About Me

My photo
Anantapur, Andhra Pradesh, India
Sanskrithi School of Business, Puttaparthi is affiliated to Jawaharlal Nehru Technological University - Anantapur (JNTUA) has obtained recognition by the AICTE in the year 2010. It is emerging steadily as the leading residential Business School in Andhra Pradesh with International standards. The institution located in the adobe of Bhagawan Sri Sathya Sai Baba, is engaged in nation building on the foundation of ethical and moral values as enunciated by Bhagawan Sri Sathya Sai Baba

Friday 7 December 2012

Model Projects

Dear Students,

The following link contains PDF documents of Marketing and other related projects on Asian Paints, Surf Excel, Dabur 'Vatika', Godrej 'Cinthol', ITC 'Aashirwaad Atta', Maruti 'Esteem', Tata 'Indica' and Hero Honda.


http://www.mediafire.com/file/dv7kt19k193po5h/modelprojectonssbblog.zip


Do not forget to have the password from the HOD.

Wednesday 5 December 2012

MOB 2nd Unit Material

Please refer the following link for MOB material for Unit 2. This information is available only to the students of our Institute. Password for the material can obtained from the Course Co ordinator.

Students from other colleges can download this material by keeping a request to enquiry@sanskrithibschool.com


http://www.mediafire.com/file/bn3f2dfcsibdb6w/Dr._C.K_Sahoo-SSB(JNTU-A)-MBA-MOB-UNIT-2.pdf

Monday 26 November 2012

MOB 1st Unit Material

http://www.mediafire.com/file/66a5hwc9xhiak5y/SSB-MBA-MOB-P1-Unit_1.pdf

Please refer the following link for MOB material for Unit 1. This information is available only to the students of our Institute. Password for the material can obtained from the Course Co ordinator.

Students from other colleges can download this material by keeping a request to enquiry@sanskrithibschool.com

Saturday 13 October 2012

ANAHATA-STIFTUNG.DE FOUNDER VISITS SSB

Sponsor students enjoying the presence of Monika Muller.(Founder:Anahata-Stiftung.De)
Students from left: Praveen, Naveen, Krishna & Nagraj.

Ip Man Legend of the Martial Arts Grandmaster



There is a saying in kung fu that "it is hard for a student to find a good sifu(teacher), but it is even more difficult for a sifu to find a good student" It is also said that there are systems of kung fu that have been lost over the passage of time because the masters could find no worthy student to whom to pass the traditions and heritage.
This could well have been the case for Wing Chun, had Leung Bik, son of the famous Wing Chun Master Leung Jan, not met Ip Man, his only student. Ip Man proved not only to be a great student, but a genius in fulfilling the responsibility of passing the art on to the future generations of masters. It was due to Ip Man's innovations that Wing Chun was able to spread from a little city in Southern China to become one of the most popular and sought after systems of Martial Arts in the world.
Although Chinese Kung Fu has risen in popularity since the time of Bruce Lee, few people know the inside story of Bruce Lee’s master – Ip Man, the leader of the Wing Chun Kung Fu style..
Ip man, often referred to as Yip Man was born on the first of October, 1893 to Yip Oi Dor and Ng Shui in Fo shan, Kwangtung, China, at the end of the Qing Dynasty and was third of four children. He was named Ki Man. He grew up in a very wealthy family. His older brother was Ip Kai Gak. His older sister was Ip Wan Mei and his younger sister was Ip Wan Hum. Ip is the family name which is said first in Chinese culture. Foshan was situated in the most prosperous region of the Zheyleng Delta of Guangdong. He lived on Fook Yin Road in the Mulberry Gardens of Fo Shan. His was a well-known family in that area. Wong Fai hung, Cheung Hung-shing, Leung Jan, Leung Siu-ching were some of the great masters of kung fu who came from Fo shan. So Ip Man, grew up hearing the stories of the exploits of these great kung fu men. It's not surprising that he would develop into one of the greats himself.
Ip Man's education in Wing Chun began as a youth when he became a student of Chan Wah Shun, who was a student of the famous Leung Jan. Chan Wah Shun accepted Ip Man as a student towards the end of his teaching career, when he was quite old. Master Chan was a big man by Chinese standards. So his Kung fu was powerful. Six years later, Master Chan was near death. One of his dying wishes was to have his student Ng Choun Su continue training Ip. Master Yip Man followed the elder fellow-student for three years. The tuition of Master Chan was very high, each student had to pay a few ounces of silver. The common man at the time could not afford such a cost, so Master Chan’s students only numbered in the teens. This is also why Wing Chun is known as the rich person’s kung fu.
At the age of 15 Ip man moved to Hong Kong with help from Leung Fut Ting, a relative. At age sixteen, Ip Man attended school at St. Stephen's College in Hong Kong. It was a secondary school for wealthy families and foreigners who lived in Hong Kong.

According to Ip Man's two sons (Ip Ching and Ip Chun), while at St. Stephen's Ip Man intervened after seeing a foreign police officer beating a woman. The story goes that the police officer tried to strike Ip Man who used his martial arts to strike the officer down, at which point Ip Man and his classmate ran to school. The classmate is said to have told an older man who lived in the same apartment block. Ip Man was invited to see this man and the man asked Ip Man what martial art he studied. Ip told him, but the old man said he would not understand. The man then asked Ip Man to show him his first 2 forms (Sil Lim Tao and Chun Kiu). The man then told Ip Man that his forms were "not too great." Ip Man was then invited to Chi Sau (a form of training that involves controlled attack and defence). Ip Man saw this as an opportunity to prove his Kung Fu was good, but he was beaten after just a few strikes. It turned out that the old man was his master's elder fellow-disciple (and so, by Chinese tradition Ip Man's martial uncle or Sibak), Leung Bik, son of his master's master Leung Jan . After that encounter, Ip Man continued his training lessons from Leung Bik. Master Leung Bik's Wing Chun was much more refined than what Ip Man had leaned from Master Chan. While Chan Wah Shun had been a big man, Leung Bik was much smaller. There also was a pretty wide gap in the education level between the two masters. Chan Wah Shun was nor very well educated, while Leung Bik's father was a well-educated doctor of Chinese medicine. This education was passed to his son. Thus, Leung Bik was better able to understand the underlying principles of the Wing Chun system. This knowledge was passed to Ip Man. By the age of 24, Ip Man had returned to Foshan, his Wing Chun skills tremendously improved.
Upon learning all that Leung Bik had to teach him, Ip Man went on to explore ways to simplify Wing Chun, making it easier to understand. In addition to his education in Wing Chun, Ip Man received an advanced formal education in his youth. He learnt the theories and principles of modern science and could therefore make use of modern technological knowledge, such as mechanical and mathematical theories, to expand the principles of Wing Chun. Ip Man even changed terminology, such as the Five Elements and Eight Diagrams (Ba Gua) that were commonly used in metaphysics. This helped to demystify Wing Chun, thus making it easier for the common student to understand and apply the system.
In Foshan, Ip Man became a policeman. He did not formally run a Wing Chun school, but taught several of his subordinates, his friends and relatives. Kwok Fu and Lun Kai (2 of Ip Man's students and friends) went on to teach students of their own. The art of Wing Chun in the Foshan and Guangdong area was mainly passed down from these two individuals. Ip Man went to Kwok Fu's village house during the Japanese Occupation. He only returned to Foshan after the war, to once again take up the job of a police officer. At the end of 1949, the Chinese Communist party won the Chinese civil war. Ip Man being an officer of the opposing Kuomintang political party, decided to escape to Hong Kong without his family when the Communists had come to Foshan. In Hong Kong, Ip Man opened a Wing Chun martial arts school.

Initially, business was poor because his students typically stayed for only a couple of months. He moved his school twice, to Hoi Tan Street in Sham Shui Po, and then to Lee Tat Street in Yau Ma Tei. By then, some of his students were skilled enough that they were able to start their own schools. Some of Ip Man's students and descendants compared their skills with other martial artists in combat. Their victories over other martial artists helped to boost Ip Man's reputation as a teacher.
During the early years of the Chinese Republic, Fo Shan had a yearly festival called “Autumn Scenes.” One year Yip Man and his wife went to see the festival. While there, an officer of the military tried to take advantage of Mrs.Ip. At the time, Ip was wearing a long gown with cloth shoes. His stature was not tall, and he looked more like a gentleman than a fighter. The officer figured he was weak and helpless, so he became more daring and offensive. Ip Man immediately resorted to the “simultaneous attack and defense” technique of Wing Chun, and the officer was knocked to the floor immediately. The officer then took out his revolver, but Ip Man grabbed its barrel and used the strength of his thumb to break the trigger, rendering it useless.
When the Japanese occupied Fo Shan, the military police caught wind of Yip Man’s reputation and invited him to become their coach. But he refused from the standpoint of righteousness. That angered the Japanese greatly, to the point that they ordered another kung fu master, surnamed Leung, to challenge Master Yip Man. Yip Man accepted only after being asked many times. Master Leung thought his punch was very powerful and used it against Master Yip. Yip Man immediately executed the Wing Chun “Horse Stance and Kwan Sao” to defend himself, and then turned around and kicked Master Leung to the ground. After this occurrence, Yip Man left Fo Shan due to the increased pressure the Japanese placed on him. However, he still continued helping the Chinese government suppress the Japanese. After the Japanese resistance, Master Yip did not teach Wing Chun, but worked at the police department. In order to rid the area of evil and protect the people, Master Yip solved many crimes, including the Fo Shan Sar Ton Fon Street Robbery, and caught the robber in Sing Ping Theater. Master Yip Man continued his position as leader of the military patrol of south Kwang Chow until the collapse of Mainland China.
With the mainland lost, Ip Man left Fo Shan for Hong Kong. There he was introduced to Mr. Lee Min, who later helped Yip establish a Wing Chun school at the Mess Union in Da Nan Street, Kowloon. At the beginning, the followers were Lee Min, Leung Chan, Lou Yue. Later on, Shu Sun Tin and Yip Bue Shing also followed. The students kept increasing to the point that in 1954 Master Yip Man left the Mess Union to establish a kung fu institute at Hia Ten Street, Deep Water Bay, Kowloon. The students kept increasing, so Ip Man moved the institute from Hia Ten Street to Lee Da Street to Lee Jenwou Village to Hing Yip Building. But he did not openly advertise for students. One would have to be introduced or know a follower. Bruce Lee was introduced by Mr. Cheung Jwo Hing to learn Wing Chun when the institute was at Lee Da Street.
In 1967, Ip Man and some of his students established the Hong Kong Ving Tsun Athletic Association.


The way of Yip Man’s instruction depended on every student’s degree of knowledge, natural ability, personal habits, and interests. Yip Mans great innovation was to personalize instruction by making each student’s progress dependent on his own habits and will to succeed. The strength of Yip Man at over seventy was no less than that of a young man. At about a later age, robberies occurred frequently in Hong Kong. One night when Yip Man was taking a walk, two thugs with knives tried to rob him. It only took Yip Man a few kicks to knock them out of the way.
In 1972, Ip Man suffered cancer and subsequently died on the 2nd of December that same year. About 6 weeks before he died he asked his 2 sons and his student Lau Hon Lam to film him performing the Wing Chun system as practice by him. He only managed Sil Lim Tau, Chum Kiu and the Dummy form. This is because he was in a lot of pain and was weak and unsteady on his feet. He was going to do Biu Gee, the Knife form and long pole. However Grandmaster Ip Chun and Ip Ching and Sifu Lau Hong Lam stopped Ip Man because Biu Gee, the knives and full pole form require a lot of energy to perform. Ip Man had many students and worried some of them were adapting the system due to their own incomplete knowledge and felt that filming it was the only way to stop the frauds and cheats.
It is thanks to Master Ip Man that the modern Wing Chun system is so popular. Among the kung fu systems, Wing Chun is considered one of the simplest to learn and understand. The system is known to be direct, simple, economical in application, and highly effective in combat. Master Ip Man's contributions to the evolution of Wing Chun can be credited for building the systems reputation. These innovations demonstrated the intelligence of Ip Man.
Ip Kai Man was one of the first martial arts instructors, or Sifu, to teach the Chinese martial art of Wing Chun Kung Fu openly.









Written by : Debjyoti Ganguly


@copyright protected 2012.

Ethics and Social Responsibility





Contributed by- Rammohan Rao.P
 

PHOTO GALLERY

Reception
 
ChairMan's Office
 
Library
 

Access strip
 
Class Room
 
Cafeteria
 

Cafeteria
 
Computer Lab
 
Computer Lab
 

Computer Lab
 
Computer Lab
 
Computer Lab
 

Audio Visual Theatre
 
Audio Visual Theatre
 
Seminar Hall & Computer Lab

Friday 12 October 2012

JNTU-ANANTAPUR MBA Syllabus For 2009-10

Click here to download

RTI Seminar 2012 at SSB

 
















The Net



  We all know that human being needs 5different elements to survive. No1 is Food , No2 is Water , No3 is Oxygen , No4 is House  and No5 is Clothes. But in 20th century you need 6 elements to survive. Do you know what is the 6th element? It does not matter much whether you are a farmer or a stock broker, if you want to take yourself to the next level then you have to be a slave of internet. Yes the 6th element is[ INTERNET ].
  The Internet is a network that links millions of computers around the world. Not so long ago, few people had heard of the Internet. Today, the Internet has revolutionized how people use computers. Many people depend on it daily to communicate with others and to get the information they need. You don't have to connect your computer to the Internet, but once you do, you'll probably wonder how you lived without it.
           Now a days internet became a daily use product.From online shopping to weather forecast , Railway reservation to 1st day 1st show movie ticket , Divine message to ingredients of a potential Bomb everything what you want you can get by some clicks. Wikipedia, Google, Yahoo, Facebook, Tweeter, Youtube, Photofunia, .net forum we all know about this sites. Just think -  how do u feel if in a fine morning you want to video chat with your girlfriend/boyfriend but you failed to find the facebook server. This invisible net bind us from top to bottom.
Everybody knows about the good side of internet but now I want to tell about the evil side of internet. Unlike all other technology internet also have some bad effect. In 20th century a kid may not know about Rabindranath Tagore but he/she is familiar with the term [ HACKING ].
HACKING : It means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. We all know about fb apps but very few of us know that some apps content secret cookies. Those apps give you a simple innocent looking link and ask you if you want to know your girlfriend’s/boyfriend’s name then click on the link. If you click on the link, Those cookies are so obedient to their master that they will automatically saved in your browser and it will transfer every information about your net banking account, emails, social networking profile to his master without your permission.
Another type of hacking is software hacking. You will create software and one group of people will break the entire security systemof your software by adding some extra “dll” files and make free to all. This same things can happen in the case of Books.
Today the biggest market of pirated product is internet. Whatever you want, new games or upcoming game’s first looks that not yet officially published by the company, new movie that released yesterday, new video album of linking park   you can download, just you must know the right place.
Every one of us use social networking site but nobody reads the security manual. We simple violate the rules and upload our personal photos, videos and information. One wrong click can make your private life a public topic.       One hackerchoose his targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
CLASSIFICATION OF HACKER :Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".These subgroups may also be defined by the legal status of their activities.
UOLOAD & SHARE :What 3rd party software you use to download videos or movies or games or e-books? We all know “torrent” the largest server of information. To download from torrents one special downloader is needed and it is available for free. How much data you download from torrent the downloader software upload that much of data from your hdd without your permission. You can’t even know from which drive and what data the software will upload.
SPYWARE:It is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
CAN I GUESS YOUR PASSWORD:Is your browser secure enough to surf private data. Let’s check how much secure your browser is …. Please follow the steps…….
1-      Open Internet explore
2-      Go to www.gmail.com
3-      Type your mail id and password [ don’t press enter or don’t hit sign in button].
4-      Copy and paste this script into address bar and hit enter.
SCRIPT- javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22[ AXEL BLAZE ]%20Says%20Password%20in%20forms%20on%20this%20page:\n\n%22%20+%20s);%20else%20alert(%22[BADBOY ]%20Says%20There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();
HTTP vs HTTPS : One day my girlfriend just asked me that if the web browser says http:// and not https:// that my security is compromised. Is this true? If you're just browsing the web and not entering any sensitive information, http:// is just fine. However, on pages that you enter your password, credit card number, or other financial information or personal information, you should always look for the https:// prefix. If you don't see the "s," don't enter any information that you want to keep secure. HTTP stands for Hypertext Transfer Protocol. It's the first element you see in any URL and you can think of it as the language used to deliver information over the web. Most web browsers (including Internet Explorer) use an encrypted protocol called Secure Sockets Layer (SSL) to access secure webpages. These pages use the prefix HTTPS. The "s" stands for secure.
LISTOFNOTABLEHACKER GROUPS:
  • Chaos Computer Club, is based in Germany and other German-speaking countries. Famous among older hackers.
  • Masters of Deception, initial membership grew from meetings on Loop-Around Test Lines.
  • w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
  • TESO, was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
  • L0pht, was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
  • Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
  • milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
  • TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
  • Anonymous, a group of hackers originating in 2003.
  • LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
  • Decocidio is an anonymous, autonomous collective of hacktivists which is part of Earth First!!, a radical environmental protest organisation, and adheres to Climate Justice Action

Written By- Indrajit Chowdhury
 ( A creator not a follower )