About Me
- SANSKRITHIBSCHOOL
- Anantapur, Andhra Pradesh, India
- Sanskrithi School of Business, Puttaparthi is affiliated to Jawaharlal Nehru Technological University - Anantapur (JNTUA) has obtained recognition by the AICTE in the year 2010. It is emerging steadily as the leading residential Business School in Andhra Pradesh with International standards. The institution located in the adobe of Bhagawan Sri Sathya Sai Baba, is engaged in nation building on the foundation of ethical and moral values as enunciated by Bhagawan Sri Sathya Sai Baba
Sunday, 14 October 2012
Saturday, 13 October 2012
Ip Man Legend of the Martial Arts Grandmaster
There is a saying in kung fu that "it is hard for a student to find a
good sifu(teacher), but it is even more difficult for a sifu to find a good
student" It is also said that there are systems of kung fu that have
been lost over the passage of time because the masters could find no worthy
student to whom to pass the traditions and heritage.
This could well have been the case for Wing Chun, had
Leung Bik, son of the famous Wing Chun Master Leung Jan, not met Ip Man, his
only student. Ip Man proved not only to be a great student, but a genius in
fulfilling the responsibility of passing the art on to the future generations
of masters. It was due to Ip Man's innovations that Wing Chun was able to
spread from a little city in Southern China to become one of the most popular
and sought after systems of Martial Arts in the world.
Although Chinese Kung Fu has risen in
popularity since the time of Bruce Lee, few people know the inside story of Bruce Lee’s master – Ip Man, the leader of the Wing Chun Kung Fu style..
Ip man, often referred to as Yip Man was born
on the first of October, 1893 to Yip Oi Dor and Ng Shui in Fo shan, Kwangtung,
China, at the end of the Qing Dynasty and was third of four children. He was
named Ki Man. He grew up in a very wealthy family. His older brother was Ip Kai
Gak. His older sister was Ip Wan Mei and his younger sister was Ip Wan Hum. Ip
is the family name which is said first in Chinese culture. Foshan was situated
in the most prosperous region of the Zheyleng Delta of Guangdong. He lived on
Fook Yin Road in the Mulberry Gardens of Fo Shan. His was a well-known family
in that area. Wong Fai hung, Cheung Hung-shing, Leung Jan, Leung Siu-ching were
some of the great masters of kung fu who came from Fo shan. So Ip Man, grew up
hearing the stories of the exploits of these great kung fu men. It's not
surprising that he would develop into one of the greats himself.
Ip Man's education in Wing Chun began as a
youth when he became a student of Chan Wah Shun, who was a student of the
famous Leung Jan. Chan Wah Shun accepted Ip Man as a student towards the end of
his teaching career, when he was quite old. Master Chan was a big man by
Chinese standards. So his Kung fu was powerful. Six years later, Master Chan
was near death. One of his dying wishes was to have his student Ng Choun Su
continue training Ip. Master Yip Man followed
the elder fellow-student for three years. The tuition of Master Chan was very
high, each student had to pay a few ounces of silver. The common man at the
time could not afford such a cost, so Master Chan’s students only numbered in
the teens. This is also why Wing Chun is known as the rich person’s kung fu.
At the age of 15 Ip man moved to Hong Kong
with help from Leung Fut Ting, a relative. At age sixteen, Ip Man attended
school at St. Stephen's College in Hong Kong. It was a secondary school for
wealthy families and foreigners who lived in Hong Kong.
According to Ip Man's two sons (Ip Ching and Ip Chun),
while at St. Stephen's Ip Man intervened after seeing a foreign police officer
beating a woman. The story goes that the police officer tried to strike Ip Man
who used his martial arts to strike the officer down, at which point Ip Man and
his classmate ran to school. The classmate is said to have told an older man
who lived in the same apartment block. Ip Man was invited to see this man and
the man asked Ip Man what martial art he studied. Ip told him, but the old man
said he would not understand. The man then asked Ip Man to show him his first 2
forms (Sil Lim Tao and Chun Kiu). The man then told Ip Man that his forms were
"not too great." Ip Man was then invited to Chi Sau (a form of
training that involves controlled attack and defence). Ip Man saw this as an
opportunity to prove his Kung Fu was good, but he was beaten after just a few
strikes. It turned out that the old man was his master's elder fellow-disciple
(and so, by Chinese tradition Ip Man's martial uncle or Sibak), Leung Bik, son
of his master's master Leung Jan . After that encounter, Ip Man continued his
training lessons from Leung Bik. Master Leung Bik's Wing Chun was much more
refined than what Ip Man had leaned from Master Chan. While Chan Wah Shun had
been a big man, Leung Bik was much smaller. There also was a pretty wide gap in
the education level between the two masters. Chan Wah Shun was nor very well
educated, while Leung Bik's father was a well-educated doctor of Chinese
medicine. This education was passed to his son. Thus, Leung Bik was better able
to understand the underlying principles of the Wing Chun system. This knowledge
was passed to Ip Man. By the age of 24, Ip Man had returned to Foshan, his Wing
Chun skills tremendously improved.
Upon learning all that Leung Bik had to teach
him, Ip Man went on to explore ways to simplify Wing Chun, making it easier to
understand. In addition to his education in Wing Chun, Ip Man received an
advanced formal education in his youth. He learnt the theories and principles
of modern science and could therefore make use of modern technological
knowledge, such as mechanical and mathematical theories, to expand the
principles of Wing Chun. Ip Man even changed terminology, such as the Five
Elements and Eight Diagrams (Ba Gua) that were commonly used in metaphysics.
This helped to demystify Wing Chun, thus making it easier for the common
student to understand and apply the system.
In Foshan, Ip Man became a policeman. He did
not formally run a Wing Chun school, but taught several of his subordinates,
his friends and relatives. Kwok Fu and Lun Kai (2 of Ip Man's students and
friends) went on to teach students of their own. The art of Wing Chun in the
Foshan and Guangdong area was mainly passed down from these two individuals. Ip
Man went to Kwok Fu's village house during the Japanese Occupation. He only
returned to Foshan after the war, to once again take up the job of a police
officer. At the end of 1949, the Chinese Communist party won the Chinese civil
war. Ip Man being an officer of the opposing Kuomintang political party,
decided to escape to Hong Kong without his family when the Communists had come
to Foshan. In Hong Kong, Ip Man opened a Wing Chun martial arts school.
Initially, business was poor because his
students typically stayed for only a couple of months. He moved his school
twice, to Hoi Tan Street in Sham Shui Po, and then to Lee Tat Street in Yau Ma
Tei. By then, some of his students were skilled enough that they were able to
start their own schools. Some of Ip Man's students and descendants compared
their skills with other martial artists in combat. Their victories over other
martial artists helped to boost Ip Man's reputation as a teacher.
During the early years of the Chinese
Republic, Fo Shan had a yearly festival called “Autumn Scenes.” One year Yip Man and his wife went to see the festival. While
there, an officer of the military tried to take advantage of Mrs.Ip. At the
time, Ip was wearing a long gown with cloth shoes. His stature was not tall,
and he looked more like a gentleman than a fighter. The officer figured he was
weak and helpless, so he became more daring and offensive. Ip Man immediately
resorted to the “simultaneous attack and defense” technique of Wing
Chun, and the officer was knocked to the floor
immediately. The officer then took out his revolver, but Ip Man grabbed its
barrel and used the strength of his thumb to break the trigger, rendering it
useless.
When the Japanese occupied Fo Shan, the
military police caught wind of Yip Man’s reputation and invited him to become
their coach. But he refused from the standpoint of righteousness. That angered
the Japanese greatly, to the point that they ordered another kung fu master,
surnamed Leung, to challenge Master Yip Man. Yip
Man accepted only after being asked many times. Master Leung
thought his punch was very powerful and used it against Master Yip. Yip Man
immediately executed the Wing
Chun “Horse Stance and Kwan Sao” to defend
himself, and then turned around and kicked Master Leung to the ground. After
this occurrence, Yip Man left Fo
Shan due to the increased pressure the Japanese placed on him. However, he
still continued helping the Chinese government suppress the Japanese. After the
Japanese resistance, Master Yip did not teach Wing
Chun, but worked at the police department. In
order to rid the area of evil and protect the people, Master Yip solved many
crimes, including the Fo Shan Sar Ton Fon Street Robbery, and caught the robber
in Sing Ping Theater. Master Yip Man continued
his position as leader of the military patrol of south Kwang Chow until the
collapse of Mainland China.
With the mainland lost, Ip Man left Fo Shan
for Hong Kong. There he was introduced to Mr. Lee Min, who later helped Yip
establish a Wing Chun school at the Mess Union in Da Nan Street, Kowloon. At the
beginning, the followers were Lee Min, Leung Chan, Lou Yue. Later on, Shu Sun
Tin and Yip Bue Shing also followed. The students kept increasing to the point
that in 1954 Master Yip Man left the
Mess Union to establish a kung fu institute at Hia Ten Street, Deep Water Bay,
Kowloon. The students kept increasing, so Ip Man moved the institute from Hia
Ten Street to Lee Da Street to Lee Jenwou Village to Hing Yip Building. But he
did not openly advertise for students. One would have to be introduced or know
a follower. Bruce Lee was introduced by Mr. Cheung Jwo Hing to learn Wing
Chun when the institute was at Lee Da Street.
In 1967, Ip Man and some of his students
established the Hong Kong Ving Tsun Athletic Association.
The way of Yip Man’s
instruction depended on every student’s degree of knowledge, natural ability,
personal habits, and interests. Yip Man’s great innovation was to personalize
instruction by making each student’s progress dependent on his own habits and
will to succeed. The strength of Yip Man at over
seventy was no less than that of a young man. At about a later age, robberies
occurred frequently in Hong Kong. One night when Yip Man was taking a walk, two thugs with knives tried to
rob him. It only took Yip Man a few
kicks to knock them out of the way.
In 1972, Ip Man suffered cancer and
subsequently died on the 2nd of December that same year. About 6 weeks before
he died he asked his 2 sons and his student Lau Hon Lam to film him performing
the Wing Chun system as practice by him. He only managed Sil Lim Tau, Chum Kiu
and the Dummy form. This is because he was in a lot of pain and was weak and
unsteady on his feet. He was going to do Biu Gee, the Knife form and long pole.
However Grandmaster Ip Chun and Ip Ching and Sifu Lau Hong Lam stopped Ip Man
because Biu Gee, the knives and full pole form require a lot of energy to
perform. Ip Man had many students and worried some of them were adapting the
system due to their own incomplete knowledge and felt that filming it was the only
way to stop the frauds and cheats.
It is thanks to Master Ip Man that the modern
Wing Chun system is so popular. Among the kung fu systems, Wing Chun is
considered one of the simplest to learn and understand. The system is known to
be direct, simple, economical in application, and highly effective in combat.
Master Ip Man's contributions to the evolution of Wing Chun can be credited for
building the systems reputation. These innovations demonstrated the
intelligence of Ip Man.
Ip Kai Man was one of the first martial arts instructors, or Sifu,
to teach the Chinese martial art of Wing Chun Kung Fu openly.
Written by : Debjyoti Ganguly
@copyright protected 2012.
Friday, 12 October 2012
The Net
We
all know that human being needs 5different elements to survive. No1 is Food ,
No2 is Water , No3 is Oxygen , No4 is House
and No5 is Clothes. But in 20th century you need 6 elements
to survive. Do you know what is the 6th element? It does not matter
much whether you are a farmer or a stock broker, if you want to take yourself to
the next level then you have to be a slave of internet. Yes the 6th
element is[ INTERNET ].
The
Internet is a network that links millions of computers around the world. Not so
long ago, few people had heard of the Internet. Today, the Internet has
revolutionized how people use computers. Many people depend on it daily to
communicate with others and to get the information they need. You don't have to
connect your computer to the Internet, but once you do, you'll probably wonder
how you lived without it.
Now a days internet became a daily
use product.From online shopping to weather forecast , Railway reservation to 1st
day 1st show movie ticket , Divine message to ingredients of a
potential Bomb everything what you want you can get by some clicks. Wikipedia,
Google, Yahoo, Facebook, Tweeter, Youtube, Photofunia, .net forum we all know
about this sites. Just think - how do u
feel if in a fine morning you want to video chat with your girlfriend/boyfriend
but you failed to find the facebook server. This invisible net bind us from top
to bottom.
Everybody
knows about the good side of internet but now I want to tell about the evil
side of internet. Unlike all other technology internet also have some bad
effect. In 20th century a kid may not know about Rabindranath Tagore
but he/she is familiar with the term [ HACKING ].
HACKING : It
means someone who finds
weaknesses in a computer or computer network, though the term can also refer to
someone with an advanced understanding of computers and computer networks. We
all know about fb apps but very few of us know that some apps content secret
cookies. Those apps give you a simple innocent looking link and ask you if you
want to know your girlfriend’s/boyfriend’s name then click on the link. If you
click on the link, Those cookies are so obedient to their master that they will
automatically saved in your browser and it will transfer every information
about your net banking account, emails, social networking profile to his master
without your permission.
Another type of hacking is software hacking. You will create
software and one group of people will break the entire security systemof your
software by adding some extra “dll” files and make free to all. This same
things can happen in the case of Books.
Today the biggest market of pirated product is internet.
Whatever you want, new games or upcoming game’s first looks that not yet
officially published by the company, new movie that released yesterday, new
video album of linking park you can
download, just you must know the right place.
Every one of us use social networking site but nobody reads
the security manual. We simple violate the rules and upload our personal
photos, videos and information. One wrong click can make your private life a
public topic. One hackerchoose his targets using a
two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this
phase. The target may be of particular interest to the hacker, either
politically or personally, or it may be picked at random. Next, they will port
scan a network to determine if it is vulnerable to attacks, which is just
testing all ports on a host machine for a response. Open ports—those that do
respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the
target in some way in hopes of finding out vital information that will help
them access the system. The main way that hackers get desired results from this
stage is from "social engineering", which will be explained below.
Aside from social engineering, hackers can also use a technique called
"dumpster diving". Dumpster diving is when a hacker will literally
search through users' garbage in hopes of finding documents that have been
thrown away, which may contain information a hacker can use directly or
indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary
target that he/she was planning to attack or steal. Many "hackers"
will be caught after this point, lured in or grabbed by any data also known as
a honeypot (a trap set up by computer security personnel).
CLASSIFICATION OF HACKER :Several subgroups of the
computer underground with different attitudes use different terms to demarcate
themselves from each other, or try to exclude some specific group with which
they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary)
advocates that members of the computer underground should be called crackers.
Yet, those people see themselves as hackers and even try to include the views
of Raymond in what they see as one wider hacker culture, a view harshly
rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give
more emphasis to a spectrum of different categories, such as white hat, grey
hat, black hat and script kiddie. In contrast to Raymond, they usually reserve
the term cracker for more malicious activity. According to (Clifford R.D. 2006)
a cracker or cracking is to "gain unauthorized access to a computer in
order to commit another crime such as destroying information contained in that
system".These subgroups may also be defined by the legal status of their
activities.
UOLOAD & SHARE :What 3rd party software you use to download videos
or movies or games or e-books? We all know “torrent” the largest server of
information. To download from torrents one special downloader is needed and it
is available for free. How much data you download from torrent the downloader
software upload that much of data from your hdd without your permission. You
can’t even know from which drive and what data the software will upload.
SPYWARE:It is a type of malware (malicious software) installed on computers that
collects information about users without their knowledge. The presence of
spyware is typically hidden from the user and can be difficult to detect. Some
spyware, such as keyloggers, may be installed by the owner of a shared,
corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests
software that monitors a user's computing, the functions of spyware can extend
beyond simple monitoring. Spyware can collect almost any type of data,
including personal information like Internet surfing habits, user logins, and
bank or credit account information. Spyware can also interfere with user
control of a computer by installing additional software or redirecting Web
browsers. Some spyware can change computer settings, which can result in slow
Internet connection speeds, un-authorized changes in browser settings, or
changes to software settings.
Sometimes, spyware is included along with
genuine software, and may come from an official software vendor. In response to
the emergence of spyware, a small industry has sprung up dealing in
anti-spyware software. Running anti-spyware software has become a widely
recognized element of computer security practices for computers, especially
those running Microsoft Windows. A number of jurisdictions have passed
anti-spyware laws, which usually target any software that is surreptitiously
installed to control a user's computer.
CAN I GUESS YOUR PASSWORD:Is your browser secure enough
to surf private data. Let’s check how much secure your browser is …. Please
follow the steps…….
1- Open Internet explore
3- Type your mail id and password [ don’t press enter or don’t
hit sign in button].
4- Copy and paste this script into address bar and hit enter.
SCRIPT-
javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22[
AXEL BLAZE ]%20Says%20Password%20in%20forms%20on%20this%20page:\n\n%22%20+%20s);%20else%20alert(%22[BADBOY
]%20Says%20There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();
HTTP
vs HTTPS : One day my
girlfriend just asked me that if the web browser says http:// and not https://
that my security is compromised. Is this true? If you're just browsing the web
and not entering any sensitive information, http:// is just fine. However, on
pages that you enter your password, credit card number, or other financial
information or personal information, you should always look for the https://
prefix. If you don't see the "s," don't enter any information that
you want to keep secure. HTTP stands for Hypertext Transfer Protocol. It's the
first element you see in any URL and you can think of it as the language used
to deliver information over the web. Most web browsers (including Internet
Explorer) use an encrypted protocol called Secure Sockets Layer (SSL) to access
secure webpages. These pages use the prefix HTTPS. The "s" stands for
secure.
LISTOFNOTABLEHACKER
GROUPS:
- Chaos Computer Club, is based in Germany and other German-speaking countries. Famous among older hackers.
- Masters of Deception, initial membership grew from meetings on Loop-Around Test Lines.
- w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
- TESO, was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
- L0pht, was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
- Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
- milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
- TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
- Anonymous, a group of hackers originating in 2003.
- LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
- Decocidio is an anonymous, autonomous collective of hacktivists which is part of Earth First!!, a radical environmental protest organisation, and adheres to Climate Justice Action
Written By- Indrajit Chowdhury
( A creator not a follower )
Subscribe to:
Posts (Atom)