வட்டார போக்குவரத்து கழகத்தின் (RTO) ஆன் லைன் சர்வீஸ்


imageநாட்டின் மிக பெரிய லஞ்ச ஊழல் நடமாடும் வட்டார போக்குவரத்து கழகத்தின் (RTO) ஆன் லைன் சர்வீஸ் செயல்ப்படும்.

 

ஒவ்வொரு RTO அலுவுலகத்திலும் இப்பொழுது என்ன நம்பர் சீர்யல் ஓடுகிறது TN - 13 - XX - XXXX , என்ன வி ஐ பி நம்பர் இருக்கிறது, லைசன்ஸ் ஆன்லைன் அப்ளிகேஷன், உங்களின் டிரைவிங் லைசன்ஸ் தற்போதைய நிலமை, ஒவ்வொரு வாகனத்திற்க்கும் ரோடு டாக்ஸ் ஆன்லைனில் செலுத்துதல், கன்டக்டர் உரிமம் புதுபித்தல், புது வாகன் ரிஜிஸ்ட்ரேஷன் அப்ளிகேஷன், ஒட்டுனர் உரிமம் ரோடு டெஸ்ட் ஆன்லைன் அப்பயின்ட்மென்ட், மற்றூம் லோன் ஹைபோதிகேஷன் ஆர் சி புக்கில் இருந்து எடுக்க எந்த ஆர் டி ஓ ஆபிசுக்கு நீங்கள் செல்ல வேண்டும் மற்றூம் வண்டி ரிஜிஸ்ட்ரேஷன் டீட்டேயில்ஸ் எல்லாம் இனிமே நம் கையில், இனிமே புரொக்கர் வேண்டவே வேண்டாம், இந்த சேவை தான் நாம் எதிர்பார்த்த சேவை...........

 

1.ஓட்டுனர் பழகுனர் உரிமம் மனு முன்பதிவு - Learners License Online Application - http://tnsta.gov.in/transport/appointment.do?_tq=890d1045ac27d24cb2b1732731085482

 

2.தொடக்க வாகன பதிவு எண் - Today What Number Series in your RTO - http://tnsta.gov.in/transport/rtoStartNoListAct.do

 

3.வாகன வரி விகிதங்கள் - Tax Rates Details - Vehicle Wise - http://www.tn.gov.in/sta/taxtables.html

 

4.நிர்வாக எல்லை அறிய - Know your RTO by Postcode - http://tnsta.gov.in/transport/know_RtoLoad.do

 

5. ஓட்டுனர் உரிமம் டிரைவிங் லைசன்ஸ் ஆன் லைன் அப்பயின்ட்மென்ட் - Online Appointment Booking for Road Test - http://tnsta.gov.in/transport/appointment.do?_tq=51da2bc262553b8d4f4adb3a40eb2af1

 

6.பொது நிர்வாக விசாரிப்புகள் - General Enquiries - http://tnsta.gov.in/transport/contacts.do

How to Protect Your Email Id and Facebook from Hackers


 

Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are many important information of a person in these email accounts and social networking website. so it is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it's a great loss and trouble for you. So always try to be safe from hackers

 

Follow these simple steps i am writing below to protect yourself from being hacked.

Never share your password to anyone.

Don't use password as your nick name, phone no. or pet names..

Use the combination of lower case, upper case, numbers and special characters for passwords.

Never click on any suspected link comes in a mail from unknown sender.

Never give your passwords to any 3rd party websites for any service.

Use different passwords for different accounts.

Check the website url every time before login.

Use secondary email address and mobile phone numbers with secret questions for account recovery.

Never use any javascript code in url while login to any of your email or any other website account. It may be a cookie stealer script.

Use latest antivirus and antimalware softwares with firewall on.


These are some steps which you can follow for safe surfing over the internet.
Don't give any chance to hackers...

Ethernet Cable - Color Coding Diagram


The information listed here is to assist Network Administrators in the color coding of Ethernet cables. Please be aware that modifying Ethernet cables improperly may cause loss of network connectivity. Use this information at your own risk, and insure all connectors and cables are modified in accordance with standards. The Internet Centre and its affiliates cannot be held liable for the use of this information in whole or in part.
T-568A Straight-Through Ethernet Cable
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out specification appear to be related and interchangeable, but are not the same and should not be used interchangeably.
T-568B Straight-Through Ethernet Cable
Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections. If you require a cable to connect two Ethernet devices directly together without a hub or when you connect two hubs together, you will need to use a Crossover cable instead.
RJ-45 Crossover Ethernet Cable
A good way of remembering how to wire a Crossover Ethernet cable is to wire one end using the T-568A standard and the other end using the T-568B standard. Another way of remembering the color coding is to simply switch the Green set of wires in place with the Orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white.
Ethernet Cable Instructions:
  1. Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T.
  2. Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over.
  3. Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires.
  4. Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper.
  5. Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable.
Ethernet Cable Tips:
  • A straight-thru cable has identical ends.
  • A crossover cable has different ends.
  • A straight-thru is used as a patch cord in Ethernet connections.
  • A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
  • A crossover has one end with the Orange set of wires switched with the Green set.
  • Odd numbered pins are always striped, even numbered pins are always solid colored.
  • Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left.
  • No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk.
  • Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components.
Basic Theory:

By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector.

How to Speed up your Computer


Perform a disk clean up.
Remove unwanted/unneeded software which may be the reason for slowdown
Defragment Your Computer
Stop unwanted Start-Up programs
    sfsadfsadf

    How To Connect Two Monitors in One Computer


    In many professions, including graphic design, architecture, communications, accounting, engineering and video editing, the idea of two or more monitors being driven from one machine is not a new one. While in the past, it has meant multiple graphics adapters and specialized software, it was common for engineers to have at least two, if not more, displays to enhance productivity.

    Now that multiple-monitor setups are more budget-friendly, it is not uncommon to see a wide range of business professionals using multiple monitors to increase visual area. This advantage helps promote the concept of a paperless office by increasing the quantity of simultaneous media that can be viewed digitally, although the advantage of viewing two documents simultaneously is also feasible on many larger widescreen monitors.


    How to Earn from the internet?


    Where's George?There are several ways to earn from the internet. But you have to remember that there is no special trick or quick rich set up to do this. If anyone says that they have a product that will let you earn while just sitting around after buying their program, then most likely its a scam. To earn from the internet takes effort and time as well as knowledge on how use the internet for your advantage.

    Some ways to earn from the internet are the following:

    Blogging - this would be making post from time to time. You can place ads in your blog and earn from them.

    Paid to click - there are several sites that pays you when you click some ads. Though they do not pay that high, but this is the easiest way since all you have to do is click.

    Affiliate Marketing - certain sites will accept you as a member to become an affiliate marketer. You don't need to have a product of your own to sell. You simply sell the products of others and earn commission for every sale.

    Article Writing - several sites pays you to write articles. You simply submit to the site articles that you write basing on different categories and once accepted they will pay you depending on how good your article is.

    There are still a lot of ways to earn from the internet. Basically, what is needed is your time and effort. Just like any work, you need to devote time and effort to be successful.

    9 TIPS to keep your computer healthy and safe


    By following this 9 tips you can make your computer healthy and safe always.
    Fix any computer problem with a solid set of workbench tools
    1. Run Windows Update for Windows XP and 2000. Make sure Internet Explorer and other browsers are updated to the latest versions.

    2. Connect your computer to a hardware firewall, or run a free firewall program such as Zone alarm. This will ensure that hackers do not intrude your computer using newly discovered Windows vulnerabilities. If you use a hardware based firewall, make sure that only ports of services you need are enabled (such as web browsing - HTTP is port 80). Many of the firewalls for home use allow all ports to be open by default - you turn off services by entering ranges of ports to be blocked. (See the instruction manual of your firewall).

    3. Install adware detection programs, such as Adware or SPYBOT: Search and Destroy, which are free for download. Run these at least every other day if you are an active web surfer, constantly doing research or shopping online.

    4. Run anti-virus software and make sure virus definitions are set to automatically update or you should check for updates, manually. If your anti-virus subscription has run out, uninstall it, and install AVG Anti-Virus by www.Grisoft.com for a free personal edition (Do not run this on your work computer without paying for it!).

    5. If you have an older computer, investigate any suspicious "whirring" noises. A hard drive that is making a very loud "whirring" noise may be aging and damaged by heat - consider replacing it soon. Also, make sure that all fans are running properly, inside, and that there are no large collections of dust on the motherboard, PCI cards, or the fans. If so, be very careful in removing it. All power should be turned off, including removal of the power cord, as some motherboards maintain a small charge from the power supply even after the computer is actually turned off.

    6. Run the Windows XP / 2000 disk defragmenter once per month. This allows for data files to be stored with each segment next to each other in order, on the disk. Without defragmenting, Windows will store data where ever it finds space, but many times it will store pieces of a data file in many different areas on a hard drive. This is how it was designed. It is faster for Windows to store data in just anyplace it can, without having to think about storing everything close together - that apparently would be too much logic to be used at one time and slow down the immediate saving of files (this is *only* my guess).

    7. Make sure programs and drivers are updated. If everything seems to be working, check for driver updates once per year.

    8. This is not necessarily related to your computer's health, but before if it ever does get sick, it is good to make sure that you are getting regular backups. Try backing up your My Documents folders and files to a CD every month and carefully label and store it away. If it seems to be too much hassle to burn a CD, try getting a USB memory device and backup your files to this once in awhile, though these are not as reliable as a CD backup (they are prone to problems with static electricity and breakage), they are better than no backup at all.

    9. Use a UPS (Uninterruptable Power Supply) to ensure that your computer gets good voltage and is not turned off when the power hiccups. Also, make sure you do not turn off your computer abruptly - always go through the Start button and shutdown or control-alt-delete, click shutdown sequence to ensure that your computer is shut down as graceful as possible.

    Five tips to help keep your passwords secret


    Treat your passwords with as much care as you treat the information that they protect. Use strong passwords to log on to your computer and to any site, including social networking sites. where you enter your credit card number, or any financial or personal information.

     

      1. Never provide your password in an email or in response to an email request.
             * Internet "phishing" scams use fraudulent email messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams and how to deal with online fraud.


      2. Do not type passwords on computers that you do not control, such as those in Internet cafes, computer labs, kiosk systems, and airport lounges.
             * Cyber criminals can purchase keystroke logging devices that gather information typed on public computers, including passwords.
             * If you need to regularly check email from a public computer, consider using Hotmail, which allows you to obtain a single-use code. To get a single-use code, click Sign in with a single-use code, and Hotmail will send a one-time use authentication code to a mobile phone. You can opt to use the one-time code, instead of your password, to access your account on a public machine.


      3. Don't reveal your passwords to others.
             * Keep your passwords hidden from friends or family members (especially children), who could pass them on to other, less trustworthy individuals.


      4. Protect any recorded passwords.
             * Don't store passwords on a file in your computer, because criminals will look there first.
             * Keep your record of the passwords you use in a safe, secure place.


      5. Use more than one password.
             * Use different passwords for different websites and services.

    Protect your e-mail with a password


    You can access e-mail from multiple e-mail accounts, but Windows Live Mail isn't meant to be used by multiple users on a single Microsoft Windows account. Signing out of Windows Live Mail doesn't prevent other people from accessing your e-mail on the current Microsoft Windows account. Anyone who opens Windows Live Mail in a particular Windows account can see all of the e-mail accounts that have been added to Windows Live Mail, not just their own e-mail account, without entering a password.

     

    You can't create Microsoft Outlook Express e-mail identities (A method used in Outlook Express that allows multiple people sharing the same computer to keep their e-mail separate. Identities aren't used in Windows Live Mail.) in Windows Live Mail. Instead, to protect each user's e-mail with a password, create a separate Windows user account and password for each person who wants to use Windows Live Mail on the computer. Each user will then be able to log on only to their own Windows account and access only their own Windows Live Mail e-mail accounts.

     

    For more instructions about how to create a new Windows account and password for each user on your computer:

        * If you use Windows XP, click Start, click Help and Support, and then search for Create a new user account.
        * If you use Windows Vista, go to the Windows Vista Help website, and then search for Create a new user account.

    How to solve the Blue screen error (dump error) in Windows Operating System


    That happens because of the error in the hard disk due to improper power shutdown.

     

    image

     

    Fix the errors by using the disk check tool that is already available in Windows XP.

     

    If the above said does not solve then the only solution is to format the system and re-install the Operating System.