Friday, 16 March 2012

Incentive increments for outstanding sports achievements


Incentive increments for outstanding sports achievements...

RBE No.26/2012
Clarification / Corrigendum No.21

GOVERNMENT OF INDIA
MINISTRY OF RAILWAYS
(RAILWAY BOARD)

No. 2011/E(Sports)/4(1)/ 1/Policy Clarifications

New Delhi, 29th February 2012

The General Manager (P),
All Zonal Railways, including CLW, DLW, ICF, RWF, RCF, Metro/Kolkata,
The CAO(R)/DMW/Patiala,
The DG/RDSO/Lucknow.

Sub:- Incentive increments for outstanding sports achievements.

Ref:- Board’s letter No. 2010/E(Sports)/4(1)/1(Policy) dt 31.12.2010.
  
Please connect Para 9.1 of Board’s policy letter referred above on the subject matter.
  
In this connection it is clarified that Railway Administration can grant incentive increments, only for the sports achievements in the Championships/ Events concluded on or after the date of issue of above referred policy letter. All other cases of incentive increments shall be dealt with as per policy in vogue at the time of such sports achievements.
  

This also disposes NR’s letter No. 400E/50/Sports/lncentive(Loose)A/Increments dt. 06.02.2012.

sd/-
(S.BANERJEE)
Dy. Director/ Estt.(Sports)

Source : AIRF
[http://www.airfindia.com/Orders%202012/Incentive%20to%20Sportspersons%20RBE%2026_29.02.2012.pdf]

How to Create Your Own Run Commands

 
If you had a belief, that RUN commands are only for predefined OS related applications; then it’s past now. Because, now we can also create user defined RUN commands so that we can run any application installed or present inside the computer. This will not only make you easily access the said application but also it will save your precious time. It’s very much easy too..

Steps:

  1. Go to RUN menu by pressing Windows + R and then type regedit. This will open the registry editor window.
  2. Then navigate to the following location:                                                   HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path
  3. Then create a new folder/key under this Apps Path by a right-click operation at Apps Path and clicking on New –> Key.
  4. Here just enter the name of the application which you will enter in RUN menu finally. E.g. angrybirds.exe.
  5. Right-Click the default string value (the thing automatically created in your new folder) and click Modify.
  6. Change the value to the path of the executable program you are attempting to run. E.g. C:\Users\Sibun\Documents\Vuze Downloads\Angry.Birds.PC.and.MacOSX\AngryBirds.exe.
  7. Now create a new String Value by right-clicking under the default value (the thing we just edited) and select New –> String Value. Name it Path and enter the value as the same path you previously entered.
run How To Create Your Own RUN Commands



8.  Now it’s all DONE! All you have to do is:-Go to RUN menu (Windows + R), then type the name of your own created command(here                angrybirds) and press ENTER.
Isn’t it simply AWESOME !!!

Appraisal of Performance of Civil Servants


The Sixth Central Pay Commission has recommended the introduction of new performance based pecuniary benefit, over and above the regular salary, for Government employees. The benefit will be called Performance Related Incentive Scheme (PRIS) and will be payable taking into account the performance of the employees during the period under consideration. The recommendation has been accepted by the Government. Guidelines are being worked out through inter-departmental consultation. 

Rule 16(3) of the All India Services (DCRB) Rules, 1958has been amended on 31st January, 2012 which provides that the Central Government may in consultation with the State Government concerned, require a Member of the All India Service (AIS) to retire from Service in public interest, after giving such Member at least three month’s previous notice in writing or three month’s pay and allowances in lieu of such notice-


(i) After the review when such Member completes 15 years of qualifying Services; or

(ii) After the review when such Member completes 25 years of qualifying Services; or

(iii) Attains the age of 50 years, as the case may be; or

(iv) If the review referred to in (i) or (ii) above has not been conducted, after the review at any other time as the Central Government deems fit in respect of such Member. 

So far as Central Government employees are concerned, Government in public interest may retire any Government Servant after he has attained the age of 50/55 years or after completion of 30 years service by giving him notice of not less than three months in writing or three months pay and allowances in lieu of such notice. 

This was stated by the Minister of State for Ministry of Personnel, Public Gruievances and Pensions and the Minister of State in the Prime Minister’s Office, Shri V. Narayanasamy in a written reply in Rajya Sabha today. 

RS/SR
(Release ID :81039)



Source : PIB dtd 15/03/2012

ailways Take Measures to Prevent Misuse of General and Tatkal Reserved Tickets


The following steps have been taken Indian Railways to prevent the misuse of general and Tatkal reserved tickets: 

1. Revised Tatkal scheme has been implemented w.e.f. November 21, 2011 which necessitates passengers to indicate prescribed proof of identity at the time of booking and carry the same during the journey. Other measures under the scheme include non issuance of duplicate tickets, prohibition of booking Tatkal tickets by agents between 0800 hrs. and 1000 hrs. and not granting refunds on confirmed Tatkal tickets. 

2. With a view to preventing cases of travelling on transferred tickets, Indian Railways have made carrying one of the prescribed proofs of identity (in original) mandatory, during journey by AC-III tier, AC-II tier, AC Chair Car, Executive and 1st AC classes, by any one of the passengers travelling on a tickets. 

The following are the prescribed proofs of identity: 


 Voter Photo Identity Card issued by Election Commission of India 

 Passport 

 PAN card issued by Income Tax Department 

 Driving Licence issued by RTO 

 Photo Identity card having serial number issued by Central/State Government 

 Student Identity Card with photograph issued by recognized school/college for their students. 

 Nationalised Bank Passbook with photograph 

 Credit Cards issued by Banks with laminated photograph. 

 Unique Identification Card “Aadhaar” 

This information was given by the Minister of State for Railways Shri K. H. Muniyappa in written reply to a question in Lok Sabha today. 

AKS/HK/LK/T R
(Release ID :80994)



Source : PIB dtd 15/03/2012

Aware from these 17 Ways To Hacking of your Computer – A Complete Reference


In the present world of high-speed internet, people have grown curiosity towards HACKING. Everybody is searching for a secret passage or method to bypass, extract, get and modify the information by any means. Among teenagers, the general tendency of hacking is concentrated to social media accounts.
Here I will describe all the methods which are popular in the world of hacking in order to hack into a computer terminal and online account.

1. Phishing
This is a method where you have to bring the user to a webpage created by you which appears to be the same as the interface of the legitimate one and get him/her to enter the credentials. Then the redirect page will land somewhere else and you will get the password in your mail box as defined inside the php script.
2. Keylogger
Consider a situation; everything you type in the system is mailed to the hacker! Wouldn’t it be easy to track your password from that? Keyloggers perform similar functionalities. So you have to be cautious while typing anything. Now a day, remote keyloggers are also used. So before downloading any executable file keep an eye on the downloadable element. Also lookout for your open ports… someone might be looking into it. Periodically check “netstat” from command prompt.
3. BruteForcing
This is quite a long and most tiring task. This method is very useful if you know that the victim is using his password among a few known possibilities that you are aware of. If you don’t know much and the possibilities are more, then you shouldn’t go for it.
4. Secret Question 
According to a survey done by security companies, it is found that people generally complain for hacking as per their secret question answers. This is indeed a much easier method. In some cases, there are only fixed secret questions, so it becomes much easier for the hackers. So, don’t use simple answers, don’t reveal it to anyone and I would suggest you to use own secret questions with answers.
5. Social Engineering
This is one of the oldest tricks to hack. Try to convince the user that you are a legitimate person from the system or central server and needs your password for the continuation of the service or some maintenance or you need to reset your password to some combination like ‘abc12345’. This won’t work now since most of the users are now aware about the Scam. But this Social Engineering concept is must for you to convince the victim for many reasons. It may work in some case.
6. Fake Messengers
This is a form of phishing in the application format. Sometimes, there are some fake applications which tend the user to enter the login info in the software and check your mail. But unknowingly, your login credentials are being sent to the ftp server destination of the hacker.
7. Viruses And Worms
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail. So install a good working antivirus and antispam program which is capable of handling the potential threats.
8. Back Doors
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network. So you have to strengthen your security to avoid unauthorized access.
9. Trojan Horses
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system. Isn’t it great! They are also referred as RATs (Remote Administration tools). Always periodically watch out your open terminals by checking ‘netstat’.
10. Denial Of Service
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
11. Distributed DoSs
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. So better to use upgraded and advanced servers like grid server etc.
12. Sniffing
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple monitoring or something more wicked. So it’s better to secure the working network. Also make sure that, none of your users is giving your TCP packets to outer network knowingly or unknowingly. Knowing IP address only also can do a lot as there is a powerful penetration tool to do the damage (BACKTRACK OS + METASPLOIT).
13. Spoofing
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
14. SQL Injection
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elevated privileges. Some security precautions need to be taken to handle this attack.
15. Cookie Stealer
Each time you access into an online account, the sites identify your system and you by your cookies. If somebody gets the cookie saved by the sites, then he can easily decode it and can get the password! This is generally possible in open networks. So while using open networks always use https as it makes you enter into secure mode without leaving the cookie to the network.
16. DNS Poisoning Or PHARMING
Phishing is a tough job. Isn’t it? Convincing someone to enter their password at your page require a lot mind work. What if you don’t have to convince the person? What if they are directed automatically to your site without having a clue? DNS poising or Pharming does the same for you.
For details on DNS poisoning –click here.
17. Whaling
This method gets you the password of the accounts which are used by the hackers to receive the passwords. So you just have to hack one ID, which is simplest method and you will have loads of passwords and so loads of accounts at your mercy..!!!

via- http://sapost.blogspot.in/
always visit www.katiharho.blogspot.in for latest update

Tendulkar scores landmark century of centuries

Tendulkar, who is now in the 23rd year of his international career had been searching for this century since 12 March 2011.



Sachin Tendulkar scored his 49th one-day century and the 100th ton of his illustrious international career against Bangladesh at Dhaka in the fourth match of the Asia Cup today.

Tendulkar, who is now in the 23rd year of his international career had been searching for this landmark century since 12 March 2011.

India lost the wicket of Gautam Gambhir in the sixth over of the match when Shafiul Islam clean bowled the left-handed opening batsman; but Tendulkar and Virat Kohli (66) then added  148 runs for the second wicket to set the platform for their team to get to a match-winning total and book their berth in the final of the tournament.

Tendulkar scored his half-century in 63 balls with a lofted drive over extra cover off Shakib Al Hasan; this was also his first 50 since the 85 he scored against Pakistan in the semi-finals of the 2011 World Cup. Tendulkar, who was the first batsman to score a double century in ODIs, reached the thee-figure mark when he took a single from Shakib Al Hasan's bowling in the 44th over of India's innings.

Tendulkar scored his first international century - 119* - against England at Old Trafford in August 1990; while his first ODI century (110) came against Australia at Colombo on 9 September 1994.

He scored the 99th century of his career against South Africa at Nagpur during the 2011 World Cup, but had failed to get to the three-figure mark in his last 33 innings.
Tendulkar scored 12 centuries in 1998 - the most he has in a single year in his career. He has scored eight centuries in three different years (1996, 1999 and 2010).

I&B Ministry launches Facebook Account for Digitalization

Ministry of Information & Broadcasting
 
I&B Ministry launches Facebook Account for Digitalization

         In a major initiative to enhance the understanding of critical issues associated with the digitalization process, the Ministry of Information and Broadcasting has  for the First time launched a Facebook account on the subject. The objective of this initiative is to not only to disseminate information regarding the issues involved, it would also facilitate a two way flow of information between the ministry and key stakeholders. 


         In this direction, the Ministry has launched a new and dedicated facebook account, namely, www.facebook.com / DigitalIndiaMIB” to facilitate exchange of information and clarifications on a wider canvass of public participation, covering a whole gamut of public concerns.   The facebook account carries answers to some of the frequently asked questions and provides links to other connected organizations.  The “Wall” on the facebook account provides interaction platform and shall be a source of useful information for the individuals as well as the stakeholders like the Multi-System Operators and Cable Operators.

         A decision to digitalize the existing analogue cable television networks in India was taken recently. The Cable Television Networks (Regulation) Amendment Act, 2011 has been enacted to bring about legal framework for implementation of Digital Addressable System in cable television networks. This is being implemented in a time- bound phased manner beginning with the 4 Metro cities which will go digital cable television way by 30th June, 2012. The rest of the country will follow suit in phases and the entire country will be digitalized by 31st December, 2014.

         The digital switch-over of cable television is for the overall public good. It however, necessitates adequate public awareness about the new system and the changes to be made at the level of stakeholders including television viewers to be digital ready by the cut-off dates. With the digitalization of Cable TV system, the service providers will be able to carry large number of TV channels in their network, as compared to those presently carried by analog cable TV system. Besides, the digital cable TV network has enhanced capability to carry additional innovative services like triple play with broadband, value added service and interactive services. It has, therefore been decided to initiate a public awareness campaign for the purpose utilizing the platform of social media.

Source: PIB

How To Install Windows Using An USB Flash Drive


Yes, Its possible! You can use your USB that you generally use for transferring your favorite movies and music, to install Windows 7 to your PC. It’s much faster and reliable than an optical drive. This trick would be more than a solution to the users who have their optical drives not working properly or users with notebooks which don’t have optical drives.

Here is the trick:

Step 1: Open a command prompt with administrator privileges by clicking on the Start button, then type cmd in the search box and press Ctrl+Shift+Enter.
Step 2: On the command prompt, type diskpart to enter the diskpart utility.

Step 3: At the DISKPART> prompt, type list disk.
Step 4: Type select disk 4, where “4″ is the number of your USB flash drive from the list.
Step 5: Type clean to clean the USB flash drive.
Step 6: Type create partition primary. This will create a partition in the USB.
Step 7: Type active, to make the partition active.
Step 8: Type format fs=fat32 quick to format the USB flash drive quickly in the FAT32 file system.
Step 9: Type assign to have Windows assign a drive letter to the drive. Type exit to leave diskpart and type exit again to close the command prompt.
Step 10: Insert your Windows 7 disc into your computer and copy all the files to the USB flash drive.
Here is the screenshot you can refer:
After all files copied, insert the USB into a computer and boot it up to start Windows installation. Make sure that the BIOS is set to boot the USB flash drive first. On some computers, you can press F12 key to set boot options.

always visit- www.katiharho.blogspot.com for latest update

HIGHLIGHTS OF BUDGET 2012-2013

HIGHLIGHTS OF BUDGET 2012-2013
Direct tax proposals for 2012-13:

1.Personal tax: Exemption limit for individuals from Rs 1,80,000 to Rs 2,00,000.

Income up to Rs 2 lakh - Nil

Rs 2-5 lakh - 10%;

Rs 5-10 lakh - 20%

Rs 10 lakh and above - 30%

2.Exemption on interest from savings bank accounts up to Rs 10,000

3.Venture capital funds to be allowed to invest across sectors

4.Dividend repatriation for foreign companies extended by a year

5.Securities Transaction Tax reduced to 0.15%

6.Cumpolsory reporting requirement for companies with assets abroad

7.Direct tax proposals to result in net revenue loss of Rs 4,500 cr

8.No change in tax structure for corporates

9.Defence outlay at Rs 1.95 lakh crore.

10.In the 11th plan met 99 per cent of the total Plan outlay

11.Direct tax target fell short by Rs 32,000 crore. Non-plan expenditure for FY 2013 is Rs 9.69 lakh crore higher 18.8 per cent than estimated.

12.White paper on black money to be tabled in current session of Parliament.

13.Sees 2.5 per cent growth in agriculture sector, 9.4 per cent growth in services. Forecasts GDP growth at 7.6 per cent in 2012-13

14.Industrial growth is holding us back

15.Development of external trade encouraging

16.Successfully achieved diversification of export and import markets.

17.Need to improve supply side economy.

18.Higher crude oil prices has resulted in higher subsidy outgo. Crude oil prices expected to be above $115 a barrel.

19.Govt expenditure on subsidies to be restricted to 2% of GDP.

20.Direct transfer of subsidy to benefit.

21.Food security subsidy to be fully provided.

22.Use of PAN in both direct and indirect taxes as a preparation towards GST rollout.

23.Efforts for consensus on FDI in multi-brand retail.

24.Disinvestment target for FY 13 at Rs 30,000 crore. For current fiscal, Rs 14,000 crore raised against the target of Rs 40,000 crore.

25.Proposes Rajiv Gandhi Equity Savings Scheme, 50% I-T deduction for those with income below Rs 10 lakh.

26.DTC implementation deferred.

27.To protect the financial health of public sector banks. To provide Rs 15,888-crore for capitalisation of public sector banks and RRBs. To create financial holding company to look at the financial needs of the banks.

28.New tax exemptions for retail investments

29.Infrastructure invsestment under the 12th Plan to go up to Rs 50 lakh crore, half of which is to come from the private sector.

30.To encourage investment in infrastructure sector tax-free bonds of Rs 60,000 crore for next fiscal. Of this Rs 10,000 crore each for NHAI, IRFC, IIFCL, Power; Rs 5,000 crore each for HUDCO, NHB, SIDBI, and Ports.

31.ECB to part-finance rupee debt of power projects

32.ECB for working capital requirement for airlines industry with a ceiling $1 billion.

33.Direct import of aviation fuel allowed

34.Targets 8,800 km of national highway in next fiscal, 14 per cent increase in allcoation for road transport.

35.Targets self-sufficiency in manfacturing urea in next five years.

36.One per cent interest subvention scheme for housing loan of up to Rs 15 lakh extended.

37.2 more mega handloom clusters announced. Powerloom mega cluster in Maharashtra

38.Proposes Rs 5,000 crore opportunity venture fund for MSMEs channelled through SIDBI

39.Rs 500 crore for geo-textile cluster in North-east region; handloom centres also in Nagaland, Mizoram and Jharkhand

40.Two-third of total market borrowings of Indian Railways to come from tax-free bonds this fiscal.

41.To raise agricultural credit by Rs 1 lakh crore to Rs 5.7 lakh crore

42.Kissan credit cards to be modified to make them into smart cards to be used at ATMs

43.Additional 3 per cent interest subsidy for farmers proposed

44.To provide Rs 10,000 crore to Nabard for refinancing regional rural banks

45.Budgetary allocation for rural, water and sanitation schemes hiked by 27% to Rs 14,000 crore

46.Rs 20,000 crore for rural infrastructure development fund, of which Rs 5,000 crore specifically for warehouses

47.PPP schemes for 2,500 schools announced

48.Allocation under National Rural Health Mission raised to Rs 20,822 crore from Rs 18,115 crore

49.Allocation to National Rural Livielihood Mission for women increased by 34 per cent

50.Interest subsidy for women SHGs up to Rs 3 lakh at 7 per cent; 3 per cent more for SHGs that repay promptly.

51.Credit guarantee fund for loans to students.....

How to configure Pass Book Printer to work through USB Cable ?


How to configure PB Printer  to work through USB Cable ?

HOLD BOTH STATION1 and STATION2 BUTTONS IN THE PRINTER
Switch on the printer
Leave the Buttons
Insert the paper into the printer
Automatically Printer will take the paper inside and a message will be printed as follows

STATION 1-CONFIRM      STATION 2=SKIP    PRESS LOCAL TO CONTINUE
Press LOCAL and then STATION 1
The Default Configuration will be printed as follows

MENU          :                  CONFIG       Press STATION 1
DRAFT SPEED:               NORMAL      Press STATION 1
LQ TYPE:                         NLQ1           Press STATION 1
PAPER WIDTH:                FIRST LINE  Press STATION 1
BUZZER:                           Y                 Press STATION 1
INTERFACE                     By default SERIAL or COM1 will be there Press STATION2
Till USB is printed and then Press STATION 1
USB EMULATION            By default OLIVETTI will be there Press STATION2
                                         Till IBM is printed and then Press STATION 1
PLUG&PLAY:                             N                 Press STATION 1
PAP.EDGE DECTEC.:       N                 Press STATION 1
SPECIAL FORMS:            N                 Press STATION 1
PRINT MODE                   STANDARD  Press STATION 1
BIM MODE:                     MONO         Press STATION 1
PNS SELECTIONS:           N                 Press STATION 1
SAVE PARAMETERS        Y                 Press STATION 1
MENU          :                            CONFIG
Leave the paper in the printer and switch off the printer (Press power button in the PB printer)
SWITCH ON THE PRINTER       
Automatically the paper will be ejected
THE SAME METHOD MAY BE USED TO CONFIGURE SERIAL OR COM1 PORT


Thanks to :

P N Satish
Postmaster Grade – I
Byndoor Post Office,
Udupi Division, Karnataka - 576214

Postal dept deficit may dip 16% to Rs 5,309 cr: Survey

Postal dept deficit may dip 16% to Rs 5,309 cr: Survey



The efforts of the Government to revive the Department of Posts (DoP) seems to be bearing fruit as its deficit is likely to come down by over 16 per cent to Rs 5,309.6 crore in 2011-12, the Economic Survey 2011-12 today said.

“In the current year 2011-12 (Budget Estimates), the gross receipts were budgeted at Rs 7,517.7 crore and with gross and net working expenses estimated at Rs 13,522.4 crore and Rs 12,827.3 crore respectively, with the deficit estimated at Rs 5,309.6 crore,” the survey said.

The gross receipts of the DoP in 2010-11 were placed at Rs 6,962.3 crore whereas the gross and net working expenses were Rs 13,793.7 crore and Rs 13,307.9 crore respectively.

The resultant deficit for 2010-11 stood at Rs 6,345.6 crore, the survey said.

It added that the postal sector needs to keep pace with changing times as many of its services have become redundant with growth in technology and takeover by other players.

“Quick decisions and actions to stay abreast of the times, including switching over to new activities and downsizing, could release a lot of resources from this sector for use elsewhere,” the survey said.
The Government has approved a total Plan outlay of Rs 1,877.2 crore for the modernisation of its IT infrastructure to increase the efficiency of the department.

“The project is intended for computerisation of all the non-computerised post offices, mail offices, administrative and other offices, establishment of IT infrastructure and development of required software applications... The project is expected to be rolled out by 2013,” the survey said.

The DoP has the largest postal network in the world with 1,54,866 post offices across India as of March 2011. Of these, 1,39,040 post offices are in rural areas, while the remaining are in urban areas.
Aimed at transforming the infrastructure, the Government had launched Project Arrow in 2008 for upgrading key postal operations such as mail delivery, remittance, and banking services.
India Post now offers a single window facility for banking, money remittances and other financial products.

The DoP is also responsible for disbursing wages under the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) through 96,895 post offices.

The postal network is also being used by other Government agencies to collect data like the rural consumer price index, the survey said. 

http://www.thehindubusinessline.com/
via-saparavur