Category Archives: SECURITY

Extremely Severe Cyclonic Storm Fani at Puri of Odisha

Cyclone Fani touched Puri coast of Odisha on 3rd May 2019 at 8 am. Initially the speed of wind was 180 to 200 km per hour for about half an hour and then slowly its speed increased to 280 to 330 km per hour destroying houses all over inside Puri town. Power supply cut on 3rd of May 2019 at 7 am when at the initial period of cyclone Fani.

Then, all the electricity poles and wires uprooted from the base. All the cable lines cut and fly out anywhere. Asbestos of houses fly anywhere and many people become homeless. The speed of wind touched to 330 km per hour and at Puri we experienced the presence of small seconds of earthquakes but to our utter surprise seismometer not detect it at all.

It was for two day since the advent of cyclone Fani, where we the natives of Puri town became homeless, foodless, no electricity, no water and even the help from government agencies are almost no.

5th May 2019, two days after advent of Cyclone Fani:

No rain is there. Slowly, the heat of sun making difficult to live. No electricity and scarcity of water everywhere. The summer is out again. We were waiting for electricity at Puri but there was no official word on it. Everywhere there is confusions. We begin to read newspaper as while during morning walk, the paper hawkers used to ask us while purchasing of daily news paper, when will the help from government organisation come.

The general election as well as election for assembly completed. People were thinking that if at all election not complete then the politicians will help at their might to save people but that is not the case this time. The water stock at overhead tank was slowly reducing and this means that within shortest possible of time we will find the absolute state of water scarcity.

We have had borewell with overhead tank and the water comes through electric motor and for this the most necessity fact was to have electricity at ours own perusal. We do not have alternate water supply for us. Our tubewell was out of order and this means within some time we will find difficulties in getting water.

Cyclone Fani falls with its all might at 10.30 am with absolute superfast speed of 330 km per hour and during 11 am two earthquakes came and that shook the walls of ours home and we were afraid as if at any point of time tsunami will come to destroy the age-old civilisation of Puri town.

Cyclone Fani with earthquakes:

During that time at home my younger sister with his four year old son and my parents and myself at home and for the first time in my life I feel the pain of incoming of death and destruction and within shortest span the wind tore away ours doors and windows and that augments fear to multiple times.

Thankfully earthquake comes for few seconds otherwise entire ancient Puri town will submerged into sea water for years to come. We faced losses due to Cyclone Fani as it uprooted terrace asbestos and two asbestos of smaller rooms. After Cyclone Fani gone we searched for these broken asbestos but it flies distant and we do not find any trace of it at all.

For few seconds wind shook asbestos of terrace steps and then it flies like kites within few seconds. large coconut trees uprooted from its base and it broke the large boundary at the back side of ours house at Puri town. The severe of Cyclone Fani was such that we hardly knew the fierce of it as we knew after the cyclone Fani goes over and peace and calmness comes back.

During these absolute difficult times ours cooking was almost stopped and only cooking for my sister and his four year old son was there. My sister undergone big surgery and during recuperation time it is important for her to eat home-cooked food and that is why compulsory home cooking for both mother and child.

The fear during that time was that we have two gas cylinders but one is empty and during refill time the cyclone Fani came and this means we were left with only one half was of full gas cylinder and for my sister home-cooked food is a sure as she had to eat home-cooked food.

It was difficult times considering the hardships we were at and the imminent shortages of water, no electricity and the presence of patience and the small kid was adding miseriese to it. During this time, as there was no clear-cut news about the when will the power restoration and the generators man hiring generator for one hour and asking lump sum of 1000 rupees from people.

No government was there to help us in this very difficult times. As we were realising the level of water at overhead tank was fast reducing and for this daddy hired the generators and it connected to home line and then we started the motor to load water on overhead tank. Within ten minutes the motor stopped as the generator operator came with a light-weight generator and that means it will not make water to move to overhead tank.

In this way this experiment with generator proved to be mea flop show. Even after it stopped working the operator demanded money and then settled with 400 rupees and this means that in the absence of government run agencies, the private operators were demanding money even during such catastrophic situation where even banks after 20 days are not functioning in its normalcy.


How to secure your computer?

When we think of security of computing devices, on the same way it is also being felt about how secure your systems are? It is not the sheer adage of “better safe than sorry”, more meanings are associated with all these. During these times, it is essential to have a strong sense of awakening within security parameters which can draw specific balance between good security systems as against deep penetrated security-mechanism.

Lots of people are hiding themselves somewhere in the world with the one ambition to steal your “user names” and “passwords”. This is all about secure your computing environment, just like we build strong houses to secure and protect our near and dear ones. On the other hand, it gives away ample opportunity for humans to go for a ride to the virtual world, it was not a smooth sailing and it is not “roses all the way”.

Simultaneously, it introduces the sub-world of Internet worms, which are moving here and there and trying to search the most haunted places namely computer users. It is not the same as everyday as all these Internet worms aims at computers that are going to destroy the basic functionality of computers. With the advent of computers in masses of data flows in sound as well as outbound from your computer and security of data is paramount as the cost of theft of data is humongous. Data theft can bring about personal as well as professional reputation of yours in the sand level and for this it is always good to save your data from the prying eyes of hackers in order to save your day.

Corporation is more worried about their loss of data as it can lead to huge loss of their skilled works. They are adopting different new and innovative methods for data security. Some are opting for enterprise level cloud computing in order to save data at some other places in the world. There are concerns about privacy leaks regarding data management and in order to save data from being going to the other person it is better to think of compelling and possibly build a stiffer set of security measures all around.

Nearly 90 percentages of personal computers are running hugely popular Microsoft OS and nearly 90 percentages of mobile operating are using android as their operating system. Hackers are attacking these two famous OS in order to gain popularity as well as getting gigantic streams of data that have been flowing from all over these. New vulnerabilities have been constantly being lurking around Microsoft as well Android OS and both are releasing updates in order to patch these vulnerabilities. It is a constant process even most of the OS which is the latest also has to bear the brunt of constant updates and these can annoy users. But it is also desirable to keep updates on in order to keep your computer from external aggression. It is always better to keep your computer updated all the time. Both companies are trying harder to keep your computer safe and secure.

It is always advantageous to turn off guest accounts in your computer user accounts. The guest account can be intrusive and it is better to stay away from it and also Internet worms can establish administrator account from the setting of the guest account. Though with the advent of the latest incarnation of Microsoft operating system, advent of “user account control” and “standard account” gives way to a perfect security as well as integrated account system control for user. In “standard account” use is able to use it just like a sandbagging environment where user is able to use the computer discretely without worrying of internet worms and this creates the simple process where the user is not worried about complete sense of security as system runs in a sort of virtual environment.

“shoulder surfing” is a phenomenon where the third person wanders here and there to see whether someone watching from the side to watch and memories yours passwords. There are some processes which can harm your computer for being attending to contact with outside servers, and it is best to disable those services so that your computer will not be vulnerable to any such external attack from computers. Of late security vulnerabilities have been found with operating systems other than Microsoft Windows. Even Linux which otherwise regarded as trustworthy is full of vulnerabilities. Macintosh computer also sees the surge of virus attacks of late and this has wider implications.

This goes on to prove that no OS is devoid of such internet attacks. What is now the road ahead for all these imminent virus attacks. Whichever, computer people are utilizing virus attack always prompts the way for the difficult path to surpass as it can block the speed of the computer to a greater level and also with it one can find life tough. The primary difficulty with these is the recovery of data. Data safety is major issues concerning the organization and they do not want to spend a huge sum of money to third party recovery companies which can recover the files but there is no guarantee of them to store those data and sell it to competitors. All these adds to the worries which Microsoft has released “File history” in its latest incarnation of Windows where it is giving opportunity for users to save all forms of data to external drive automatically and in this way with regular backups all yours data now been stored on your external hard drive with safety and care.

There is much software in the market which deals with complete encryption of data with a single click. In its latest version of Windows, it has introduced “Bit locker” encryption which can encrypt data with superior mechanisms. With the advent of excellent pass word managers and most of them are free and some are running in the cloud in order to secure all yours passwords and they will make yours life easier with automated passing of user names as well as passwords to different browsers and this makes the entire state of password management to a greater level. Most modern web browsers are compatible with secure websites. Most of modern web browsers are implementing this in the long way and many popular websites are introducing their websites in secure version in order to create a sense of security among existing customers. This is a great way to secure the transmission of data without any such disturbances as with it entire data transmission goes with perfect encryption mechanisms.

Data security is a primary concern for all including corporate and public. Data are money and there are many lascivious persons who want to have your data to sell to them to require companies in order to earn money. On the other hand, this creates intrusion in privacy and in the long run it can ruin the prospects of your business as well as financial transactions. For corporate data is their business and they do not want it to be with their rivals and for this more and more complicated secure mechanisms are here to stay and in order to have a greater transparency among corporate as well as individuals the need of the hours is to go for security and build a strong sense of “safe computing practices”.

Related Posts:
1 2 3 4 5 9