-->

Time.....

ALL ABOUT SINGRAULLLI.......

RECENTLY ADDED PHOTOS......

PLS DONT COPY............

Protected by Copyscape Online Plagiarism Tool

Friday, January 21, 2011

Mobile Number Portability In India...

Huhhhhhh
I would not blame if Mobile Number Portability reminds us all the famous dialogue  " Tareekh pe tareekh,Tareekh pe tareekh" from bollywood famous film Damini. but finally the dot has announced the launch of MNP in India.


Finally after a long and long wait,Mobile Number Portability (MNP)has successfully been launched in India yesterday.


20.1.2011 is the day for mobile phone users in India.Previously it was only available in haryana and from January 20th it is available all over the nation.


The telecoms minister Mr. Kapil Sibal added to the news channel that the much waited and pending mobile service is finally set to launch on 20 Jan 2011.


Now the consumers has chance to command over their choice of telecoms provider.


OK lets now examine what really MNP is :


MNP i.e. mobile number portability is a service in which a user is free to choose whatever telecoms company with he is satisfied and to move between them without changing the old numbers.


Previously it was necessary to change the current mobile number if a user opt for other service provider but now the scenario has completely changed.




MNP is like dumping the service provider but keeping the favourite number.Is not a fun and kingly feeling ?.With more than 700 million mobile phone users in India this is not a service but a necessity as the range of 10 digit mobile number has already towards the dead end.


Technically MNP can be defined as a process of routing calls ,Sms and other services to the same numbers through the new service providers.




The Customers can port between prepaid and postpaid.The master mobile number database will be maintained by a third party software company.For zone 1, Syniverse has been appointed with the MNP and related issues while for zone 2,Telcordia has been appointed.


Mobile Number Portability service (MNP) will definitely launch a severe competition between service providers and users can see a better improvement in service quality and quantity.Cheap call rates ,and Sm's rates,data plans what i expect.


80,000 users already benifited from this service in haryana.


Now whats the procedure for availing this service..


There is a number of buzz in the market among which most accepted is as follows


  (a.) The user has to send a message to 1900 in the format described below
  
     PORT xxxxxxxxxx (replace x's with ur current mobile number).


  (b). Then after few minutes the user will get Sm's reply having a unique Porting     ID and expiry date.


  (c.) A second Sm's or a application is required to send to the new operator with unique porting     code.Please remember this unique code is valid for few days and if expired can be requested again.

  (d.) After that the existing operator will check if for any dues and if all is OK then it will give approval for porting the number.


  (e.) The user will get an Sm's  with the time and date when the porting Will take place.TRAI rules compels the porting procedure to be within 4-5 days.


  (f.) Finally when the porting is done the user will get an Sm's confirming the porting.The phone may be dead for 2 hours during porting process.




The  process of porting mobile number between service providers is a maximum of  INR RS 19 but the same can be varies according to the service providers..


The benefits can be stated as with this the customer can be the king.


However there is some criteria which must be fulfilled before opting this service if the user is a post paid customer then there should not be any dues and for the pre paid customers the remaining balance will be lapsed and not be carried forwarded and also the user has to wait at least for 90 days for the second porting.


The user can also withdraw the application within a day if mind changes and user want to stick with the old numbers however the porting fee will not be refunded.


After the subbmission it hardly takes 4 days and for J&K and northern eastern it is within 12 days.


The user can flexibly switch from CDMA service to GSM service and vice verse.


DOT has mandate to implement MNP service within a circle hence service providers can be switch as along as they are within the same circle.


Land line numbers can not be ported as of now it is only for mobile phone numbers.


The user need to carry in two recent passport size photo graph and a proof of address(POA) and proof of identity(POI).




The following links can be used for getting more details about number porting


Airtel



Vodafone 


Idea


Aircel


Tata Docomo


Reliance


Virgin


Loop






Enjoy Friends and tell me if u like this information and pls comments.
comments are extremely necessary for me to improve my articles and pls tell in what topics u would like to read....


JITENDRA KUMAR PATEL.
http://www.facebook.com/bewithjitendrapatel

Thursday, January 20, 2011

SafeGuarding Mobile Phones From Prying Eyes......



Hi friends,

Welcome back....

Thanks for waiting and Before forwarding to this post i would like you to read once again my 

older post {  http://bewithjitendrapatel.blogspot.com/2011/01/security-risk-associated-with-mobile.html } so that u can easily understand the objective of this post... 

Lets start securing the phone .....

1.Sim Cards..

The most easiest way to secure sim card is using PIN codes.
Activating this service will ask the PIN code on each reboot of a phone or when someone 

changes the SIM.So if u loose ur SIM card no one can use ur SIM card..

If for a reason u also get confused with ur PIN then u can use PUK code(PIN Unblocking Key).

Note: PUK has the limit of 10 and after that the sim card is permanently banned and might 

require to replace the sim.....

The other security features u can use is to use Fixed Dialling and Call Barring.

These service will allow only outgoing to those numbers as authorised by you.
Both sms service,mms service and calling service is disabled for Un-authorised numbers.

How ever this service requires PIN2 and if blocked requires PUK2 which is not easily 

provided by the telecom company as it intereferes with company revenue policy....

Also try to use services like caller line display,send my caller identity and closed user 

groups...(if anyone suceeeds psl inform me also  )

2.Phone

 a.Use security keyguard off features...

 b.Password protect ur sms inbox and gallery files.

 C.The mobile phone must be kept in secure locations.

 d.Avoid installing insecure or un signed applications.

 e.Enable content encyption

 f.Activate password encryption

 g.Use memmory cards enrypting softwares.

 h.Never use facebook ,orkut or any other social networking site through    public hotspot.

 i. Never ever do transactions through public computers like cafe of wi-fi.

 j.BlueTooth must be turned off and turned on only when it is required.

 k.Set the number of passwors attempts.

 l.Disable wifi till required.

 m.Use SSL for emails.

 n.Pls follow some degree fo precaution while browsing.

 o.Double or triple format the card before giving it to anyone else.

 p.Wipe out the phone completely before Abondoing it.

 q.Update phone software and firmwares on a regular basis.

 r.Use paid antivirus.

 s.regularly scan card and phone memmory for faults.

 t.Back up the phone data at regular intervals.

 u.Use more than two types of security softwares like malware,spyware and antiviruses.

 v.chek for fraud billing.

 w.Have initiatives in reducing mobile crimes.

 x.Avoid talking in crowded areas,if required,use headphone.

 y. Use digital certificates.

 z.Use remote wipe features.

ALL CHARACTERS ARE USED UP SO   Hmmmmmm....


 ok


 1.Use autolock features and keep them behind complex fatures..

 2.Lastly, Awareness is the key to protection... ( BE AWARE and BE UPDATED. )

I would also like to list soem softwares for securing mobile devicess..

These softwares can easily be downloaded through a simple search in the google.


List of some common softwares....

Kaspersky Anti-Virus Mobile
McAfee VirusScan Mobile
Symantec Mobile Security 4.0 for Symbian
Symantec Mobile Security Suite 5.0 for Windows Mobile
Symantec Mobile Antivirus for Windows Mobile
SMobile Security Shield
Kaspersky Mobile Security
BullGuard Mobile Antivirus
Norton Smartphone Security
F-Secure Mobile Security
Trend Micro Mobile Security
NetQin Mobile Anti-virus
Airscanner Mobile Security Combo
SimWorks Anti-Virus
Avira AntiVir Mobile

  • Security Genius
    More Productivity Applications
    "Security Genius" application is a value-added service on Nokia S60 3.0 platform. It can protect a mobile user from losing his/her phone just in case the phone is lost.









  • Kaspersky Mobile Security
    Security Applications
    Kaspersky Mobile Security offers total protection of your privacy and personal information and maximises your chances of retrieving your phone if it is lost or stolen.









  • Security+
    Restricted the use of Pocket PCs as a specialized device where access to many functions is restricted or disabled and only the applications configured are executed. It is like a Kiosk Mode but better.









  • Life360 Security Center
    track in real time all ur family members..










  • SmrtGuard Mobile Security
    Protect your BlackBerry with SmrtGuard Mobile Security. SmrtGuard includes Wireless Data Backup & Restore, Anti-Virus protection, Anti-Spam, Call Blocker, Anti-Theft & Recovery with GPS tracking, Remote Data Wipe, Personal Guardian & more!









  • SmrtGuard Mobile Securi...
    Protect your Android with SmrtGuard Mobile Security. SmrtGuard includes Wireless Data Backup & Restore, Anti-Virus, Anti-Spam, Call Blocker, Anti-Theft with GPS tracking, Remote Data Wipe & more! After download, don't forget to register & activate









  • WaveSecure - Mobile Sec...

    WaveSecure is an award-winning security service that protects your phone, data and privacy in the event of loss or theft. 









  • Lookout Mobile Security...

    Protect your phone. Get the official, free mobile anti-virus, data backup and Phone Finder solution with Lookout. 









  • iTag - Mobile Security ...

    iTag is a FREE, award winning, service to remotely locate and protect your lost phone. View your phone’s location, make it ring, lock the keys, back up, delete your phone. Get alerted when friends are near and find your lost car using bluetooth








  • MYMobile Protection

    Protection against theft & losses , Virus protection, Performance optimisation, Backup & Data recovery, AntiSpam for e-mail & SMS, Credit card & Identity theft protection. For Android http://m.getjar.com/MYAndroid-Protection









  • mobecode

    Keep your SMS messages and Emails secret. Send and receive coded messages








  • Sesame Password Manager

    Sesame combines a password generator and password manager into a single, easy-to-use application. Store all of your passwords, or your customer passwords, in one convenient location. Sesame features: * Generate random passwords between 4 and 20 char.









  • CellBox Password Manager
    security tool: password manager for mobiles. Passwords are encrypted using Anubis 320 bit ciphe













  • App lock

    App lock can protect your privacy.It can lock the aplication what you need,and then someone must enter password to dispaly it.So it can protect your secrecy and privacy








  • message lock

    Want to lock Messages of your Phone? So that no one else can see.









  • Contacts Lock

    Want to lock 









  • Gallery Lock

    Want to lock Gallery of your Phone? So that no one else can see your images, music & videos.Locked Gallery is completely Invisible to others









  • S60 Lock Screen

    Handy Lock screen application for S60 phones. All S60 3.x and 5.x phones supported. Looks a bit like iPhone lock scree









  • Memory Status

    Memory Status has the following functions: 1. Memory Status "Memory Status" displays the status of the virtual memory. You can know the each meaning by pushing the info buttons. 2. Running User Processes "Running User Processes" displays the list 









and a huge unending list......


So frends I hope that i have put some seeds in ur brain about mobile phone security.

Pls frends  take the security of your phone seriously and always be happy..

Always remember prevention is better than cure....

pls post ur comments and ask me if u need any help......

have fun .....




JITENDRA KUMAR PATEL.

http://www.facebook.com/bewithjitendrapatel

Wednesday, January 19, 2011

Security Risk Associated With Mobile Phones.........

Once i heard ki "Jeene k liye sirf teen cheezo ki jaroorat hai roti ,kapda aur makan ".


Does the above quote stil holds true ? Many people dont think so atleast not 


me.The new addition is the mobile phones.It is not same as for it was 


invented.Today talking is just a 1 in a million task which we do with our phones.SMS,MMS,banking,E-mail,Push-mail,Shopping etc are others.


Mobile phones have evolved a lot and today it has taken the shape of a 
computer with small memory,small processors,small power supply ,and many more 
small things but what about the security?


I personally don't think that the security related with these device is that 
small as the device itself is.


How many of us have put password in our phone or used any encrypting tool for 
our memory cards or an any application that provide some counter measures.The 
answer to these question is very few in numbers.


In my these post i would like to list some of these issues.
Please note that the vulnerability associated with this devices are numerous 
and also it is not possible to explain each of them so i will list only some 
major and common issues..


1.MEMORY CARDS


Today the cheapest phone in the market do have a memory card . 
Many a times it happens we just cry " My card had bee the data w one." just concerned with 
the money but not about the personnel information.


Remember after for mating also your data is not safe. If i can recreate those files from a for mated card then smart and intelligent crackers certainly misuse your data.


2.IPHONE


I phones are the great plate form for the mobile phone hackers android being in 
the second rank.
Security risk can be seen from the rule of UK government which harshly strict 
UK government ministers using i phone when GCHQ refused to pass the device 
safe for official business.


There is a jailbreak application for i-phone which allows user to install any 
application on their phone and later converts it into a  " Weaponised " form 
which can crack on to a phone when user clicks on a link online.
however risk has been reduced by apple initiatives which allows only those 
application to install which has been listed in App Store.


3.ANDROID PHONE


A very high cost cyber attack has not yet been identified but a security 
professional of united kingdom has found that a malicious website has the 
capacity to read the contents of the files stored on the androids device.


Smart phones which is using goggles Android OS , a customised version of Linux  
does not have a hardware encryption and has a lot of features to make them 
vulnerable to to days security risks.


Installing applications in android does not ask for any signature or something 
like that.


How ever each application ask before accessing device file system , device 
data or network....


5.Black Berry's(Luxury Icon)


The government of India already put high pressure on reliance India mobile 
company for encrypted data access last year but it might not have born 
fruit,however a pair of developers of Russia are attempting to crack the phone 
having a password.


Black berry have offline data backup mechanism and can be easily cracked its 7 
digit  password in not more than 7 days and hardly few more days if it 
contains a special symbols or numbers.
however ,transmission of data between BES(blackberry enterprise server) and 
the phone is encrypted with secure AES or triple DES algorithm.




6.SYMBIAN


This is an operating system developed in a joint venture of nokia and Sony 
Ericsson's mobile phones and a highly distributed mobile OS in the world.


A service known as Bucktooth made the networking of this mobile devices very 
easy but has compromised with security.


Blue snarfing and Blue bugging is a common threat to this.


Blue snarfing give UN authorised access to mobile data.


Blue bugging is type of mobile phone attack where attacker can easily trace 
and listen calls made from the phone.It was originally targeted for laptops but 
as advancement hack increased it has compromised PD A's and Smart Phones too.




7.SIM CARDS 


Sim card if lost can be used to make suspicious call to strangers .
in most adverse condition it can be use to connect to some malicious web 
activity with your identification as saved in mobile phone company database.


Using social networking and general email checking using public WI-FI hot spot  
is most insecure activity any one can do.


Even a nubile in hacking can easily sniff all the details with user name s 
,passwords and  private chatting logs.


So Friends the above is a list of some basic security threats related with 
to days mobile phones....




In my next article i would list some of the best countermeasures to how to 
protect this security holes and i will also list some of the software which u 
can use as a counter measures.
so don't miss out my next article "SAFE GUARDING MOBILE PHONES FROM PRYING 


EYES.....". Till then explore your phone to a maximum........


As i always say pls do comments......


JITENDRA KUMAR PATEL.
http://www.facebook.com/bewithjitendrapatel

SEARCH BLOG

INDORAMA { BUNKERS OF L.K.C.T. }

Followers