Monday, 22 December 2014

Cyber-Security is as important to National Security as soldier on border.

Cyber-Security is as important to National Security as soldiers on border-well as we speak about cyber -security we need to understand what is cyber-security.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity assures protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest.
In India where common man spend there whole life in just earning his life necessities.Government is not at all concern about other threats to National Security
Nation Cyber Security policy of India is not under progress at all its just few pages of line written to finish the formalities of making Nation Cyber Security Policy.
While other countries have capabilities of tracking each and every person's whole life at any time , anywhere, in such era of surveillance we are still sitting far behind and waiting for any terrific act to happen. 
In India we never take precautions its in out habbit now for example
Mumbai Attack 26/11
So after Mumbai Attack government took following measures(remember after).
Government has planned to buy 36 speed boats to patrol the coastal areas, and several helicopters for the same purpose. It will also create an Anti-Terror force known as the Force One. and a anti- terrorism bill passed in Parliament that's all.
Mumbai attack could have been stopped if security agencies would have a clean way to share tracked emails information gathered by CIA, and British Secret Service 
Before that India Police was just quiped with a wooden stick to deal with any threat on our homeland. NSG (National Security Guard ) operation on Taj Hotel was so confidential and effective that its being broadcast live on all T.V channels so that master planner in Pakistan can give there commands easily.
 ---------------------------------------lets come to Cyber Terrorism------------------------------------
Such attack or riplica of such attack now can be done online from thousands of Kilo-meter away with just few person to handle attack, cyber Terrorism is not a kind of thing where you need thousands of hundreds of peoples to carry out an attack. A single Blackhat Hacker can damage our IT infrastructure like any group of terrorist which consist of 500 men.

Every months millions of sites are defaced by Unethical Hacker and Scriptkiddes from Several countries like USA, Europe, Brazil, Turkey, China, Pakistan, Bangladesh, Algeria and UAE.
according to Offical report submitted in Parliament 9,174 Indian websites were hacked by various hacker groups from different parts of the world till May 2014. 62,189 security incidents were reported during the same period to the Indian Computer Emergency Response Team (CERT-In).

The offensive and defensive cyber security capabilities of India are still missing.

Sophisticated Malware like Stuxnet & Duqu have already proved that Critical IT Infrastructures around the World like:-
 Power Grids,
 Nuclear Facilities,
 Satellites,
 Defense Networks,
 Governmental Informatics Infrastructures,
 etc... are vulnerable to diverse range of Cyber Attacks. The Reality is that Cyber Attacks are affecting Indian Critical Infrastructure even now at this moment and we are not even aware of that threat we don't even know whats happening in our cyber-space other countries have there own network traffic analysis centers where all the computer internet traffic is analysed regularly to detect any abnormal threat online.
for example any DDos Attack.

India have following sleeping Organisations and Authorities for Computer and Cyber Security

  • Datasecurity Council of India- www.dsci.in
  • National Critical Information Infrastructure Protection Centre NCIIPC
  • Cyber-society - www.cysi.in
  • Indian Computer Emergency Response Team (CERT-In)

most of time the work they do is just to report any incident.

DRDO- DEFENCE RESEARCH & DEVELOPMENT ORGANISATION of India does not even have a single project on Computer security, they don't have field near to Cyber Security 


 According to brief given by wikipedia on new National_Cyber_Security_Policy_2013
In short, India is not at all cyber prepared despite the contrary claims and declared achievements and the cyber security policy is just another policy document with no actual implementation and impact.The cyber security challenges in India would increase further and immediate action is required in this regard.

 According to report on Critical Infrastructure Security in india by Rajabahadur V. Arcot
this can be downloaded from here.
       Computer Emergency Response Teams (CERT) are regularly
issuing alerts about the vulnerabilities, it is annoying to find that even the website of its Indian counterpart (CERT-In) is not accessible most of the time. In matters such as the cyber security threats to the country’s critical infrastructure industry.

 According to article of Praveen Dalal about -Cyber Security Challenges Before The Narendra Modi Government-
There are no dedicated cyber security laws in India. Indian government has drafted thecyber security policy of India 2013 but the same has not been implemented so far. Further, the policy is also suffering from many shortcomings including lack of privacy and civil liberties protection and absence of cyber security breaches disclosure norms. The cyber security trends of India (PDF) have also shown poor cyber security preparedness of India to protect its cyberspace and critical infrastructures.

What can be done in this situation?
well first of all we need to invoke our government attention towards this issue which is very important, the current condition of Indian cyber space is very fragile if anyone attack on right place at right time his efforts can leads to a catastrophic results on our national security.
   Imagine a day when mobile phones, telephone not working , no trains available, banks not functioning, Stock Exchange Market crashed, all the communication methods fails , and military satellites becomes useless, Internet access unavailable. this is not joke if you are still not frighten then imagine condition of any nation with such situation no doubt nation will collapse in a week.

Solution to all this India has to develop its own defensive and Offensive Capabilities for such purpose.


Indian Government has to laid a foundation of National Research lab on Cyber- Security and National Security like :-

and We need to build a National Cyber Command Center to defend and prevent our Cyber space.

big thanks to http://cybersecurityofindia.blogspot.in/ f

or guidance
please share this article as much as you can .....

Tuesday, 9 December 2014

Process Management from Linux Command Line


Process Management from Linux Command Line


Running a foreground application you can use terminal or icon from launcher




you can use command <app name> bg to keep running it in background
i.e.. artha bg

or you can bring any background running application on screen by doing same type <app name> fg
i.e.. artha fg

Top


Top command provide a system stat view, The top program provides a dynamic real-time view of a running system. It can display system summary information as well as a
list of processes or threads currently being managed by the Linux kernel.


kill

kill - The kill command will kill a process using the kill signal and PID given by the user. To use the SIGKILL signal with "kill", type one of the following for a process with a PID of 0710.

To view all the current processes from your teminal type command

ps -A


scroll around and choose the process which you want to kill and notice its Pid
(PID- its is the process Id, every process running in Linux have a certain Id its mostly a integer value.)
Use the following command to kill that particular process:-
kill -9 <pid> for example kill -9 0710


If you want to know pid of specific application then use this command pidof <appname>

i.e.. pidof firefox 

kill -SIGKILL 0710

kill -L

List the available signal choices in a nice table.
kill -9 -1

Kill all processes you can kill.

killall - The killall command kills all process with a particular name .
killall -9 firefox

pkill 

pkill- This command is a lot like killall except it allows partial names. So, "pkill -9 unity"

ps -aux | less


As the list of processes can be very long, the output of ps -aux can be piped (means transferred) to the less command, which lets it be viewed one screenful at a time. The list can be advanced one screen forward by pressing the SPACE bar and one screen backward by pressing the b key in above command.

The pstree command can also be a useful tool for finding offending processes. this command displays the names of all processes on the system in the form of a tree diagram, thatshow showing all of their parent/child inter-relationships. When used with its -p option, pstree also shows the PIDs of the processes, i.e.,
pstree -p | less

pstree can simplify terminating a series of related processes (i.e., a process and all of its descendants) because it makes it immediately clear which process is the parent; all that is necessary is to kill the parent in order to also terminate all of its descendant processes. That is, it is not necessary to manually search through a list of processes to find and individually terminate each one as would be necessary using ps.

Because Unix-like operating systems and many of their application programs are inherently very robust (i.e., stable and resistant to crashing), it is not necessary to use the kill command as often as it is to terminate programs or reboot on some other operating systems. May be anytime you want to close a application but its not responding then you can simply use this kill command to kill it instead.




Note that "ps -aux" is distinct from "ps aux". The POSIX and UNIX

standards require that "ps -aux" print all processes owned by a user

named "x", as well as printing all processes that would be selected by

the -a option. If the user named "x" does not exist, this ps may

interpret the command as "ps aux" instead and print a warning.

To see every process on the system:-
ps -e ps -ef ps -eF ps -ely

To see every process on the system using BSD syntax:-
ps ax ps axu

To print a process tree:-
ps -ejH ps axjf

To get info about threads:-
ps -eLf ps axms

To get security info:-

ps -eo euser,ruser,suser,fuser,f,comm,label ps axZ ps -eM

To see every process running as root (real & effective ID) in user

format:
ps -U root -u root u

Nice 

nice - run a program with modified scheduling priority
nice -n 'Nice value' process name

nice -n 19 firefox
 type man nice in terminal to know more.

Saturday, 8 November 2014

Linux Command Line Cheatsheet

Linux Command Line Cheat-sheet

Linux command line is very usefull interface to work on linux but people often forgets the commands so...
if you keep forgetting linux basic commmands then this is what you do download this cheatsheet also know as Linux command memento
and print it on your bed sheet, chart paper(A3), or you can make it your Desktop background


what you don't like this !
okay want it in dark background go here --link
and here too ..
or you can download it in a pdf or word format go here-- link

share it please

let spread our moto of opensource

love peace Linux

Thursday, 23 October 2014

Top ten things to do after installing Ubuntu Linux

  Top ten things to do after installing Ubuntu Linux

1) Update -Make Sure you are Update of latest Software and Distro

use these two commands to update your package and distro.

$sudo apt-get update 

$sudo apt-get dist- upgrade

----------------------------------------------------------------------------------------

2) Codecs- package of support file system.Download Ubuntu restricted extra package from software center.                          

http://apt.ubuntu.com/p/ubuntu-restricted-extras

-----------------------------------------------------------------------------------------

 3) Flash- install flash player to play videos in browser     

 
$sudo pepperflashplugin-nonfree --instal
$sudo update-pepperflashplugin-nonfree --install

-----------------------------------------------------------------------------

4) Download Carlo Dock -best app for Desktop customisation.    


               http://apt.ubuntu.com/p/cairo-dock

               http://www.glx-dock.org/

 ----------------------------------------------------------------------------------------

5) Synaptic Package Manager

 http://apt.ubuntu.com/p/synaptic

 

---------------------------------------------------------------------
6) Download Ubuntu after install app

this will install all the necessary app in your distro directly just in few clicks-

sudo add-apt-repository ppa:thefanclub/ubuntu-after-install
sudo apt-get update
sudo apt-get install ubuntu-after-install

or visit- here

---------------------------------------------------------------------------------------

7) Clamtk anti-virus

http://apt.ubuntu.com/p/clamtk

http://clamtk.sourceforge.net

-----------------------------------------------------------------------------------------
8) Download Software updates 

from Software updater from launcher.

-----------------------------------------------------------------------------------------

9) Chrome Browser - http://apt.ubuntu.com/p/chromium-browser

 http://code.google.com/chromium/

----------------------------------------------------------------------------------------------

10) Ebook viewer - Calibre

http://apt.ubuntu.com/p/calibre

http://calibre-ebook.com

Note- Suggestion given above are only applicable to Debian based or Ubuntu Derived Distro's only.

Tuesday, 21 October 2014

How to change Netbeans themes



Default Appearance is pain in eyes really my personal experience so has lead me to many ways to change the default theme of my fav. IDE
hence for better coding experience you need to get rid of this annoying white background of window in IDE.


Download your fav. theme from here
then go to plugins window from tools in menu
click on downloaded tab and locate the downloaded file and click on install
and here you go its installed but you need to set its as default appearance from option in tools menu
and also click on font as your theme style name to make font style as your theme respectively.
Its Done


Monday, 29 September 2014

How to find and fix Bash Shell-shock vulnerability CVE-2014-6271 in unix like system

In the world wide hurly-burly of personal network system and server security risk of these days due to Bash Shell-shock vulnerability CVE-2014-6271, so what should we do i suggest ...

Keep Calm And Patch

so lets begin to check if you system is vulnerability to bash shell-shock vulnerability  

type command - env x='() { :;}; echo vulnerable' bash -c 'echo hello'
in your terminal.

if your system is vulnerable then above command will return output like above
vulnerable hello

all the Debian /Ubuntu user to patch it kindly update your bash to latest version
run bash --version command to know your currently installed version
run- sudo apt-get update && sudo apt-get install –only-upgrade bash
if your system is alread updated then just simply upgrade your bash version by running this command 
sudo apt-get install --only-upgrade bash

again check your bash version after upgrading your bash version my previous version was version 3.2

----------------------------------------------------------------
update the bash using yum on all RedHat/CentOS 

run- yum update bash

On RedHat 6 (and CentOS 6), I had the following bash version before the fix:

run- # rpm -qa | grep bash
bash-3.2-33.el5_11.4
now again check your system if vulnerable or not by using this command 
run- cd /tmp; rm -f /tmp/echo; env 'x=() { (a)=>\' bash -c "echo date"; cat /tmp/echo

if you are not vulnerable then out put will be like

no content will be displayed and if it is still vulnerable then it will show content of file like 

bash: x: line 1: syntax error near unexpected token `=' 
bash: x: line 1: `' bash: error importing function definition for `x' 
Fri Sep 26 16:15:09 PDT 2014
------------------------------------------------------------------------------------------------------------------------------
if you have more than one server to update use this script to do all at once

#!/bin/bash
# This script will log into each of your servers and execute the command below

servers=(
# Put your list of servers here
111.222.333.444
123.123.123.123
10.10.10.10
15.22.22.22
)
for server in ${servers[@]}
do
# Here's the command you're going to run on each
ssh $server 'yum -y update bash'
done

Tails Linux most secure and anonymous operating system ever

Tails Linux most secure and anonymous operating system ever.


[{Tails}==theamnesicincognitolivesystem]



Tails is a live operating system that aims to protect your privacy and anonymity completely. It has been developed to helps you to use the Internet anonymously and circumvent censorship almost anywhere in world you go and on any computer you use but leaving no trace unless you ask it to explicitly.


It is a complete operating system designed to be used from a CD, DVD, USB stick/thumb drive, or SD card independently of the computer's pre-installed operating system. It is Free Software and based on Debian GNU/Linux.


This OS is opensource so you can even download its source code and customize according to your need and because its opensource so its a free software, 

this is OS which is being used by many Anonymous group and people all around the globe- specifically #NSA whistle blower Edward Snowden used for his emails and other online work.

as Developer explains



Tails also comes with a selection of tools to protect your data using strong encryption:

direct download link s here- https://tails.boum.org/download/index.en.html


just download the iso image file and write it on any external removable storage like usb drive using #UNetbootin program and you are good to go--



Monday, 22 September 2014

7 Extra Things VLC Can Do!

7 Extra Things VLC Can Do!


VLC media player is one of the most popular opensource player
for most people.It has got almost all codecs in it. VLC can
do a lot of other things beyond your imagination.
Find out how many of these listed below you knew,
and how many you did not.
Lets find out---

1. Rip DVDs:


VLC includes a basic DVD ripper. You probably would
never use it when there are better DVD rippers
available, but it helps to know that you can in fact,
get a decent quality DVD rip with VLC. To rip a movie
follow these steps: Go to the Media menu and choose
Convert–>Save. Click on the Disc tab. Here you can adjust the Starting Position and rip only
specific titles or chapters.
Enter file name making sure to end with .MPG, and
start ripping.
Click Save.

2. Record videos:


With the new VLC, you can record videos during
playback. The record button is hidden by default. To
see it, click on View–>Advanced Control. The record
button will now appear. Clicking on the button while
playing a movie or video will start recording. Clicking
again will stop recording.

3. Play RAR files:


Do you know VLC can play videos zipped inside RAR
files? They play like normal video files and you can
even use the seek bar. If the RAR file is split into
several files, no problem. Just load the first part
(.part001.rar ) and it will automatically take the rest
of the parts and play the whole file.

4. Play in ASCII mode:


VLC media player has an amusing ability, to playback
movies in ASCII art. To enable ASCII mode, open VLC
media player and click on Tools –>Preferences. Open
the section “Video” section and under “Output”
select “Color ASCII art video output” from the drop
down menu. Save it. Now play any video file to enjoy the ASCII art.

5. Listen to online radio:


VLC includes hundreds of Shoutcast radio stations.
You just need to enable it through Media –>Services
Discovery –> Shoutcast radio listings. Now, open the
Playlist and browse through the stations.

6. Convert Audio and Video formats:


In VLC you can convert video and audio files from
one format to another. Several different formats are
supported like MP4, WMV, AVI, OGG, MP3 FLVetc. To
access the converter:
* Go to Media –>Convert/Save.
* Load the file you want to convert using the Add button and click Convert.
* Now choose the output format and output file
location.

7. Download YouTube and other online videos:


First grab the URL of the YouTube video page. Now
click on Media –>Open Network stream. Paste the URL
and click Play.
Once VLC starts streaming the video, click Tools –
>Codec Information and at the bottom of the
window you will see a Location box. Copy the URL and paste it on your browser’s address bar. The
browser will now download the file which you can
save it to your hard disk. Alternatively, you can
record the video.

Installing TrueCrypt in Linux

Installing TrueCrypt in Linux


Lets begin our installation process of TrueCrypt one of the most trusted open source encryption tool for several platforms

first you have to download the source file from truecrypt official site www.truecrypt.org

then compile it after extracking using above tar command in terminal.

then use $make;make install commands to finish the installation.



Another way of doing this is
type following command in terminal

sudo add-apt-repository ppa:michael-astrapi/ppa
sudo apt-get update && sudo apt-get install truecrypt
And to remove it:

sudo apt-get install ppa-purge
sudo ppa-purge ppa:michael-astrapi/ppa

Although if you visit the official site of true crypt now it will show you a warning that its not secure anymore due to some security issues but if u are not facing any active security threads its good to go.

but if you guys want to go a step ahead then you have many alternative options of truecrypt
as fallows
Gnu PG - www.gnupg.org
AES Crypt - www.aescrypt.com

Thursday, 26 June 2014

Installing Graphic Layer Engine in Linux

Installing Graphic Layer Engine in Linux


GLE (Graphics Layout Engine) is a graphics scripting language designed for creating publication quality figures (e.g., a chart, plot, graph, or diagram). It supports various chart types (including function plot, histogram, bar chart, scatter plot, contour plot, color map, and surface plot) through a simple but flexible set of graphing commands.


The optional software packages should all be included in your Linux distribution's package repository. You should be able to find and install them by searching the repository for the package names (i.e., "qt4", "libtiff", "libpng", ...). If, for a given package, a version is available with "devel" or "dev" in the name, then install that version. The "devel" packages typically include the "C" header files of the library, which are required to compile GLE.

QGLE requires Ghostscript to be installed as a library named "libgs.so" (the actual name may include a version number). Normally this file should be part of GhostScript. If your distribution does not include "libgs.so" in its GhostScript package, then download gs8.54-linux.zip and extract it in your home directory, or somewhere under "/usr" (as root). This ZIP file contains a GhostScript binary that includes "libgs.so".



Step 1- Download binary file from here

Step 2- If you are installing it from souce code .tar.gz file or .tar

than follow these commands

Install required packages to compile the source file

          sudo apt-get install cmake

          sudo apt-get install make
 
now uzip the source code using 

        tar -xvzf filename-x.y.z.tar.gz

 than change the directory in terminal to the newly extracted directory
     
       cd dirname-x.y.z

now follow these commands
 -----------------------------------------------------------------------------------------------------------------------    
      ./configure -nomake examples -nomake tools -nomake demos -no-qt3support -no-phonon -no-webkit

make

sudo make install
-----------------------------------------------------------------------------------------------------------------------

If you have to install gle on Redhat /CentOS system than follow these steps

(remember above method work on every distro but for your ease go ahead)

download the Debian package file from here

and follow these steps-

Step1- You need to convert .deb file to rpm file so install alien first
       download alien to convert the file from here

Step2- now run these commands to convert the .deb file into rpm file


               # sudo alien -r libsox1_14.2.0-1_i386.deb
                  libsox1-14.2.0-2.i386.rpm generated


Step3- Now to install this rpm file .

            # rpm -i filename.rpm

Done

Friday, 18 April 2014

Winamp suffering

WINAMP


 THE Legendary player is Suffering problems

Yes the One of the oldest and best media player well know as Winamp was almost dead.
After the big financial fight the official site is not down for forever but no new version of this player are expected in future anymore

but certainly magical thing happened that its not completely dead users will be able to get winamp using the official site www.winamp.com



What is lost

- Online services (like Now playing, MoodAgent, etc). The good thing about it is that now   people can use / create custom services to use with it, like Broser Pro or Reader already does in cPro skins.
- Nullsoft TV (Idem, if you have the links you´re good, get some here)
- Winamp.com
- Winamp.com Forums (there is: winampforum.com, not official of course, but it nicely replicates the old one)
- Winamp.com skins (luckily, there´s DeviantArt / 1001skins)
- Winamp.com plugins (later it will be uploaded somewhere)
- Winamp Android app (See this thread for more info / precautions)
- Winamp MAC application
- Support for Windows 8 (although community will do its best to help)
- Winamp Cloud (already dead, never got out of beta)

the last post from winamp forum was this

  "As you all surely know by now, Winamp & SHOUTcast have recently changed ownership (from AOL to Radionomy).

The winamp.com website is currently undergoing heavy work and an almost-completely new redesign.
As a result, many features will be unavailable, including some in-client services.

The Winamp downloads and Winamp Pro purchases will also be temporarily unavailable
whilst code licensed to/by the previous owner is removed/replaced.

We hope to have everything restored and back in working order as soon as possible,
and we apologize for any inconvenience caused in the meantime."

However the player is yet available for smartphones  like Android OR iOS and also for PC
get them from respective links below



Android: Winamp 1.4.15 & Pro apps
http://winampenthusiasts.com/showthread.php?tid=42
http://winampenthusiasts.com/showthread.php?tid=44




Mac OSX: Winamp Sync Beta 0.8.1
https://www.macupdate.com/app/mac/40721/winamp

but don't let yourself down if u never had a chance to tinker with this great player before the server of winamp went offline i downloaded its final setup and its link is right here below just click and download

Earlier this year came online back but it was not same the downloads are not available there

-----------------Download Winamp Latest Version------------------

Windows- click

Windows winamp theme- click

Wednesday, 1 January 2014

Womens Safety App



  Women Security App For Smartphones



In today's world our women's are not save out there while they are away from home doing there daily jobs. Its is necessary to have any way out in case of an emergency, No matter what is your relationship with her either she is your friend, Mother, Sister, Relative, share and tell her to install these app to ensure there safety.


1) Microsoft Guardian- (W8 Phones)


Guardian users can call for help through an 'SOS' alert button and also connect to security agencies, police and hospitals easily via this app in times of distress.

can be download from this officaial link of microsoft cloud portal

there is one problem with this is a windows 8 phone app so in order to use it you must have a windows phone.

Guardian





2) Women Security- (Android)






THIS IS A SMARTPHONE APP THAT HELPS WOMEN TO ENSURE THEIR SAFETY USING THEIR DEVICES.
THE APP HAS BEEN SHORTLISTED IN THE "NASSCOM WOMEN'S SECURITY APP FAME CONTEST".

this can be downloaded from following link
https://play.google.com/https://itunes.apple.com/


3) WatchMe911- (iphone)






This is one of the best security apps that’s available for the iPhone. The developer encourage you to place this app on the front home screen of your iphone or in the app bar at the bottom so that you can activate it whenever you need to. There are four main features: a panic alarm and flashlight, an automatic 911 emergency dial, a panic mode and a monitor me mode. The panic mode will send SMS messages – along with your GPS location – to a predefined contact in your address book so that they can help you. The monitor me mode is about keeping your loved ones up to date about your location. If you’re a single woman who perhaps lives alone, this is the right app for you.
On iTunes: itunes.apple.com






4) Circle of 6 (iphone)


Here’s how it works:
• In critical situations, use Circle of 6 to call two pre-programmed national hotlines or a local emergency number of your choice
• You're out late and you lose track of your friends. Use Circle of 6 to send your circle a “come and get me” message- with a map using GPS to show your precise location.

• You're on a date that starts to get uncomfortable. You need a polite way to excuse yourself. Use Circle of 6 to alert your circle to call you and interrupt the situation.

• You're seeing someone new, but you have some doubts about how things are going. Use Circle of 6 to access a wealth of online information about healthy relationships.

• In critical situations, use Circle of 6 to call two pre-programmed national hotlines or a local emergency number of your choice



5) VithU: V Gumrah Initiative-(Android)

)
VithU, is an emergency App that, at the click of the power button of your smartphone 2 times consecutively begins sending out alert messages every 2 minutes to your contacts that you feed into the app as the designated receivers or guardians.

The message says "I am in danger. I need help. Please follow my location."

The receiver will receive a link to your location every 2 minutes giving them your updated location. Also, you will get updates on the Crime Scene in India and a “Tips Feed” option exclusively giving you safety tips in an emergency situation can be downloaded on Android Device from https://play.google.com/store/apps/
  


6) Women Safety Secure (Android)


this Apps will be in activated position & detect some load human voice(can be shouting/crying) it will immediately recognized it as distress signal & activates alarm.. Alarm shows that the situation is declared as distress situation & send sms to pre-configured numbers. https://play.google.com/

A United Nations statistical report compiled from government sources showed that more than 250,000 cases of rape or attempted rape were recorded by police annually.
24,206 rape cases were registered in India in 2011.
     "Every Year thousands of cases are registered of rape, murder, robbery, sexual harassment against women's if you think you care then share this post to your loved ones" 

Proper way to install nvidia 390 fix error

Proper way to install nvidia 390 if you see any error in the process look below; command  sudo apt purge --autoremove '*nvidia*...