Featured Articles

Sri Lanka Vehicle Information

Sri Lanka Motor Traffic Department has given you the facility to obtain detail of any kind of registered vehicle through their new e-service.

A fee will be charged for the full information service and the limited information can be obtained free of charge.

The information provided in this service is only for your reference and should not be misused. Motor Traffic Department accepts no liability for the actions taken on the basis of the information provided in this service.

Find details of the vehicle and its owner, just by entering its NUMBER PLATE details.

 Vehicle information

https://play.google.com/store/apps/details?id=lk.icta.mobile.apps.dmt&hl=en

Ministry of Parliamentary Reforms and Mass Media

 

 

 

Address : 63,Asi Disi Medura, Kirulapone Mawatha, Polhengoda, Colombo 05. Sri Lanka
Email : info@media.gov.lk
Tele : 011-2513 459, 011-2513 460, 0112512321, 0112513498
Web : http://www.media.gov.lk

Ransomware

What Is Ransomware?

Ransomware is a type of malware that installs covertly on a victim’s device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim’s data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim’s data, until a ransom is paid.

Ransomeware

How does your computer become infected with ransomware?

In most cases, the software infects computers through links or attachments in malicious messages known as phishing emails. It may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it.

The age-old advice is to never click on a link in an email.  The idea is to try to trick the victim into running a malicious piece of code.”

The software is usually hidden within links or attachments in emails. Once the user clicks on the link or opens the document, their computer is infected and the software takes over.

How does it work?

It finds all of your files and encrypts them and then leaves you a message. If you want to decrypt them, you have to pay.

The ransomware encrypts data on the computer using an encryption key that only the attacker knows. If the ransom isn’t paid, the data is often lost forever.

When the ransomware takes over a computer, the attackers are pretty explicit in their demands.  In most cases, they change the wallpaper of the computer and give specific instructions telling the user how to pay to recover their files. Most attackers demand to remove the malicious ransomware; the price can double if the amount isn’t paid within 24 hours.

How can people prevent attacks like this?

The first step is being cautious. There is no perfect solution to the problem.

Users should regularly back up their data and ensure that security updates are installed on your computer as soon as they are released. Up-to-date backups make it possible to restore files without paying a ransom.

Users should also look for malicious email messages that often masquerade as emails from companies or people you regularly interact with online. It’s important to avoid clicking on links or opening attachments in those messages, since they could unleash malware.

Mobile Ransomware

Ransomeware

Now there is a tendency of targeting mobile operating systems too.  Mobile ransomware payloads are blockers, as there is little incentive to encrypt data since it can be easily restored via online synchronization.

Mobile ransomware specially targets the Android platform, as it allows applications to be installed from third-party sources.

The payload is typically distributed as an APK file installed by an unsuspecting user; it may attempt to display a blocking message over top of all other applications, while another used a form of click jacking to cause the user to give it “device administrator” privileges to achieve deeper access to the system.

Different tactics have been used on iOS devices, such as exploiting iCloud accounts and using the Find My iPhone system to lock access to the device. On iOS 10.3, Apple patched a bug in the handling of JavaScript pop-up windows in Safari that had been exploited by ransomware websites.

 

Importance of Removing Bra While Sleeping

Sleeping in a bra is considered worst thing to do for the breasts. Wearing bra while sleeping could also cause uneasiness. This may cause discomfort and also interrupt your sleep.  But, there is a myth that wearing a bra to bed will make your breasts perkier and many speculations around the topic.

Some women find sleeping in bra quite discomforting while others claim that it prevents breast sagging. However, taking an extra minute to remove it will make a significant difference on your health in many ways.

 bra.

Considering its harmful effects on breast health, it is recommended to remove bra before sleeping. As far as breast sagging is concerned, there are special exercises and massage therapies that help in getting firm and toned breasts.

Blood Circulation

This is one of the main things that suffer when you sleep in your bra, especially the underwire ones impact the blood circulation. If the wire is too tight against your skin, your pectoral muscles will be constricted, affecting the circulation of nerves in your arms.

In addition, bra wire also compresses muscles around breast area and affects the nervous system.  Some type of bras, which are very tight hurt the breast tissue due to constantly restricted circulation.  Therefore, it is advisable to remove bra before you go to bed.

Skin Irritation

This is another significant side-effect of wearing an ill-fitting bra.  The hooks can protrude into your skin, as well as the straps, that can actually cause lesions or even cysts if left for too long. You may not even notice the slight pain during the night.

Breast Fungus

Wearing bra while sleeping may boost the growth of fungal infection since it may create moisture around the bosom area. The warm and moist environment can be a breeding ground for fungi as a result of spending more time wearing a bra.

 

Sinhala New Year Auspicious Times
  1. Bathing for the Old Year (Parana Aurudhdha Sandaha Snanaya) පරණ අවුරුද්ද සඳහා ස්නානය

    Bathing-auspicious-time

  2. Dawn Of The New Year (Aluth Aurudhu Udawa) අලුත් අවුරුදු උදාව

    Raban-Gaseema

  3. Lighting the Hearth (Lipa gini melaweema) ලිප ගිනි මෙලවීම

    kiri-ithireema

  4. First Meal in the New Year (Ahara Anubawaya) ආහාර අනුභවය

    Sinhala-new-year-table

  5. Starting Work and Exchanging money (Wada Alleema Saha Ganu Denu Kireema) වැඩ ඇල්ලීම සහ ගනු දෙනු කිරීම

  6. Applying Herbal Ointment (Hisa Thel Gama) හිස තෙල් ගෑම

  7. Going For Jobs (Rekee Raksha Sandaha Pitathwa Yama) රැකී රක්ෂා සඳහා පිටත්ව යාම

    Pluck-tea-leaves

Sinhala Tamil New Year – Aluth Avuruddha

The most significant festival of Sri Lankans comes on April or ‘Bak’ every year.  Being a significant festival to everyone, the Sinhala and Tamil New Year is celebrated with much pomp and fanfare. During this period, the whole country takes on a festive mood as people gear up for the upcoming celebrations by cleaning homes, shopping and making New Year sweetmeats, to begin the New Year on a joyous and positive note.

The annual transition of the Sun from Pisces (Meena Rashiya) to Aries (Mesha Rashiya) marks the beginning of Aluth Avurudu.  the Sinhalese traditional New Year begins at a time determined by astrological calculations. Usually April 14th is considered as the New Year Day while 13th of April considered as the day prior to the New Year Day or the ‘Parana Aurudhdha.  The ending of the old year, and the beginning of the new year occur several hours apart from one another (this span of time is usually 12 hours and 48 minutes, which starts when the sun, as a disk, starts to cross the astrological boundary between ‘House of Pisces’ and ‘House of Aries’ and ends when the crossing is complete. The halfway point is considered as the dawn of the New Year). This period is, referred to as the Nonagathe (or the ‘neutral period’ or ‘Auspicious Time’). During this time Sri Lankans are, according to tradition, encouraged to refrain from material pursuits, and engage solely in either religious activities or traditional games.

There is an auspicious time to start every work that was stopped during the ‘nonagathya period’.  For every work, there is an auspicious time.  For example, there are auspicious times to lit the hearth (Lipa gini melaweema), take first meal at the Avurudu table (Ahara anubawaya), Performing rituals and exchanging money (Wada alleema saha ganu denu kireema) Friendly exchange of sweets amongst neighbours, applying herbal ointment (Hisa thel gama), going for jobs (Rajakari sandaha pitathwa yama) and so on.

 

What Is Swine Flu?

Swine flu (H1N1 and H3N2v influenza virus) facts

Swine flu is a respiratory disease caused by influenza viruses that infect the respiratory tract of pigs and result in a barking cough, decreased appetite, nasal secretions, and listless behavior; the virus can be transmitted to humans.

It’s called swine flu because in the past, the people who caught it had direct contact with pigs.

Swine flu viruses may mutate (change) so that they are easily transmissible among humans.

 

Swine Flu Symptoms

These, too, are pretty much the same as seasonal flu. They can include:

Cough

Fever

Sore throat

Stuffy or runny nose

Body aches

Headache

Chills

Fatigue

  • The disease lasts about three to seven days with more serious infections lasting about nine to 10 days.
  • Vaccination is the best way to prevent or reduce the chances of becoming infected with influenza viruses.
  • Primary-care specialists, pediatricians, and emergency-medicine doctors usually treat the disease, but other specialists may be consulted if the flu is severe and/or complicated.

What is Anti-Virus Software?

Antivirus or anti-virus software or sometimes known as anti-malware software or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, , rootkits, backdoors, hijackers, keyloggers, spyware trojans, adware, and more.

Therefore you must always be sure you have the best, up-to-date security software installed to protect your computers, laptops, tablets and smartphones.

Antivirus software was originally developed to detect and remove computer viruses. A computer without anti-virus software installed will be infected within minutes of connecting to the internet. The bombardment is constant, with anti-virus companies update their detection tools constantly to deal with the more than 60,000 new pieces of malware created daily.

There are several anti-virus software they all perform some basic functions such as;

 

  1. Scan specific files or directories for any malware or known malicious patterns
  2. Allow you to schedule scans to automatically run for you
  3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
  4. Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.
  5. Show you the ‘health’ of your computer.

 

Here are some antivirus software which would prevent viruses invading your home computer.

  • AVG

  • McAfee

  • Norton

  • Kaspersky

 

Never Charge Your Phone in Public

The battery of your phone depends on the usage of it.  You may not know when it happens.  Say you are at the airport and your flight is delayed.  Oh! What should you do?  Your phone battery is low and is about to die.

Luckily you have your charger or there are public charging place.

But, you must think twice before you charge your phone in a public place.  There is a risk in plugging your charger into a public outlet because that would compromise your phone (along with all the information on it) and sometimes it may infect your phone too.

Connecting Your Phone To An Unknown Port Has Its Risks

The cord you use to charge your phone is also used to send data from your phone to other devices.

When you plug your iPhone into your Mac with the charging cord, you can download photos from your phone to your computer.

If a port is compromised, there’s no limit to what information a hacker could take.

Your our email, text messages, photos, contacts and everything will be at risk.

There is no use of a phone with a dead battery.  We are not suggesting to for such a thing.

But, we do recommend finding alternatives. You can always go for alternatives.

charging

It’s best to avoid using public sources to charge your phone, and instead, utilize your own portable charging device (power bank) when your cell battery is low. (You can charge your power bank without putting your phone at risk.

You may also can use an extra battery.

 

Exporting A Google Doc From iPhone

Applications like the Google Docs app for iOS allow you to access documents.  They also allow you to export a document, or make it available in another application.

  • To export a Google Doc from your iPhone as a PDF or Word file:
  • Open the Google Docs application
  • Tap on the document that you wish to export.
  • Then, tap on the three dot icon at the top right corner of the screen.
  • From the drop-down menu, tap “Share & export.”
  • From the following window that opens, you can choose to add another user to the doc with “Share,” to make a copy of the document, or to copy a link to the doc on your clipboard. But, to create a PDF Word file, you’ll want to tap the option that says “Send a copy.”
  • Once you tap that option, a popup window will appear asking you to choose between a PDF and a Word file (.docx). Choose the option you want by tapping on it, and make sure a blue checkmark appears next to the file type. Then tap “OK.”
  • After tapping “OK,” a grey menu will appear from the bottom of your screen.
  • From here you can AirDrop the file by tapping on an available user in that section. You can also attach it to an email, import it to iBooks (if it’s a PDF), or add it to iCloud Drive.

If you choose the email option, the file will appear as an attachment in a blank email in the Apple Mail app. Simply add a recipient and a message, and hit send.