Monday, August 14, 2017

India immediately shut down Internet






In a democracy like India, internet shutdowns have become a norm. The authorities suspend mobile internet and broadband services whenever there have been violence, widespread protests because of social media posts or otherwise.
According to Brookings Institution report, India lost over Rs. 6, 548 cores in business due to internet shutdowns in the past 3 years.

Similarly, The Software Freedom Law Centre’s has an internet shutdown tracker which lets everyone check data on internet services being suspended.

Below is the list of internet shutdowns that have taken place at India in 2017 so far.

Jammu and Kashmir

The valley has led the list in facing the most number of internet shutdowns in India. In 2017 so far, there have been 10 cases of internet suspensions due to various incidents. Recently, due to the killing of Amarnath Yatris in Kashmir, internet services were terminated as a precaution. Earlier, internet services were suspended for around 17 days after the killing of killing of Burhan Wani. In total the valley has seen around 40 internet shutdowns since 2011.

Rajasthan

India’s largest state by area and known for its forts and palaces has seen 3 internet shutdowns so far in 2017. In June 2017, mobile internet services were suspended in Nagaur and Churu as there were vehement protests by Rajputs over the encounter of gangster Anandpal Singh. Earlier in March, a scuffle had broken out between two rival groups because of which services were suspended in Rajasthan’s Sikar district.

Haryana

The state has seen 5 shutdowns so far in 2017. In March, internet services and bulk mobile messaging was suspended in the apprehension of any untoward incidents which might occur due to the proposed Jat agitation to Delhi. Earlier in January 31st, the Jat quota agitation resulted in internet services being suspend in certain sensitive areas to prevent the spread of rumour.

Uttar Pradesh

Internet services have so far been suspended for 2 times in the state. In June 2017, after the main accused of the Saharanpur violence was arrested, internet services were shut down across the entire district for two days.

Earlier, the UP government had suspended internet services in the Saharanpur area to stop rumor mongering and violence after clashes took place between the Dalit and Rajput community.

Madhya Pradesh
So far this year, there has been only one instance of internet shutdown after police opened fire during a farmers protest at Mandsaur. Later on, Internet services in Mandsaur, Ratlam and Ujjain were suspended.

West Bengal
Mobile internet services were taken down 3 times so far in West Bengal. Due to a Facebook post, intense clashes broke out in Baduria and Basirhat in North 24 Parganas after which internet services were disrupted. Similarly, due to unrest in Darjeeling over Gorkhaland agitation, web services were taken down.

Nagaland
Mobile internet services were taken down multiple times from January 30th 2017, as clashes took place between urban local bodies and the state government over reservation in civic body elections. So far internet services have been taken down 2 times in 2017.

Maharashtra
Mobile internet services were taken down once in Nasik on 5th June, 2017 due to the state wide protests by the farmers.

Odisha
So far internet services have been taken down 2 times in 2017. Firstly in April, services were suspended for 48 hours in the wake of “objectionable post” on social media

Friday, May 12, 2017

11 things you can do to protect against ransomware, including Cryptolocker


1. Back up your data
The single biggest thing that will defeat ransomware is having a regularly updated backup. If you are attacked with ransomware you may lose that document you started earlier this morning, but if you can restore your system to an earlier snapshot or clean up your machine and restore your other lost documents from backup, you can rest easy. Remember that Cryptolocker will also encrypt files on drives that are mapped. This includes any external drives such as a USB thumb drive, as well as any network or cloud file stores that you have assigned a drive letter. So, what you need is a regular backup regimen, to an external drive or backup service, one that is not assigned a drive letter or is disconnected when it is not doing backup.
The next three tips are meant to deal with how Cryptolocker has been behaving – this may not be the case forever, but these tips can help increase your overall security in small ways that help prevent against a number of different common malware techniques.
2. Show hidden file-extensions
One way that Cryptolocker frequently arrives is in a file that is named with the extension “.PDF.EXE”, counting on Window’s default behavior of hiding known file-extensions. If you re-enable the ability to see the full file-extension, it can be easier to spot suspicious files.
3. Filter EXEs in email
If your gateway mail scanner has the ability to filter files by extension, you may wish to deny mails sent with “.EXE” files, or to deny mails sent with files that have two file extensions, the last one being executable (“*.*.EXE” files, in filter-speak). If you do legitimately need to exchange executable files within your environment and are denying emails with “.EXE” files, you can do so with ZIP files (password-protected, of course) or via cloud services.
4. Disable files running from AppData/LocalAppData folders
You can create rules within Windows or with Intrusion Prevention Software, to disallow a particular, notable behavior used by Cryptolocker, which is to run its executable from the App Data or Local App Data folders. If (for some reason) you have legitimate software that you know is set to run not from the usual Program Files area but the App Data area, you will need to exclude it from this rule.
5. Use the Cryptolocker Prevention Kit
The Cryptolocker Prevention Kit is a tool created by Third Tier that automates the process of making a Group Policy to disable files running from the App Data and Local App Data folders, as well as disabling executable files from running from the Temp directory of various unzipping utilities. This tool is updated as new techniques are discovered for Cryptolocker, so you will want to check in periodically to make sure you have the latest version. If you need to create exemptions to these rules, they provide this document that explains that process.
6. Disable RDP
The Cryptolocker/Filecoder malware often accesses target machines using Remote Desktop Protocol (RDP), a Windows utility that allows others to access your desktop remotely. If you do not require the use of RDP, you can disable RDP to protect your machine from Filecoder and other RDP exploits. For instructions to do so, visit the appropriate Microsoft Knowledge Base article below:
7. Patch or Update your software
These next two tips are more general malware-related advice, which applies equally to Cryptolocker as to any malware threat. Malware authors frequently rely on people running outdated software with known vulnerabilities, which they can exploit to silently get onto your system. It can significantly decrease the potential for ransomware-pain if you make a practice of updating your software often. Some vendors release security updates on a regular basis (Microsoft and Adobe both use the second Tuesday of the month), but there are often “out-of-band” or unscheduled updates in case of emergency. Enable automatic updates if you can, or go directly to the software vendor’s website, as malware authors like to disguise their creations as software update notifications too.
8. Use a reputable security suite
It is always a good idea to have both anti-malware software and a software firewall to help you identify threats or suspicious behavior. Malware authors frequently send out new variants, to try to avoid detection, so this is why it is important to have both layers of protection. And at this point, most malware relies on remote instructions to carry out their misdeeds. If you run across a ransomware variant that is so new that it gets past anti-malware software, it may still be caught by a firewall when it attempts to connect with its Command and Control (C&C) server to receive instructions for encrypting your files.
If you find yourself in a position where you have already run a ransomware file without having performed any of the previous precautions, your options are quite a bit more limited. But all may not be lost. There are a few things you can do that might help mitigate the damage, particularly if the ransomware in question is Cryptolocker:
9. Disconnect from WiFi or unplug from the network immediately
If you run a file that you suspect may be ransomware, but you have not yet seen the characteristic ransomware screen, if you act very quickly you might be able to stop communication with the C&C server before it finish encrypting your files. If you disconnect yourself from the network immediately (have I stressed enough that this must be done right away?), you might mitigate the damage. It takes some time to encrypt all your files, so you may be able to stop it before it succeeds in garbling them all. This technique is definitely not foolproof, and you might not be sufficiently lucky or be able to move more quickly than the malware, but disconnecting from the network may be better than doing nothing.
10. Use System Restore to get back to a known-clean state
If you have System Restore enabled on your Windows machine, you might be able to take your system back to a known-clean state. But, again, you have to out-smart the malware. Newer versions of Cryptolocker can have the ability to delete “Shadow” files from System Restore, which means those files will not be there when you try to to replace your malware-damaged versions. Cryptolocker will start the deletion process whenever an executable file is run, so you will need to move very quickly as executables may be started as part of an automated process. That is to say, executable files may be run without you knowing, as a normal part of your Windows system’s operation.
11. Set the BIOS clock back
Cryptolocker has a payment timer that is generally set to 72 hours, after which time the price for your decryption key goes up significantly. (The price may vary as Bitcoin has a fairly volatile value. At the time of writing the initial price was .5 Bitcoin or $300, which then goes up to 4 Bitcoin) You can “beat the clock” somewhat, by setting the BIOS clock back to a time before the 72 hour window is up. I give this advice reluctantly, as all it can do is keep you from having to pay the higher price, and we strongly advise that you do not pay the ransom. Paying the criminals may get your data back, but there have been plenty of cases where the decryption key never arrived or where it failed to properly decrypt the files. Plus, it encourages criminal behavior! Ransoming anything is not a legitimate business practice, and the malware authors are under no obligation to do as promised – they can take your money and provide nothing in return, because there is no backlash if the criminals fail to deliver.

Friday, November 25, 2016

Reliance Jio 4G VoLTE technology: Here’s how voice-calls will work


Reliance Jio 4G is now open for all: From VoLTE to LTE to 4G we explain what you’re getting into with Jio service.

With Reliance Jio shaking up the market with the announcement of their 4G service, there seems to be a growing confusion among buyers regarding the technology the network will deploy. We have a small guide to help you work through the various terms such as VoLTE, LTE, 4G and the likes so that you know exactly what you’re getting into with the Reliance Jio service.

What is VoLTE?

VoLTE stands for Voice over LTE and is a new protocol for transmitting voice data over the LTE network. While 2G and 3G networks are circuit-switch based, 4G or LTE networks utilise Packet Switching. When a call is made over a 2G or a 3G network, a certain amount of network bandwidth is assigned to that call as a pipeline, which does not terminate till the call ends. On a VoLTE network, voice calls are broken up into packets of information, sent over the full data pipeline and then reconstructed at the receiver’s end. The result is that voice information can be carried over a higher bandwidth pipe, resulting in better call quality.

LTE and VoLTE is NOT the same

It is essential to understand that LTE (also referred to as 4G-LTE) is a wholly IP-based communications protocol. Existing carriers have all 2G,3G and 4G setups on their network, allowing data to go through the 4G band while pushing calls through the 2G/3G band. While LTE is the next generation data transmission protocol with higher two-way bandwidth, it is capable of only transmitting data. VoLTE is the way in which a voice call can be converted to digital packets and transmitted over the LTE network. In effect, VoLTE is a subset of the LTE technology.

Phone Compatibility

Reliance Jio’s network is purely LTE, and does not have any 2G and 3G bands and as such, calls made on this network will only be VoLTE based. Therefore, in order to use the feature, you must have a handset which is VoLTE enabled. While VoLTE is baked into most of the modern Qualcomm and several Mediatek SoCs, the feature may not be enabled on the handset and can be done so by means of a software update to be pushed out by the handset manufacturer.

A phone may be able to use the LTE network, but the VoLTE feature is separate and as such, must be enabled. If you have an LTE enabled phone, you can use the data services of the Jio SIM. In order to make calls over the Reliance Jio network, you must either use the sim in a VoLTE enabled phone, or an LTE enabled phone running the JioJoin app (available only on Android phone running Version 4.0 and up).

Turning Off Data

Its probably not the best to turn off data on your cellphone if you’re on the Reliance Jio network. Since all traffic on the network is running over a data line, disabling data would effectively put the phone in the equivalent of airplane mode. It should be mentioned that Reliance has clarified that data usage towards voice calls will not be counted towards the data allotment of the monthly plans.

HD Calling
HD Calling is being touted as a major feature of the VoLTE saga, but there is a caveat. Calls are in HD only if the parties engaged in a phone call are both on Reliance’s Jio network The call has to originate and terminate on a VoLTE enabled handset. You can still make and receive calls from other networks, but they won’t be in the higher quality standard that you can expect from a VoLTE call.



Source by indianexpress..

Sunday, January 17, 2016

Why You Should Buy a Refurbished Laptop OR Desktop (New isn't always better)

 

"Refurbished" sounds like a dirty word to a lot of technophiles, but given the savings and hidden advantages, it's time to change your thinking.

Refurbished vs. used

There's a difference between refurbished and used. Used means a product has been used for a significant amount of time by the previous owner. If they took care of it, you'll get a significant discount on a product in reasonable condition, but they're sold as-is, meaning, if the hard drive fails after a couple of months, you either have to fix it or write it off. Even if they're "fixed up," they're still used.
A refurbished unit is one that was returned to the manufacturer or seller for some reason. They can no longer sell the unit as new, so they fix whatever was wrong (which isn't always a defect) and sell it as refurbished. There are several reasons a product could be sold as refurbished.
  • Demo/floor model units
  • Blogger/journalist review models
  • Items damaged in shipping
  • Returned (unopened) products
  • Products with opened boxes, even if the item itself is unused
  • Products with defective parts

Pros of buying refurbished


You do have to be careful buying refurbished electronics. But there are several benefits to these, even over new.
Firstly, they're between 15 and 30 percent cheaper than a brand new counterpart. That's a savings of $150 to $300 on an item that's normally $1,000. While that may not sound like much, consider what you could spend the money on otherwise (for example, those cute kitten heels you've been eyeing). The additional savings could even be enough to allow you to get a more sophisticated model than you'd normally be able to afford.
Also, products refurbished as part of a reputable program are usually less likely to have any damage or defects. Not only has the damaged part been replaced, but all other parts have been tested yet again.

How to buy refurbished

Not all refurbishment programs are created equal. Apple and Dell (among others) have received rave reviews for their refurbished electronics. When buying refurbished, look for programs with these qualities.
  • Full disclosure — A company that has quality standards will have no problem telling you what they are.
  • Certified — Refurbished products that are certified by the original manufacturer are more likely to meet stringent quality standards.
  • Warranty/Extended service agreement — A good refurbishment program has at least a 90-day manufacturer warranty on the product. Better ones have a full year. Those that offer you the option of purchasing extended service agreements (beyond the automatic warranty) show they stand behind their refurbishment process.
  • Return policy — The warranty is good, but sometimes you just change your mind. Policies of two weeks and 30 days are pretty standard, though some go as long as 90 days.
  • Everything else — The first thing to do when you get your refurbished product home is check to make sure it has everything the new model was supposed to come with unless otherwise disclaimed. Don't be alarmed if it comes with a newer version, so long as it's compatible.

Mr. Santosh Paswan
Mob: 9773 567 888

ETECHSERVE
Shop No.33/K/6, Road No. 5,
Opp.Usmania Bakery,Shivaji Nagar,
Govandi, Mumbai -4000 43.
E-mail: support@etechserve.in   

Deals In Laptops. Desktops. Servers. Printers. Toners, Projectors. Mac.
Specialist in rental of Laptops, Desktop, Printers Servers Mac book & iPhones.



Saturday, November 21, 2015

What's the difference between an Intel Core i3, i5 and i7 ?

Difference ( Core i3 , Core i5 & Core i7)


Intel Core i3 Processor

This particular Intel processor is the enter level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.
Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.
  • Uses 4 threads. Yes, it uses hyper-threading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.
  • This processor consists of 2-4 cores, depending on which one you get your hands on.
  • Contains A 3-4 MB Cache
  • Uses less heat and energy than earlier processors, which is always a good thing in this day and age.

Intel Core i5 Processor

  • This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.
  • As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.
  • This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.
  • The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyper threading technology for a boost in performance.
  • The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.
  • The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.

Intel Core i7 Processor

  • This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. 
  • The cache on this one is 4-8 MB.
  • This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky.  And yes it also utilizes hyperthreading technology.
  • You will have four cores to take advantage of with this particular series.
  • And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.

Monday, December 8, 2014

Exclusive: Google Chromecast Arrives in India Tomorrow Exclusively via Snapdeal

A source close to iGyaan has revealed that Google Chromecast is now going to be available for purchase in India. The unique device that helps mirror everything from your tablet and smartphone to your TV is arriving on 9th December i.e. tomorrow. Google Chromecast is the perfect device for those who enjoy the luxuries of big screen viewing.
Sources also revealed that the news will be announced at the Google Online Shopping Festival and the device will be available exclusively on Snapdeal. The company is also building a development platform for Chromecast users for easy viewing on smartphones. Google has partnered with telecommunication giant Airtel to provide customers cost-effective data packs for the same.
A LITTLE ABOUT CHROMECAST
Chromecast is a thumb-sized medium through which you can easily transfer viewing from your laptop, Android phone and tablet to TV. For this, your mobile becomes your personalised remote control. You can browse your favourite movies, videos and more and cast it on your TV. You can pause, play, rewind, make playlists and can even control the volume. Just plug in, connect and enjoy. In short, it’s a whole new way to enjoy video viewing.
iGyaan.in

Tuesday, November 11, 2014

Here’s How You Can Deceive WhatsApp’s Blue Tick


In a recent attempt to intrude our private lives, WhatsApp added another layer of unnecessary information in the form of blue check marks, indicating that the recipient has indeed read the message.
The addition of the blue check marks is utterly unwanted in our opinion, given that this brings back the social pressure to reply – what most users consider an interruption of privacy. In the interest of privacy, WhatsApp earlier added the choice to conceal the ‘last seen’ notification that informs the other party when that person was last available on the messaging platform.
Well, there is a way around to avoid this new feature. Rahul Banker, a blogger and head of India’s Google Developers Group, has revealed the method to avoid this feature in a blogpost.

Basically, when you read the message you received on WhatsApp, the app uses your Wi-Fi or Data connection to notify the sender that the message has been read via blue tick marks. So, if you read the message offline, the app won’t be able to send the information to the sender.
So, if you don’t want the sender to know whether you have read the message or not, you just need to switch off your internet and Wi-Fi connections, then open WhatsApp and read the message. Close the app, reconnect to your data or Wi-Fi, and the check marks remain grey.

India immediately shut down Internet

In a democracy like India, internet shutdowns have become a norm. The authorities suspend mobile internet and broadband services whenever th...