Monday, November 4, 2013

list of country in the world

list of country in the world
13Aruba
25Belize
26Benin
28Bhutan
33Brazil
36Brunei
39Burma
43Canada
47Chad
48Chile
49China
62Cuba
63Cyprus
71Egypt
80Fiji
82France
86Gabon
91Ghana
94Greece
98Guam
101Guinea
103Guyana
104Haiti
109Hungary
110Iceland
111India
113Iran
114Iraq
115Ireland
117Israel
118Italy
119Jamaica
121Japan
122Jersey
123Jordan
126Kenya
130Kuwait
132Laos
133Latvia
134Lebanon
135Lesotho
136Liberia
137Libya
144Malawi
147Mali
148Malta
153Mayotte
154Mexico
156Moldova
157Monaco
160Morocco
162Namibia
163Nauru
165Nepal
171Niger
172Nigeria
173Niue
176Norway
177Oman
179Palau
180Panama
184Peru
187Poland
190Qatar
191Reunion
192Romania
193Russia
194Rwanda
200Samoa
204Senegal
212Somalia
215Spain
218Sudan
222Sweden
224Syria
225Taiwan
230Togo
231Tokelau
232Tonga
235Tunisia
236Turkey
239Tuvalu
240Uganda
241Ukraine
245Uruguay
247Vanuatu
249Vietnam
255Yemen
256Zambia
CLICK HERE TO SEE OTHER LINKS
www.listofcountriesoftheworld.com/
en.wikipedia.org/wiki/List_of_countries_by_population
www.nationsonline.org › ... › EarthContinentsCountries of the World
www.worldatlas.com/nations.htm
www.internetworldstats.com/list2.htm

how to create your own app

how to create your own app for android

Building Your First App

 How to build an Android app

 

CODING METHOD:

Welcome to Android application development!
This class teaches you how to build your first Android app. You’ll learn how to create an Android project and run a debuggable version of the app. You'll also learn some fundamentals of Android app design, including how to build a simple user interface and handle user input.
Before you start this class, be sure you have your development environment set up. You need to:
  1. Download the Android SDK.
  2. Install the ADT plugin for Eclipse (if you’ll use the Eclipse IDE).
  3. Download the latest SDK tools and platforms using the SDK Manager.
If you haven't already done these tasks, start by downloading the Android SDK and following the install steps. Once you've finished the setup, you're ready to begin this class.
This class uses a tutorial format that incrementally builds a small Android app that teaches you some fundamental concepts about Android development, so it's important that you follow each step.
  CLICK HERE TO SEE FULL DETAIL

ONLINE METHODS:
This are the some online apps creator tools ,u just click and drag ,that it your own apps is ready with in 2 min.

www.appsgeyser.com/
 www.techradar.com
 appsmakerstore.com
www.makeuseof.com
appinventor.mit.edu
appfurnace.com  

 APPS publishing charges for google is 25$

click here to see

Friday, October 18, 2013

deepavali special trains 2013 in india

 train detail all over the India,from Indian railways.

Special Train Names with Details -click here to get list of train

click the above link.for all over india.


deepavali special trains 2013 from chennai. 

deepavali special trains - Southern Railway Welcomes You


DEEPAVALI SPECIAL TRAINS
            The following special trains will be run to clear the extra rush of passengers in connection with the Deepavali festival.
1) Nagercoil – Chennai Egmore Superfast Specials (via. Madurai, Tiruchchirappalli, Vriddhachalam, Villupuram): T.No.06748 Nagercoil – Chennai Egmore Superfast Special will leave Nagercoil at 17.00 hrs. o­n 11.11.2012 and arrive Chennai Egmore at 06.05 hrs. the next day. T.No.06747 Chennai Egmore – Nagercoil Special will leave Chennai Egmore at 14.35 hrs. o­n 12.11.2012 and arrive Nagercoil at 05.30 hrs. the next day.  The composition of the trains will be 1 AC 2-tier, 2 AC 3-tier, 12 Sleeper Class,   3 General Second Class and 2 luggage-cum-brake van coaches. The trains will stop at Valliyur, Tirunelveli, Vanchi Maniyachchi, Kovilpatti, Sattur, Virudunagar, Madurai, Dindigul, Tiruchchirappalli, Vriddhachalam, Villupuram, Melmaruvathur, Chengalpattu and Tambaram. T.No.06748 will stop at Mambalam and T.No.06747 will stop at Ariyalur and Srirangam also.
2) Tirunelveli – Chennai Central Weekly Specials (via. Tiruchchirappalli, Erode):  T.No.06750 Tirunelveli – Chennai  Central Weekly Special will leave Tirunelveli at 16.00 hrs. o­n 08.11.2012 and arrive Chennai Central at 09.20 hrs. the next day. T.No.06749 Chennai Central – Tirunelveli Superfast Weekly Special will leave Chennai Central at 22.30 hrs. o­n 09.11.2012 and arrive Tirunelveli at 14.00 hrs. the next day.  The composition of the trains will be 1 AC 2-tier, 2 AC 3-tier, 10 Sleeper Class,   6 General Second Class and 2 luggage-cum-brake van coaches. The trains will stop at Vanchi Maniyachchi, Kovilpatti, Sattur, Virudunagar, Madurai, Dindigul, Tiruchchirappalli, Karur, Erode, Salem, Jolarpettai, Vaniyambadi, Ambur, Gudiyattam, Katpadi and Arakkonam. T.No.06750 will stop at Perambur also.
3) Coimbatore  – Chennai Central – Coimbatore Superfast Specials:  T.No.06618 Coimbatore – Chennai  Central Superfast Special will leave Coimbatore at 21.10 hrs. o­n 13.11.2012 and arrive Chennai Central at 05.15 hrs. the next day. T.No.06617 Chennai Central – Coimbatore Superfast Special will leave Chennai Central at 21.00 hrs. o­n 14.11.2012 and arrive Coimbatore at 04.30 hrs. the next day.  The composition of the trains will be 1 AC 2-tier, 3 AC 3-tier, 13 Sleeper Class,  2 General Second Class and 2 luggage-cum-brake van coaches. The trains will stop at Tiruppur, Erode, Salem, Jolarpettai, Katpadi and Arakkonam. T.No.06618 will stop at Perambur also.

4) Chennai Central – Coimbatore – Chennai Central Superfast Weekly Specials: T.No.06015 Chennai Central – Coimbatore Superfast Weekly Special will leave Chennai Central at 22.30 hrs. o­n 11.11.2012 and arrive Coimbatore at 06.40 hrs. the next day. T.No.06016 Coimbatore – Chennai Central Superfast Weekly Special will leave Coimbatore at 23.45 hrs. o­n 12.11.2012 and arrive Chennai Central at 07.45 hrs. the next day. The composition of the trains will be 1 AC 2-tier, 2 AC 3-tier, 10, Sleeper Class, 6 General Second Class and 2 luggage-cum-brake van coaches.  The trains will stop at Arakkonam, Katpadi, Jolarpettai, Salem, Erode & Tiruppur. T.No.06015 will stop at Coimbatore North also. T.No.06016 will stop at Perambur also.
5) Chennai Central – Nagercoil – Chennai Central Specials (via. Chennai Egmore, Villupuram, Vriddhachalam): T.No.06019 Chennai Central – Nagercoil Special will leave Chennai Central at 19.30 hrs. o­n 10.11.2012 and arrive Nagercoil at 11.15 hrs. the next day. T.No.06020 Nagercoil – Chennai Central Special will leave Nagercoil at 13.20 hrs. o­n 11.11.2012 and arrive Chennai Central at 05.00 hrs. the next day. The composition of the trains will be  1 AC 2-tier, 4 AC 3-tier, 11 Sleeper Class, 3 General Second Class and          2 luggage-cum-brake van coaches.  The trains will stop at Chennai Egmore, Tambaram, Chengalpattu, Melmaruvathur, Villupuram, Vriddhachalam Tiruchchirappalli, Dindigul, Madurai, Virudunagar, Satur, Kovilpatti, Vanchi Maniyachchi, Tirunelveli and Valliyur. T.No.06020 will stop at Mambalam also.
6) Tiruchchirappalli – Chennai Egmore Special (Via. Mayiladuthurai, Villupuram): T.No.06802 Tiruchchirappali – Chennai  Egmore Special will leave Tiruchchirappali at    19.30 hrs. o­n 12.11.2012 and arrive Chennai Egmore at 04.20 hrs. the next day. T.No.06801 Chennai Egmore – Tiruchchirappali Superfast Special will leave Chennai Egmore at 22.45 hrs. o­n 15.11.2012 and arrive Tiruchchirappalli at 06.00 hrs. the next day.  The composition of the trains will be 1 AC 2-tier, 2 AC 3-tier, 13 Sleeper Class,  2 General Second Class and 2 luggage-cum-brake van coaches. The trains will stop at Thanjavur, Kumbakonam, Mayiladuthurai, Sirkazhi, Chidambaram, Tiruppadiripuliyur, Villupuram, Melmaruvathur, Chengalpattu and Tambaram. T.No.06802 will stop at Mambalam also.

 7) Chennai Egmore– Tuticorin Specials (via.Villupuram, Mayiladuthurai):  T.No.06001 Chennai  Egmore - Tuticorin Special will leave  Chennai Egmore at 22.45 hrs. o­n 13.11.2012 and arrive Tuticorin at 12.50 hrs. the next day. T.No.06002 Tuticorin – Chennai Egmore Superfast Special will leave Tuticorin at 18.15 hrs. o­n 14.11.2012 and arrive Chennai Egmore at 07.20 hrs. the next day.  The composition of the trains will be 1 AC       2-tier, 2 AC 3-tier, 13 Sleeper Class,   2 General Second Class and 2 luggage-cum-brake van coaches. The trains will stop at Tambaram, Chengalpattu, Melmaruvathur, Villupuram, Tiruppadiripuliyur, Chidambaram, Sirkazhi, Mayiladuthurai, Kumbakonam, Thanjavur, Tiruchchirappalli, Dindigul, Madurai, Virudunagar, Sattur, Kovilpatti, Vanchi Maniyachchi and Milavittan. T.No.06001 will stop at Tuti-Melur. T.No.06002 will stop at Mambalam also.

happy deepavali..................
happy journey..................
 
 
 use the below link.

LI-FI TECHNOLOGY IN WIRELESS COMMUNICATION.

Li-Fi Technology in Wireless Communication
 
My First International Journa,in Li-Fi Technology.was published in International Journal of Engineering Research and Technology.with a impact factor of 1.7.
 
  

Thursday, August 29, 2013

History About Facebook

Facebook is a social networking service launched in February 2004, owned and operated by Facebook It was founded by Mark Zuckerberg with his college roommates and fellow Harvard University students Eduardo Saverin, Azel[disambiguation needed], Andrew McCollum, Dustin Moskovitz and Chris Hughes. The website's membership was initially limited by the founders to Harvard students, but was expanded to other colleges in the Boston area, the Ivy League, and gradually most universities in Canada and the United States,corporations,and by September 2006, to everyone of age 13 and older with a valid email address.

On October 1, 2005, Facebook expanded to twenty-one universities in the United Kingdom, the Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) system in Mexico (around thirty campuses throughout the country at the time), the University of Puerto Rico and Interamerican University of Puerto Rico network in Puerto Rico, and the University of the Virgin Islands network in the U.S. Virgin Islands. Facebook launched a high school version in September 2005, which Zuckerberg called the next logical step.[40] At that time, high school networks required an invitation to join. Facebook later expanded membership eligibility to employees of several companies, including Apple Inc. and Microsoft. On December 11, 2005, universities in Australia and New Zealand were added to the Facebook network, bringing its size to 2,000+ colleges and 25,000 + high schools throughout the United States, Canada, Mexico, the United Kingdom, Australia, New Zealand, and Ireland. Facebook was then opened on September 26, 2006 to everyone ages 13 and older with a valid e-mail address.
Late in 2007, Facebook had 100,000 business pages, allowing companies to attract potential customers and tell about themselves. These started as group pages, but a new concept called company pages was planned.
In October 2008, Facebook announced that it would set up its international headquarters in Dublin, Ireland.
In 2010, Facebook began to invite users to become beta testers after passing a question-and-answer-based selection process, and a set of Facebook Engineering Puzzles where users would solve computational problems which gave them an opportunity to be hired by Facebook.
As of February 2011, Facebook had become the largest online photo host, being cited by Facebook application and online photo aggregator Pixable as expecting to have 100 billion photos by summer 2011. As of October 2011, over 350 million users accessed Facebook through their mobile phones, accounting for 33% of all Facebook traffic.
On March 12, 2012, Yahoo! filed suit in a U.S. federal court against Facebook weeks before the scheduled Facebook initial public offering. In its court filing, Yahoo said that Facebook had infringed on ten of its patents covering advertising, privacy controls and social networking. Yahoo had threatened to sue Facebook a month before the filing, insisting that the social network license its patents. A spokesperson for Facebook issued a statement saying "We're disappointed that Yahoo, a longtime business partner of Facebook and a company that has substantially benefited from its association with Facebook, has decided to resort to litigation". The lawsuit claims that Yahoo's patents cover basic social networking ideas such as customizing website users' experiences to their needs, adding that the patents cover ways of targeting ads to individual users.

Saturday, June 15, 2013

WIFI Hacking Tool

WIFI Hacking Tool

There are many tools available that hackers can use to access your private communication in wifi hotspots. This article discusses some of the most well-known wifi hacking tools.

Software names:

  • Aircrack-ng: This suite of tools includes 802.11 WEP and WPA-PSK key cracking programs that can capture wireless packets and recover keys once enough information been captured. Aircrack-ng supports newer techniques that make WEP cracking much faster. This software has been downloaded over 20,000 times.
  • Airjack: An 802.11 packet injection tool, Airjack was originally used as a development tool to capture and inject or replay packets. In particular, Airjack can be used to inject forged deauthentication packets, a fundamental technique used in many denial-of-service and Man-in-the-Middle attacks. Repeatedly injecting deauthentication packets into a network wreaks havoc on the connections between wireless clients and access points.
  • AirSnort: AirSnort is wireless LAN (CLAN) tool which recovers WEP encryption keys. AirSnort works by passively monitoring transmissions, and then computing the encryption key when enough packets have been gathered. After that point, all data sent over the network can be decrypted into plain text using the cracked WEP key.
  • Cain & Able: This is a multi-purpose tool that can intercept network traffic, using information contained in those packets to crack encrypted passwords using dictionary, brute-force and cryptanalysis attack methods, record VoIP conversations, recover wireless network keys, and analyze routing protocols. Its main purpose is the simplified recovery of passwords and credentials. This software has been downloaded over 400,000 times.
  • CommView for WiFi: This commercial product is designed for capturing and analyzing wifi network packets. CommView for WiFi uses a wireless adapter to capture, decode, and analyze packets sent over a single channel. It allows hackers to view the list of network connections and vital IP statistics and examine individual packets.
  • ElcomSoft Wireless Security Auditor: This is an all-in-one cracking solution that automatically locates wireless networks, intercepts data packets, and uses cryptanalysis techniques to crack WPA/WPA2 PSKs. This software displays all available wireless networks, identified by channel number, AP MAC address, SSID, speed, load, and encryption parameters. While these capabilities can be found in open source tools, ElcomSoft provides a more polished product for professional use by wireless security auditors.
  • Ettercap: Ettercap can be used to perform man-in-the-middle attacks, sniff live connections, and filter intercepted packets on the fly. It includes many features for network and host analysis. This shareware has been downloaded nearly 800,000 times.
  • Firesheep: This is a plug-in to the Firefox browser that allows the hacker to capture SSL session cookies sent over any unencrypted network (like an open wifi network) and use them to possibly steal their owner’s identities. It is extremely common for websites to protect user passwords by encrypting the initial login with SSL, but then never encrypt anything else sent after login, which leaves the cookie (and the user) vulnerable to “sidejacking.” When a hacker uses Firesheep to grab these cookies, he may then use the SSL-authenticated session to access the user’s account.
  • Hotspotter: Like KARMA, Hotspotter is another wireless attack tool that mimics any access point being searched for by nearby clients, and then dupes users into connecting to it instead.
  • IKECrack: This is an open source IPsec VPN authentication cracking tool which uses brute force attack methods to analyze captured Internet Key Exchange (IKE) packets to find valid VPN user identity and secret key combinations. Once cracked, these credentials can be used to gain unauthorized access to an IPsec VPN.
  • KARMA: This evil twin attack listens to nearby wireless clients to determine the name of the network they are searching for and then pretends to be that access point. Once a victim connects to a KARMA evil twin, this tool can be used to redirect web, FTP, and email requests to phone sites in order to steal logins and passwords.
  • Kismet: Kismet takes an intrusion detection approach to wireless security, and can be used to detect and analyze access points within radio range of the computer on which it is installed. This software reports SSIDs (Service Set Identifiers – used to distinguish one wireless network from another) advertised by nearby access points, whether or not the access point is using WEP, and the range of IP addresses being used by connected clients.
  • NetStumbler: This tool turns any WiFi-enabled Windows laptop into an 802.11 network detector. NetStumbler and dozens of similar “war driving” programs can be used with other attack tools to find and hack into discovered wifi networks.
  • WireShark: WireShark is a freeware LAN analyzer that can be used to passively capture 802.11 packets being transmitted over a wifi  network. This software has been downloaded millions of times.

Hardware

For hackers that prefer a turn-key package, there are also hardware wireless hacking tools available. We’ve highlighted one called WiFi Pineapple. It’s a simple, small, portable device that can be carried into any hotspot and used to attract any laptop trying to find a wifi access point. The Pineapple uses a technique called an Evil Twin attack. Hackers have used tools like KARMA to do the same thing for years, but with Pineapple, now you can buy a piece of hardware for only $100 that allows you to become a hacker without downloading or installing any software.
Here’s what their website says: “Of course all of the Internet traffic flowing through the pineapple such as e-mail, instant messages and browser sessions are easily viewed or even modified by the pineapple holder.”

Hacking Countermeasures

Fortunately, there are resources that you can use to help combat these threats. Below are two excellent books:
  • Hacking Exposed: Network Security Secrets & Solutions, by Joel Scambray. This book talks about security from an offensive angle and includes a catalog of the weapons hackers use. Readers see what programs are out there, quickly understand what the programs can do, and benefit from detailed explanations of concepts that most system administrators do not understand in detail. Hacking Exposed wastes no time in explaining how to implement the countermeasures that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what UNIX configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare.
  • Wi-Foo: The Secrets of Wireless Hacking, by A. Vladimirov, K. Gavrilenko, and A. Mikhailovsky. This book is the first practical and realistic book about 802.11 network penetration testing and hardening, based on a daily experience of breaking into and securing wireless LANs. Rather than collecting random wireless security news, tools, and methodologies, Wi-Foo presents a systematic approach to wireless security threats and countermeasures starting from the rational wireless hardware selection for security auditing and describes how to choose the optimal encryption ciphers for the particular network you are trying to protect.

Definitions

The following list includes common wifi terms discussed in this white paper. For additional terms and definitions, please see our online glossary.
Encryption
Encryption is the translation of data into a secret code. To read encrypted data, you must have access to the secret key or password that was used to translate the data into cipher text. That same key or password enables you to decrypt cipher text back into the original plain text. Encryption is the most effective way to achieve data security, but depends on using keys known only by the sender and intended recipient. If a hacker can guess (crack) the key, data security is compromised.
Evil Twin
This is a rogue wifi access point that appears to be a legitimate one, but actually has been set up by a hacker to intercept wireless communications. An Evil Twin is the wireless version of the “phishing” scam: an attacker fools wireless users into connecting their laptop or mobile phone by posing as a legitimate access point (such as a hotspot provider). When a victim connects to the Evil Twin, the hacker can launch man-in-the-middle attacks, listening in on all Internet traffic, or just ask for credit card information in the standard pay-for-access deal. Tools for setting up an evil twin are easily available (e.g., Karma and Hotspotter). One recent study found that over 56% of laptops were broadcasting the name of their trusted wifi networks, and that 34% of them were willing to connect to highly insecure wifi networks – which could turn out to be Evil Twins.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) combines the Hypertext Transfer Protocol used by browsers and websites with the SSL/TLS protocol used to provide encrypted communication and web server authentication. HTTPS connections are often used to protect payment transactions on the Internet so that anyone that might intercept those packets cannot decipher sensitive information contained therein.
Man-In-the-Middle Attacks
A man-in-the-middle attack is a form of active eavesdropping in which the attacker makes independent connections a communication source and destination and relays messages between them, making those victims believe that they are talking directly to each other, when in fact the entire conversation is being controlled by the attacker. The attacker must be able to intercept all messages exchanged between the two victims. For example, an attacker within reception range of an unencrypted wifi access point can insert himself as a man-in-the-middle by redirecting all packets through an Evil Twin. Or an attacker can create a phishing website that poses as an online bank or merchant, letting victims sign into the phishing server over a SSL connection. The attacker can then log onto the real server using victim-supplied information, capturing all messages exchanged between the user and real server – for example, to steal credit card numbers.
Sidejacking
Sidejacking is a web attack method where a hacker uses packet sniffing to steal a session cookie from a website you just visited. These cookies are generally sent back to browsers unencrypted, even if the original website log-in was protected via HTTPS.  Anyone listening can steal these cookies and then use them access your authenticated web session. This recently made news because a programmer released a Firefox plug-in called Firesheep that makes it easy for an intruder sitting near you on an open network (like a public wifi hotspot) to sidejack many popular website sessions. For example, a sidejacker using Firesheep could take over your Facebook session, thereby gaining access to all of your sensitive data, and even send viral messages and wall posts to all of your friends.
Sniffers
Packet sniffers allow eavesdroppers to passively intercept data sent between your laptop or smartphone and other systems, such as web servers on the Internet. This is the easiest and most basic kind of wireless attack. Any email, web search or file you transfer between computers or open from network locations on an unsecured wireless network can be captured by a nearby hacker using a sniffer. Sniffing tools are readily available for free on the web and there are at least 184 videos on YouTube to show budding hackers how to use them. The only way to protect yourself against wifi sniffing in most public wifi hotspots is to use a VPN to encrypt everything sent over the air.
SSL
A Netscape-defined protocol for securing data communications – particularly web transactions – sent across computer networks. The Secure Sockets Layer (SSL) protocol establishes a secure session by electronically authenticating the server end of any connection, and then using encryption to protect all subsequent transmissions. The Transport Layer Security (TLS) protocol refers to the Internet standard replacement for SSL. Websites that are addressed by URLs that begin with https instead of http use SSL or TLS.
WEP and WPA
WEP and WPA are security protocols used to protect wireless networks. Wired Equivalent Privacy (WEP) is a deprecated security protocol for IEEE 802.11 wireless networks. Because all wireless transmissions are susceptible to eavesdropping, WEP was introduced as part of the original 802.11 standard in 1997. It was intended to provide confidentiality comparable to that of a traditional wired network. Since 2001, several serious weaknesses in the protocol have been identified so that today a WEP connection can be cracked within minutes. In response to these vulnerabilities, in 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). Wi-Fi Protected Access versions 1 and 2 (WPA and WPA2) refer to certification programs that test WiFi product support for newer IEEE 802.11i standard security protocols that encrypt data sent over the air, from wifi user to wifi router.

Monday, February 4, 2013

Types of Computer Ports and its images

Types of Computer Ports and its images


  A port serves as an interface between the computer and other computers or peripheral devices. Physically, a port is a specialized outlet on a piece of equipment to which a plug or cable connects. Electronically, the several conductors making up the outlet provide a signal transfer between devices.

   Port connectors may be male or female, but female connectors are much more common. Bent pins are easier to replace on a cable than on a connector attached to a computer, so it was common to use female connectors for the fixed side of an interface.

Tuesday, January 22, 2013

Amazing Facts about India and Indians!

Amazing Facts about India and Indians!

  1. India is the world's largest, oldest, continuous civilization.
  2. India never invaded any country in her last 10000 years of history.
  3. India is the world's largest democracy.
  4. Varanasi, also known as Benares, was called "the ancient city" when Lord Buddha visited it in 500 B.C.E, and is the oldest, continuously inhabited city in the world today.
  5. India invented the Number System. Zero was invented by Aryabhatta.
  6. The World's first university was established in Takshashila in 700BC. More than 10,500 students from all over the world studied more than 60 subjects. The University of Nalanda built in the 4th century BC was one of the greatest achievements of ancient India in the field of education.
  7. Sanskrit is the mother of all the European languages. Sanskrit is the most suitable language for computer software - a report in Forbes magazine, July 1987.
  8. Ayurveda is the earliest school of medicine known to humans. Charaka, the father of medicine consolidated Ayurveda 2500 years ago. Today Ayurveda is fast regaining its rightful place in our civilization.
  9. Although modern images of India often show poverty and lack of development, India was the richest country on earth until the time of British invasion in the early 17th Century. Christopher Columbus was attracted by India's wealth.
  10. The art of Navigation was born in the river Sindhu 6000 years ago. The very word Navigation is derived from the Sanskrit word NAVGATIH. The word navy is also derived from Sanskrit 'Nou'.
  11. Bhaskaracharya calculated the time taken by the earth to orbit the sun hundreds of years before the astronomer Smart. Time taken by earth to orbit the sun: (5th century) 365.258756484 days.
  12. The value of pi was first calculated by Budhayana, and he explained the concept of what is known as the Pythagorean Theorem. He discovered this in the 6th century long before the European mathematicians.
  13. Algebra, trigonometry and calculus came from India. Quadratic equations were by Sridharacharya in the 11th century. The largest numbers the Greeks and the Romans used were 106 whereas Hindus used numbers as big as 10**53(10 to the power of 53) with specific names as early as 5000 BCE during the Vedic period. Even today, the largest used number is Tera 10**12(10 to the power of 12).
  14. IEEE has proved what has been a century old suspicion in the world scientific community that the pioneer of wireless communication was Prof. Jagdish Bose and not Marconi.
  15. The earliest reservoir and dam for irrigation was built in Saurashtra.
  16. According to Saka King Rudradaman I of 150 CE a beautiful lake called Sudarshana was constructed on the hills of Raivataka during Chandragupta Maurya's time.
  17. Chess (Shataranja or AshtaPada) was invented in India.
  18. Sushruta is the father of surgery. 2600 years ago he and health scientists of his time conducted complicated surgeries like cesareans, cataract, artificial limbs, fractures, urinary stones and even plastic surgery and brain surgery. Usage of anesthesia was well known in ancient India. Over 125 surgical equipment were used. Deep knowledge of anatomy, physiology, etiology, embryology, digestion, metabolism, genetics and immunity is also found in many texts.
  19. When many cultures were only nomadic forest dwellers over 5000 years ago, Indians established Harappan culture in Sindhu Valley (Indus Valley Civilization).
  20. The four religions born in India, Hinduism, Buddhism, Jainism, and Sikhism, are followed by 25% of the world's population.
  21. The place value system, the decimal system was developed in India in 100 BC.
  22. India is one of the few countries in the World, which gained independence without violence.
  23. India has the second largest pool of Scientists and Engineers in the World.
  24. India is the largest English speaking nation in the world.
  25. India is the only country other than US and Japan, to have built a super computer indigenously.
Famous Quotes on India (by non-Indians)
  • Albert Einstein said: We owe a lot to the Indians, who taught us how to count, without which no worthwhile scientific discovery could have been made.
  • Mark Twain said: India is, the cradle of the human race, the birthplace of human speech, the mother of history, the grandmother of legend, and the great grand mother of tradition. Our most valuable and most instructive materials in the history of man are treasured up in India only.
  • French scholar Romain Rolland said: If there is one place on the face of earth where all the dreams of living men have found a home from the very earliest days when man began the dream of existence, it is India.
  • Hu Shih, former Ambassador of China to USA said: India conquered and dominated China culturally for 20 centuries without ever having to send a single soldier across her border.