conventional type of papersArticles permitted inside Examination Hall Battery-operated pocket calculators of “non-programmable” type only, mathematical/engineering/drawing instruments, including a flat rule divided on the edges into inches and tens of an inch and into centimeters and millimeters, a slide rule, set squares, a protractor and a pair of compasses, pencils, coloured pencils, mapping pens, eraser, T-square and drawing board for use wherever necessary. Candidates are not allowed to bring with them any “Tables or Charts” for use in the Examination Hall.Mobile phones, pagers or any other communication devices are not allowed inside the premises where the examination is being conducted. Any infringement of these instructions shall entail disciplinary action including ban from future examinations. Candidates are advised in their own interest not to bring any of the banned item including mobile phones/pagers to the venue of the examination, as arrangement for safekeeping can not be assured.Tables to be supplied by UPSC If it is considered necessary for answering the questions set in any paper, the Commission may supply any of the following for reference purpose only:-(i) Mathematical/Physical, Chemical and Engineering Tables (including Logarithmic Tables);(ii) Steam Table (including Mollier Diagrams for Temperature up to 800 C and Pressure up to 500 Kgf/Cm);(iii) National Building Code of India 1970 or 1983 Group 2 Part VI;(iv) Any other special articles as may be necessary for the candidates to answer the questions set in the question paper.After conclusion of the examination, return the above items to the Invigilator.Answers to be written in own hand Write the answers in your own hand in ink. Pencil may be used for maps, mathematical drawings or rough work.Check Answer Book The candidate must write his roll number (and not his name) only in the space provided for the purpose on every answer book used by him. Before writing in the answer book, please see that it is complete. In case there are any missing pages, it should be got replaced.Do not tear out any pages from the Answer Book. If you use more than one Answer Book, indicate on the cover of first Answer Book the total number of Answer Books used. Do not leave any blank, unused spaces between answers. If such spaces are left, score them out.Answers in excess of prescribed number will be ignored The candidate must attempt questions strictly in accordance with the directions given on each question paper. If questions are attempted in excess of the prescribed number shall be valued and the remaining answers will be ignored.Questions relating to graph/ récis should be attempted only on graph/ récis sheets to be supplied on demand by the Invigilators. All loose sheets such as récis sheet, drawing papers, graph sheets etc. whether used or not, should be placed inside the answer books and fastened along with the additional answer book(s), if any. Candidates who fail to observe this instruction will be penalized. Do not write your roll number on these sheets.Unfair means strictly prohibited Do not copy from the papers of any other candidate nor allow your papers to be copied nor give nor attempt to give nor obtain nor attempt to obtain irregular assistance of any description. It will be responsibility to every candidate to ensure that his answers are not copied by another candidate. Failure to do so will invite penalty, as may be awarded by the Commission for adoption of unfair means.Conduct in Examination Hall Do not misbehave in any manner or create disorderly scene in the examination hall or harass or bodily harm the staff deployed for the conduct of examination. You will be severely penalized if you attempt to do so.Please read carefully and abide by the instructions printed on the Question Paper and on the Answer Book supplied in the Examination Hall.Source- FREE IAS Exam Preparation
-
Can anyone give information about the Airforce group'y examination, especially negative marking and merit marks?
Indian Air Force Group Y ExamINDIAN AIR FORCE INVITES ONLINE APPLICATIONS FROM UNMARRIED MALE (INDIAN/NEPALEES) CANDIDATES FOR SELECTION TEST FOR INTAKE 01/2019 ON 10 & 11 MARCH 2018 TO JOIN AS AIRMEN IN GROUP X TRADES (EXCEPT EDUCATION INSTRUCTOR TRADE) AND GROUP „Y TRADES {EXCEPT AUTOMOBILE TECHNICIAN, GROUND TRAINING INSTRUCTOR, INDIAN AIR FORCE (POLICE), INDIAN AIR FORCE (SECURITY) AND MUSICIAN TRADES}Indian Air Force Group Y Exam 2018 ELIGIBILITY CRITERIA:-Date of Birth Block -(a) Candidate born between 13 January 1998 and 02 January 2002 (both days inclusive) are eligible to apply.(b) In case, a candidate clears all the stages of the Selection Procedure, then the upper age limit as on date of enrolment is 21 years.Educational Qualification -(a) Group X (Except Education Instructor Trade).(i) Passed Intermediate/10+2/ Equivalent examination with Mathematics, Physics and English with minimum 50% marks in aggregate and 50% marks in English.OR(ii) Passed Three years Diploma Course in Engineering in any stream, as mentioned in the drop down menu of apply online section under candidate's login on the CASB web portal http://www.airmenselection.cdac.in. The candidate should have completed the course from a Government recognized Polytechnic institute with 50% marks in aggregate and 50 % marks in English in diploma or in Intermedidate/Marticulation, if English is not subject in Diploma Course.(b) Group Y {Except Automobile Technician, GTI, IAF (P), IAF(S) and Musician} Trades.Passed Intermediate / 10+2 / Equivalent Examination in any stream/subjects approved by Central / State Education Boards with minimum 50% marks in aggregate and 50% marks in English.(c) Group Y Medical Assistant Trade Only.Passed 10+2/Intermediate/ equivalent exam with Physics, Chemistry, Biology and English with a minimum of 50% marks in aggregate and 50% marks in English.Note–1: Candidate eligible for Group X examination are also eligible for Group Y and would be given an option of appearing in both group X and Group Y exam in one sitting while filling up the online registration form.Note - 2: Diploma holders are eligible to appear for Group X trades only.Note - 3: Education Boards listed in Council of Boards for School Education (COBSE) website as members, as on date of registration will only be permitted.Note - 4: Exact aggregate Percentage of marks before decimal as written in the marks sheet of 10+2/ Intermediate/Equivalent Examination/Three years Diploma Course OR calculated as per the rules of concerned Education Board/Polytechnic Institute will only be considered (For example 49.99% should be taken as 49% and not to be rounded off to 50%).Mandatory Medical Standards:-(a) General Medical Standards for both Group ‘X’ (Except Education Instructor Trade) and Group ‘Y’ {Except Automobile Technician, GTI, IAF (P), IAF(S) and Musician} Trades are as follows: -(i) Height: Minimum acceptable height is 152.5 cms.(ii) Chest: Minimum range of expansion: 5 cm(iii) Weight: Proportionate to height and age. However, minimum weight of 55 Kg required for Operations Assistant (ATS) Trade only.(iv) Corneal Surgery (PRK/LASIK) is not acceptable. (v) Hearing: Candidate should have normal hearing i.e. able to hear forced whisper from a distance of 6 meters with each ear separately.(vi) Dental: Should have healthy gums, good set of teeth and minimum 14 dental points.(vii) Health: Candidate should be free from medical or surgical deformity. He should be free from all communicable diseases and skin ailments. Candidate must be physically and mentally FIT to perform duty in any part of the world, in any climate and terrain.(viii) Body Tattoo: Permanent body tattoos are not permitted, however tattoos only on inner face of the fore arms (inside of elbow to the wrist), back (dorsal) part of the hand/reverse side of palm and Tribals with tattoos which are as per custom and traditions of their tribes may be considered. However, right to decide on acceptability/ unacceptability of the individual rests with the Selection Centre. Candidates with permanent body tattoos are to submit two photographs (close up and distant view) with details of size and type of the Tattoo.(b) Details of medical standards for various Groups/Trades are available on CASB web portal http://www.airmenselection.cdac.inIndian Air Force Group Y Exam Registration / Application FormIndian Air Force Group Y Exam 2018 Application Form / Registration:-Apply online at website:- http://www.airmenselection.cdac.in or http://www.careerindianairforce.... 15 DECEMBER 2017 to 12 JANUARY 2018.Following Certificates are to be uploaded as the case may be:-(a) Class 10/matriculation passing certificate.(b) Intermediate/10+2 or equivalent marksheet/marksheets (if applying on the basis of 12th/ intermediate or equivalent educational qualifications).(c) 3 Yrs Engineering Diploma Final Year Marksheet (if applying on the basis of 3 Yrs Engineering Diploma from a Govt. recognised polytechnic in prescribed stream.(d) Passport size colour photograph of size 10 KB to 50 KB (front portrait in light background without head gear except for Sikhs) recent (taken not before November 2017). The photograph is to be taken with candidate holding a black slate in front of his chest with his Name and Date of Photograph taken, clearly written on it with white chalk in capital letters.(e) Candidate’s left hand thumb impression image (Size 10 KB to 50 KB).(f) Candidate’s signature image (Size 10 KB to 50 KB).(g) Candidate’s parents (Father/Mother/Guardian) signature image (if candidate is below 18 years on the date of filling the online application.(h) The marksheet indicating marks in English subject (if applying on the basis of 3 Yrs Engineering Diploma qualification) in diploma or 12th/10th if English is not a subject in diploma.Examination Fee : Examination fee of Rs.250/-is to be paid by the candidate while registering for the online examination. The payment can be made by using Debit Cards/ Credit Cards/Internet Banking through payment gateway. The examination fee can also be paid by Challan payment at any Axis Bank Branch.Candidate must have his valid E-mail ID and Mobile No. for successful online registration.Candidate should preferably have his Aadhaar Card Number handy.Indian Air Force Group Y Exam Exam DatesIndian Air Force Group Y Exam 2018 Date:-Selection test on 10 & 11 MARCH 2018 to join as Airmen in Group X Trades (except Education Instructor Trade) and Group Y {Except Automobile Technician, GTI, IAF (P), IAF(S) and Musician} Trades..Indian Air Force Group Y Exam SyllabusIAF Group Y Exam 2018 Syllabus:-ENGLISHI. ComprehensionA small passage followed by questions.1. To judge comprehension2. Drawing of inferences3. Use of vocabularyII Composition1. Agreement of subject with verb2. Pattern of verb and their use.3. Sequence of tenses.4. Transformation of sequences-Compound, Complex, Simple, Negative, Affirmative.III Grammar1. Spellings2. Word formation3. Antonyms and Synonyms4. One word substitution5. Correct usage of articles6. Correct usage of Prepositions7. Correct usage of adjectives-degrees of comparison8. Correct usage of conjunctions9. Correct usage of Nouns and Pronouns10. Correct usage of numbers (Singular-Plural)11. Words, which are commonly getting confused12. Word order13. Correct usage of AdverbsIV. Idioms and Phrases1. Use of simple idioms2. Use of Common proverbsV. Direct / Indirect sentences : Narration change1. Change of various types of sentences from direct to indirect form2. Change of various types of sentences from indirect to direct formVI. Active and Passive Voices1. Change of all types of sentences from active topassive form2. Change of all types of sentences from passive to active formREASONING AND GENERAL AWARENESS (RGA)(A) Reasoning (Verbal and Non-Verbal)1. Numerical Series2. Distance and Direction Sense Test3. Mathematical Operations (Assigning Value to Arithmetic Sign)4. Number Ranking & Time Sequence Test5. Assign Artificial Values to Mathematical Digit6. Inserting Correct Mathematical Digit7. Human Relation8. Coding and Decoding9. Odd Man Out10. Mutual Relation Problem11. Tallest Youngest Relation12. Dictionary Words13. Analogy14. Non Verbal Reasoning15. Number Coding16. Number Puzzle(B) Mathematics17. Ratio and proportion18. Average19. LCM, HCF20. Profit and Loss21. Time, Distance and Speed22. Percentage23. Simplification of Numbers24. Fraction25. Area of Triangle, Square and Rectangle26. Surface area and Volume of Cuboid, Cylinder, Cone and Sphere27. Probability28. Simple Trigonometry(C) GK and CA29. General Science30. Civics31. Geography32. Current Events33. History34. Basic Computer OperationPaper PatternIndian Air Force Group Y Exam 2018 Paper Pattern:-Phase – IEligible candidates will be sent Provisional Admit Cards for phase - I of testing on their respective e-mail IDs during the month of February 2018 (which they will download & take colour printout & will carry the same to the examination centre on the day of online test as indicated on their respective Admit Cards) to appear in the Selection Test at the examination centres allotted to them. This provisional admit card can also be downloaded by the candidate under candidates login on CASB web portal http://www.airmenselection.cdac.in. All candidates in possession of provisional admit card will undertake Online Test as per their respective Group applied for, at Centres designated/allotted as per their admit card. Online test will be objective type and questions will be bilingual (English & Hindi) except for English paper. Online test for candidates opting for both Group X&Y shall be conducted in one sitting, on the same system. Candidates are to bring one blue/black pen and original valid ID proof along with them forPhase - I testing. A demonstration video on the conduct of online test is uploaded on the CASB web portal http://www.airmenselection.cdac.in.Details of the Test are as follows: -(a) Group ‘X’ Trades. Duration of the Online test will be 60 minutes and will comprise of English, Physics and Mathematics as per 10+2 CBSE syllabus.(b) Group ‘Y’ {Except Automobile Technician, GTI, IAF (P), IAF(S) and Musician} Trades. Duration of the Online test will be 45 minutes and will comprise of English as per 10+2 CBSE syllabus and Reasoning & General Awareness (RAGA).(c) Both Group ‘X&Y’ Trades. Duration of the Online test will be 85 minutes and will comprise of English, Physics, and Mathematics as per 10+2 CBSE syllabus and Reasoning & General Awareness (RAGA).CANDIDATES ARE TO QUALIFY IN EACH PAPER SEPARATELY IN THEIR RESPECTIVE GROUPS. The result of Phase-I will be uploaded on http://www.airmenselection.cdac.in within 15 days from the date of online exams.Phase – IISoon after the declaration of the result of Phase-I test, all candidates shortlisted for Phase II will be sent a new admit card on their registered e-mail ID for phase - II test at an Airmen Selection Centre. This admit card for phase – II exam can also be downloaded online under candidate’s login on CASB web portal http://www.airmenselection.cdac.in . Candidates have to report at the stipulated date and time for phase – II at the designated Airmen Selection Centre along with following documents:-(a) Colour print out of Admit Card for phase – II.(b) Colour Print out of duly filled application form downloaded on completion of online registration.(c) HB Pencil, Eraser, Sharpener, Glue stick, Stapler and Black/Blue Ball Point Pen for writing.(d) Ten copies of un-attested recent (which was used for the online application registration) passport size colour photograph.(e) Original and four self-attested photocopies of Matriculation Passing Certificate(required for verification of Candidate’s Name, Father’s Name and his Date of Birth).(f) Original and four self-attested photocopies of Matriculation Marks Sheet (only applicable for three years Diploma Course holders when English is not a subject in Diploma Course).(g) Original and four self-attested photocopies of Intermediate/10+2/ Equivalent ExaminationPassing Certificate and Marks Sheet.OROriginal and four self-attested photocopies of Three years Diploma Course Passing Certificate and Marks Sheets of all semesters.(h) Certificate for SOAFP (Son of Air Force Personnel), certificate for sons of serving/retired/ deceased Air Force civilian employees paid out of defence estimates are to be downloaded as the case may be, from the download section of CASB web portal and brought along while reporting for phase –II of the examination.(j) For Candidates discharged from Indian Army/Indian Navy/Any other Government Organisation. Original and four Self-attested photocopies of Discharge Certificate (as issued from Indian Army/Indian Navy/Government Organisation).(k) NOC in original and 4 self-attested photocopies from the employer for candidates presently serving in any government organization (if applicable).(l) Original and four self-attested photocopies of NCC ‘A’, ‘B’ or ‘C’ certificate (if applicable).Note: Candidates discharged from Indian Air Force for any reason are not eligible to appear in the Selection Test.Verification of Eligibility - Candidates should be in possession of the documents mentioned at para 16 above, when appearing for the Selection Test which would be scrutinised/ verified prior to commencement of Phase – II to ascertain the eligibility prima-facie. Detailed verification of all the documents listed at para 16 above will be carried out in respect of candidates who pass Adaptability Test - 1. Candidature of those who do not meet the laid down educational criteria will be rejected during Initial verification of original certificates & mark sheets and also during detailed verification at Airmen Selection Centre (ASC).Note-1: For SOAFP, the Name of the ward and his Date of Birth mentioned in the Discharge Book/ Service Certificate must match with the details mentioned in his matriculation passing certificate.Note-2: Under no circumstances the candidates will be permitted to appear in Phase – II of the Selection Test without Original Educational Marks Sheets/Passing Certificates & Documents mentioned above in paragraph 16 (e) to (k). However, candidates with photocopies of Educational Marks Sheets/ Passing Certificates can be permitted to appear in the Selection Test only on production of a certificate from College/School Principal signNowing that Educational Certificates/Marks sheets are deposited with College/School.Note-3: The original Passing Certificates/Marks Sheets will not be retained by the Selection Centre. The same will be returned to the candidates on completion of detailed verification.Note-4: Internet copy of marksheet not acceptable.Physical Fitness Test (PFT) - Candidates who pass Online Test and are shortlisted as per merit which will be displayed on the CASB Web Portal http://www.airmenselection.cdac.in on a stipulated date will be called at designated Airmen Selection Centre for Physical Fitness Test (PFT) which would consist of 1.6 Km run to be completed within 06 minutes and 30 seconds. Candidates will also have to complete 10 push-ups, 10 sit-ups and 20 squats within the stipulated time to qualify in the Physical Fitness Test. Note: Candidates are advised to bring their sports shoes and shorts/Track pants.Adaptability Test-1 (For both Group ‘ X’ & Group ‘Y’ Trades) All candidates who pass the Physical Fitness Test (PFT) will have to undertake Adaptability Test-1 (objective type written test) which is to assess suitability of a candidate for employment in the IAF which involves deployment in varied geographic terrain, weather and operational conditions.Adaptability Test-2 (For both Group ‘ X’ & Group ‘Y’ Trades). All candidates who passAdaptability Test -1 will have to undertake Adaptability Test-2 as per policy in vogue. Adaptability Test-2 is to select candidates who can adapt to the environment of Indian Air Force and are able to adjust to the military way of life.Note: Candidates qualifying for both Group X and Group Y will be allotted the group according to their merit as well as preference given by the candidate at the time of filling up of online application. However, President, CASB reserves the right to allocate Group to a candidate as per vacancies available. Phase - IIIMedical Examination - Candidates who qualify Adaptability Test-2 will be issued with medical appointment letter at respective ASCs. It can also be downloaded under candidates login on CASB web portal http://www.airmenselection.cdac.in for their medical examination at designated Medical Board Centre (MBC) on specified date. Medical Examination will be conducted by Air Force Medical Team as per IAF medical standards and policy in vogue on subject issue. Medical examination would also include Baseline Investigation of:-(a) Blood Haemogram - Hb, TLC, DLC(b) Urine RE/ME(c) Biochemistry(i) Blood Sugar Fasting & PP (ii) Serum Cholesterol(iii) Urea, Uric acid, Creatinine (iv) LFT—Serum Bilurubin, SGOT, SGPT(d) X- Ray chest (PA view)(e) ECG (R)Note. Candidates are advised to get tartar and stains removed from their teeth before appearing for the Medical Examination. Ears should be free of wax. Candidates should be prepared to stay for the medical test for four to five days under their own arrangement. No TA/DA will be admissible. Candidates using corrective glasses must be in possession of prescription from ophthalmologist bearing stamp and registration number and should not be more than one month old. Passing in the medicals is not a guarantee for the employment in Indian Air Force.I hope this will help you…..ALL THE BEST..
-
What started the Trojan horse?
1971The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.1973In fiction, the 1973 Michael Crichton movie Westworld made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok. Alan Oppenheimer's character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery." (Crichton's earlier work, the 1969 novel The Andromeda Strain and 1971 film were about an extraterrestrial biological virus-like disease that threatened the human race.)1974The Rabbit (or Wabbit) virus, more a fork bomb than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "Rabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally signNowing a threshold and crashing the computer.1975April: ANIMAL is written by John Walker for the UNIVAC 1108. ANIMAL asked a number of questions of the user in an attempt to guess the type of animal that the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damage to existing file or directory structures, and not to copy itself if permissions did not exist or if damage could result. Its spread was therefore halted by an OS upgrade which changed the format of the file status tables that PERVADE used for safe copying. Though non-malicious, "Pervading Animal" represents the first Trojan "in the wild".The novel The Shockwave Rider by John Brunner is published, coining the word "worm" to describe a program that propagates itself through a computer network.1981–19891981A program called Elk Cloner, written for Apple II systems, was created by Richard Skrenta. The Apple II was seen[by whom?] as particularly vulnerable due to the storage of its operating system[clarification needed] on floppy disk. Elk Cloner's design combined with public ignorance[not in citation given] about what malware was and how to protect against it led to Elk Cloner being responsible for the first large-scale[not in citation given] computer virus outbreak in history.1983November: The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" – as suggested by his teacher Leonard Adleman – to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a VAX11/750 system at Lehigh University. The program could install itself in, or infect, other system objects.1984August: Ken Thompson publishes his seminal paper, Reflections on Trusting Trust, in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system, it inserted a backdoor into the login command, and when used to compile itself, it inserted the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code were present in the source code.1986January: The Brain boot sector virus is released. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in Lahore, Pakistan by 19-year-old Pakistani programmer, Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.December: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.1987Appearance of the Vienna virus, which was subsequently neutralized—the first time this had happened on the IBM platform.Appearance of Lehigh virus (discovered at its namesake university), boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.November: The SCA virus, a boot sector virus for Amiga computers appear, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit.December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. It was written in Rexx on the VM/CMS operating system and originated in what was then West Germany. It re-emerged in 1990.1988March 1: The Ping-Pong virus (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at the University of Turin in Italy.June: The CyberAIDS and Festering Hate Apple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files.November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX that are connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.1989October: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason. It infects both executable .COM-files and boot sectors on MS-DOS systems.December: Several thousand floppy disks containing the AIDS Trojan, the first known ransomware, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a post office box in Panama in order to receive a decryption program.1990–19991990Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of polymorphic viruses, the Chameleon family. Chameleon series debuted with the release of 1260.June: The Form computer virus is isolated in Switzerland. It would remain in the wild for almost 20 years and reappear afterwards; during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 per cent of reported infections.1992March: The Michelangelo virus was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped, according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal. John McAfee had been quoted by the media as saying that 5 million computers would be affected. He later said that, pressed by the interviewer to come up with a number, he had estimated a range from 5 thousand to 5 million, but the media naturally went with just the higher number.1993"Leandro" or "Leandro & Kelly" and "Freddy Krueger" spread quickly due to popularity of BBS and shareware distribution.1994April: OneHalf is a DOS-based polymorphic computer virus.1995The first Macro virus, called "Concept", is created. It attacked Microsoft Word documents.1996"Ply" — DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.Boza, the first virus designed specifically for Windows 95 files arrives.Laroux, the first Excel macro virus appears.Staog, the first Linux virus attacks Linux machines1998June 2: The first version of the CIH virus appears. It is the first known virus able to erase flash ROM BIOS content.1999January 20: The Happy99 worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy New Year. It modifies system files related to Outlook Express and Internet Explorer (IE) on Windows 95 and Windows 98.March 26: The Melissa worm was released, targeting Microsoft Word and Outlook-based systems, and creating considerable network traffic.June 6: The ExploreZip worm, which destroys Microsoft Office documents, was first detected.December 30: The Kak worm is a JavaScript computer worm that spread itself by exploiting a bug in Outlook Express.2000–20092000May 5: The ILOVEYOU worm, also known as Love Letter, or VBS, or Love Bug worm, is a computer worm purportedly created by a Filipino computer science student. Written in VBScript, it infected millions of Windows computers worldwide within a few hours of its release. Using social engineering techniques, it is considered to be one of the most damaging worms ever.June 28: The Pikachu virus is believed to be the first computer virus geared at children. It contains the character "Pikachu" from the Pokémon series, and is in the form of an e-mail titled "Pikachu Pokemon" with the message: "Pikachu is your friend." The attachment to the email has "an image of a pensive Pikachu", along with a message stating, "Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND." Along with the image, there is a program, written in Visual Basic 6, called "pikachupokemon.exe" that modifies the AUTOEXEC.BAT file and adds a command for removing the contents of directories C:\Windows and C:\Windows\System at computer's restart. However, a message would appear during startup, asking the user if they would like to delete the contents of those folders. This is because the author, instead of writing the lines “del C:\WINDOWS\*.* /y” and “del C:\WINDOWS\SYSTEM\*.* /y” to AUTOEXEC.BAT, the author did not include the /y switches, which would have automatically chosen the yes option. The operating systems affected by this worm are Windows 95, Windows 98, and Windows ME.2001February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the Microsoft Outlook addressbook. Its creator, Jan de Wit, was sentenced to 150 hours of community service.May 8: The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS.July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares.July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released.August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China.September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.2002February 11: The Simile virus is a metamorphic computer virus written in assembly.Beast is a Windows-based backdoor Trojan horse, more commonly known as a RAT (Remote Administration Tool). It is capable of infecting almost all versions of Windows. Written in Delphi and released first by its author Tataye in 2002, its most current version was released October 3, 2004March 7: Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.2003January 24: The SQL Slammer worm, aka Sapphire worm, Helkern and other names, attacks vulnerabilities in Microsoft SQL Server and MSDE becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth), causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim.April 2: Graybird is a trojan horse also known as Backdoor.Graybird.[28]June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).August 12: The Blaster worm, aka the Lovesan worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers.August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows.August 19: The Sobig worm (technically the Sobig.F worm) spreads rapidly through Microsoft systems via mail and network shares.September 18: Swen is a computer worm written in C++.October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weakpoints by the Blaster and Sobig worms cause massive damage.November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039.November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.2004January 18: Bagle is a mass-mailing worm affecting all versions of Microsoft Windows. There were 2 variants of Bagle worm, Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004.Late January: The MyDoom worm emerges, and currently holds the record for the fastest-spreading mass mailer worm. The worm was most notable for performing a distributed denial-of-service (DDoS) attack on Xinuos | Home, which belonged to The SCO Group.February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business.June 15: Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on F-Secure[33] and Symantec.August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor trojan that infects Windows NT family systems (Windows 2000, Windows XP, Windows 2003).August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehaviour including performance degradation and denial of service with some websites including Google and Facebook.October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.2005August 2005: ZotobOctober 2005: The copy protection rootkit deliberately and surreptitiously included on music CDs sold by Sony BMG is exposed. The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses.Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.2006January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files.February 16: discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.Late March: Brontok variant N was found in late March. Brontok was a mass-email worm and the origin for the worm was from Indonesia.June: Starbucks is a virus that infects StarOffice and OpenOffice.Late September: Stration or Warezov worm first discovered.2007January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30 it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[40] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film.July: Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.2008February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in signNow Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.July 31: The Koobface computer worm targets users of Facebook and Myspace. New variants constantly appear.November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. The French Navy, UK Ministry of Defence (including Royal Navy warships and submarines), Sheffield Hospital network,[48] German Bundeswehr, and Norwegian Police were all affected. Microsoft sets a bounty of US$250,000 for information leading to the capture of the worm's author(s). Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644 patching the server service vulnerability responsible for the spread of Conficker.2009July 4: The July 2009 cyber attacks occur and the emergence of the W32.Dozer attack the United States and South Korea.July 15: Symantec discovered Daprosy Worm. Said trojan worm is intended to steal online-game passwords in internet cafes. It could, in fact, intercept all keystrokes and send them to its author which makes it potentially a very dangerous worm to infect B2B (business-to-business) systems.August 24: Source code for MegaPanzer is released by its author under GPLv3. and appears to have been apparently detected in the wild.2010–present2010January: The Waledac botnet sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.January: The Psyb0t worm is discovered. It is thought to be unique in that it can infect routers and high-speed modems.February 18: Microsoft announced that a BSoD problem on some Windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon Trojan.June 17: Stuxnet, a Windows Trojan, was detected. It is the first worm to attack SCADA systems. There are suggestions that it was designed to target Iranian nuclear facilities. It uses a valid certificate from Realtek.September 9: The virus, called "here you have" or "VBMania", is a simple Trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".September 15: The virus called Kenzero is a virus that spreads online from Peer to peer (P2P) sites taking browsing history.2011SpyEye and Zeus merged code is seen. New variants attack mobile phone banking information.Anti-Spyware 2011, a Trojan horse that attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It actually disables security-related process of anti-virus programs, while also blocking access to the Internet, which prevents updates.Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows Remote Desktop Protocol (RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log into a domain or local system account named 'Administrator' using a number of common passwords.[65] A detailed overview of how the worm works—along with the password dictionary Morto uses—was done by Imperva.July 13: the ZeroAccess rootkit (also known as Sirefef or max++) was discovered.September 1: Duqu is a worm thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS Lab)[67] of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu. Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.2012May: Flame – also known as Flamer, sKyWIper, and Skywiper – a modular computer malware that attacks computers running Microsoft Windows. Used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found".August 16: Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012.September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker's IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim's information. This family of bot is also designed to infect HTML pages with inline frames (iframes), causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.2013September: The CryptoLocker Trojan horse is discovered. Cryptolocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer in order to receive the decryption key. In the following months, a number of copycat ransomware Trojans are also discovered.December: The Gameover ZeuS Trojan is discovered. This type of virus steals one's login details on popular Web sites that involve monetary transactions. It works by detecting a login page, then proceeds to inject a malicious code into the page, keystroke logging the computer user's details.December: Linux.Darlloz targets the Internet of things and infects routers, security cameras, set-top boxes by exploiting a PHP vulnerability.2014November: The Regin Trojan horse is discovered. Regin is a dropper that is primarily spread via spoofed Web pages. Once downloaded, Regin quietly downloads extensions of itself, making it difficult to be detected via anti-virus signatures. It is suspected to have been created by the United States and United Kingdom over a period of months or years, as a tool for espionage and mass surveillance.2015The BASHLITE malware is leaked leading to a massive spike in DDoS attacks.Linux.Wifatch is revealed to the general public. It is found to attempt to secure devices from other more malicious malware.2016February: Ransomware Locky with its over 60 derivatives spread throughout Europe and infected several million computers. At the height of the spread over five thousand computers per hour were infected in Germany alone. Although ransomware was not a new thing at the time, insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections. Unfortunately even up to date antivirus and internet security software was unable to protect systems from early versions of Locky.February: Tiny Banker Trojan (Tinba) makes headlines. Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC and Bank of America. Tiny Banker Trojan uses HTTP injection to force the user's computer to believe that it is on the bank's website. This spoof page will look and function just as the real one. The user then enters their information to log on, at which point Tinba can launch the bank webpage's "incorrect login information" re [1] turn, and redirect the user to the real website. This is to trick the user into thinking they had entered the wrong information and proceed as normal, although now Tinba has captured the credentials and sent them to its host.September: Mirai creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the Internet of Things. Mirai ends up being used in the DDoS attack on 20 September 2016 on the Krebs on Security site which signNowed 620 Gbit/s. Ars Technica also reported a 1 Tbit/s attack on French web host OVH. On 21 October 2016 multiple major DDoS attacks in DNS services of DNS service provider Dyn occurred using Mirai malware installed on a large number of IoT devices, resulting in the inaccessibility of several high-profile websites such as GitHub, Twitter, Reddit, Netflix, Airbnb and many others. The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc., a security firm.2017May: The WannaCry ransomware attack spreads globally. Exploits revealed in the NSA hacking toolkit leak of late 2016 were used to enable the propagation of the malware. Shortly after the news of the infections broke online, a UK cybersecurity researcher in collaboration with others found and activated a "kill switch" hidden within the ransomware, effectively halting the initial wave of its global propagation. The next day, researchers announced that they had found new variants of the malware without the kill switch.June: The Petya (malware) attack spreads globally affecting Windows systems. Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit, similar to the one used in the WannaCry ransomware attack.September: The Xafecopy Trojan attack 47 countries affecting only Android operating systems. Kaspersky Lab identified it as a malware from the Ubsod family, stealing money through click based WAP billing systems.September: A new variety of RAT Trojan, Kedi RAT (Remote Access Trojan) distributed in a Spear Phishing Campaign. The attack targeted Citrix users. The Trojan was able to evade usual system scanners. Kedi Trojan has all characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via gmail using common HTML, HTTP protocols.2018??????????
Trusted esignature solution— what our customers are saying
Get legally-binding signatures now!
Frequently asked questions
How do i add an electronic signature to a word document?
How do you esign financial documents in pdf?
How to scan and sign a multiple page pdf?
Get more for Erase eSignature Form Mobile
- How Can I Electronic signature New Hampshire Real Estate PPT
- How To Electronic signature New Hampshire Real Estate PPT
- Can I Electronic signature New Hampshire Real Estate PPT
- Can I Electronic signature New Hampshire Real Estate Form
- How Do I Electronic signature New Hampshire Real Estate PPT
- How To Electronic signature New Hampshire Real Estate PPT
- How Do I Electronic signature New Hampshire Real Estate PPT
- Help Me With Electronic signature New Hampshire Real Estate PPT
Find out other Erase eSignature Form Mobile
- Brick mason contractor package illinois form
- Roofing contractor package illinois form
- Electrical contractor package illinois form
- Sheetrock drywall contractor package illinois form
- Flooring contractor package illinois form
- Trim carpentry contractor package illinois form
- Fencing contractor package illinois form
- Hvac contractor package illinois form
- Landscaping contractor package illinois form
- Commercial contractor package illinois form
- Excavation contractor package illinois form
- Renovation contractor package illinois form
- Concrete mason contractor package illinois form
- Demolition contractor package illinois form
- Security contractor package illinois form
- Insulation contractor package illinois form
- Paving contractor package illinois form
- Site work contractor package illinois form
- Siding contractor package illinois form
- Refrigeration contractor package illinois form