Friday 26 August 2016

Tips & Tricks for some HR interview questions


The Following tips and tricks (in images) will guide you regarding the distinction between over smart and smart answers that can be given for several Human Resource interview questions.

Interviews usually take place face to face and in person, although modern communications technologies such as the Internet have enabled conversations to happen in which parties are separated geographically, such as with video conferencing software, and of course telephone interviews can happen without visual contact. Interviews almost always involve spoken conversation between two or more parties, although in some instances a “conversation” can happen between two persons who type questions and answers back and forth. Interviews can range from unstructured or free-wheeling and open-ended conversations in which there is no predetermined plan with prearranged questions, to highly structured conversations in which specific questions occur in a specified order. 

They can follow diverse formats; for example, in a ladder interview, a respondent’s answers typically guide subsequent interviews, with the object being to explore a respondent’s subconscious motives. 

Typically the interviewer has some way of recording the information that is gleaned from the interviewee, often by writing with a pencil and paper, sometimes transcribing with a video or audio recorder, depending on the context and extent of information and the length of the interview. Interviews have a duration in time, in the sense that the interview has a beginning and an ending.















Share:

Thursday 28 July 2016

Design Of Police Siren Using NE555


CLASS WORK PROJECT 

DESIGN OF POLICE SIREN USING NE555 
 
Introduction
A siren is a loud noise making device.
Sirens are mounted in fixed locations and used to warn of natural disasters or attacks.

Sirens are used on emergency service vehicles such as ambulances, police cars and fire tracks

Background
This police siren simulated electronic project uses two 555timers IC to generate a sound similar to a police siren.

A single 556 timer IC which consists of two 555 timers can also be used. In this circuit both of the timers are configured as a stable circuit.

Problem Statement
Due to the need to alert people in case of emergencies such as police vehicles and ambulances.

Significance of the project
The whole idea of the siren was to alert the public about emergency cases. The Siren finds application in police vehicles, ambulances.

General Objective
The general objective of this project was to understand the operation of a siren. By making a run up of the project, theoretical knowledge was transferred into practice and during the hardware implementation, practical skills such as a printed board implementation, circuit testing and soldering were enhanced.

Specific Objective
To design a simple Police siren.

Scope of the study
The project only focuses on producing loud sound which brings about sound pollution to the environment. Some instruments such as bazar where hard to find and  generally expensive.

It took us a lot of time to make a working siren without mistake.

Circuit diagram:


Materials and Quantity 

Capacitors  
100µF    1          
100nF    1   
1µF        1   
10µF      1 

Resistors  
68KΩ     2 
8.2KΩ    2  
1KΩ       1  

Diode  
1BH62    1  

IC    NE555    2  

Buzzer  
64 ohm, 500mW    1  

Battery  
10v    1  

LED  
Red &blue    2

Variable resistor        1  

Print board        1

Jumpers
   
Switch        1    











TUMUSIIME BENON      
SEKITTI HAMIS     
ARYAMANYA EDWIN       
SEGUYA ENOCK      
SISYE GARVIN      
KASAMBA GEORGE     
ANGURIA MAX     
MUTABAZI  ARBAN     
KIBALAMA JOEL    
SITAKU OSCAR     
UMA STEPHEN      
ARIHO LEWIS   
Share:

Series and Parallel Connection Of Bulbs and Socket Outlets

CLASS WORK PROJECT
 
CONNECTION SERIES AND PARALLEL OF BULBS AND SOCKET OUTLETS
 
Introduction
The project is showing 2-lamps in parallel controlled switch, by 2-way switches with intermediate switch, 1-gang, 1-way switch controlling two series connected lamps, single and double socket outlets connected in parallel and single and double socket outlets connected in series.

The project was to test the lighting of bulbs connected in series and the parallel and voltage of socket outlets connected in parallel and in series .

Objectives
  •  To compare the advantages and disadvantages of series over parallel circuit.
  • To demonstrate the operation of two way switches with intermediate switch
  • To equip students with the knowledge of wiring two different wiring system i.e. series and parallel
Challenges
  • There was a problem of lack of enough money to buy all the components
  • Difficulties in designing the circuit diagram since only a list of materials was given
Tools used 
  • Pliers: This was used to hold cables as well as peeling off insulators on cables
  • Hammer: This was used to fix nails into the board  
  • Tester: This was used to test the presence of current in a circuit 
  • Screw driver(flat and star): This was used to loosen and tighten knots
Materials used
  • Bulbs
  • Lamp holders 
  • Junction boxes 
  • Socket outlets 
  • Switches Cables 
  • Clips and nails 
  • Intermediate switch 
  • Power cable
Safety precautions
  •  One should always observe insulation of tools to avoid electric shock
  • Power must be switched off whenever an equipment is being assembled 
  • Do not work alone while working with high voltage electric equipments
  • Chairs and stools should be under the benches when not in use 
  • Wearing a ring or watch can be hazardous in an electric lab since such items make good electrodes for the human body
  • Never touch electrical equipment while standing on a damp or metal floor
Procedure
The main switch was placed in its position and the power cable connected to it
 
The testing of current was done by use of a tester and then plugged out of the power supply
 
Junction boxes were fixed in their rightful position with two on either sides of the main switch and the cables of 1.5mm and 2.5mm were connected to the switches, lamp holders and socket outlets respectively from and in the junction boxes
 
To the right, a single socket outlet and a double outlet were connected to one junction box in parallel and another single socket outlet and double socket outlet were connected to the second junction box in series
 
To the left, one junction box was connected to lamp holders in series with 1gang switch and their circuit closed. Another junction box was connected to lamp holders in parallel and two 2-way switches with an intermediate switch in between them
 
Conclusion 
All the bulbs light but with two bulbs in series blinking
When the intermediate switch is turned off, the 2-way switches do not function or do any task and the bulbs in parallel do not light
The 1gang switch controls both bulbs in series since current flows along only in one path
                                     
              
           

ALIGANYIRWA YOSIA                          
NUWAMANYA ANANIA                         
MUGABE WILSON ROBERT                 
WESENE AMEDI                                    
MUTESI BRENDA                                    
NAMBUYA RECHEAL                            
ASIIMWE ROBERT                                 
TURYAHABWE FRANK                            
MUSHABE AUGUSTUS                           
BWAMBALE JOSEPH                              
KAMUMBERE PAUL                             
Share:

Design Of Dual Power Supply System 5V and 12V Output

CLASS WORK PROJECT DESIGN

DESIGN OF DUAL POWER SUPPLY SYSTEM 5V AND 12V OUTPUT


Introduction

In this chapter we would be discussing the design and implementation of the dual power supply system. Electronic circuits using tubes or transistors required a source of dc. power. For example, in tube amplifiers, d.c. voltage was needed for plate, screen grid and control grid.  Similarly, the emitter and collector bias in a transistor had also to be direct current.  Batteries were rarely used for this purpose as they were costly and required frequent replacement.  In practice, d.c. power for electronic circuits was mostly conveniently obtained from commercial a.c. lines by using rectifier-filter system, called a d.c. power supply. 

The rectifier-filter combination constituted an ordinary d.c. power supply.  The d.c. voltage from an ordinary power supply remained constant so long as a.c. mains voltage or load was unaltered.  However, in many electronic applications, it was desired that d.c. voltage should remain constant irrespective of changes in a.c. mains or load.  Under such situations, voltage regulating devices were used with ordinary power supply.  This constituted regulated d.c. power supply and kept the d.c. voltage at fairly constant value.  
Background
A transformer was used to step down the AC line voltage to a smaller peak voltage Vm, which had to be somewhat larger than the ultimately desired DC output.  A diode circuit rectified the AC signal and a capacitive filter bank was then used to “smooth” or “filter” the rectified sinusoid, producing a waveform with predominant DC component.  Under normal loading conditions there was always some residual periodic variation or “ripple” in the filtered signal.  If the application required very low ripple and constant DC output over a wide range of loading conditions, then an active regulation was required to further reduce or eliminate this residual ripple.  Most active regulator circuits would require a certain minimum input-output voltage differential for proper operation.

Problem statement
To buy two different chargers become expensive to low class living individuals, therefore the team decided to designed a charger that can charge two different d.c components at the same time so such the expenses of buying two chargers is reduce by a quarter or even a half.  

Significance of the project. 
  • The design was not so complex i.e. it required few components.
  • It required less space unless heat sink was used. 
  • Did not generate noise and heat. 
  • Fast transient response meaning that the rate at which the capacitor discharged was fast. 
  • Low cost.
General Objectives  
The general objective of a rectifying circuit was to convert a.c power to d.c power.

Specific Objective  
 To generate a dual power circuit that could supply two different d.c devices that used 5V and 12V at the same time.

Scope of study
To design a dual power supply of 5V and 12V dc with the following specification of both input and output. 
  • A.C input of 230V
  • A.C output of 14V 
  • D.C input of 14V 
  • D.C output of 5V and 12V.

Methodology 

Tools used. 
  • Soldering lead.
  • Power source. 
  • Soldering gun.

Materials used  
  • Step down transformer
  • Diodes 
  • Capacitors. 
  • Voltage regulators 
  • Resistor 
  • LED 
  • Printed board 
  • USB head 
  • Bread board 
  • Jumpers

Bill of quantity 
S/N    Components                            Specification        Qty
1        Step-down transformer          230V/14V, 1A         1   
2        Diodes                                    1N4004                  4  
3        Capacitors                             1000µF                   2   
4        Voltage regulator                   VR7812                  1    
5        Voltage regulator                   VR7805                  1   
6        Resistor                                  1kΩ                        1   
7        LED                                        Red-5V                   1   
8        USB head                               5V                          1  
9        Printed board                         Ea                          1   
10      Jumper                                    Ea                         15   
11      Soldering lead                        Role                      1   

Circuit diagram


Safety precautions. 
  • Avoid touching capacitor before it is completely discharged.
  • The terminals of each components were appropriately marked for correct connection to avoid short circuit. 
  • Avoid connecting components when power is on. 
  • Avoid touching soldering gun when it is connected to the power source.
Procedures
  •  The four diodes were connected as shown to form the rectifying circuit with its input connected to the secondary winding of the transformer while its output connected to the input of power regulators coded VR17812 and VR27805.
  • Each of the input terminals of the two regulators were connected to the ground through capacitor rated 1000µF. 
  • The reference terminal of each of the regulator was connected directly to the ground. 
  • Connectors were connected to the output and ground of VR17812 to generate 12V d.c output. 
  • 1KΩ resistor in series with the LED were connected across the output and ground of VR27805 and connectors were connected to both the output and ground terminal to generate 5V d.c output.
Mode of operation
The above circuit obtains power from a 230V AC mains supply voltage and fed into a step down transformer for transforming higher voltage supply to lower one. The transformer TR1 is of 230V primary, 14V secondary and 1A step down transformer. The stepped down voltage is fed into the bridge rectifier made of four 1N4004 diodes for the conversion of AC supply to DC one. 
The output from the bridge rectifier was filtered by the capacitor C1 and C2 to offer a steady DC level to the input pins of the regulators used in the above circuit. The DC voltage is then fed in to the IC 7805 which is a 5V regulator and also to the IC 7812 which was a 12V regulator. The output obtained from the 7805 & 7012 are 5V and 12V respectively. A LED D5 was connected through the current limiting resistor of 1KΩ to indicate the state of the device.
Schematic 
 


Conclusion
After the components were mounted on the printed board and the circuit was powered through at a step down transformer, the required voltages of 5V and 12V dc were obtained across the terminals.  

Challenges
In the process of designing and construction of the dual power supply, the following problem were encountered, 
  • Most of materials used in the construction of the dual power supply were expensive.
  • There was no enough time given to the students for studying and designing of project which caused a lot of expenses. 
  • The project was new to the students since it was the first electronic project that they have ever studied and we had the problem of determining the terminals of the electronic components we used. 
  • The circuit did not have the protective equipment’s which put all the component under used in great danger. 
  • Another problem was that the circuit produced heat and this can burn the circuit components.
Improvement to above challenges
In order to have an efficient dual power supply, the following components has to be incorporated in the circuit to solve the problems notices during the design and operation of the system. 
  • A.C Relay – this relay has to be connected before the rectifier circuit to monitor voltage, current, frequency, surge variation and lose connection.
  • D.C Relay – It has to be connected at the output to monitor output parameters. 
  • Heat sink – should be connected with the regulating circuit to dissipate heat generated by regulators.
                                                   
KIMULI ISMAIL   
LWANGA RICHARD   
ATENY GABRIEL AGUTO   
KASIIMBURA OSBERT   
SSEMWOGERERE DANIEL      
FATUMAH SULAIMAN    
KITYO MARK ANTHONY      
BUKENYA IVAN    
BOGERE INNOCENT       
DDEMBE JOSIAH   

Share:

Tuesday 5 July 2016

Design Of Automatic Night Light Detector

DESIGN OF AUTOMATIC NIGHT LIGHT DETECTOR

( Case study: Kampala International University)

SEMESTER RESEARCH  PROJECT 

BY

  • NABASA HIRIJI                
  • LUNKUSE STELLA      
  • OGWAL EMMANUEL              
  • LUCY HAKIM                      
  • SSEMAGANDA RICHARD      
  • RWOTOLARA DANIEL      
  • SIMON JUMA BULLEN     



LECTURER’S NAME: MR. ADABARA IBRAHIM

©2016 all rights reserved

ABSTRACT

The lighting systems in place nowadays mainly rely on the presence of users who have to switch them on or off manually. Due to this manual operation the lighting systems are expensive where there have to be switches in place, energy consumption is also high especially when the lights are left on during the day time hours when they are not necessary and the switches are prone to wear and tear.

This research project solved the manual operation problems and able to reduce the cost since it is automatic and it switches on and off depending on the time of date.

First designed a 5V regulated power supply using a transformer, bridge rectifier, capacitor and a voltage regulated.

Design the switch that will be on during night hours and off during day hours. The implementation of the circuit was done by use of bread boards, soldering gun and lead.

Testing of the research project was done in two distinct levels. Firstly we tested the functionality of the switch and lastly the overall system.

This research project is much economical compared to the one that is currently been used.

CHAPTER ONE 

INTRODUCTION 

1.0   Introduction
The project title is an “Automatic Night Light Detector” which uses Light Dependent Resistor, it consists of a circuit which turns on the bulb interfaced to it during night hours and it turns off the bulb automatically during day hours.

1.1   Background
The light-darkness detector is a current system that was developed in the late 1990’s. Its introduction has attracted a number of users including institutions, homesteads, hospitals and city authorities all over the world. 

1.2   Statement of problem
Energy consumption is increasing changing over time, which ultimately changes the level of global warning. Every day we work hard to reduce the level of energy consumption. This cannot be realized if our lighting systems are consuming a lot of energy.
Technology is also changing where the manual operations are replaced by automatic operations. The automatic is preferred because there is no need of constant monitoring; this helps to reduce the level of energy consumption.

1.3   General objective of the problem
The main objective of this project was to come up with a lighting system that turns on/off light automatically during the night and day hours respectively hence saving energy and it’s cost effective.

1.4   Specific objectives
The project’s specific objectives are;
To design and come up with cost effective lighting system.
To design the switching system that will automatically turn on/off lights during night and day hours respectively.

1.5   Significance of the study
The project is cost effective in terms of power consumption and installation.
The project provides reliability light intensity at all the necessary times.

1.6   Scope of the project
Lighting is very important in all institutions especially learning institutions. Without the proper light intensity learning can be a problem to students and their lecturers. Kampala International University is our case study which is one of the institutions that need the proper intensity for learning purposes. To maintain the light intensity that is adequate for this purpose we designed an automatic night light detector and with this the institution will minimize on energy consumption since the system switches lights on during night hours and switches them off during the day hence saving energy.

Circuit diagram

  


Soldering on PCB




Share:

SAMPLE: Format of preliminary pages

Preliminary pages:

  • Acknowledgment 
  • Declaration
  • Approval ( this should contain two positions where the organization and school supervisors must sign) - Append stamps
  • Abstract 
  • List of Figures
  • List of Tables
  • Table of Contents
  • List of Acronyms / Abbreviations


ACKNOWLEDGEMENT


First and foremost I would like to thank precious and merciful God for giving me all the necessary strength, knowledge, wisdom and moral ability to complete this workshop training report.

I would like to express my utmost gratitude to the administration of Kampala International University for providing me the opportunity to pursue the engineering workshop training as a partial fulfillment of the requirement for Diploma award in Telecommunication Engineering.

Much appreciation extends to my family, specifically to my parents who supported me the most in my education, financially and morally as well.

DECLARATION

I Baba Harrison sincerely declare that this report is my own work and the details of training and experience contained in this report describe my involvement as a trainee in the field of Telecommunications Engineering. All the information contained in this report is certain and correct to the best of my knowledge.

Signature: ..............................................

Date: .....................................................


APPROVAL

This report is submitted to Kampala International University, School of Engineering and Applied Sciences, Department of Electrical, Telecommunication and Computer Engineering for examination with my approval as the candidate’s university supervisor.


School supervisor:

Name: ………………………………………………………

Signature: ………………………………………………….

Date: ……. /…….. /……………



Organization supervisor:

Name: ………………………………………………………

Signature: ………………………………………………….

Date: ……. /…….. /……………

ABSTRACT

This workshop training report is about “electrical wiring, computer hardware/software circuit connection, surveying and building construction etc” a case study of Kampala International University.

The workshop training report was conducted in (number of days) during the practical training. Much emphasis was put on studying procedures of carrying out electrical wiring, circuit connections, surveying and concepts of building construction.

Chapter one: (summarize what you have writing done in chapter one only, don`t include diagrams)

Chapter two: (summarize what you have writing done in chapter two only, don`t include diagrams)


Chapter three: (summarize what you have writing done in chapter three only, don`t include diagrams)


LIST OF FIGURES

Chapter one
Figure 1.0 Showing levels obtained after measurements at four different points............page number
Figure 1.1 Showing bill of quantity for setting out a building……………………...page number

Chapter two
Figure 2.0 Showing levels obtained after measurements at four different points............page number
Figure 2.1 Showing bill of quantity for setting out a building……………………...page number

Chapter three
Figure 3.0 Showing levels obtained after measurements at four different points............page number
Figure 3.1 Showing bill of quantity for setting out a building……………………...page number


LIST OF TABLES

Chapter one
Table 1.0 Showing levels obtained after measurements at four different points............page number
Table 1.1 Showing bill of quantity for setting out a building……………………...page number

Chapter two
Table 2.0 Showing levels obtained after measurements at four different points............page number
Table 2.1 Showing bill of quantity for setting out a building……………………...page number

Chapter three
Table 3.0 Showing levels obtained after measurements at four different points............page number
Table 3.1 Showing bill of quantity for setting out a building……………………...page number



TABLE OF CONTENTS 

Table of contents should be automatically generated, but if you have challanges on how to auto generate table of content you can place you comment below or conatnt us but the format is 

  1. Preliminary pages
  2. Chapter one
  3. Chapter two
  4. Chanter three
  5. Conclusions
  6. Appendices
  7. References 



LIST OF ACRONYMS/ABBREVIATIONS

K.I.U Kampala International University
H.O.Ds         Head Of Departments
D.C              Direct Current
L1                Line 1
L2                Line 2


ITIE 


Share:

Format and Cover page of the industrial traning / workshop traning report

The industrial training /workshop training report should be prepared in triplicate. one copy to the organization, second copy to the school supervisor and the third is the student`s copy.

The report should be having a minimum of 25 pages and maximum  pages 100 pages including preliminaries and appendices. the report must have the company stamp and signature of the cover page, approval and declaration pages.

Format 


  • Font size (12)
  • Line spacing (1.5)
  • Font style (Tahoma)
  • Numbering (Bottem and centered)
  • Work must be justify.

Cover page



  • Name of the University 
  • Name of the Industrial Training (Industrial Training I) and also on the Logbook.
  • Details of the Company where training was carried out.
  • Name of the student and Reg. Number.
  • Period of the industrial training ( 2nd June, 2016 - 31st August, 2016).

SAMPLE: WORKSHOP TRAINING REPORT COVER PAGE



KAMPALA INTERNATIONAL UNIVERSITY SCHOOL OF ENGINEERING AND APPLIED SCIENCES (SEAS)


DEPARTMENT OF TELECOMMUNICATION, ELECTRICAL AND COMPUTER ENGINEERING


Name: HARRISON ADABARA

Reg. No: ETC/43655/151/DF

Diploma in Telecommunication Engineering

WORKSHOP TRAINING REPORT

Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Bachelor of Science in Telecommunication Engineering Kampala International University


Place of Training: KAMPALA INTERNATIONAL UNIVERSITY P.O. BOX 20000, KAMPALA - GABA ROAD


Duration: SEPTEMBER - OCTOBER 2015

Share:

Monday 4 July 2016

Biography of hacker Raphael Grey a.k.a. Curador

Curador is a 18-year old hacker from rural Wales who in the winter of 2000 stole an estimated 26,000 credit cards numbers from a group of e-commerce web sites and posted the numbers on the web. After ex-hacker Chris Davis tracked him down, he was arrested on March 23, 2000, and charged under the United Kingdom's computer crime statute.   




INTERVIEW: RAPHAEL GRAY AKA CURADOR
Q. What kind of thrill do you get out of hacking? Is it sort of the New Age equivalent of sex, drugs and rock-and-roll?

I suppose you could call it that, in a way. After the first ten minutes, when I was waiting for the five and a half thousand credit cards I was to download from the first site . . . certainly there was a great rush, so to speak. You do get a rush from doing it--definitely. There is a lot of adrenaline, if nothing else, while you're trying to track it down. I sometimes spent two days solid trying to do something without sleep, without anything, just constantly trying to do it. And when you finally get through, the relief is not just from the fact that you got it, but now you can sleep. . . .

Q. But what is the incentive that keeps you doing it? It's not as if you're going to get the secrets that are going to make you a wealthy man all of a sudden.

I'm just a very nosy person. I'm like your nosy neighbor on steroids, basically. ...You can see a lot of someone's life just from the contents of their PC.When I'm 28, definitely, I'll have either gone to university or be starting. You never know who's got what in their PC at the end of the day. When you get on to one PC and one network and that network's getting through another network, you might get in somewhere really interesting. You might find out that there's going to be a new "X-Files" show. You might find anything.

Q. Is that really worth staying up all night for?


I think so yes, basically. . . .

Q. What do computers give you back?

Computers are my career as well. I can get paid for doing the kind of work that I do. And you get a lot back in satisfaction, really, from writing programs and things like that, finding new ways of doing things, maybe figuring out a new way to perform a neural network for artificial intelligence, which is something I'm really interested in. . . .

Q. But you're like a burglar who breaks into the houses just to see what's in there. You don't take anything. What's the point?

I think, obviously, I'm just a very nosy person. I'm like your nosey neighbor on steroids, basically. It can be interesting, because when you see into someone's computer, it gives you an idea of how they work, who they speak to, what they're interested in, whether they actually do any work, what their job is. You can see a lot of someone's life just from the contents of their PC. Some people even have correspondence with their family at home from their PCs, and so on. So it just depends.

Q. What are you going to be doing in ten years?

I do want to go to university at some point in time. I'd like to try and get some kind of research grant or something, and . . . go into artificial intelligence in a big way, robotics, making equipment for the disabled, basically increasing the quality of their lives. Just looking for things and ways for computers to interact with people better, so that you feel a lot more at home with the computer. . . .

Q. That's what you're going to do . . . if you're not in jail?

Indeed, if I'm not in jail. If I'm in jail, then I'm going to lift a lot of weights. Not much else. . . .

Q. You didn't break in and take all those credit card numbers just to show the world how stupid and sloppy these people were. What were you really after?


Well, if I was trying to do something else, you seem to know more about it than me, because quite literally, I don't know. . . .

Q. What's your fascination with credit card numbers?

They're a good choice. People don't like other people to know they have their credit card numbers. . . .

That's because people that get them use them to buy stuff.

Yes.

Q. Is that why you were getting them?

No, I didn't try and buy anything with them that wasn't refunded. . . . There are loads of things I could've used them for. . . . But I didn't. The whole point of it was the message.

Q. And what was the message?

There are a lot of people out there who won't even safeguard their own safety, let alone the safety of their customers. At the end of the day, it's the fault of these companies. The buck does stop with them. . . . But they're not even trying to protect their own business from that.

How Raphael Gray internet “hacker” exposes Microsoft security weaknesses

Raphael was arrested at his home on the 23 March 2000. Police and FBI agents arrived in the early hours of the morning. It was alleged that he had intruded into nine e-commerce websites in Britain, America, Canada, Thailand and Japan and taken details of some 26,000 credit card numbers and disclosed some of the credit card information on the Internet.

Raphael, who was only 18 at the time explained to the police and FBI when he was interviewed that he had been concerned for sometime at the inherent security weakness in one particular make of software called Microsoft Internet Information Server. This inherent weakness enabled remote users to access information stored on computers using this software. Raphael explained he had contacted a number of e-commerce sites using this software and pointed out the security weakness but they had ignored him, and he had also contacted Bill Gates, the Microsoft Chief who again ignored him. He went on to explain that he was known on the website as “Curador”, “Custodian” or “The Saint” and he finally decided that the best way of bringing this to public attention was to publish some of the credit card numbers on a website which he set up. The prosecution accepted throughout that Raphael’s motivation was to expose and publish the fact that the e-commerce retailers were not security conscious, and secondly to broadcast the message that due to their indifference to security, individuals ought not to entrust e-commerce retailers with their credit card details. In this case Raphael initially faced a ten count indictment, each count alleging he caused a computer to perform a function with intent to secure unauthorised access and with attempt to facilitate the commission of an offence to which section 2 of the Computer Misuse Act 1990 applied. The case involved complex and novel points of law, and from the start there was intense media interest both in this country and abroad. At the plea and directions hearing on 20/10/00 Raphael entered not guilty pleas to all counts and the prosecution indicated they wish to serve an amended indictment. This was served a month later when the prosecution put their case in an entirely different way. The new indictment had six initial counts alleging an offence under the Computer Misuse Act 1990 section 2(1), alleging the defendant had committed an offence under section 3(1) of the Computer Misuse Act by doing an act which caused an unauthorised modification of the contents of a computer. The remaining four counts alleged obtaining services by deception on two separate occasions, by using a credit card number he had downloaded to set up two separate websites upon which to display the credit card information. and the related offences under the Computer Misuse Act section 2(1). This raised the totally new issue of modification. The defence instructed a computer security expert, Mr Peter Sommer to advise on the complex issues of authorisation and modification, and he advised that what Raphael had done did not amount to modification of the contents of a computer as alleged by the prosecution in the first six counts.
On 28 March 2001 the prosecution indicated they would reduce the first six counts to section 1 charges of simple unauthorised access if the defendant pleaded guilty to the remaining four counts. After lengthy discussion Raphael agreed to this compromise and was finally given a two year community rehabilitation order.
As there was no trial the complex and novel issues of unauthorised access and modification of a computer were never decided, but undoubtedly these issues will come before the court again in the near future.

ITIE Summary of Raphael Grey aka Curador
At age 19, Raphael Gray was able to hack several computer systems around the world in just a matter of one month. His mission was to gain unauthorized access to credit card information, which eventually netted him millions of dollars. Dubbed “The Bill Gates Hacker,” Gray broke into secure computer systems and published all the credit card information he accessed as part of his multimillion credit card pound mission.

References

Share:

Sunday 3 July 2016

Top most notorious hackers to ever get caught

Hacker is a person that enjoy modifying how a system function.

According to Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase here:
  • A person who enjoys learning details of a programming language or system
  • A person who enjoys actually doing the programming rather than just theorizing about it
  • A person capable of appreciating someone else's hacking
  • A person who picks up programming quickly
  • A person who is an expert at a particular programming language or system, as in "UNIX hacker"
Generally a hacker is somebody who can subvert computer security without any malicious purpose, the definition of the word has evolved into a term referring to computer criminals who exploit their computer savvy abilities to illegally access computer systems for malicious purposes
     Here is a list of the top most notorious hackers to ever get caught 

    If you know any other hacker who have been caught and his or her name not on the list, do contact ITIE.

    Here's a preview: 
    1. Jeanson James Ancheta 
    2. Kevin Poulsen 
    3. Albert Gonzalez 
    4. George Hotz 
    5. Kevin Mitnick 
    6. Gary McKinnon 
    7. Adrian Lamo 
    8. Jonathan James 
    9. Owen Walker 
    10. Robert Tappan Morris 
    11. HD Moore 
    12. Dennis Moran 
    13. Kristina Svechinskaya 
    14. Sam Jain 
    15. Karl Koch 
    16. Ehud Tenenbaum 
    17. Leonard Rose 
    18. Rafael Nunez 
    19. Andrew Auernheimer 
    20. Mark Abene 
    21. Julian Paul Assange 
    22. Mike Calce 
    23. Chad Davis 
    24. Nahshon Even-Chaim 
    25. Raphael Gray
    26. ..............



    Share:

    Search This Blog

    ITIE FACEBOOK PAGE

    Engineering Practical Forum

    ITIE. Powered by Blogger.