-->

W E L C O M E

Related Posts Plugin for WordPress, Blogger...

Wednesday 28 August 2013

If Your Mobile Phone Was Stolen & You Hate the Phone Thief, You Will Do This


If your phone was stolen, there isn’t much you can do about it in India. The story is usually that you go to the cops, lodge a complaint and they ask you for the bills and unique numbers for the mobile phone. Everybody forgets about it, except you.
Ever wonder if you could do something about this? Register your new phone or stolen phone on MyCellWasStolen, an online database of mobile phones and stand a chance to get it back. Or at least avenge the theft by doing your bit to end the racket!
Here’s how it works: Once you register your phone, it tracks the mobile so that it becomes difficult for the thief to sell the phone. Under normal circumstances, a stolen cellphone is repackaged and sold to an unsuspecting buyer. But imagine if buyers could check if the phone was stolen before buying? The database makes it possible by telling the buyer if its a stolen device or not.
End Phone Theft (Pic: Anand Murali/ NBW)
End Phone Theft (Pic: Anand Murali/ NextBigWhat)
The database is also shared with carriers, who can block calls from stolen phones. Local crime authorities also have access to the data so they can raid shops that sell stolen goods. You could also register a new cell phone on the site, so it can be tracked in the event of theft.
The service was built by Vikas Hazrati, the CTO & Founder of Knoldus Software and his team.
Such a database is of no use unless a large number of people start using it. Morever, the altruistic nature of a buyer can be trusted enough for him to go and check on the site every time he or she buys a device. Second hand phone buyers can be shady too.
The database will gain a lot of credibility if it was maintained by a law enforcement agency directly in collaboration with carriers and consumers. A nationwide database could be the perfect solution for them to curb phone theft. However, this could also throw up interesting questions on privacy and cell phone based tracking.
MyCellWasStolen is not the only database that provides such a service. Websites like missingphones.org, that of the Indore Police department and a few others do the same. The Indian government is also thinking of creating such a database for which it has talked to various companies.

Tuesday 27 August 2013

Offence and Penal Sections in case of driving.

Offence and Penal Sections

S.No.

Offence description

Penal section

Amount
1No Overtaking6RR/177MVARs. 100
2Driver without UniformDMVR7/177MVARs. 100
3Smoking by Driver/ConductorDMVR11.2/177MVARs. 100
4Misbehavior by TSR/TAXI DriverDMVR11.3/177MVARs. 100
5Overcharging By TSR \TaxiDMVR11.8/177MVARs. 100
6Refusal by TSR/TAXI DriverDMVR11.9/177MVARs. 100
7Park\Wait in Bus lane\Bus StandRRR15(2)/177MVARs. 100
8Open DalaRRR16.1\177MVARs. 100
9One way ViolationRRR17(1)/177MVARs. 100
10Violation of Yellow line18(||)RRR119/177MVARs. 100
11Yellow line ViolationRRR18.2MVARs. 100
12IN Case of Bus/HTVs62/192A MVATo Court
13Multi-toned HornRRR 21.4/177MVARs. 100
14Conductor without BadgeDMVR22(1)/177MVARs. 100
15Conductor without UniformDMVR 29(1/)/177 MVARs. 100
16Carrying High/Long LoadRRR 29/177 MVARs. 100
17W/O Registration CertificateRRR32/177 MVARs. 100
18Without Knowledge of Traffic rules RRR33/177 MVARs. 100
19Driving With defective number plateCMVR50/177 MVARs. 100
20Not displaying number plateCMVR50/177 MVARs. 100
21Without fitness56/192 MVARs. 2000
22Overtaking to other commercial vehicle in running condition  66/192 A MVATo Court
23picking passenger without stand66/192A MVATo Court
24Running in first Line (Not in bus lane) 66/192A MVATo Court
25Without speed Governor66/192A MVATo Court
26School bus without school board66/192 MVATo Court
27Without Permit66(1)/192A MVATo Court
28Advertisement on vehicle DMVR 71.2/177MVARs. 100
29Cruelty with animal DMVR 80/177MVARs. 100
30Caring passenger in goods vehicleDMVR 84(2)/177MVARs. 100
31Caring goods  in passenger  vehicleDMVR 84(4)/177MVARs. 100
32Without log bookCMVR 85(10)177 MVRs. 100
33Smoking in the vehiclesDMVR 86.1(5)/177MVARs. 100
34Blowing of pressure horn DMVR 96(1)/177MVARs. 100
35Using horn in no honking zoneDMVR 96(1)/177MVARs. 100
36Use of colored light in motorDMVR 97(2)/177MVARs. 100
37W/O PUC certificate99(1)177MVARs. 100
38Excess smokeDMVR 99(1) A /177MVARs. 100
39Tinted GlassCMVR 100.2/177MVARs. 100
40Without WiperCMVR 101/177MVARs. 100
41Playing MusicDMVR 102/177MVARs. 100
42Driving Without light after sun setCMVR 105/177MVARs. 100
43Using sirenCMVR 107/177MVARs. 100
44Using High Beam112(4)(A)&(C) 177MVARs. 100
45Over Speed112/183(1)MVARs. 400
46Abetment of over speeding112/183(2)MVARs. 300
47Violation of stop line113(1)/177 MVARs. 100
48Over Weight113/194 MVARs. 2000
49Violation of restriction of trip115/194 MVARs. 2000
50Red light Jumping119/177 MVARs. 100
51Violation of mandatory signs ( one way no right turn no left turn no horn )119/177 MVARs. 100
52Driving without hornCMVR 139.1/177 MVARs. 100
53Driving left hand drive without indicator120/177 MVARs. 100
54Driving without silencerCMVR 120/177 MVARs. 100
55improper & obstructive parking 122/177 MVARs. 100
56Traveling running board (Driver)128(1)/177 MVARs. 100
57Traveling running board (passenger)128(2)/177 MVARs. 100
58Traveling without pass / ticket124/177 MVARs. 100
59Obstructive driving (Extra passenger on driver seat)126/177 MVARs. 100
60Triple ridding122/177 MVARs. 100
61Driving without helmet (Rider or Pillow Rider)129/177 MVARs. 100
62Conductor without license129/182 MVARs. 100
63Disobeying lawful direction 132/179 MVARs. 500
64Not using seat beltCMVR 138(3)/177 MVARs. 100
65W/O insurance146/196 MVARs. 1000
66Misbehavior with police officer179 MVARs. 1000
67Driving dangerously184 MVARs. 1000
68Using mobile phone while driving184 MVARs. 1000
69Drunken driving ( breathe test) is possible  evidence u/s 203 185 MVATo Court
70Using vehicle without registration or permits (for commercial vehicle) 192 A MVATo Court
71Driving without licence3/181 MVARs. 500
72Driving by minor4/181 MVARs. 500
73Allowing unauthorized person to drive5/181 MVARs. 1000

Offences for Which Only Court Challans Shall Be Made

1.Drunken Driving (Breath Test) is permissible evidence u/s 203)185
2.Using vehicle without permit (for Commercial Vehicles)192A
MVAMotor Vehicle Act, 1988
CMVRCentral Motor Velhicles Rules, 1989
DMVRDelhi Motor Vehicles Rules, 1989
RRRRules of Road Regulation, 1989
RWPRank_wise Prosecution 

Monday 26 August 2013

Keyboard to get rid of Facebook addiction



 Two doctoral candidates from MIT have created a new keyboard device that is capable of shocking users overindulging online.
Robert R. Morris and Dan McDuff calculated that they were wasting about 50 hours a week on Facebook so to stop that from happening again they turned to Pavlovian method, Discovery News reported.
McDuff said that the keyboard is able to monitors application usage and if it senses that too much time is being spent on a particular website or application it give a shock to its users, asserting that the shock is just unpleasand and not dangerous.
The system that they have devised uses a Mac's UI Inspector for monitoring application usage and a processing code, which routes on-screen alert signals to an Arduino board that activates a relay and initiates a shock circuit.
That current is then passed on to conductive metal strips that is embedded in a keyboard rest pad. 

Saturday 17 August 2013

5 Incredibly Useful Google Search Operators You Should Know About

For the majority of us, searching on Google means typing the query in the search bar (or the address bar as most of the browsers these days let you search directly from there), and hitting the Enter/return key. That's how most of us search on Google. Doesn't mean there aren't better ways to do it. 
 
Google provides a number of search operators that make searching and filtering the results very easy. Learning them makes sense considering the time you'd end up spending on Google in your lifetime. Here are the 5 most useful of them:
 
1. "query" - Double quotes are used to search for a specific phrase. If you were to search for, let's say, halloween in Nebraska, not all the results will have that exact phrase. Instead, Google will treat those words as separate and show the results accordingly. However, if you do "halloween in Nebraska", only those results will show up that have the exact phrase. 
 
2. -query - Use this to exclude something from the results. For example, if I were to search for Microsoft -Google, that means I need results that talk about Microsoft without any reference to Google. 
 
3. intitle: - This can be used when you need to locate text in the title of an article. So doing a search for intitle:Windows 8 Start Screen will show the articles that have this phrase in their title.
 
4. site: - You may use this one when you want to restrict your search to a specific site. If you do site:techsspots.blogspot.in, it will only show posts from our blog. If you were to do gmail site:techsspots.blogspot.in, it will show the posts about Gmail on techsspots.
 
5. filetype: - This is for locating files. For instance, filetype:pdf will return results that contain PDF files. 
 

Tip: All the above operators can also be used in conjunction with each other. For example, you could do "Gmail" -Firefox to find posts about Gmail that exclude references to Firefox. 

Saturday 10 August 2013

BusinessCards MX 4.87 Datecode 06.08.2013 + Keygen and Serial



530c0b4ccd86e580256aeb6a5d06e136.jpeg

Details:

BusinessCards MX 4.87 Datecode 06.08.2013|89.5 MB


BusinessCards MX - a very powerful program for creating and designing business cards. Able to very easily and quickly create and print professional business cards. The program interface is designed in such a way that even a beginning user will not have problems with using the program. The process of designing is based on inserting ready-made elements accessible in the program such as figures, images and the background, and freely shifting them on the prepared project. The program uses templates which you can prepare your own or use ready models of business cards.

Features:
Work with the formats JPG, BMP, WMF, PNG, TIFF and other
Use of a dozen effects when working with objects (text, image, backgrounds)
export graphic files to PDF, JPG, TIFF, BMP with a high resolution (300 DPI, 600 DPI)
Size of business cards: min - 70 × 40, max - 105? 65
Change the appearance of the interface
Convert and export to CMYK (with profiles ICC)
Support for right to left languages ​​(like arabic, hebrew)
Unicode Support
Ability to print on both sides of the paper (duplex printing)
Multilingual interface

When you add new templates when selecting their thumbnails are not visible, which is extremely inconvenient, correct it as follows:
- Click Open Template
- Select and open the template
- Press the back button
- Click Next
- Click Open Template
- Generate: The current document has been modified. You want to save the changes?
- Press Yes
All sketch template becomes visible. But just to torment with each pattern!

Information about the program:
Year: 2013
Platform: Windows 8/XP/Vista/7
Language: Multilingual + Russian
Medicine: keygen MAZE
File Size: 89.53 MB


How to Install:

NOTE: Keygens, patches, Activators, Cracks, Loaders etc. are always scanned with Kaspersky Internet Security 2013 Latest Version to Avoid Virus Issues. Different Anti-viruses may give different results

(1): Please use 7Zip/WinRAR/Universal Extractor to EXTRACT FILES
(2): run the setup
(3): Use the given Keygen and Serial to activate
(4): Enjoy and Support Developers, Buy It, They Deserved It!

PS : If You got an error while extracting while others are working try diferent directory path in your PC. Somtimes if you got a long directory path while extracting it will giv you an error. To solve this issue , as an example just paste the tgz file in C drive and extract (just inside the C drive not with in any other folder). Hope your Understand

Thursday 8 August 2013

Fingerprints for sim cards: DoT examines proposal

The Department of Telecom is examining a proposal for making it compulsory for mobile operators to take fingerprint or any other biometric feature of the subscriber at the time of receiving application for a new mobile connection. 

Minister of State for Communications and ITMilind Deora said DoT has recently received a suggestion from the Ministry of Home Affairs indicating that a central database be maintained by DoT of all subscribers which maintains biometric parameters akin to the Aadhaar system.

"As per this proposal, this would entail taking fingerprint/thumb impression or any other unique biometric feature of the subscriber when he/she applies for a mobile connection," Deora said in a written reply to the Lok Sabha.

He added the suggestion "is presently being examined in DoT and decision on the same is yet to be taken."

Strengthening the rules for taking a new mobile connection, the DoT last year came with tough guidelines which called for physical verification of facts provided by the subscriber.

The guidelines also made operators responsible for inaccurate information provided by subscribers for taking new prepaid and postpaid mobile connections.

Under the new rules, the authorized person selling sim cards has to give an undertaking that he has seen the applicant and matched the photograph attached on the application form.

Retailers and franchisees selling mobile sim cards have to register police complaint against subscribers if they submit forged documents to get the connections.

Wednesday 7 August 2013

How To Format External Hard Drive In FAT32

Majority of computer users own at least one external hard drive these days. While it’s always a good idea to format the external hard drive with NTFS because of its advantages, sometimes you might have to format your external hard drive with FAT32. For instance, if you want to transfer files from a Mac to your external hard drive, you need to format the drive in FAT32 as Mac OS X doesn’t support transferring files to NTFS drive (doesn’t support writing to NTFS).
Although one can always right-click on a drive, select Format, and then select FAT32 as file system, Windows doesn’t show FAT32 file system option when you are trying to format a drive that is larger than 32GB. So how to format an external drive with a capacity of more than 32GB with FAT32?
Format External Hard Drive In FAT32
There are a couple of ways to format your external hard drive in FAT32, even if it’s larger than 32GB. The best method is to use the native Command Prompt to quickly change the file system to FAT32. Users who aren’t comfortable using Command Prompt can use third-party tools such as FAT32 Format, Seagate DiscWizard (only for Seagate drives) and Acronis True Image Western Digital Edition (supports only WD drives).
In this guide, we are going to show you how to format an external hard drive with FAT32 fie system with the help of native Command Prompt and also with the using a free tool called FAT32 Formatter.
Warning: Formatting a drive will erase all data on the drive. So please backup all data to another drive before formatting your drive.
Method 1: Formatting external drive with FAT32 file system using Command Prompt.
Step 1: Open Command Prompt. To do this, you can type CMD in Start menu search box (Vista and Windows 7), or in the Start screen (Windows 8 and Windows 8.1) and then press Enter key.
Alternatively, you can open Run dialog box by using Windows logo + R hotkey, type CMD in the box, and then press Enter key to open Command Prompt.
Format Large External Hard Drive FAT32 Step1
Step 2: In the Command Prompt, enter the following command and press Enter key.
format /FS:FAT32 X:
(In the above command, replace “X” with the drive letter of your external drive. You can find the drive letter of your external drive by opening Computer or My Computer)
You’ll be asked to enter the Volume Label (drive name as it appears in Computer). Type the volume label, press Enter key and finally, press “Y” (without quotes) key to confirm.
Format External Hard Drive FAT32
Method 2: Formatting external hard drive with FAT32 file system using FAT32 Format software.
(Since Seagate DiscWizard is compatible with Seagate drives only, and Acronis True Image WD Edition supports on WD drives, we are going to use FAT32 Format software, a free software that supports all drives.)
Step 1: Visit this page and click on the FAT32 Format’s picture to start downloading the software. It’s a portable software and doesn’t require an installation.
Step 2: Run FAT32 Format tool.
Format Large External Hard Drive FAT32 Step4
Step 3: Select your external drive’s drive letter, enter a volume label for the drive, and then click the Start button to begin formatting your drive with FAT32. That’s it! Good luck.
If for any reason, FAT32 Formatter fails to work on your PC, you can use FAT32FileSystem or FAT32 Formatter for the same job.

Tor Project: Stop using Windows, disable JavaScript to protect your anonymity

The Tor Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered anonymity tool.
The zero-day vulnerability allowed as-yet-unknown interlopers to use a malicious piece of JavaScript to collect crucial identifying information on computers visiting some websites using The Onion Router (TOR) network.
"Really, switching away from Windows is probably a good security move for many reasons," according to a security advisory posted Monday by The Tor Project.
The Tor Project's reasoning comes from the characteristics of the malicious JavaScript that exploited the zero-day vulnerability. The script was written to target Windows computers running Firefox 17 ESR (Extended Support Release), a version of the browser customized to view websites using TOR.
People using Linux and OS X were not affected, but that doesn't mean they couldn't be targeted in the future. "This wasn't the first Firefox vulnerability, nor will it be the last," The Tor Project warned.
hackers
The JavaScript was likely planted on certain websites that the attacker wanted to see who came to visit. The script collected the hostname and MAC (Media Access Control) address of a person's computer and sent it to a remote computer, the exact kind of data that Tor users hope to avoid revealing while surfing the Internet.
"This exploit doesn't look like general purpose malware; it looks targeted specifically to unmask Tor Browser Bundle users without actually installing any backdoors on their host," said Vlad Tsyrklevich, a security researcher who analyzed the code, in an email. He published an analysis on his website.
The Tor Project also advised users to turn off JavaScript by clicking the blue "S" by the green onion within the Tor browser.
"Disabling JavaScript will reduce your vulnerability to other attacks like this one, but disabling JavaScript will make some websites not work like you expect," Tor wrote. "A future version of Tor Browser Bundle will have an easier interface for letting you configure your JavaScript settings."
The vulnerability was patched by Mozilla in later versions of Firefox, but some people may still be using the older versions of the Tor Browser Bundle. The bundle's browser, based on Firefox, is designed to protect your anonymity while surfing the web, and is specially configured to visit TOR sites, which have URLs that look like "http://idnxcnkne4qt76tg.onion/."
[Read: Review: Tor Browser Bundle lets you browse in anonymity]
Requests to websites on Tor take a circuitous route through a network of servers around the world designed to obscure a computer's IP address and other networking information that makes it easier to link a computer to a user.
Several Tor Browser Bundle versions were fixed over a four-day period starting June 26. Although the Browser Bundle will automatically check for a new version, it is possible that some users didn't upgrade, which could have put them at risk.
"It's reasonable to conclude that the attacker now has a list of vulnerable Tor users who visited those hidden services," The Tor Project wrote.
Although unconfirmed, computer security experts have theorized the malware may have been used by law enforcement to collect information on people who browsed certain Tor websites supported by a company called Freedom Hosting.
That hosting company is believed to be connected to a 28-year-old man, Eric Eoin Marques. He is being held by Irish authorities pending an extradition request from the U.S. on charges of distributing and promoting child pornography, according to the Irish publication the Independent.
In response to a query about the case, the FBI said Monday that someone had been arrested as part of an investigation, but did not identify the person.

Monday 5 August 2013

150Mbps Wireless N Nano Router TL-WR702N

What is the TL-WR702N?

The TL-WR702N is designed for use with tablets, smart phones, handheld game consoles and other portable electronic wireless devices. The device, which can be powered by an external power adapter or USB connection to a computer, can conveniently connect to the internet and share the connection around an average sized room at 150Mbps.The device’s tiny size makes it ideal for use on the road and is powerful enough to satisfy almost any basic wireless application requirement.

Portable and Compact—Ideal for Home and Travel Use

TL-WR702N is the smallest wireless router in the world and very easy to use. A traveler need simply plug a hotel room’s WAN cable into the port provided and enter a default password to instantly create a wireless hotspot in the room.
                

Flexible Power Supply—Easy to Take on the Road

TL-WR702N has a Micro USB port and can be powered by an external power adapter or via a USB connection to a computer. When traveling, users can plug the TL-WR702N into their computer’s USB port and share their Wi-Fi connection with family and friends. 
                    

Multiple Operating Modes

TL-WR702N supports AP, Router, Bridge, Client and Repeater modes to enable various wireless applications to give users a more dynamic and comprehensive wireless networking experience. 
                               

Advanced Security

TL-WR702N provides WPA-PSK/WPA2-PSK encryptions, which can effectively and efficiently protect the wireless network. What makes the nano router more powerful is its Pre-Encryption function which sets the initial SSID and Password for users to protect their wireless security.
                         

FEATURES

  •  Compatible with IEEE 802.11b/g/n
  • Wireless speed up to 150Mbps
  • Compact and portable, small enough to take on the road
  • Powered through a micro USB port by an external power adapter or USB connection to a computer
  • Compatible with almost all 2.4GHz Wi-Fi devices
  • Supports AP, Router, Client, Bridge and Repeater operation modes
  • Supports WEP, WPA/WPA2, WPA-PSK/WPA2-PSK encryptions

like