Since the launch of online ticket booking facility of Indian Railways via its IRCTC service, the service gradually took off with India’s expanding domestic internet infrastructure. However railways are not been able to keep pace with the rapid growth in internet traffic towards their service.
A report from railways suggest that on average 35 to 37 lakhs booking fails every month with many users reporting money been deducted by IRCTC without completing the booking process with various reasons. Most common reason for booking failure is operation timing out, largely due to over loaded servers of IRCTC.
Pradeep Kundu, spokesman for the IRCTC said “At one point in time, we used to receive eight to nine lakh concurrent hits during peak hour”. He also blamed poor internet connectivity of users end along with Banking payment getway faults in explanation of payment deduction without successful booking.
Indian Railways had previously upgraded their server infrastructure however it seems that didn’t help much and while Puja / Dashera vacations are approaching, one can only expect to see more problems for users trying to book their tickets online
Its been 16 years since Sabeer Bhatia transformed web communication with his innovative idea of HotMail.com to free users from computer based way of accessing emails to more device free web based native access to the service with web based email via Hotmail service.
The idea was an instant hit drawing more than 8.5million users world wide promoting a $400 million deal from Microsoft to acquire the service to offered it under the Microsoft umbrella.
Since then, many more players had made it into the play ground and arrival of Google’s Gmail service has left many other providers scouting for ways to keep their profit margin high with proper user response and satisfaction.
In last couple of months, various court rulings have made “The Pirate Bay” website (thepiratebay.org) the most censored website of the world. Various ISP around the world from many countries like Belgium, Denmark, Finland, India, Ireland, Malaysia, Netherland, China, and the UK is blocking access to the website.
How to unblock / unlock and access The Pirate Bay website ?
One of the most effecting ways are using proxy to bypass the blocking via ISP. You can use many method of Proxy for the same. Below are the list of ways via which you can unblock and access thepiratebay.org
The easiest go around is to use external web proxy, which are dedicated to replicate the pirate bay website via their own IP and domain, thus bypassing the primary block on the specific pirate bay domain and its IP address.
Often we buy new storage device and plugin to some of our very important systems (PC or server or notebook) thinking it to be totally safe since its a brand new device. How ever a recent news may send scare through any IT professional working with a system having sensitive data or information.
An Australian film maker Darryl Mason, bought a new hard drive from a well known Australian departmental brand Dick Smith. The reason for purchase was to back up video footage of his upcoming films from his laptop. The data was very sensitive and precious in terms of effort was put in to shoot, hence he never connected the laptop to any other storage or to Internet to prevent any malware infection or such.
However to his utter surprise, he found the new hard drive already had few Pirated Movies and after connecting the hard disk, his laptop is reporting file corruption with many of his videos and files indicating presence of possible malware in the device.
It should be warring to all IT professional and home users too. Never to trust even a new device. Always pre-scan the device before plugging it to an important system if there is no security software present in that.
Tip for home users
Malware protection is not that costly by the way. Microsoft offers a real time scanner called Security Essential for free to all Windows users.
Download is simple, easy to use (infact all it needs is installation and it works in background) and update. Comes with real time scanner to protect the system for unwanted infections and very light weight on system resources too.
Hollywood studios & the movie making companies are the top lobbyiest in the process bringing making file sharing practice under fire and stronger piracy law. Many Torrent tracker and such websites have suffered big personal loss via this process.
In order to show how guilty the law makers them self are, Torrent tracker TorrentFreak.com published an article showing proof of many leading Hollywood studios downloading pirated content them self.
A service called youhavedownloaded.com was used to track certain IP address belonging to major HollyWood studios to check their past history in file sharing. Result is surprising since the record shows how deeply the law makers them self are involved in breaking the law.
Often its quite hard to figure out that how many other website is ran by a particular a website owner or blogger, specially if the said person wishes to stay anonymous.
eWhoIS uses an interesting method to cross reference websites using Google Analytics or Adsense publisher ID to match and figure out the similar websites.
Most of the website owners of bloggers uses single Google adsense or analytics account to monitor or monetize their website, and eWhoIS takes advantage of this for Reverse Adsense ID Lookup and Reverse Google Analytics ID Lookup.
In the above example, I have done an eWhoIS on a popular Windows news and discussion website WinVistaClub.com to find out what other website is ran by the owner of WinVistaClub.com. The tool detected and reported a list of 5 other website using the same adsense / analytics account.
It is nothing new that we come across to web articles about why not to use Internet Explorer and how much better another alternate browser is. One such story I was reading today at Computer world about 12 reasons on why not to use Internet Explorer. While I was reading, the points kept me thinking that most of them are valid for those so called safe options (alternate browsers) also.
You are safer by avoiding software that bad guys target. Mac users benefited from this for years. Windows users can lower their attack surface (be less vulnerable) by avoiding popular software. Internet Explorer is popular, so bad guys exploit known problems with the browser. No thanks.
100% true that bad guys targets those which are used by mass.
Google Chrome and FireFox both based are on same Mozilla platform retains around 35% market shared between them.
These two browsers are used by power users compare to IE, which are mostly in school / college / public PC and corporate world where they run their own software.
So if Internet Explorer is targeted because of its audience, so would be the Mozilla platform too because of the market share and more importantly the percentage of power users on active use.
ICANN was created to make sure the internet integrate and smooth networking between countries and their network via maintaining a standard Domain Name Server operation.
DNS services helps to translate a domain name like ChotoCheeta.com to its IP address, which takes the user to the desired website and its content. Through out these years, ICANN was the sole body approve domain extension and allow certain registrars to issue the domain names to end users but that is about to chance.
ICANN is about pass a rule via which they would open up this area and would allow end user to chose or create any domain extension of gTLD they wish. Meaning now you can book, domain.anything-you-want.
Some see this as a welcome move to help new business to grow but if thinking deeply in today’s unsafe internet world, this would just open the flood gates for the phishing attacks since there would be virtual unlimited ways to mimic a original domain.
One of the largest and trusted mobile security vendor Lookout, released a statement with list of newly discovered android market apps containing malware or harmful codes.
These applications, which are being distributed via official Google android market, targeted to infect users who chose to install them on their android device.
The list of infected applications (by developer name) includes:
Magic Photo Studio
Sexy Girls: Hot Japanese
HOT Girls 4
Sex Sound: Japanese
HOT Girls 1
HOT Girls 2
HOT Girls 3
Floating Image Free
Super StopWatch and Timer
System Info Manager
Call End Vibrate
Quick Photo Grid
Super Photo Enhance
Super Color Flashlight
Super App Manager
Quick SMS Backup
Bubble Buster Free
Quick History Eraser
Super Compass and Leveler
Go FallDown !
The security giant have reported the issues to Google, and hopefully they (google android team) would pull these apps out of market soon, but till then users are on their own to stay inform and avoid installation of these apps.