SlideShare a Scribd company logo
1 of 20
Seminar Presentation
                on
       Mobile Phone Cloning
                By
   Shishupal Nagar 8CSB-1(95)




DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING
     Jaipur Engineering College & Research Centre
              Sitapura Tonk, Road Jaipur
CONTENTS
 INTRODUCTION
 GSM & CDMA MOBILE PHONES
 SOME IMPORTANT TERMS
 HOW IS A PHONE CLONED?
 METHODS TO DETECT CLONED PHONES
 IMPACT OF CLONING
 HOW TO PREVENT CLONING?
 CONCLUSION
 REFERENCES
INTRODUCTION
CLONING:
 Cloning is the creation of an organism that is an exact
  genetic copy of another. This means that every single bit
  of DNA is the same between the two!

WHAT IS MOBILE PHONE CLONING?
 Mobile phone cloning is copying the identity of one
  mobile telephone to another mobile telephone.

 The purpose of mobile phone cloning is making
  fraudulent telephone calls.
 The bills for the calls go to the legitimate subscriber.
GSM
 Global System for Mobile Communications. A
  digital cellular phone technology based on TDMA.
 GSM phones use a Subscriber Identity Module
  (SIM) card that contains user account information.
 Any GSM phone becomes immediately programmed
  after plugging in the SIM card.
 Operators who provide GSM service are Airtel ,
  Vodafone ,Idea etc.
CDMA
 It stands for Code Division Multiple Access.
 In a CDMA system, your encoded voice is digitized and
  divided into packets.
 These packets are tagged with "codes." The packets
  then mix with all of the other packets of traffic in the
  local CDMA network as they are routed towards their
  destination. The receiving system only accepts the
  packets with the codes destined for it.
 Operators who provide CDMA service in India are
  Reliance , Tata Indicom etc.
IMPORTANT TERMS
 IMEI stands for International Mobile Equipment
  Identifier, this is a 10 digit universally unique number
  of our GSM handset. I use the term Universally
  Unique because there cannot be 2 mobile phones
  having the same IMEI no. This is a very valuable
  number and used in tracking mobile phones.
 SIM, which stands for Subscriber Identification
  Module. Basically the SIM provides storage of
  subscriber related information.
CONTD……
 ESN, which stands for Electronic Serial Number. It is
  same as the IMEI but is used in CDMA handsets
 MIN stands for Mobile Identification Number, which
  is the same as the SIM of GSM.
HOW IS A PHONE CLONED?
 Cellular thieves can capture ESN/MINs using devices
  such as cell phone ESN reader or digital data interpreters
  (DDI).
 The ESN/MIN pair can be cloned in a number of ways
  without the knowledge of the carrier or subscriber through
  the use of electronic scanning devices.
 After the ESN/MIN pair is captured, the cloner
  reprograms or alters the microchip of any wireless phone
  to create a clone of the wireless phone from which the
  ESN/MIN pair was stolen.
METHODS TO DETECT
      CLONED PHONES
 Duplicate detection - The network sees the same phone
  in several places at the same time. Reactions include
  shutting them all off so that the real customer will contact
  the operator because he lost the service he is paying for, or
  tearing down connections so that the clone users will
  switch to another clone but the real user will contact the
  operator.
 Velocity trap - The mobile phone seems to be moving at
  impossible, or most unlikely speeds. For example, if a call
  is first made in Helsinki, and five minutes later, another
  call is made but this time in Tampere, there must be two
  phones with the same identity on the network.
CONTD……
 Call counting - Both the phone and the network keep
  track of calls made with the phone, and should they differ
  more than the usually allowed one call, service is denied.

 PIN codes - Prior to placing a call, the caller unlocks the
  phone by entering a PIN code and then calls as usual.
  After the call has been completed, the user locks the
  phone by entering the PIN code again. Operators may
  share PIN information to enable safer roaming.
CONTD….
 Frequent wrong number phone calls to your phone, or
  hang-ups.

 Difficulty in placing outgoing calls.


 Difficulty in retrieving voice mail messages.

 Incoming calls constantly receiving busy signals or
  wrong numbers. Unusual calls appearing on your
  phone bills.
IMPACT OF CLONING
 Each year, the mobile phone industry loses millions of
  dollars in revenue because of the criminal actions of
  persons who are able to reconfigure mobile phones so that
  their calls are billed to other phones owned by innocent
  third persons.
 Many criminals use cloned cellular telephones for illegal
  activities, because their calls are not billed to them, and
  are therefore much more difficult to trace.
CONTD….
 This phenomenon is especially prevalent in drug crimes.
  Drug dealers need to be in constant contact with their
  sources of supply and their confederates on the streets.
  Traffickers acquire cloned phones at a minimum cost,
  make dozens of calls, and then throw the phone away after
  as little as a days' use. In the same way, criminals who
  pose a threat to our national security, such as terrorists,
  have been known to use cloned phones to thwart law
  enforcement efforts aimed at tracking their whereabouts.
HOW TO PREVENT CLONING?
 Service providers have adopted certain measures to
  prevent cellular fraud. These include encryption, blocking,
  blacklisting, user verification and traffic analysis:
 Blacklisting of stolen phones is another mechanism to
  prevent unauthorized use. An Equipment Identity Register
  enables network operators to disable stolen cellular
  phones on networks around the world.
 User verification using Personal Identification Number
  (PIN) codes is one method for customer protection against
  cellular phone fraud.
CONTD….
 Tests conducted have proved that United States found that
  having a PIN code reduced fraud by more than 80%.
 Traffic analysis detects cellular fraud by using artificial
  intelligence software to detect suspicious calling patterns,
  such as a sudden increase in the length of calls or a sudden
  increase in the number of international calls.
 The software also determines whether it is physically
  possible for the subscriber to be making a call from a
  current location, based on the location and time of the
  previous call.
CONCLUSION
 Mobile Cloning Is in initial stages in India so preventive
  steps should be taken by the network provider and the
  Government the enactment of legislation to prosecute
  crimes related to cellular phones is not viewed as a
  priority, however. It is essential that intended mobile crime
  legislation be comprehensive enough to incorporate
  cellular phone fraud, in particular "cloning fraud" as a
  specific crime.
 Existing cellular systems have a number of potential
  weaknesses that were considered. It is crucial that
  businesses and staff take mobile phone security seriously.
REFERENCES
 www.google.co.in
 www.wikipedia.org
 www.1000projects.org/
 www.seminarsonly.com/
Mobile phone-cloning
Mobile phone-cloning

More Related Content

What's hot

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
asmita tarar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 

What's hot (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdfCYBERBULLYING DETECTION USING              MACHINE LEARNING-1 (1).pdf
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Eye phone
Eye phoneEye phone
Eye phone
 

Viewers also liked (7)

E contracts
E contractsE contracts
E contracts
 
E contract
E contractE contract
E contract
 
E contract
E  contractE  contract
E contract
 
GSM Network
GSM NetworkGSM Network
GSM Network
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Toorcamp 2016
Toorcamp 2016Toorcamp 2016
Toorcamp 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Mobile phone-cloning

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
SALMAN SHAIKH
 

Similar to Mobile phone-cloning (20)

mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Mobile phone-cloning

  • 1. Seminar Presentation on Mobile Phone Cloning By Shishupal Nagar 8CSB-1(95) DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura Tonk, Road Jaipur
  • 2. CONTENTS  INTRODUCTION  GSM & CDMA MOBILE PHONES  SOME IMPORTANT TERMS  HOW IS A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING?  CONCLUSION  REFERENCES
  • 3. INTRODUCTION CLONING:  Cloning is the creation of an organism that is an exact genetic copy of another. This means that every single bit of DNA is the same between the two! WHAT IS MOBILE PHONE CLONING?  Mobile phone cloning is copying the identity of one mobile telephone to another mobile telephone.  The purpose of mobile phone cloning is making fraudulent telephone calls.  The bills for the calls go to the legitimate subscriber.
  • 4. GSM  Global System for Mobile Communications. A digital cellular phone technology based on TDMA.  GSM phones use a Subscriber Identity Module (SIM) card that contains user account information.  Any GSM phone becomes immediately programmed after plugging in the SIM card.  Operators who provide GSM service are Airtel , Vodafone ,Idea etc.
  • 5. CDMA  It stands for Code Division Multiple Access.  In a CDMA system, your encoded voice is digitized and divided into packets.  These packets are tagged with "codes." The packets then mix with all of the other packets of traffic in the local CDMA network as they are routed towards their destination. The receiving system only accepts the packets with the codes destined for it.  Operators who provide CDMA service in India are Reliance , Tata Indicom etc.
  • 6. IMPORTANT TERMS  IMEI stands for International Mobile Equipment Identifier, this is a 10 digit universally unique number of our GSM handset. I use the term Universally Unique because there cannot be 2 mobile phones having the same IMEI no. This is a very valuable number and used in tracking mobile phones.  SIM, which stands for Subscriber Identification Module. Basically the SIM provides storage of subscriber related information.
  • 7. CONTD……  ESN, which stands for Electronic Serial Number. It is same as the IMEI but is used in CDMA handsets  MIN stands for Mobile Identification Number, which is the same as the SIM of GSM.
  • 8. HOW IS A PHONE CLONED?  Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).  The ESN/MIN pair can be cloned in a number of ways without the knowledge of the carrier or subscriber through the use of electronic scanning devices.  After the ESN/MIN pair is captured, the cloner reprograms or alters the microchip of any wireless phone to create a clone of the wireless phone from which the ESN/MIN pair was stolen.
  • 9.
  • 10. METHODS TO DETECT CLONED PHONES  Duplicate detection - The network sees the same phone in several places at the same time. Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for, or tearing down connections so that the clone users will switch to another clone but the real user will contact the operator.  Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is made but this time in Tampere, there must be two phones with the same identity on the network.
  • 11. CONTD……  Call counting - Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.  PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and then calls as usual. After the call has been completed, the user locks the phone by entering the PIN code again. Operators may share PIN information to enable safer roaming.
  • 12. CONTD….  Frequent wrong number phone calls to your phone, or hang-ups.  Difficulty in placing outgoing calls.  Difficulty in retrieving voice mail messages.  Incoming calls constantly receiving busy signals or wrong numbers. Unusual calls appearing on your phone bills.
  • 13. IMPACT OF CLONING  Each year, the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons.  Many criminals use cloned cellular telephones for illegal activities, because their calls are not billed to them, and are therefore much more difficult to trace.
  • 14. CONTD….  This phenomenon is especially prevalent in drug crimes. Drug dealers need to be in constant contact with their sources of supply and their confederates on the streets. Traffickers acquire cloned phones at a minimum cost, make dozens of calls, and then throw the phone away after as little as a days' use. In the same way, criminals who pose a threat to our national security, such as terrorists, have been known to use cloned phones to thwart law enforcement efforts aimed at tracking their whereabouts.
  • 15. HOW TO PREVENT CLONING?  Service providers have adopted certain measures to prevent cellular fraud. These include encryption, blocking, blacklisting, user verification and traffic analysis:  Blacklisting of stolen phones is another mechanism to prevent unauthorized use. An Equipment Identity Register enables network operators to disable stolen cellular phones on networks around the world.  User verification using Personal Identification Number (PIN) codes is one method for customer protection against cellular phone fraud.
  • 16. CONTD….  Tests conducted have proved that United States found that having a PIN code reduced fraud by more than 80%.  Traffic analysis detects cellular fraud by using artificial intelligence software to detect suspicious calling patterns, such as a sudden increase in the length of calls or a sudden increase in the number of international calls.  The software also determines whether it is physically possible for the subscriber to be making a call from a current location, based on the location and time of the previous call.
  • 17. CONCLUSION  Mobile Cloning Is in initial stages in India so preventive steps should be taken by the network provider and the Government the enactment of legislation to prosecute crimes related to cellular phones is not viewed as a priority, however. It is essential that intended mobile crime legislation be comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a specific crime.  Existing cellular systems have a number of potential weaknesses that were considered. It is crucial that businesses and staff take mobile phone security seriously.
  • 18. REFERENCES  www.google.co.in  www.wikipedia.org  www.1000projects.org/  www.seminarsonly.com/