What is the present rules of RTO office for LL and DL in this covid-19 situation?

 What is the present rules of RTO office for LL and DL in this covid-19 situation?

Submit a learning license? No need to visit the RTO office again

Given the coronavirus pandemic, the function of the transportation sector is being carried out without contact, the publication of Sister HT Livehindustantan reported quoting a senior official. This will bring transparency in RTOS function in countries, he also said.

People who try to get a student license or find a temporary registration number for their vehicles no longer need to visit the regional transportation office (RTO) for verification. Given the social blasphemy norms because Covid-19, the central government will launch 16 facilities that allow you to do all that from the online portal. The Ministry of Transportation Union has stated that Aadhaar will be adopted as an alternative document for authentication and no other paper needed.

This will allow people to apply for new student licenses, updates, duplicate licenses, and temporary vehicle registration. They will also be able to change the address in their SIM and get international driving permission, NOC for registration, duplicate registration certificate, vehicle transfer etc. New rules are scheduled to be implemented by February first week.


Given the coronavirus pandemic, the function of the transportation sector is being carried out without contact, the publication of Sister HT Livehindustantan reported quoting a senior official. This will bring transparency in RTOS function in countries, he also said.


On January 29, the Ministry of Road Transportation and Highway also sought advice and objections from all countries related to the same notification. Countries have 15 days to respond to notifications.

New online systems will also limit people from getting many driving licenses from various states. The government also hopes that through this stolen vehicle registration racket in other states will also be closed.


The government in recent months has brought some changes to the rules of motorized vehicles. In October last year, the government mandated that people no longer need to bring physical copies of documents related to their vehicles including their SIM. It allows people to save copies of their documents on the government portal, MPARIVAHAN or DIGILOCKER. They can then show the documents needed to the traffic police if needed.

How Viruses useful in daily life?

 How Viruses useful in daily life?

Virus: You've heard badly; This is good

"Words, viruses, connotates morbidity and mortality, but the bad reputation is not universally feasible," said Marilyn Roossinck, PhD, Professor of Plants and Environmental and Biology Microbiology at Pennsylvania State University, University Park. "Viruses, like bacteria, can be a useful microbial that is important in human health and agriculture," he said. The current review of the literature on useful viruses emerged before the April 24 print in the Journal of Virology, published by the American Society for Microbiology.

In sharp contrast with gastrointestinal pressure which causes humans, Murine (mouse infection) Norovirus plays a role in the development of the mouse intestine and its immune system, and can really replace the beneficial effects of certain intestinal bacteria when this has been destroyed by antibiotics. Normal intestinal bacteria, healthy help prevent infection by bacteria that cause gastrointestinal disease, but excessive antibiotic intake can kill normal intestinal flora, and make someone susceptible to gastrointestinal disease. However, mouse norovirus infections really recover the normal function of the immune system lymphocyte and normal morphology of the intestine, said Roossinck.


The mammal virus can also provide immunity to bacterial pathogens. Gamma-herpesvirus increases the resilience of mice against Listeria monocytogenes, human gastrointestinal pathogens are important, and for Yersinia pestis, or known as an outbreak. "Humans are often infected with their own gamma-herpes viruses, and can be imagined that this can provide similar benefits," Roossinck said.


Herpesvirus latent also armed natural killer cells, an important component of the immune system, which killed both mammalian tumor cells, and cells infected with the pathogenic virus.


Gastrointestinal results of luxury mammals with viruses. So far, a little known about how these viruses affected their host, but their number and diversity showed that they had important functions, said Roossinck. For example, the GI virus that infects bacteria - known as fage - can modulate the expression of the bacterial gene involved in the host digestion.


Recent research shows that bacteriophage attaches to many mucous membranes Metazoa (Class "Animalia," which includes everything from worms to wombat). And mucous membrane, Roossink shows, is the entry point for many bacterial pathogens, shows that they provide the first line of defense against invasion bacteria.


Viruses also provide various services for plants. Some plants grow in hot land that surround the geyser and "artist 'PaintPots" from Yellowstone National Park. One of these plants, which is a type of tropical panic grass, is symbiosis that includes mushrooms that colonize plants, and viruses that infect the fungus. These three symbiotic members are needed to survive on boiling land on more than 122 degrees Fahrenheit.


In the laboratory, Roossinck has created symbiosis between fungi infected with the same virus and plant. This has allowed every factory that has been tested for the group to survive at this increased soil temperature, including tomatoes, he said, noting that he had pushed soil temperature to 140 degrees without killing plants.


Investigators have also found that certain viruses can make some plants tolerant of drought, and at least one example of cold tolerance given viruses has been found - discoveries that can be useful to expand the plants range.


Plants are often infected with "persistent viruses" derived from generation to generation, maybe more than thousands of years, with viruses transmitted to almost 100 percent of the descendants of their plants, but it has never been proven to be transmitted from one plant. to others. "One such virus, white Crytpic Clover virus, suppresses the formation of nitrogen installation nodules when adequate nitrogen is present on the ground, saving plants from producing expensive organs when not needed "said Roossinck.


Another useful virus is an old-fashioned retrovirus of making a permanent home in the genome, or who left the genes in it, said Roossinck. "Mammalian genes for synchritin, are important in the formation of placenta, is a retroviral ENV gene entered on several different occasions," Roossinck wrote.


"The virus is beyond doubts about the coolest things I've ever met," said Roossinck. "They did truly extraordinary things with a little genetic information. I was always a little disturbed on the bad rap they got, so it was very interesting for me to find a good one."

My ringworm start with in 6 month how can I eat food

My ringworm start with in 6 month how can I eat food

Diet for ringpap


Regardless of its name, ringworm is not caused by worms or other parasites; Instead, it was caused by fungal infections. It is characterized by red patches, circling on your skin, and can cause itching, blisters, and temporary bald patches. Although diets cannot cure ringworm or replace medical care, certain foods can help treat or prevent this condition.


Check with your doctor before changing your diet to overcome ringworm.

Rich vitamin food

Vitamin A can help improve the function of the immune system, help your body produce leukocytes that attack and destroy mushrooms in your body, according to the Certified Nutrition Consultant Phyllis Balch, the author "recipe for nutrition healing." This can help eliminate skin mushrooms that contribute to ringworm. Vitamin A is also needed for repairing skin tissues, which can help prevent scar tissue because your skin is cured. Vitamin A is found in beef and fish, eggs and dairy products. Your body can also produce vitamin A from carotenoids, especially beta-carotene, found in carrots, kale, apricots, mustard green, parsley, spinach and hot peppers.



Garlic

Add fresh garlic to the main dishes, such as casserole, curry, soup, pasta and sauteed dishes, or for steamed vegetables or dipping oil for bread. Allicin, chemicals found in fresh garlic cloves, can offer antifungal benefits, according to Michael Castleman, author of "new healing herbs." Talk to your doctor if you plan to use garlic to treat or prevent ringworm. This food can encourage your blood thinning.


Food rich in vitamin E

Like vitamin A, Vitamin E is the enhancer of a natural immune system that can help your body against the fireplace - causing fungi, according to Balch. Vitamin E also plays a role in the production of skin tissue, potentially reducing scar tissue caused by ringworm. 

Clove

Cloves are stinging spices, a little sweet ones commonly used to spice up Indian dishes and Asian sauteed dishes. Talongkok's physician has used these spices for treatment purposes for more than 2,000 years, according to Castleman. Eugenol, an active chemical compound on the clove bud, can help destroy mushrooms that cause ringworm. Consult your doctor before adding clove to your diet to overcome or prevent ringworm. Even though the side effects are unusual, cloves can cause diarrhea.

15 'Virus' in 2020 that internet users in India must be careful

 15 'Virus' in 2020 that internet users in India must be careful

This is mostly a ransomware, malware and banking trojans aimed at stealing money or sensitive information from individuals and organizations. Some of the Android smartphone targets while others spread through office networks. Here are 15 warnings of this virus from Cert-in that organization and individuals need to be careful ...

Polok Ransomware targets government and health organizations

Cert-in reported "prolock" on August 2020. This is the successor to the Pwndlocker Ransomware strain that appears at the end of 2019. Ransomware affects the organizations of various sectors including government, financial, retail and health care organizations.

'Backdoor Virus' based OS Linux called Doki

Cert-in reports about backdoor-based Linux OS named "Doki" in August. spread. The attackers exploited boom cloud computing infrastructure which is usually based on Linux architecture to attack Linux systems and servers. The attackers targeted a publicly accessible server docker held with popular cloud platforms, including AWS, Azure, and Allbaba. According to the certificate, this attack is very dangerous because the facts of the attackers use container escape techniques to gain full control over the victim's infrastructure.

Blackrock Malware Targets Android Smartphones

Cert-in reported about Blackrock Malware in July. It is equipped with data stealing, and attacking various Android applications. "It can steal credential information and credit cards from 300+ targeted applications such as e-mail clients, e-commerce applications, virtual currencies, message delivery / social media, entertainment, banking applications, financial applications etc.," he said.

Clop Ransomware stole sensitive data and leaked it on the dark web

According to the certificate, "Clop" is active in attacker organizations / institutions throughout the world. Posting compromise Ransomware leaks information if the deal of negotiation negotiations fails. Leakproof information includes data backup, financial records, thousands of emails and vouchers etc.

Thiefrquest Ransomware Install Keylogger and Spy on Victims

This ransomware does not only encrypt files on the system but also install keyloggers, remote shells and steal files related to the cryptocurrency wallet from infected hosts. Even after the ransom has been paid by the victim, the attacker continues to have access to the computer and can issue the file and emphasis button. So, the attackers can impose the victim.

Conti Ransomware attacks the company's network and is operated by humans

Conti Ransomware infects at the stage and violates the company's network and spreads laterally to acquire domain administration rights to deploy Ransomware. Conti is a human-operated ransomware designed to be controlled directly by the operator than being executed automatically by itself, according to the certificate.

Wastedlocker Ransomware Targets Media, IT and Other Manufacturing Industry

Wastedlocker Ransomware is associated with the famous cybercriminal clothing "Evil Corp." which was previously related to some terrible cyber attacks too. According to certification, the attack mainly focuses on A.S. Organizations located various industries including manufacturing, media, IT, health care, and more.

Thanos is a ransomware-as-a-service tool that offers special services

The new Ransomware-As-A-Service (Raas) tool, called "Thanos" provides buyers and affiliate customization tools to build unique charges. This Ransomware family employs riplace tactics used to cut the security of the endpoint of anti-ransomware, according to certification.

Lucifer Malware targets Windows machines with Crypto-Jacking and DDoS attacks

"Lucifer" targets a Windows system with Crypto-Jacking and DDoS attacks. Reports show that this malware uses a complete list of critical vulnerabilities that are not seen, according to the certificate.


"Tycoon" targets Windows and Linux OS and is involved in a highly targeted attack campaign that targets small and medium software and the education industry. As identified, malware is deployed in targeted attacks on organizations where the system administrator is locked from their system after the attack on the domain controller and file server, according to the certificate.

Snatch Ransomware Processing Brute Forcing Remote Desktop Protocol (RDP) Account

"Snatch" interferes into the target organization network through a Brute Forcing Remote Desktop Protocol account (RDP). 

Victorygate botnet mines cryptocurrency causes the device to the heat

VictoryGate botnets using all available utas to do cryptocurrency mining produces a 90-99% CPU load so that it slows the infected device and causes too hot that can even damage it. Also, when the USB drive is connected to an infected machine, the file is copied in a hidden directory with a malicious code, according to the certificate.

EventBot Malware Read OTPS on Android Phones

EventBot is a mobile banking Trojan and Infousaler that abuses Android internal accessibility features to steal user data from financial applications, read the user's SMS message and an SMS message interception that allows malware to cut authentication two factors, according to the certificate.

Maze Ransomware targets the shortcomings in Adobe Flash Player and Windows

Maze Ransomware is often sent via email or exploit kits such as Fallout and Spelevo. Kit Fallout and Spelevo Exploit utilize the shortcomings in Adobe Flash Player and Microsoft Windows (CVE-2018-8174, CVE-2018-15982, and CVE-2018-4878). In addition, the Ransomware labyrinth uses remote Desktop Protocol (RDP) and evil ads as the attack vector, according to the certificate.

Kinsing malware affects the docker container to mine cryptocurrency

"Kinsing" was reported that hunting for labor-affected labor openly and infected them with a container who runs Crypto miners, according to the certificate.


parwal virus of dogs can it transfer to humans

 parwal virus of dogs can it transfer to humans

Canine parvovirus, often called parvo, is a serious and very contagious virus that affects most Canid (dogs, wolves, foxes, coyotes, etc.). This fatal potential disease attacks the cells splitting in the body.

What is Parvo?

Canine Parvo is a virus that causes severe diarrhea, vomiting, dehydration, and lethargy to dogs but is not contagious to humans.1 Parvo refers to various viral strains that affect other species, and even though they are the same type of viral, they are usually specific specific. In rare cases, certain strains can spread to cats. If you think your dog or puppy has a symptom of parvo, contact your veterinarian immediately.

Symptoms of parvo in dogs

Parvovirus is very dangerous because it attacks the cells that divide quickly in the bone marrow and animal intestines. After the bone marrow is affected, the number of animal blood cells goes down, increasing the risk of infection, and the immune system starts to be closed. When the intestinal cells are affected, the intestinal layer becomes damaged and the body is no longer able to absorb nutrients or digest food correctly. 


Parvo usually causes bloody diarrhea with smells much worse than normal dog shit.


When this disease takes victims on the body, dogs will become very weak and dehydrated.1 Dogs can develop sepsis, which is a blood infection that can occur when the intestinal wall cannot act as a barrier to bacteria.

Unfortunately, many dogs don't survive Parvo. Early detection and intensive animal care is the best defense against disease.


Not all dogs with parvovirus will show severe symptoms. In some cases, adult dogs can contract diseases with small symptoms (or not at all) but can infect other dogs.


Parvo can be a frightening prospect for dog owners, but can be prevented with routine animal care and maintain your latest dog vaccination.


Causes of Parvo.

Parvo most often affects puppies, but adult dogs can contract disease if they are not vaccinated.1 A dog whose immune system is compromised (due to other medical conditions) is also at risk for Parvo.


A dog becomes infected with Canine Parvo after coming into contact with microscopic particles from viruses from contaminated impurities. The virus enters the dog system through the mouth. Then it takes around three to seven days for disease to be active in the body.


Within a few days, the virus will start spilling on the bench. At this point it can affect other dogs. Symptoms generally do not appear for several more days. Viruses continue to be spilled in feces during dog disease and for several weeks after recovery.


Parvovirus is stable in the environment for a long time and remains feasible in areas where dogs play and relieve themselves. Shoes you can easily take viruses and transport them to other areas. A dog does not need direct contact with feces to sign Parvo.

Parvovirus particles can live on soil or other outdoor environments for five to seven months and even longer in cold climates because viruses can survive at freezing temperatures. If the particles are on a dog's or feather claw and then digest, the dog can be infected.


Diagnosis

Medical History and Symptoms Your dog plays a big role in the diagnosis of parvo, but the final diagnosis is usually done after the Lab test confirms the existence of disease.


Most veterinarians will run tests on stool samples to detect antibodies for Parvovirus, which will show whether an animal has been infected. Many veterinarians have an in-house test kit to speed up diagnosis, where results are usually available within 15 minutes.

If a positive parvo test, your veterinarian is likely to recommend lab work further to assess damage to this disease causing blood cells and organs.


The faster your veterinarian can judge your dog, the better Possible recovery. Don't wait to see your veterinarian if your dog has signs of disease.


Treatment

Unfortunately, there is no cure for Parvo. The basis of treatment is a supportive treatment. Home care is usually ineffective for dogs that become very sick. General care involves the following:


Intravenous fluid for rehydration

Antibiotics to prevent sepsis

Anti-emetic or anti-nausea drugs to combat nausea and vomiting

Antacid to prevent further damage to the gastric and esophagus layer because of nausea and vomiting

Worms because the existence of intestinal parasites can increase damage caused by parvo and inhibit recovery

Other treatments may be suggested depending on the condition of the dog and professional opinion of the veterinarian. This may include anti-inflammatory drugs, antivirus drugs, plasma transfusions, and more. In addition, Lab work needs to be repeated periodically to monitor the overall condition of the dog.

If your dog is treated for parvovirus, expect to stay in a hospital about a week, give or receive. In general, the survival rate with the right treatment is around 70 to 80 percent.


Home care is generally not recommended for Parvo because it is not as effective. However, if the cost is the main factor and the owner is dedicated, home care can be tried as a substitute for Euthanasia. It's important to know about your dog's care and follow medical recommendations. Survival is less likely with home care, but it is not impossible.


Recovery

Once a dog has recovered from Parvo, his treatment hasn't ended yet. It is important to complete any antibiotic courses prescribed by your veterinarian. VET You might also recommend anti-nausea and / or anti-diarrhea drugs for several days.


Expect your dog bench loose for several days because the intestinal tract is still cured. Introducing food is gradually, ideally starting with a tasteless diet that is prescribed by your veterinarian.


Your dog will continue to spill parvovirus for about a month after recovery.2 Therefore, it should not be permitted in the public area for that time period. In addition, it must be kept away from puppies and dogs that are not vaccinated.


Fortunately, once recovered completely, Parvo dogs tend to have residual health problems. More good news: After a dog recovered from Parvo, it would be immune to him for several years or maybe a lifetime.


How to prevent Parvo

Because Parvo is a deadly and contagious disease, prevention is very important. This is how to protect your dog or puppy from Parvo:


Vaccinating your puppies and adult dogs. Make sure you see a veterinarian regularly and you report signs of disease on time.

Don't bring your puppy to public places or around an unknown dog before reaching the age of 17 weeks and fully vaccinated. Puppy immunity is unknown to around 16 weeks, and the immunity induced vaccine is not fully effective for up to five to 10 days after the vaccine.

While all dogs can be affected, puppies are most vulnerable to parvovirus. All breeds are at risk, but some breeds that might tend to parvo include Rottweiler, Doberman Pinscher, and American Pit Bull Terrier.3

Decontamination of Parvo

Because Parvovirus is very contagious on other dogs, steps must be taken to decontaminate the area where positive parvo dogs have spent time.


Even if the Parvo dog has spent a while in an area and has not defecated there, you have to decorate the area. Remember that Parvovirus can remain on claws and dog hair and can be transported this way.


At Vet Hospital, Parvo dogs are placed in isolation and animal staff cleaning with a specific whitening or disinfectant solution known to kill Parvovirus.


Other household chemicals will not kill area. Dirty beds must be discarded, sealed in a plastic trash bag before doing so, or washed in hot water and bleach.


If there are dogs or dogs who are not vaccinated who live at home, they must be kept away from contaminated indoor areas for at least one month.


Outside areas are far more difficult for disinfectants. Parvovirus can live outdoors above frozen temperatures for five to seven months, depending on the condition.


It's just safe for your dog to return to bleached areas after they are completely dry. Overall, your best bet is to keep puppies and dogs that are not vaccinated from the area until you can be sure the virus has died.

If you suspect your pet is sick, immediately contact your veterinarian. For health related questions, always consult your veterinarian, because they have examined your pet, find out the medical history of pets, and can make the best recommendations for your pet.

Literature survey on virus detection of HMM

 Literature survey on virus detection of HMM

Exploring the Hidden Markov Model for Virus Analysis: Semantic Approach

Abstract

The latest work has presented a Hidden Markov model (HMMS) as an attractive choice for virus identification. However, until now a few studies have been conducted to identify the meaning of these hidden countries. In this paper, we checked HMMs for four different compilers, handwritten assembly code, three virus construction kits, and metamorph viruses to record similarities and differences in hidden countries HMMS. Furthermore, we develop hmm duel strategies, which utilize our knowledge of various compilers for more precise identification. 


introduction

Wong and stamp [30] have shown that a tool based on HID-

Model den Markov (HMMS) is effective for detecting meta

Morfic computer virus. This paper explores these tools at

more profound to better understand hidden meaning

stated in this model.

In other domains, HMM countries have

Connect with several fundamental aspects of Athand's problems. For example, caves and neuwirth [5] revealed that

Hmm with two hidden countries for English (written) LAN-

Guage in accordance with vocals and consonants. This paper is

teasing to reveal details about hidden countries and blocking

mine insight what they might give about the assembly code

In general, and the virus code in particular.

The main insight is a virus construction kit and meta-

The morphic code is basically another type of compiler. We

Test building models for four different compilers, for hands

Written assembly code (benign), for three virus construction

Kit, and for two metamorphic malware families. We are iden-

TIFY points that stand out from our model, record how handwriting

assembly is different from the code compiled and how the code is benign

Different from the virus code.

We take advantage of understanding of different models

More effective detect computer viruses. Traditional

Proach uses the virus code model and a hidden markov flag

Files as infected if you exceed the given threshold [30]. As a replacement,

We test files against several HMMs and different flags

submit as a virus only if the HMM virus reports the highest

The probability of observing files given. We support this approach

hmm duel strategy, evokes the idea that difference

Ferent Hmms compete with each other. Re-

SULT shows that hmm duel strategies reach superior

produce threshold-based techniques, and often done

Tive on identifying the virus. While some hmms have

leverage in other areas such as intrusion detection [8], this

The previous approach was applied to the identification of viruses

,

This paper expands on previous conference paper [3]

to enter additional source analysis of benign code and

Additional virus families, including Mwor worms [22]

specifically designed to avoid detection techniques

used by Wong and Cap. We also show how the threshold

The approach can be combined with hmm duel strategies to reduce the performance of the hmm duel overhead

Strategy without reducing the accuracy of the results.


- We explore the semantic meaning behind hidden countries

From the Hidden Markov model.

- We demonstrate the effectiveness of HMMS in distin-

Towards between different compilers.

- We develop hmm duel strategies, new technology

Nique to use some HMMs in virus identification.

- We develop hmm tiered strategies that combine

Threshold approach with hmm duel strategy, gain-

Ing the benefits of both techniques.

1.1 polymorphic viruses, metamorph viruses, and viruses

Construction kit

Signature-based detection is the main method of identity

Computer virus fying [29]. However, virus makers have

has a lot of sense, and has developed various counters

Measurement. One of the initial approaches used by the virus writer is for

Encryption

Are two virus protecting apps cause of mobile hanging?

 Are two virus protecting apps cause of mobile hanging?

Malwarefox anti-malware

With a large Android platform, it has become a favorite target of a hacker. But don't worry; Malwarefox anti-malware is there to protect your Android device.

Screen shot from google play store


It can detect various types of malicious applications and files that can include adware, backdoor, spyware, keyloggers, phishing attacks, unwanted programs (pUA or PUP), and other dangerous threats.

Some features of this tool are:


250% file and faster application scanning

Protect personal data through anti-logging, which captures hazardous keyboard applications, SMS applications, and password managers.

Virus database is always the latest

Data protection and real-time privacy

Malwarefox Anti-malware has more than 100rb install and compatible with the Android 4.1 and higher version.

F-secure

With 30+ years experience, F-Secure brings you sophisticated F-Secure products safe to provide the best protection for all your devices. The award-winning security suite is the winner of the 2018 AV-Test Best Protection Award.

Screen shot from Google play store


This protects against online threats of various types, including those who even advance such as phishing and ransomware, so all your family can be safe with their cellphones. F-Secure Safe is easy to use and is one of the best antivirus tools in the world.


Therefore, whether it is banking or just exploring the internet, you are safe with Ransomware protection, which monitors your folder and stops the hackers from encrypting them. Other features include:


Parental control by blocking dangerous content and setting certain boundaries to their screen time.

Finder, if you lose your phone, or be stolen.

My F-Secure account to manage your device and monitor their security status.

All of these features are available in free and paid packages. But if you want to get some more sophisticated features, you need to buy a paid package, Total F-Secure, start at $ 59.99 for 3 devices and 1 year. The features included are:


Private VPN to protect your privacy through encrypting your network and hiding your actual IP address when visiting a web page

Wi-Fi protection to secure your internet connection when using public Wi-Fi

Virtual location so you can beat the geo-restrictions and access the content you want while adding additional privacy layers

Tracking protection to prohibit advertisers using your information, which makes money while sacrificing your privacy

Password managers to access and save all passwords you use any device. It also tells you about passwords that are reused and weak and then help you produce new ones.

Online identity protection that uses 24/7 web monitoring together with human intelligence to find all your personal data from online violations

Warning violations When a well-known service is hacked, which can harm your account and data.

Good safe safe and total F-Secure compatible with Windows 7, 8.1, and 10; Android 5 or newer, MacOS X 10.14 or Newer, and iOS 11 or more. There are free trials available for 3 devices and 30 days without banking or credit card details.