Quantum Quarks

Quantum Quarks is a technical competition fully based on the field of IT. It is mainly focussed on the problem-solving and the basic Knowledge about Networking and IT which will test the Learning, Grasping and Implementation Skills of the participants rather than their Programming skills.




Assistance & tabs

Can I Participate?

Yes, Any Student can participate provided he/she pays the registeration fees on the day of the Event to the respective head.

Do I have to register for the event?

Yes, You must Register. Provide your Registeration id in the above mentioned blank and click on Participate.

Do I need a prerequisite?

Anything required in or during the event is mentioned in the details tab of the event. You must go through that before participating.

  • Details
  • Venue
  • Rules & Regulations

The event will have only three rounds -
In the First round, the participants will be given basic problems on the Cryptography and some puzzles based on algorithms.
In the second round, the participants will be provided an router with a LAN cable and a Laptop. They simply have to set up a password protected WI-fi using that router as a repeater for our College Wi-Fi which should have internet access.
In the third round, Participants will be connected over the same network as the target PC and they have to spoof the college website on the Target PC..

Coming Soon

Pen is mightier than the PC:

The first round will be pen and paper and the participants will have to solve the competitive questions on cryptography and algorithms. Those participants who solves the maximum problems in the given time will be selected for the next round.
TIME:- 25-30 Mins


NetworKING:


The participants have to extend the signal of our College Wi-fi and make it Password protected using a Router and a Laptop. The Wi-Fi network formed by the router should have proper internet access. Students have to configure the router in such a way that it takes the internet access from the Laptop(which will be connected to our College Wi-Fi) through LAN and further extend it as a password-protected Wi-Fi.
TIME:- 45 Mins


DNS Spoofing:

The Target and the Participants PC's will be connected over the same network. The participants have to spoof the DNS of target PC. They can also Access the Target PC if they want to a