KAVALIPOST

Thursday, 18 April 2013

CABINET APPROVES 8% HIKE IN DEARNESS ALLOWANCE FOR CENTRAL GOVERNMENT EMPLOYEES AND PENSIONERS...

CABINET APPROVES 8% HIKE IN DEARNESS ALLOWANCE FOR CENTRAL GOVERNMENT EMPLOYEES AND PENSIONERS...

UNION CABINET ON TUESDAY APPROVED A PROPOSAL TO HIKE AN ANOTHER ADDITIONAL DEARNESS ALLOWANCE BY 8% FOR CENTRAL GOVERNMENT EMPLOYEES AND PENSIONERS...

THE CENTRAL GOVERNMENT TODAY APPROVED TO RELEASE A EIGHT PER CENT HIKE IN DEARNESS ALLOWANCE TO CENTRAL GOVERNMENT EMPLOYEES AND PENSIONERS, THIS HIKE IS TO BE EFFECTIVE RETROSPECTIVELY FROM JANUARY 2013...

THE DEARNESS ALLOWANCE AND DEARNESS RELIEF FOR CENTRAL GOVERNMENT SERVING EMPLOYEES AND PENSIONERS WILL INCREASE FROM 72% PER CENT OF BASIC EMOLUMENTS TO 80% PER CENT WITH EFFECT FROM 1.1.2013 TO COMPENSATE FOR PRICE RISE.

VISITORS ARE REQUESTED TO KEEP WATCH ON THIS BLOG TO VIEW THE OFFICIAL ORDER FROM FINANCE MINISTRY REGARDING DA AND DR HIKE AS AND WHEN RECEIVED, WILL BE PUBLISHED..!

Post office Savings Bank Rules with year 

The government savings bank act 1873

The Government Savings certificate Act 1959

The post office Savings Bank General Rules 1981

The post office Savings Account Rules 1981

The Post office Recurring Deposit Rules 1981

The post office Time deposit Rules 1981

National Savings Scheme Rules 1992

Post Office (Monthly Income Scheme)Rules 1987

Indira Vikas Patra Rules 1987

National Savings Certificate (VIII Issue) Rules 1989

Kisan Vikas Patra Rules 1988

National Savings Scheme Rules 1987

The Post office Savings Certificate Rules 1987

The Post office Savings Certificate Rules 1960

Senior Citizens Savings Scheme Rules 2004

Clarification on the reimbursement of Children Education Allowance Scheme (CEA) 

To view copy of Directorate F. No. 33-05/2013-PAP dated 10/4/2013, please CLICK HERE.

Format Virus Infected Pen Drive 

Most of the times we are able to format the Pen drive but sometimes even after formatting the virus is still present in Pen Drive or the Pen Drive does not gets formatted.So here I am sharing three ways to format virus Infected Pen Drive or Memory Card i.e micro SD card.
format virus infected pen drive

Format Virus Infected Pen Drive or Memory Card.

Three Way to do so are:


  1. Go to Windows >> Run in Windows XP,7 and Vista. Windows 8 users press Windows + R on keyboard
    Now type “cmd” and press enter.
    Now in the DOS  window (Black Colour Window) which opens up type  ” FORMAT F ” without Inverted commas. (here F is the drive letter of my pendrive/memory card)
  2. If the above does not work try this one . This always works.
    PRESS WINDOWS KEY AND GO TO RUN
    TYPE cmd AND PRESS ENTER
    NOW IN THE DOS WINDOW(BLACK SCREEN) TYPE THE FOLLOWING
    FORMAT X: /FS:FAT32 /Q /V: PenDrive” (here x is the drive letter of my pendrive/memory card..and write without quotes AND DO NOT GIVE SPACE BETWEEN “V: AND PENDRIVE” HERE I GIVED SPACE BECAUSE IT WAS TURNING INTO A SMILEY)
  3. This is the third way to Format a Virus Infected Pen drive or Memory card.
    Use a Linux Box
    Other solution to format virus infected pen drive is to insert it into a PC on which Linux is installed and then format it on that PC only. Since Linux systems are unaffected by viruses so you will be able to format virus infected Pen Drive or Memory Card.
    When you put a virus infected pen Drive in a Linux system and then open it you will be able to see all the content including the viruses. If you do not want to format the Pen Drive you can delete the viruses.
     

    How to steer clear of technology-led fraud! 


    There are thousands and thousands of incidents to show how technology is being used to commit fraud these days. In fact, no one can deny that information technology (IT) has become indispensable today. But the pervasiveness of IT has also given rise to concerns over privacy and data protection. Instances of technology-led frauds are affecting individuals and business alike, giving rise to concerns regarding the adoption of technology in day-to-day activities as well as critical business functions. From ATMs to mobile phones to emails, nothing is sacrosanct from fraud these days. 

    So what goes and what is the way out? "Advancement in the field of technology has led to increase in fraud. Technology-led fraud is on a rise due to ease and high availability of technology such as high-end computers, smartphones, peripheral devices, and high speed internet," says Arpinder Singh, Partner & National Director - Fraud Investigation & Dispute Services (FIDS), Ernst & Young. 
    In fact, technology has become an essential part of our lives, and most of our daily activities include (a) interacting with family and friends over phone/chat, (b) social networking, (c) online bill payments and fund transfer/online investments, (d) entertainment, and (e) official work. 
    Additionally, with the vast variety of gadgets to handle, it becomes difficult to control and manage information and vulnerabilities associated with these devices. On an average, a professional person would be handling up to 10 or more devices. (2 smartphones, tablet, 2 laptops (home/office), hard drives, pen drives, memory sticks, cameras, gaming consoles, multimedia hard drives etc.) 
    No need to mention here that all this sounds scary. However, if we are using technology in our day-to-day life, then we also need to know how such frauds are usually committed and how to steer clear of them. 
    Here we take a look at some of the modalities of technology-led fraud 
    SOCIAL ENGINEERING 
    Social engineering takes place when people are manipulated into divulging confidential information or performing actions for others who aren't authorized to do them. Social engineering is performed for the purpose of information gathering, fraud or unauthorized access to computer systems and confidential data. 
    Examples of social engineering 
    Unknown fellow commuter asking you details about your work / personal life 
    Fraud interview calls / foreign jobs offers 
    Email received from unknown / hacked email account that contain fraudulent link or attachments.

    INTERNET SCAMS 
    Internet users get a lot of scam emails which look like the following: 
    "You have won a prize... please send us xxx amount as shipping charges to send you your prize" 
    "Congratulations! You are our lucky draw winner... kindly give your account details so we can transfer your reward money" 
    "You need to update / verify your personal information... click on the link below..." 
    "Please donate for my ailing daughter who has to go through an expensive cancer operation." 
    These are a few ways how fraudsters trick you to provide them with your personal / banking details or lure you with a gift / travel coupon / movie ticket etc so you can transfer money to them. 


    "Fraudulent links in emails direct you to phishing sites that ask you to enter your personal information / user ID / password or other details. Email attachments or counterfeit software available on the internet contain malicious content that is capable of causing harm to your system or capture sensitive information from your system in stealth mode and sent to fraudsters," says Singh. 
    TELEPHONE 
    You may get calls from tele-executives claiming to be from certain company who have called you to help you with a security fix on your system or to verify certain details about you or from a charitable trust asking you to donate money for people in need. 
    Examples 
    1. Telephonic technical support scams 
    Cybercriminals may call you on the telephone and claim to be from a certain technical support. They might offer to help solve your computer problems by taking remote access to your computer. Once they have access to your computer, they can do the following: 
    Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. 
    Adjust security settings of your computer to leave your computer vulnerable. 
    Request credit card information so they can bill you for telephone support services. 
    Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there. 
    2. Fraud Interview call letter 
    You may get fraud job emails saying that you have been shortlisted / selected for a job. However you have to transfer some amount to an account so that they can arrange for your travel and accommodation. 
    3. Scareware 
    A tactic frequently used by fraudsters that involves convincing users that a virus has infected their computer, then suggesting that they download / buy fake antivirus software to remove it. The fake antivirus is often a malware that can harm your system. 
    Scareware can attack you in any combination of following different ways: 
    Accessing your credit card: scareware will deceive you into paying money for fake antivirus software. 
    Identity theft: scareware will surreptitiously invade your computer and attempt to record your keystrokes and banking / personal information. 
    'Zombie' your computer: scareware will attempt to take remote control of your machine to serve as a spam-sending zombie robot 

    HOW TO PREVENT TECH FRAUD 
    Now after knowing the tricks of fraudsters, we also must learn how to prevent technology-led fraud. 
    "The best way to fight fraud is to learn how to avoid it. Education is the answer to prevent one from being victim of technology-led fraud. Hence one should be informed of various methods used by fraudsters to conduct fraud and always exercise precaution while dealing with technology," says Jaju. 

    To avoid Internet fraud 

    Ensure internet/wireless access at home and office is secure and configured by an expert to prevent any hacking attempt on an endpoint (Workstation, smartphone, tablet, laptop, gaming console, multimedia hard drive etc) 
    Install security and scanning software onto your computer to protect it from online hacking. 
    Avoid using shared terminals for internet banking. 
    Do not use your name, date of birth, address or any other personal information for passwords. These passwords are easily cracked by hackers. Also do not use a dictionary word as there are hacking programs that will attempt every word in the dictionary. 
    A complex password which includes combination of alphabets (lower case & upper case), numbers, symbols etc and minimum 8 characters is advisable. Change your password regularly. 
    For internet account recovery options use phone verification and/or security question. Be sure the answer for security question is not known to anyone. 
    Never disclose personal information in response to an email. 
    Do not open email attachments received from unknown email IDs. 
    If you are concerned about an email you receive from a company, contact that company by phone to verify the information. If there is a web link provided in the email, type it directly into your browser instead of using the link or copying and pasting it, as some links can be redirected to other sites. 
    When giving personal information over a website, check to make sure that site is secure. Look at the first part of the web address in your browser. It should be prefixed by "https://" and not "http://". 
    Regularly check your credit card and bank statements and keep track of your transactions. Also, log into your online accounts frequently. This way, you will be able to notice any changes to your account soon after it happens. 
    Never give control of your computer to a third party unless you can confirm that it is a legitimate representative of a computer support team with whom you are already a customer. 

    To avoid telephonic fraud 
    If you get a call on behalf of a bank for purpose of verification of account details, ask them their full name, designation and the department in which they work, what details they need and why. Chances are it is genuine verification call. However if they ask you for confidential information then hang up immediately (most of the banks never ask for personal information on phone). 
    Call back the bank on the number provided on their website and confirm with them if any such verification was initiated from them. If not, inform them of the call you received. 
    If you get a call from an unknown person claiming that your family member / friend is in trouble and needs money. Disconnect the call and call your family member / friend directly or call a common friend to confirm. 
    Do not entertain tele-executives who talk fast or are in a hurry to get information from you. It is trick used by most fraudsters to put pressure on you to act in haste before you have time to think. 
    Ask for a written communication for various offers provided to you on phone. 
    Keep your Bluetooth connection in off mode when not required and do not accept requests from unknown devices. 
    Do not jailbreak/root or hack your smartphones or tablets and install applications from unauthorized sources (app markets such as Cydia, Installous). These applications might be bugged to steal your information. 
    Always ensure that you encrypt any external data source such as hard drive, pen drive, mobile or camera memory card. Always remember to securely wipe your phone and memory card before disposing or selling it. 
    Use applications and websites such as truecaller to confirm the genuineness of a phone number. 

    WHAT TO DO IF YOU'RE A VICTIM 
    Despite taking all these precautions, what should you do if you ever become a victim of any technology-led fraud? 
    Experts suggest that as a precaution, you should enroll your credit/debit cards to hotlisting and insurance agencies such as CPP that let's you block all your debit/credit cards with one phone call. You should also inform the bank immediately to freeze your bank accounts to prevent any further financial damage. 
    Additionally, you should report the incidents immediately to the Cyber Crime Investigation cell. The List of Cyber Crime cells in India is available on the following link: 

    http://cybercrimecomplaints.com/cyber-crime-cells-india 
    "You should also immediately disconnect internet access to any compromised or possibly compromised devices to prevent any further exploitation and data leakage," says Singh. 
    If followed carefully, these simple tips to a large extent may help you avoid being a victim of any technology-led fraud.

    Source :The Economic Times

     

     

    Honorarium to MTS/Group 'D' officials - Revision of Rates 


    No.17011/01/2011-Estt.(AL) 
    Government of India 
    Ministry of Personnel, Public Grievances and Pension 
    Department of Personnel & Training 
    New Delhi, April 17, 2013. 
    OFFICE MEMORANDUM 

    Subject: Grant of honorarium to MTS/Group 'ID' officials when appointed to work as Despatch Rider/Scooter Driver/Staff Car Driver for short period in the absence of Despatch Rider/Scooter Driver/Staff Car Driver — Revision of rates — 


    Reference is invited to this Department's O.M. No.17016/6/87-Estt.(Allow) dated 25th February, 1988, on the captioned subject and to revise the rates of honorarium with immediate effect as under:

    1.
    MTS/Group `D' officials when appointed to work as Dispatch Rider/Scooter Driver
    10/- per day.
    2.
    MTS/Group 'D' officials/Dispatch Rider/Scooter Driver when appointed to work as Staff Car Drivers
    20/- per day



    2. The amount of honorarium shall be subject to the ceiling as envisaged in FR 46(b) and instructions issued by this department from time to time.

    3. In so far as persons working in the Indian Audit and Accounts Departments are concerned, these orders issue in consultation with Comptroller and Auditor General of India.

     

 

 

 


 

No comments:

Post a Comment