സ്ത്രീകള്‍ എങ്ങിനെ വസ്ത്രം ധരിക്കണം എന്ന് പുരുഷന്‍ നിഷ്ക്കര്‍ഷിക്കുന്നത് ശരിയോ? അല്ലെങ്കില്‍ തിരിച്ചും?

Friday, March 16, 2012

MODEL QUESTIONS FOR PM GRADE1 & IPO EXAM 2012(Qn 1 to 25)


1.         Night Post Office may extend up to  and by

a)         0830 pm ,DG posts                b)       0700pm,HOC 
c)         1000pm, PMG                         d)       0600pm,SSP                                    Ans: a

2.         Franking machine has

a)         Value die                              b)         License die
c)         Both a&b                              c)         None of this                                      Ans :c


3.         Franking article can be posted by
            a)         Any post office                     b)         Only two post office
c)         Head office                           d)         All sub offices                                   Ans :b

4.         Franking machine license is issued by

            a)         Head of the cirlcle                b)         Head of the division
            c)         DG posts                                d)         Any of these                                     Ans :b

5.         Window delivery ticket is a

            a)         Daily docket                          b)         The receipt given by po     
c)         ID of Franking machine licensee’s representative d)   None of these Ans :c

6.         Rebate available at the time of reset of meter is

            a)         2%                                          b)         3%     
c)         5%                                          d)         none of these                                   Ans :b

7.         Error on franking impression the refund will be claimed by firm/institute within_____ and ___ of less deduction.

            a)         two month, 2%                      b)         three month, 4%
            c)         one month, 5%                     d)         six month,      1%                              Ans: c

8.         Franking meter reset will be made by

            a)         PA                                           b)         Postman       
            c)         LSG postmaster                    d) PRI and above status                             Ans : d

9.         More than one impression of value die but not more than 1 licensee die allowed.

            a)         Correct                                   b)         Incorrect                                             Ans :a
                       
10        Prepayment of postage on cash facility is authorized by and how much letter may be posted to have these facility.

            a)         HOC, UR-500 big city and 250 small city, Reg -50
            b)         DG post, UR-1000 big city and 500 small city, Reg -100
            c)         Head of the division UR-5000 big city and 1000 small city, Reg -500
            d)         None of these                                                                                               Ans :a

11.       Recall of postal article fee for each article is

            a)         9/-                                            b)         6/-       
c)         3/-                                            d)         Free of cost                                       Ans :b
(in shape of postage)

12        Window delivery will be made in case of insured article vale is more than

            a)         500                                         b)         100
            c)         200                                         d)         No limit                                               Ans :a

13.       Limit of detain article in post office which are received for delivery inland  & foreign article

            a)         15 days and 30 days           b)         7 and 15 days
            c)         30 days and 45 days           d)         None of these                                   Ans :b

14.       Fee for availing post box facility is

            a)         150 per year and 50 per quarterly,            b)         250 per year / 100 quarterly
            c)         100 per year / 50 quarterly              d)         None of these           Ans :a

15.       Fee for availing facility of box and post bag is combine is

a)         150 per year and 50 per quarterly,            b)         250 per year / 80 quarterly
            c)         100 per year / 50 quarterly              d)         None of these           Ans :b

16.       Cost of window delivery ticket is

            a)         9/-                                b)         6/-
            c)         3/-                                d)         Free of cost                                                   Ans :d

17.       Cost of Identity card is

            a)         9/-                                b)         6/-
            c)         3/-                                d)         Free of cost                                                   Ans :a

18.       Validity period of ID card is

            a)         1 Year                                    b)         2 Year           
            c)         Six month                  d)         3 year                                                             Ans: d

19.       Postal Restante article can be detained in post office

            a)         7 days                                    b)         1 month
            c)         15 days                      d)         Cann not be detain                                     Ans :b

20.       Redirection fee of parcels within delivery area /original address  and sender in case of unclaimed parcel is

            a)         9/-                                b)         6/-
            c)         3/-                                d)         free of cost                                                    Ans: d

21.       Redirection fee of parcels except delivery area /original address is

            a)         Postage plus registration fee         b)         Full postage
c)         Half  the prepaid rate                       d)         Free of cost                           Ans: d

22.       Suggestion & complaint book are maintained by

            a)         HO                              b)         BO     
            c)         Circle office               d)         All post office                                                            Ans: d

23.       Size limit of ID card is

            a)         88mmX 63mm                      a)         100mmX 70mm
            c)         11mmX 22mm                      d)         None of these                                   Ans: a

24.       Instruction regarding change of residence is valid for

            a)         1 month         b)         1 year
            c)         3 month         d)         5 year                                                                         Ans: c

25.       Authority to whom complaint should be addressed

            a)         Local Supdt.and PM in case  first class PO.       b)         HOC
            c)         DG Posts                                                                   d)         PMG               Ans: a
(Prepared by AB Kantharaja, Mobile-8969822340 http://abkanthaaja.blogspot.in )

Courtesy : http://rms sa.blogspot.in/

Aware from these 17 Ways To Hacking of your Computer – A Complete Reference


In the present world of high-speed internet, people have grown curiosity towards HACKING. Everybody is searching for a secret passage or method to bypass, extract, get and modify the information by any means. Among teenagers, the general tendency of hacking is concentrated to social media accounts.
Here I will describe all the methods which are popular in the world of hacking in order to hack into a computer terminal and online account.

1. Phishing
This is a method where you have to bring the user to a webpage created by you which appears to be the same as the interface of the legitimate one and get him/her to enter the credentials. Then the redirect page will land somewhere else and you will get the password in your mail box as defined inside the php script.
2. Keylogger
Consider a situation; everything you type in the system is mailed to the hacker! Wouldn’t it be easy to track your password from that? Keyloggers perform similar functionalities. So you have to be cautious while typing anything. Now a day, remote keyloggers are also used. So before downloading any executable file keep an eye on the downloadable element. Also lookout for your open ports… someone might be looking into it. Periodically check “netstat” from command prompt.
3. BruteForcing
This is quite a long and most tiring task. This method is very useful if you know that the victim is using his password among a few known possibilities that you are aware of. If you don’t know much and the possibilities are more, then you shouldn’t go for it.
4. Secret Question 
According to a survey done by security companies, it is found that people generally complain for hacking as per their secret question answers. This is indeed a much easier method. In some cases, there are only fixed secret questions, so it becomes much easier for the hackers. So, don’t use simple answers, don’t reveal it to anyone and I would suggest you to use own secret questions with answers.
5. Social Engineering
This is one of the oldest tricks to hack. Try to convince the user that you are a legitimate person from the system or central server and needs your password for the continuation of the service or some maintenance or you need to reset your password to some combination like ‘abc12345’. This won’t work now since most of the users are now aware about the Scam. But this Social Engineering concept is must for you to convince the victim for many reasons. It may work in some case.
6. Fake Messengers
This is a form of phishing in the application format. Sometimes, there are some fake applications which tend the user to enter the login info in the software and check your mail. But unknowingly, your login credentials are being sent to the ftp server destination of the hacker.
7. Viruses And Worms
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail. So install a good working antivirus and antispam program which is capable of handling the potential threats.
8. Back Doors
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network. So you have to strengthen your security to avoid unauthorized access.
9. Trojan Horses
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system. Isn’t it great! They are also referred as RATs (Remote Administration tools). Always periodically watch out your open terminals by checking ‘netstat’.
10. Denial Of Service
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
11. Distributed DoSs
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. So better to use upgraded and advanced servers like grid server etc.
12. Sniffing
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple monitoring or something more wicked. So it’s better to secure the working network. Also make sure that, none of your users is giving your TCP packets to outer network knowingly or unknowingly. Knowing IP address only also can do a lot as there is a powerful penetration tool to do the damage (BACKTRACK OS + METASPLOIT).
13. Spoofing
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
14. SQL Injection
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elevated privileges. Some security precautions need to be taken to handle this attack.
15. Cookie Stealer
Each time you access into an online account, the sites identify your system and you by your cookies. If somebody gets the cookie saved by the sites, then he can easily decode it and can get the password! This is generally possible in open networks. So while using open networks always use https as it makes you enter into secure mode without leaving the cookie to the network.
16. DNS Poisoning Or PHARMING
Phishing is a tough job. Isn’t it? Convincing someone to enter their password at your page require a lot mind work. What if you don’t have to convince the person? What if they are directed automatically to your site without having a clue? DNS poising or Pharming does the same for you.
For details on DNS poisoning –click here.
17. Whaling
This method gets you the password of the accounts which are used by the hackers to receive the passwords. So you just have to hack one ID, which is simplest method and you will have loads of passwords and so loads of accounts at your mercy..!!!

(collected by http://abkantharaja.blogspot.in & http://rms sa.blogspot.in/

How to configure PB Printer to work through USB Cable ?

How to configure PB Printer  to work through USB Cable ?

HOLD BOTH STATION1 and STATION2 BUTTONS IN THE PRINTER
Switch on the printer
Leave the Buttons
Insert the paper into the printer
Automatically Printer will take the paper inside and a message will be printed as follows

STATION 1-CONFIRM      STATION 2=SKIP    PRESS LOCAL TO CONTINUE
Press LOCAL and then STATION 1
The Default Configuration will be printed as follows

MENU          :                            CONFIG       Press STATION 1
DRAFT SPEED:               NORMAL      Press STATION 1
LQ TYPE:                        NLQ1           Press STATION 1
PAPER WIDTH:                FIRST LINE  Press STATION 1
BUZZER:                        Y                 Press STATION 1
INTERFACE                     By default SERIAL or COM1 will be there Press STATION2
Till USB is printed and then Press STATION 1
USB EMULATION            By default OLIVETTI will be there Press STATION2
                                         Till IBM is printed and then Press STATION 1
PLUG&PLAY:                             N                 Press STATION 1
PAP.EDGE DECTEC.:       N                 Press STATION 1
SPECIAL FORMS:            N                 Press STATION 1
PRINT MODE                   STANDARD  Press STATION 1
BIM MODE:                     MONO         Press STATION 1
PNS SELECTIONS:           N                 Press STATION 1
SAVE PARAMETERS        Y                 Press STATION 1
MENU          :                            CONFIG
Leave the paper in the printer and switch off the printer (Press power button in the PB printer)
SWITCH ON THE PRINTER       
Automatically the paper will be ejected
THE SAME METHOD MAY BE USED TO CONFIGURE SERIAL OR COM1 PORT


Thanks to :

P N Satish
Postmaster Grade – I
Byndoor Post Office,
Udupi Division, Karnataka - 576214

Railways Take Measures to Prevent Misuse of General and Tatkal Reserved Tickets

The following steps have been taken Indian Railways to prevent the misuse of general and Tatkal reserved tickets: 

1. Revised Tatkal scheme has been implemented w.e.f. November 21, 2011 which necessitates passengers to indicate prescribed proof of identity at the time of booking and carry the same during the journey. Other measures under the scheme include non issuance of duplicate tickets, prohibition of booking Tatkal tickets by agents between 0800 hrs. and 1000 hrs. and not granting refunds on confirmed Tatkal tickets. 

2. With a view to preventing cases of travelling on transferred tickets, Indian Railways have made carrying one of the prescribed proofs of identity (in original) mandatory, during journey by AC-III tier, AC-II tier, AC Chair Car, Executive and 1st AC classes, by any one of the passengers travelling on a tickets. 

The following are the prescribed proofs of identity: 


  •  Voter Photo Identity Card issued by Election Commission of India 
  •  Passport 
  •  PAN card issued by Income Tax Department 
  •  Driving Licence issued by RTO 
  •  Photo Identity card having serial number issued by Central/State Government 
  •  Student Identity Card with photograph issued by recognized school/college for their students. 
  •  Nationalised Bank Passbook with photograph 
  •  Credit Cards issued by Banks with laminated photograph. 
  • Unique Identification Card “Aadhaar” 

This information was given by the Minister of State for Railways Shri K. H. Muniyappa in written reply to a question in Lok Sabha today. 

AKS/HK/LK/T R
(Release ID :80994)

Source : PIB dtd 15/03/2012

Appraisal of Performance of Civil Servants

The Sixth Central Pay Commission has recommended the introduction of new performance based pecuniary benefit, over and above the regular salary, for Government employees. The benefit will be called Performance Related Incentive Scheme (PRIS) and will be payable taking into account the performance of the employees during the period under consideration. The recommendation has been accepted by the Government. Guidelines are being worked out through inter-departmental consultation. 

Rule 16(3) of the All India Services (DCRB) Rules, 1958has been amended on 31st January, 2012 which provides that the Central Government may in consultation with the State Government concerned, require a Member of the All India Service (AIS) to retire from Service in public interest, after giving such Member at least three month’s previous notice in writing or three month’s pay and allowances in lieu of such notice-


(i) After the review when such Member completes 15 years of qualifying Services; or

(ii) After the review when such Member completes 25 years of qualifying Services; or

(iii) Attains the age of 50 years, as the case may be; or

(iv) If the review referred to in (i) or (ii) above has not been conducted, after the review at any other time as the Central Government deems fit in respect of such Member. 

So far as Central Government employees are concerned, Government in public interest may retire any Government Servant after he has attained the age of 50/55 years or after completion of 30 years service by giving him notice of not less than three months in writing or three months pay and allowances in lieu of such notice. 

This was stated by the Minister of State for Ministry of Personnel, Public Gruievances and Pensions and the Minister of State in the Prime Minister’s Office, Shri V. Narayanasamy in a written reply in Rajya Sabha today. 

RS/SR
(Release ID :81039)



Source : PIB dtd 15/03/2012

SCHEME FOR ENGAGEMENT OF GDS ON COMPASSIONATE GROUNDS-MERIT POINTS AND PROCEDURE FOR SELECTION-REVISED PROVISIONS THEREOF.

D.G. Posts No. 17-17/2000-GDS dated 09Mar 2012.
 
A reference is invited in this Directorate letters of even number dated 14 Dec 2010 and 01 Aug 2011 vide which the scheme for engagement of GDS on compassionate grounds with merit points & procedure for selection as modified was circulated and made effective for all the compassionate engagement cases to be considered on or after 01.01.2011.

2. The scheme has recently been reviewed in this Directorate and in partial modification in the existing provisions of the Scheme, the following provisions are hereby ordered to be substituted with the approval of the competent authority:


(a) The attribute of assessing indigence appearing at Ser 7- Educational Qualification of Applicant on Page 3 of this Directorate letter No. 17-17/2010-GDSdated 14.12.2010 is deleted.

(b) The attribute of assessing indigence appearing at Ser 2- Outstanding liabilities for Education/Marriage of dependent children on Page-2 of this Directorate letter No. 17-17/2010-GDSdated 14.12.2010 is substituted as under:

Ser
Points
Criteria
1
20 for two or more dependent children
For education of children
15 for one dependent child
2
20 for two or more dependent daughter
For marriage of daughters
15 for one dependent daughter

(c) The attribute of assessing indigence appearing at Ser 6-Discharge Benefits i.e Ex-gratia gratuity ,Severance Amount, Service Discharge benefits under NPS Lite and Group Insurance Benefits received by family on Page 3 of this Directorate letter No. 17-17/2010-GDSdated 14.12.2010 is substituted as under:

Ser
Points
Slabs for benefits on discharge
1
20
Rs. 75000 & below
2
15
Below Rs. 150000 but above Rs. 75000
3
10
Rs. 150000 & above.

(d) The word “Proposed” appearing under Criteria 1,3,5,& 6 on page 2&3 of this Directorate letter No. 17-17/2010-GDSdated 14.12.2010 may be taken as deleted.

(e) Apart from the above cases where the wife of the deceased GDS has applied for compassionate engagement for her, she shall get 15 additional points as grace points. This is the line with the general principle that the widow needs to be give preference for compassionate engagement. Such grace points shall not be permissible in the widower applicant.

3. All other provisions contained in the Scheme dated 14.12.2010as further modified under letter of even number dated 01.08.2011 shall continue to apply as already prescribed and all compassionate engagement shall be approved with in the ambit of the prescribed Scheme only. It is reiterated that the existing criteria of 50 Points and above for adjudging hard and deserving cases stands.

4. The above changes shall take effect from the date of application of the original Scheme. All cases which were considered & rejected by the CRC based on the earlier provisions of the new Scheme may be reconsidered afresh based on application of the revised criteria within the time frame allowed under Para7 (e) of the Directorate’s letter No. 17-17/2010-GDSdated 14.12.2010 as fresh cases subject to availability of vacancies in the division concerned in view of removal of ceiling of 10% already without further reference to this Directorate.

5. Pursuant to the provisions now revised where the widow now applies for the compassionate engagement following rejection of the case of one of her child case may also be taken as a fresh case to be considered as per the new Scheme as modified. Thus before the already rejected cases are reconsidered the widow may be given an option to be exercised in writing within one month of date of receipt of the communication to be issued by the Circle treating the application of her child as withdrawn & consideration of her application afresh to follow in due course . Where such as option is exercised, the already rejected application of her child may be considered and her fresh application may be got processed expeditiously.
Sd/
(Surender Kumar)
Assistant Director General (GDS)