Monday, July 29, 2013

Daily IT update for Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black)


 photo shopping-online-cheap.gif
Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black) It’s the ‘must do’ to finding for Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black) information before decide to purchase the Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black). You can review information in the technology stories and breaking IT news to keep you up to date and learn about the features information technology including cloud computing, security, development, virtualization, mobile and more. Beware and it’s necessary to take some time to learn the facts about the terms used to describe so you can’t go wrong with Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black) searching at several stores compare quality, price, and service from several different retailers, mostly about the price and features and ask the website to provide you full details of Jensen JTA-460 3-Speed Stereo Turntable with MP3 Encoding System and AM/FM Stereo Radio (Black).

Tuesday, March 5, 2013

Data Recovery - Hard Drive Crash? How to Recover Your Lost Data, Quickly!

Due to the advancements in technology, computers have become an essential tool used both for business and personal purposes. It is quite difficult to keep up with the times without a computer with an Internet connection which will keep you updated. With the onslaught of the Internet, it has become an even more essential tool.

If you have a computer set and you have been using it for some time to store data, one of the most dreaded problems that you might - and you will encounter - is a hard drive crash.

At one time or another, you would have accidentally deleted a file and if you are not very computer-savvy, you might think that there is no way for you to recover your data.

Data Recovery - Hard Drive Crash? How to Recover Your Lost Data, Quickly!

When this happens, all you have to do is look into your 'Recycle Bin' or Trash folder if the file is still there and restore the file by dragging it onto the desktop. You can also use a file-recovery system which can scan your disk for recoverable data.

However, it is a different case once your hard disk crashes. You may lose all of the important data stored on your hard drive and without a dependable back-up system, you might not think it possible to restore the lost files.

Do not lose hope because there is still a number of solutions available out there to recover your lost data in case your hard drive crashes. First, take a look at the symptoms of a hard drive crash, which would mean that all the important data stored on your computer may be lost:

1. You hear a 'clicking' sound on your hard drive. This basically means that you may have a corrupted ROM or read-only memory chip, or it could also be caused by an electrical problem.

2. You see a blue screen while booting up your computer. This may mean that your computer's OS or operating system is corrupted or damaged.

3. Your computer often re-boots, restarts, hangs, or freezes. This may be caused by a virus on your PC, that is why it continually restarts or re-boots even in the middle of an operation. A bad sector causes your computer to freeze or hang while processing data.

4. You keep on receiving error messages while in the middle of an operation. You may receive a "Drive not formatted" error which means that the partition of your hard drive is damaged.

Another error message that you may receive is "Operating system not found". This error appears when your OS is or the files on your hard drive are damaged.

Should you encounter any of these hard drive crash symptoms, here are some "first-aid solutions":

- Turn your PC off if you hear a clicking sound on your hard drive, and if you are technologically challenged, get professional help - quick! - before losing your precious data.

- Take note of what happened, how your PC behaved, and remember any error messages to make it easier for a technician to troubleshoot.

- Use a data recovery software in the event of a hard drive crash. Such software which recovers data includes tools to restore deleted files from your Recycle Bin folder. It can also restore damaged and lost files caused by a virus, or power outage, or bad disk sectors.

-Windows and MAC users should also be aware of the basic file recovery capabilities offered by the system of these computers.

Finally, it is always a good practice to take preventive measures even before your hard drive crashes. Make it a habit to back up and even double back-up your most important files.

If worse comes to worst, you can always get the services of a hard drive recovery expert or get the services of a hard drive data recovery specialist.

Data Recovery - Hard Drive Crash? How to Recover Your Lost Data, Quickly!
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you found those tips useful more information on Data Recovery can be found at "Data Recovery without heartache" [http://data-recovery.dream-webs.co.uk].

Monday, February 25, 2013

How to Recover Data From Failed Hard Drives

There are two main methods of recovering data from failed hard drives.

First of all, you can run specialized data recovery software that could retrieve all of your important data files. In the majority of cases, you will be able to recover the data from your failed hard drives without too much trouble using data recovery freeware, or purchase fully supported software if you prefer.

Please note hat data recovery is not always possible if the actual problem is due to aging or faulty hard drive component such as a broken head arm. In those extra-ordinary cases you would have the hardware fixed by an expert technician before being able to access any of the precious data on the hard drive.

How to Recover Data From Failed Hard Drives

As far as data recovery in concerned, there are no limitations to the physical size of your hard drive. Whether you are trying to recover data from a 1 MB pen drive or a 300 GB Ultra-SCSI drive, you should still be able to recover the data.

Additionally, there are no limitations to the different types of operating systems which you may be trying to recover data from, such as Microsoft Windows to Linux systems. This also extends to include different file formats such as FAT32 and NTFS which are very common file formats for Windows systems, or the Mac OS file system used by Apple Macs.

Information can be retrieved from all sectors of the hard drive - even files that you may have deleted in the past which had ended up in recycle bin prior to your hard drive failing would be recoverable.

Secondly, data recovery experts will be able to recover lost data from most damaged hard drives. It's not surprising that most common damage is attributable to drop damage and spill damage, especially in the case of laptops.

At the corporate level, most companies use RAID (redundant array of inexpensive disks) configurations to protect their data and to negate the impact of a single hard disk drive failing. There would be no loss of data if one of the disks in a RAID 5 disk-set failed as you would be able to re-construct the data for the failed member from the remaining disks. However, if the entire RAID volume failed, then that would be a cause for concern.

In the case of a RAID volume failing you would have little alternative but to send your hard drives to a data recovery expert to restore the RAID configuration as well as the data. This would also be the case if your disk partition failed and you were unable to access the data held on that particular partition or disk.

The recovery of your important data and files from failed hard drives is possible using data recovery software. If your hard drives are badly damaged, or the RAID volume-set has failed and the data on the hard disks is inaccessible, requesting professional assistance from data recovery experts would be a better option.

How to Recover Data From Failed Hard Drives
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

For practical advice and information on data recovery freeware, software programs, tools and utilities to help you safely recover your data, please visit our website, http://www.datarecoveryfreeware.net

Tuesday, February 19, 2013

'The Required File Cannot Be Found' - iPod Error and Recovery

iTunes is the interface software that allows your iPod to interact with computer system. You can use iTunes to sync all files and folders of computer. But sometimes, it fails to sync and displays errors. One of the possible reasons is disk structure corruption that might force you to reformat it. After this, you need to restore lost data from backup. However, if backup cannot restore the required information, you should use iPod Recovery applications.

You might encounter the similar error message with your Windows:

"iPod name" cannot be synced. The required file cannot be found."

'The Required File Cannot Be Found' - iPod Error and Recovery

Cause

Your iPod might fail to sync due to below possible reasons:

o Corrupted 'Photo Cache' folder
o iTunes installation files are corrupted or deleted
o Corrupted files in iTunes library
o USB connection issues
o Computer firewall or antivirus problems
o Out-of-date Windows installation
o Disk use is not enabled in iTunes
o iPod disk structure is damaged

Solution

You need to apply these methods to solve the existing problem:

o Delete the corrupted '' Photo Cache' folder. To do so, click Start->Search->All files and folders and type 'Photo Cache' and search over the entire hard drive. Delete the folder when located
o Disconnect your iPod from computer and remove 'iTunes' and 'QuickTime' using 'Add or Remove programs' feature in Control Panel. Next, use Windows Installer Cleanup Utility to remove all their installation files from computer. You should then install latest version of iTunes and QuickTime
o Find and delete the corrupted files from iTunes Libraray, if any
o For correcting USB issues, first try connecting your iPod to the rear port. If this doesn't help, perform steps like reinstalling or updating USB drivers and using a new USB cord
o Try allowing your iTunes onto your computer's security/firewall programs
o Update Windows installation with the latest updates and service packs available
o You can also attempt to enable disk use in iTunes
o If the problem continues, disk structure might be damaged. Connect your iPod and run chkdsk. If this doesn't resolve the issue, reformat the iPod and restore lost data from backup.

If data backup is not in clean state or not available, you can use iPod Recovery solutions. These are powerful iPod data Recovery utilities that can restore lost data in all logical data loss cases.

Stellar Phoenix iPod Recovery is an advanced recovery tool for lost music files, videos, documents, podcasts, graphics and other data from crashed iPod. It is available for both Mac and Windows operating systems. It is compatible with Nano, Classic, Mini and iPod Shuffle.

'The Required File Cannot Be Found' - iPod Error and Recovery
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Simpson is a software professional, researching on iPod recovery, iPod data recovery, recover iPod, iPod Mini, iPod Classic Softwares.

Saturday, February 9, 2013

Data Recovery - 10 Most Effective Computer Backup Tools

Despite my best efforts, this past week I lost both my primary and secondary computer systems. After losing my primary desktop several years ago, I vowed I would never let myself be caught without an operating PC. As they say, "the road to h*ll is paved with good intentions," and I once again was caught with my proverbial pants down without an operating computer when my desktop, which had been exhibiting some problem signs in the last month, died suddenly and would not turn on.

I then went to my laptop, which I had admittedly been lazy about keeping updated, and turned it on. Immediately the Windows update process started, and asked me install Service Pack 3 for Windows XP. Having done that successfully on my desktop, I wasn't too worried about any installation problems on the laptop. However, upon completing the installation, the blue screen of death appeared, which is NEVER a good sign with a Windows-based system.

After trying for about an hour without success to revive my laptop (which is only 8 months old and still under warranty), I knew that I was in trouble and starting looking for alternatives. Fortunately, my husband keeps a laptop on hand that he uses for gaming when we travel, and he generously offered to let me install my programs and files on it until I could repair one of my computers.

Data Recovery - 10 Most Effective Computer Backup Tools

After finally acknowledging that there was no way I could have foreseen this situation, I decided that I needed to s*ck it up, get over, and move on. So, I'm making do with a partially customized laptop that will do until one or the other of my PCs is returned.

Despite having gone through similar situations previously, I still learned a few new things along the way about data recovery and computer backup. Here are the 10 most effective tools that saved my bacon during my recent computer meltdown.

1. Automatic backup software. I've been using 2 online backups, Carbonite and Syncplicity. I have had to restore from Carbonite previously, and I found the process to be lengthy and somewhat confusing. So, several months ago I began using Syncplicity because it offers online access to all backed up files as well as the ability to synchronize an unlimited number of computers. However, it has taken a week to restore 20 GB of data with Syncplicity, and some of the data was wasn't really restored, despite what Syncplicity told me in my account. However, I can easily download this missing info to my computer from the online vault. One process that makes this backup system easier is that I store all of my data files in My Docs so I don't have to hunt them down in Program Files, or wherever they are typically stored.

2. Email client software. I still use the dinosaur Eudora for my email client. Old habits die hard, I suppose. However, somehow I missed marking some key Eudora folders to back up, and so I was initially using my webmail access providing by my hosting company to access email because of this oversight with Eudora. I began to tire of that quickly, as I had no way to create additional folders in those systems, so I then decided to manually configure Eudora and open folders and emails as I need them in the program. This experience has made me very tempted to change all of my incoming and outgoing email servers on all domains to Gmail just to have access to everything online, come hurricane, flood, tornado, or computer crash.

3. Bookmark service. I'm an avid researcher and resource collector, so having access to my bookmarks, or favorites file, is vital to my day-to-day operations. I had been using Spurl, but because of frequent periodic outages of their service, I've changed to Foxmarks. I like that this service offers me the ability to access all of these online, as well as have them at my fingertips any time I need them from my Bookmarks menu as well as easily synchronize them to any computer.

4. Contact management. Even though I don't use Outlook for email, I do use it for calendar and contact management. I had been using Plaxo as an online backup for my contacts, but it doesn't permit me to store my notes about each contact. I've been using Airset now for several months, and it regularly syncs my contacts (with notes) and my calendar to their online service. I found this much more convenient than trying to restore a backup PST file to Outlook and then repeating that again when my primary computer is returned. Instead, I just make changes to contacts and my calendar on Airset, and I'll just sync that to Outlook on my desktop.

5. Passwords. I've been using Roboform for years to help me manage my passwords. I've got my Roboform data in My Docs, so it was a breeze to reinstall Roboform and copy the data folder to the new computer and permit me to access all of the sites requiring a password and username. Finally, something that worked seamlessly!

6. Project Management. Smartsheet has been my project management service for the last few months. I love that it has the ability to create an item and allow you to attach a document and discussion to that item. Rather than having to hunt down information about a project, all I had to do was log into my Smartsheet account and there it was.

7. Software licenses. Roughly 99% of the new software I install is downloaded and I don't get a physical copy on CD. Therefore, I make sure that I have the downloaded version in a My Downloads folder that's a part of My Docs file, which is backed up regularly. And, I make a PDF copy of the software license that I get by email and store in a Software folder, also in My Docs. Lastly, I purchased a very inexpensive program, Registration Vault, that lets me store all of my software license and purchase info and permits me to back up my data to My Docs. As I had to reinstall software on a new computer, it was easy to restore the Registration Vault files, get my software license number, and have a fully functioning piece of software within minutes.

8. Accounting. I use Quickbooks for my accounting needs, and while they do offer an online version, I haven't yet moved to that. Instead, I back up Quickbooks after every use in the My Docs folder. When I needed to invoice consulting clients at the beginning of this month, all I had to do was reinstall Quickbooks and restore my latest backup. I instantly had everything I needed again at my fingertips.

9. Alternate free services. Some software I use, like CuteFTP and TraxTime, don't permit data backups. So, I really do have to start all over with my FTP info and my time tracking info when my computer dies. Rather than installing these programs on the new computer, I just used some free alternatives to get me through. FireFTP, a Firefox add-on, has worked quite well for me as my FTP client, and MyHours.com has stood in fairly well for TraxTime, although it requires a few more steps for operation than TraxTime.

10. Email marketing. While not a tool, I discovered that both text and HTML versions of email broadcasts matter in email marketing. I wasn't initially able to get my normal email client up and running, so I was reading my email from my webmail systems. I've got 2 hosting accounts, and the newer one has a fairly sophisticated webmail system and let me read HTML emails with no problem. The other, however, doesn't permit HTML viewing. So, those emails sent only in HTML were ones that I was unable to read. If you're wise and your email marketing program permits you to send emails out in both plain text and HTML, do it, even though it might seem like a needless pain. You just never know how members of your list might be forced to ready your emails.

As you might gather, I've discovered that online services have provided me with the greatest backup to help me through this computer crisis. My lesson? Duplicate as much as you can in online systems. In this way, you'll have access to your data when you travel, when you have a computer crash, or when you're faced with a natural disaster.

Copyright (c) 2009 OnlineBizU.com

Data Recovery - 10 Most Effective Computer Backup Tools
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Internet Marketing Strategist & Boomer Biz Coach Donna Gunter helps baby boomers create profitable online retirement businesses that they love by demystifying the tools & strategies needed to market and grow their businesses online. To claim your FREE gift, TurboCharge Your Online Marketing Toolkit, visit her site at OnlineBizU.com. Ask Donna an Internet Marketing question at AskDonnaGunter.com

Wednesday, February 6, 2013

What is Error Number 0x800CCC0E and How to Fix It?

Error Number 0x800CCC0E happens when there is a problem with Microsoft Outlook, Outlook Express or Windows Mail. Error 0x800ccc0e is usually caused by a conflict with Simple Mail Transfer Protocol (SMTP) servers while using your E-mail program. The exact error messages may look like:

SMTP, Port: 25, Secure(SSL): No, Socket Error: 10051, Error Number: 0x800CCC0E

SMTP, Port: 25, Secure(SSL): No, Socket Error: 10060, Error Number: 0x800CCC0E

What is Error Number 0x800CCC0E and How to Fix It?

SMTP, Port: 25, Secure(SSL): No, Socket Error: 10061, Error Number: 0x800CCC0E

What causes Error Code 0x800ccc0e?

Error code 0x800CCC0E is triggered because Microsoft Outlook, Outlook Express or Windows Mail is not able to make a proper connection with the SMTP server and therefore you are not able to send E-mail messages. Fortunately, error number 0x800CCC0E is quite easy to fix.

How To Fix Error Number 0x800ccc0e ?

In order to fix error number 0x800ccc0e, you will need to make sure that your e-mail account settings are correct and that PORT 25 is the port used in the SMTP area - unless specifically told to use another port by your Internet Service Provider (ISP). It's possible your ISP has started to block the standard Outgoing Mail Port (25). You may need to consult your ISP's support pages to get the SMTP e-mail settings.

You can also get error 0x800ccc0e messages when you have anti-virus or firewall software enabled on your pc. Turn the anti-virus or firewall off for a moment and try to send your email again. If it works then the security software is the problem and you will need to contact your ISP for help.

Other Solutions to Windows Errors and Slow PC Performance

Many computer errors are usually caused by corrupt or missing Windows Registry data after removing or installing programs. The Windows Registry is the engine of the Windows operating system. Without it, Windows would not be able to run.

When you install and uninstall software the Windows Registry gets overloaded with "junk" information, which can cause errors and slow down your PC performance.

The best thing you can do, to stop your computer from getting more error messages or further registry corruption, is to repair and clean your Windows Registry.

What is Error Number 0x800CCC0E and How to Fix It?
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Tune-Your-PC.com recommends to run a Free Registry Scan [http://www.tune-your-pc.com/download/download-regcure2.php] from the multi-award winning registry repair tool, RegCure. RegCure cleans, repairs and optimizes the Windows Registry in under 2 minutes. And because it is an user-friendly tool, you don't have to be a PC geek.

Looking for tips, tricks and software about how to speed up, repair, optimize and protect your computer? At [http://www.Tune-Your-PC.com] you will find tweaks and solutions for your computer issues, such as computer freezes, slow PC performance, security (spyware, viruses, privacy), and data & photo recovery.

P.S. Don't forget to claim your FREE E-Book "Windows Speed Secrets Unleashed".

Sunday, February 3, 2013

'SMART - Status Bad - Backup and Replace' Hard Disk Error and Recovery

Physical hard disk failure refers to the condition in which data stored in the system becomes inaccessible due to hard disk malfunction. A hard disk is comprised of several mechanical and electronic components. But when these components get affected due to external factors like high intensity magnetic waves, sharp impact, temperature, water or fire, they get physically failed. Also, internal issues like wear and tear, low material quality and poor composition cause hard drive failure. In such cases, Hard Disk Recovery service can come to rescue and recover all lost data.

Hard drive failure is not instant in some cases. The modern hard drives come with an advanced technology known as S.M.A.R.T. (Self Monitoring, Analysis and Reporting Technology). It is a proactive warning system that monitors the hard drive health on the basis of certain parameters and generates reports and warning messages on finding any fault. These parameters are sometimes denoted as hard disk reliability factors, such as temperature, excessive bad sectors etc. So, if a hard drive is anticipated to fail, SMART gives error message as:

"Pri master hard disk: S.M.A.R.T. Status Bad, backup and replace"

'SMART - Status Bad - Backup and Replace' Hard Disk Error and Recovery

Explanation

By master hard disk, error refers to the one, which is being primarily used by computer system to store data. The above warning suggests that users are required to immediately backup all data and replace the failing hard drive with a new one. Hard drives may go bad due to mechanical component failure, electronic faults or firmware corruption.

But in most of the cases related to physical failure, users may need to opt for Data Recovery service to recover their lost files. It can occur due to two basic reasons:

o Backup failure
o Ignoring the S.M.A.R.T error message

Hard Disk Recovery Service

It is a specialized component level service provided by recovery experts to recover data from physically failed hard drives. The processes involved in Hard Disk Recovery start with detailed analysis of the failed hard drive and chalk out suitable recovery procedures accordingly. A physically failed hard drive gets dismantled in sterile lab environments of Clean Rooms and technical procedures like repairing or replacing disk internals, disk cloning, shifting the platters etc. are applied. Data Recovery service experts can recover data in all cases of failures including those which S.M.A.R.T. can't detect.

Stellar Information Systems Limited offers industry's leading Hard Disk Recovery service through Class-100 Clean Rooms. We have been providing recovery service from more than 16 years. The advanced recovery service is provided for almost all makes and models of hard drives as SCSI, SATA, EIDE and IDE including server hard drives and SSDs (Solid State Drives).

'SMART - Status Bad - Backup and Replace' Hard Disk Error and Recovery
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

K Madhav is a student of Mass Communication and doing research on Hard Disk Recovery and Data Recovery.

Wednesday, January 30, 2013

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template

What is the mistake? Focusing your disaster recovery plan template on technology first and business process priorities second.

This might sound like a strange statement coming from network infrastructure experts. But focusing on appliances and software solutions can lead to the development of incomplete or inadequate solutions and this can be an expensive and humbling mistake! IT Business Continuity and Disaster Recovery (BCDR) is not about appliances, power supplies, routers, switches and servers, it's about supporting business processes.

Business Continuity and Disaster Recovery (BCDR) are two separate and related concepts that are often lumped together when developing recovery plans. Let's start with some quick definitions.

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template

IT Business Continuity

Business Continuity refers to an organization's ability to keep vital business operations running at or near normal capacities in the event of infrastructure failure. These failures can be caused by human errors, power failures, application errors and a host of others that impact the ability of the infrastructure to properly support the organization. When speaking of Business Continuity the majority of the infrastructure remains in place and functional which is in contrast to Disaster Recovery.

IT Disaster Recovery

Disaster Recovery refers to incidents that significantly impact or make unavailable critical infrastructure. The most common examples are natural disasters and other "acts of God." Planning for data protection and recovery are fundamental to disaster recovery principles.

So the idea of BCDR really is to ensure that your company or organization continues to function at or near normal capacity levels under even the most challenging conditions.

Sounds pretty straightforward, right? Well, wrapped up in that deceptively simple concept are dozens, hundreds, perhaps even thousands of business processes, most, if not all of which are dependent upon your IT infrastructure for successful execution.

So the place to begin defining your disaster recovery plan is not in the server room but rather out among the business units.

For example, maybe you work for a financial institution that has to comply with Sarbanes-Oxley, HIPAA or PATRIOT Act regulations. Information availability is required under all conditions, including routine back-up. Fines for non-compliance and damage to reputation for failure to comply are huge.

Or

Your organization manufactures precision electronic components and your ERP and inventory management systems must be operational during the week. Downtime costs you 00/hour. However, routine maintenance can be performed during the week.

Or

Your company processes a high volume of data entry, fulfillment processing and shipping operations around the clock. Downtime has been calculated to be ,700 per hour.

3 different scenarios with 3 entirely different sets of requirements.

Hopefully you see that before you can develop or use a recovery plan template for your organization you must identify, understand, and prioritize the requirements of each of the most critical processes.

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

To learn more about developing or using disaster recovery plan templates more effectively I highly recommend you read the white paper titled The Disaster Waiting to Happen: The 4 Biggest BCDR Mistakes People Make And Why They Cost So Much. You can get your copy while supplies last here Disaster Recovery Plan Template and you'll discover why Business Continuity and Disaster Recovery Planning remains such a hot topic in the IT infrastructure world today.

Kurt Buckardt is CTO of Konsultek a leading edge network infrastructure and information security company located in Chicago, IL. Kurt can be reached at 847.426.9355. To learn more about Konsultek and how we can help you with your BCDR, network infrastructure and information security needs visit http://www.konsultek.com

Friday, January 25, 2013

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive

Yikes, your hard drive crashed! Now I know the first thing running through your head. Is there anyway to restore data from damaged hard drive? I remember this happened to me once before. I ended losing about 20 GB's worth of information. Music files, multimedia, word documents, priceless photos of my family and I - all erased forever. What I didn't understand at the time was you can restore lost data from a damaged or corrupted hard drive quite easily. What you need is the proper file recovery software to do it!

There are numerous ways a hard drive can be damaged. You could have suffered a serious system error. A terrible virus can take over your computer and corrupt your hard drive. Problems in the Windows registry can cause severe hard drive failure. Or perhaps it was due to human error or some kind of physical damage. Whatever the reason, you will need to recover lost files quickly before it is too late.

In order to recover data from crashed hard drive, the first thing you need to do is protect the integrity of the drive. The files are there but can be lost forever if you do not take the proper steps. Do not mess around with it or make any alterations whatsoever. A crashed hard drive is hypertensive to any kind of changes and it can be very hard to troubleshoot.

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive

To restore lost data you need to use file recovery software. After my own incident I smartened up and selected the best data recovery software I could find. I found an excellent program that makes the process so easy all you need to do is click the mouse a few times and you can rescue your data. Download the software for free and see what files it can recover.

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Did you accidentally delete or lose data that you actually needed? Want an easy way to get it back? Learn how to go about recovering deleted files the easy way. Simply scan your computer and choose which files you want to restore. It costs absolutely nothing to try!

Jim Marshall is a computer technician expert with over 15 years in the industry. He has worked on restoring hundreds of hard drives, storage devices, iPods, partitioned drives,and much more. He has compiled reviews of some of the top data recovery programs based on his experiences. After extensive testing see what he considers the best.

http://www.recovering-deleted-files.net/

Wednesday, January 23, 2013

Banking Fraud - Prevention and Control

Banking Fraud is posing threat to Indian Economy. Its vibrant effect can be understood be the fact that in the year 2004 number of Cyber Crime were 347 in India which rose to 481 in 2005 showing an increase of 38.5% while I.P.C. category crime stood at 302 in 2005 including 186 cases of cyber fraud and 68 cases cyber forgery. Thus it becomes very important that occurrence of such frauds should be minimized. More upsetting is the fact that such frauds are entering in Banking Sector as well.

In the present day, Global Scenario Banking System has acquired new dimensions. Banking did spread in India. Today, the banking system has entered into competitive markets in areas covering resource mobilization, human resource development, customer services and credit management as well.

Indian's banking system has several outstanding achievements to its credit, the most striking of which is its reach. In fact, Indian banks are now spread out into the remotest areas of our country. Indian banking, which was operating in a highly comfortable and protected environment till the beginning of 1990s, has been pushed into the choppy waters of intense competition.

Banking Fraud - Prevention and Control

A sound banking system should possess three basic characteristics to protect depositor's interest and public faith. Theses are (i) a fraud free culture, (ii) a time tested Best Practice Code, and (iii) an in house immediate grievance remedial system. All these conditions are their missing or extremely weak in India. Section 5(b) of the Banking Regulation Act, 1949 defines banking... "Banking is the accepting for the purpose of lending or investment, deposits of money from the purpose of lending or investment, deposits of money from the public, repayable on demand or otherwise and withdraw able by cheque, draft, order or otherwise." But if his money has fraudulently been drawn from the bank the latter is under strict obligation to pay the depositor. The bank therefore has to ensure at all times that the money of the depositors is not drawn fraudulently. Time has come when the security aspects of the banks have to be dealt with on priority basis.

The banking system in our country has been taking care of all segments of our socio-economic set up. The Article contains a discussion on the rise of banking frauds and various methods that can be used to avoid such frauds. A bank fraud is a deliberate act of omission or commission by any person carried out in the course of banking transactions or in the books of accounts, resulting in wrongful gain to any person for a temporary period or otherwise, with or without any monetary loss to the bank. The relevant provisions of Indian Penal Code, Criminal Procedure Code, Indian Contract Act, and Negotiable Instruments Act relating to banking frauds has been cited in the present Article.

EVOLUTION OF BANKING SYSTEM IN INDIA

Banking system occupies an important place in a nation's economy. A banking institution is indispensable in a modern society. It plays a pivotal role in economic development of a country and forms the core of the money market in an advanced country.

Banking industry in India has traversed a long way to assume its present stature. It has undergone a major structural transformation after the nationalization of 14 major commercial banks in 1969 and 6 more on 15 April 1980. The Indian banking system is unique and perhaps has no parallels in the banking history of any country in the world.

RESERVE BANK OF INDIA-ECONOMIC AND SOCIAL OBJECTIVE

The Reserve Bank of India has an important role to play in the maintenance of the exchange value of the rupee in view of the close interdependence of international trade and national economic growth and well being. This aspect is of the wider responsibly of the central bank for the maintenance of economic and financial stability. For this the bank is entrusted with the custody and the management of country's international reserves; it acts also as the agent of the government in respect of India's membership of the international monetary fund. With economic development the bank also performs a variety of developmental and promotional functions which in the past were registered being outside the normal purview of central banking. It also acts an important regulator.

BANK FRAUDS: CONCEPT AND DIMENSIONS

Banks are the engines that drive the operations in the financial sector, which is vital for the economy. With the nationalization of banks in 1969, they also have emerged as engines for social change. After Independence, the banks have passed through three stages. They have moved from the character based lending to ideology based lending to today competitiveness based lending in the context of India's economic liberalization policies and the process of linking with the global economy.

While the operations of the bank have become increasingly significant banking frauds in banks are also increasing and fraudsters are becoming more and more sophisticated and ingenious. In a bid to keep pace with the changing times, the banking sector has diversified it business manifold. And the old philosophy of class banking has been replaced by mass banking. The challenge in management of social responsibility with economic viability has increased.

DEFINITION OF FRAUD

Fraud is defined as "any behavior by which one person intends to gain a dishonest advantage over another". In other words , fraud is an act or omission which is intended to cause wrongful gain to one person and wrongful loss to the other, either by way of concealment of facts or otherwise.

Fraud is defined u/s 421 of the Indian Penal Code and u/s 17 of the Indian Contract Act. Thus essential elements of frauds are:

1. There must be a representation and assertion;

2. It must relate to a fact;

3. It must be with the knowledge that it is false or without belief in its truth; and

4. It must induce another to act upon the assertion in question or to do or not to do certain act.

BANK FRAUDS

Losses sustained by banks as a result of frauds exceed the losses due to robbery, dacoity, burglary and theft-all put together. Unauthorized credit facilities are extended for illegal gratification such as case credit allowed against pledge of goods, hypothecation of goods against bills or against book debts. Common modus operandi are, pledging of spurious goods, inletting the value of goods, hypothecating goods to more than one bank, fraudulent removal of goods with the knowledge and connivance of in negligence of bank staff, pledging of goods belonging to a third party. Goods hypothecated to a bank are found to contain obsolete stocks packed in between goods stocks and case of shortage in weight is not uncommon.

An analysis made of cases brings out broadly the under mentioned four major elements responsible for the commission of frauds in banks.

1. Active involvement of the staff-both supervisor and clerical either independent of external elements or in connivance with outsiders.

2. Failure on the part of the bank staff to follow meticulously laid down instructions and guidelines.

3. External elements perpetuating frauds on banks by forgeries or manipulations of cheques, drafts and other instruments.

4. There has been a growing collusion between business, top banks executives, civil servants and politicians in power to defraud the banks, by getting the rules bent, regulations flouted and banking norms thrown to the winds.

FRAUDS-PREVENTION AND DETECTION

A close study of any fraud in bank reveals many common basic features. There may have been negligence or dishonesty at some stage, on part of one or more of the bank employees. One of them may have colluded with the borrower. The bank official may have been putting up with the borrower's sharp practices for a personal gain. The proper care which was expected of the staff, as custodians of banks interest may not have been taken. The bank's rules and procedures laid down in the Manual instructions and the circulars may not have been observed or may have been deliberately ignored.

Bank frauds are the failure of the banker. It does not mean that the external frauds do not defraud banks. But if the banker is upright and knows his job, the task of defrauder will become extremely difficult, if not possible.

Detection of Frauds

Despite all care and vigilance there may still be some frauds, though their number, periodicity and intensity may be considerably reduced. The following procedure would be very helpful if taken into consideration:

1. All relevant data-papers, documents etc. Should be promptly collected. Original vouchers or other papers forming the basis of the investigation should be kept under lock and key.

2. All persons in the bank who may be knowing something about the time, place a modus operandi of the fraud should be examined and their statements should be recorded.

3. The probable order of events should thereafter be reconstructed by the officer, in his own mind.

4. It is advisable to keep the central office informed about the fraud and further developments in regard thereto.

Classification of Frauds and Action Required by Banks

The Reserve Bank of India had set-up a high level committee in 1992 which was headed by Mr. A... Ghosh, the then Dy. Governor Reserve Bank of India to inquire into various aspects relating to frauds malpractice in banks. The committee had noticed/observed three major causes for perpetration of fraud as given hereunder:

1. Laxity in observance of the laid down system and procedures by operational and supervising staff.

2. Over confidence reposed in the clients who indulged in breach of trust.

3. Unscrupulous clients by taking advantages of the laxity in observance of established, time tested safeguards also committed frauds.

In order to have uniformity in reporting cases of frauds, RBI considered the question of classification of bank frauds on the basis of the provisions of the IPC.
Given below are the Provisions and their Remedial measures that can be taken.

1. Cheating (Section 415, IPC)

Remedial Measures.

The preventive measures in respect of the cheating can be concentrated on cross-checking regarding identity, genuineness, verification of particulars, etc. in respect of various instruments as well as persons involved in encashment or dealing with the property of the bank.

2. Criminal misappropriation of property (Section 403 IPC).

Remedial Measure

Criminal misappropriation of property, presuppose the custody or control of funds or property, so subjected, with that of the person committing such frauds. Preventive measures, for this class of fraud should be taken at the level the custody or control of the funds or property of the bank generally vests. Such a measure should be sufficient, it is extended to these persons who are actually handling or having actual custody or control of the fund or movable properties of the bank.

3. Criminal breach of trust (Section 405, IPC)

Remedial Measure

Care should be taken from the initial step when a person comes to the bank. Care needs to be taken at the time of recruitment in bank as well.

4. Forgery (Section 463, IPC)

Remedial Measure

Both the prevention and detection of frauds through forgery are important for a bank. Forgery of signatures is the most frequent fraud in banking business. The bank should take special care when the instrument has been presented either bearer or order; in case a bank pays forged instrument he would be liable for the loss to the genuine costumer.

5. Falsification of accounts (Section 477A)

Remedial Measure

Proper diligence is required while filling of forms and accounts. The accounts should be rechecked on daily basis.

6. Theft (Section 378, IPC)

Remedial Measures

Encashment of stolen' cheque can be prevented if the bank clearly specify the age, sex and two visible identify action marks on the body of the person traveler's cheques on the back of the cheque leaf. This will help the paying bank to easily identify the cheque holder. Theft from lockers and safe deposit vaults are not easy to commit because the master-key remains with the banker and the individual key of the locker is handed over to the costumer with due acknowledgement.

7. Criminal conspiracy (Section 120 A, IPC)

In the case of State of Andhra Pradesh v. IBS Prasad Rao and Other, the accused, who were clerks in a cooperative Central Bank were all convicted of the offences of cheating under Section 420 read along with Section 120 A. all the four accused had conspired together to defraud the bank by making false demand drafts and receipt vouchers.

8. Offences relating to currency notes and banks notes (Section 489 A-489E, IPC)
These sections provide for the protection of currency-notes and bank notes from forgery. The offences under section are:

(a) Counterfeiting currency notes or banks.

(b) Selling, buying or using as genuine, forged or counterfeit currency notes or bank notes. Knowing the same to be forged or counterfeit.

(c) Possession of forged or counterfeit currency notes or bank-notes, knowing or counterfeit and intending to use the same as genuine.

(d) Making or passing instruments or materials for forging or counterfeiting currency notes or banks.

(e) Making or using documents resembling currency-notes or bank notes.

Most of the above provisions are Cognizable Offences under Section 2(c) of the Code of Criminal Procedure, 1973.

FRAUD PRONE AREAS IN DIFFERENT ACCOUNTS

The following are the potential fraud prone areas in Banking Sector. In addition to those areas I have also given kinds of fraud that are common in these areas.

Savings Bank Accounts

The following are some of the examples being played in respect of savings bank accounts:

(a) Cheques bearing the forged signatures of depositors may be presented and paid.

(b) Specimen signatures of the depositors may be changed, particularly after the death of depositors,

(c) Dormant accounts may be operated by dishonest persons with or without collusion of bank employees, and

(d) Unauthorized withdrawals from customer's accounts by employee of the bank maintaining the savings ledger and later destruction of the recent vouchers by them.

Current Account Fraud

The following types are likely to be committed in case of current accounts.

(a) Opening of frauds in the names of limited companies or firms by unauthorized persons;

(b) Presentation and payment of cheques bearing forged signatures;

(c) Breach of trust by the employees of the companies or firms possessing cheque leaves duly signed by the authorized signatures;

(d) Fraudulent alteration of the amount of the cheques and getting it paid either at the counter or though another bank.

Frauds In Case Of Advances

Following types may be committed in respect of advances:

(a) Spurious gold ornaments may be pledged.

(b) Sub-standard goods may be pledged with the bank or their value may be shown at inflated figures.
(c) Same goods may be hypothecated in favour of different banks.

LEGAL REGIME TO CONTROL BANK FRAUDS

Frauds constitute white-collar crime, committed by unscrupulous persons deftly advantage of loopholes existing in systems/procedures. The ideal situation is one there is no fraud, but taking ground realities of the nation's environment and human nature's fragility, an institution should always like to keep the overreach of frauds at the minimum occurrence level.

Following are the relevant sections relating to Bank Frauds

Indian Penal Code (45 of 1860)

(a) Section 23 "Wrongful gain".-

"Wrongful gain" is gain by unlawful means of property to which the person gaining is not legally entitled.

(b) "Wrongful loss"

"Wrongful loss" is the loss by unlawful means of property to which the person losing it is legally entitled.
(c) Gaining wrongfully.

Losing wrongfully-A person is said to gain wrongfully when such person retains wrongfully, as well as when such person acquires wrongfully. A person is said to lose wrongfully when such person is wrongfully kept out of any property, as well as when such person is wrongfully deprived of property.

(d) Section 24. "Dishonestly"

Whoever does anything with the intention of causing wrongful gain to one person or wrongful loss to another person, is said to do that thing "dishonestly".

(e) Section 28. "Counterfeit"

A person is said to "counterfeit" who causes one thing to resemble another thing, intending by means of that resemblance to practice deception, or knowing it to be likely that deception will thereby be practiced.

BREACH OF TRUST

1. Section 408- Criminal breach of trust by clerk or servant.

2. Section 409- Criminal breach of trust by public servant, or by banker, merchant or agent.

3. Section 416- Cheating by personating

4. Section 419- Punishment for cheating by personation.

OFFENCES RELATING TO DOCMENTS

1) Section 463-Forgery

2) Section 464 -Making a false document

3) Section 465- Punishment for forgery.

4) Section 467- Forgery of valuable security, will, etc

5) Section 468- Forgery for purpose of cheating

6) Section 469- Forgery for purpose of harming reputation

7) Section 470- Forged document.

8) Section 471- Using as genuine a forged document

9) Section 477- Fraudulent cancellation, destruction, etc., of will, authority to adopt, or valuable security.

10) Section 477A- Falsification of accounts.

THE RESERVE BANK OF INDIA ACT, 1934

Issue of demand bills and notes Section 31.

Provides that only Bank and except provided by Central Government shall be authorized to draw, accept, make or issue any bill of exchange, hundi, promissory note or engagement for the payment of money payable to bearer on demand, or borrow, owe or take up any sum or sums of money on the bills, hundis or notes payable to bearer on demand of any such person

THE NEGOTIABLE INSTRUMENTS ACT, 1881

Holder's right to duplicate of lost bill Section 45A.

1. The finder of lost bill or note acquires no title to it. The title remains with the true owner. He is entitled to recover from the true owner.

2. If the finder obtains payment on a lost bill or note in due course, the payee may be able to get a valid discharge for it. But the true owner can recover the money due on the instrument as damages from the finder.

Section 58

When an Instrument is obtained by unlawful means or for unlawful consideration no possessor or indorse who claims through the person who found or so obtained the instrument is entitled to receive the amount due thereon from such maker, acceptor or holder, or from any party prior to such holder, unless such possessor or indorse is, or some person through whom he claims was, a holder thereof in due course.

Section 85:

Cheque payable to order.

1. By this section, bankers are placed in privileged position. It provides that if an order cheque is indorsed by or on behalf of the payee, and the banker on whom it is drawn pays it in due course, the banker is discharged. He can debit his customer with the amount so paid, though the endorsement of the payee might turn out to be a forgery.

2. The claim protection under this section the banker has to prove that the payment was a payment in due course, in good faith and without negligence.

Section 87. Effect of material alteration

Under this section any alteration made without the consent of party would be void. Alteration would be valid only if is made with common intention of the party.

Section 138. Dishonour of cheque for insufficiency, etc., of funds in the account.

Where any cheque drawn by a person on an account maintained by him with a banker for payment of any amount of money to another person from out of that account for the discharge, in whole or in part, of any debt or other liability, is returned by the bank unpaid. either because of the amount of money standing to the credit of that account is insufficient to honour the cheque or that it exceeds the amount arranged to be paid from that account by an agreement made with that bank, such person shall be deemed to have committed an offence and shall, without prejudice.

Section 141(1) Offences by companies.

If the person committing an offence under Section 138 is a company, every person who, at the time the offence was committed, was in charge of, and was responsible to, the company for the conduct of the business of the company, as well as the company, shall be deemed to be guilty of the offence and shall be liable to be proceeded against and punished accordingly.

SECURITY REGIME IN BANKING SYSTEM

Security implies sense of safety and of freedom from danger or anxiety. When a banker takes a collateral security, say in the form of gold or a title deed, against the money lent by him, he has a sense of safety and of freedom from anxiety about the possible non-payment of the loan by the borrower. These should be communicated to all strata of the organization through appropriate means. Before staff managers should analyze current practices. Security procedure should be stated explicitly and agreed upon by each user in the specific environment. Such practices ensure information security and enhance availability. Bank security is essentially a defense against unforced attacks by thieves, dacoits and burglars.

PHYSICAL SECURITY MEASURES-CONCEPT

A large part of banks security depends on social security measures. Physical security measures can be defined as those specific and special protective or defensive measures adopted to deter, detect, delay, defend and defeat or to perform any one or more of these functions against culpable acts, both covert and covert and acclamations natural events. The protective or defensive, measures adopted involve construction, installation and deployment of structures, equipment and persons respectively.

The following are few guidelines to check malpractices:

1. To rotate the cash work within the staff.

2. One person should not continue on the same seat for more than two months.

3. Daybook should not be written by the Cashier where an other person is available to the job

4. No cash withdrawal should be allowed within passbook in case of withdrawal by pay order.

5. The branch manager should ensure that all staff members have recorder their presence in the attendance registrar, before starting work.

Execution of Documents

1. A bank officer must adopt a strict professional approach in the execution of documents. The ink and the pen used for the execution must be maintained uniformly.

2. Bank documents should not be typed on a typewriter for execution. These should be invariably handwritten for execution.

3. The execution should always be done in the presence of the officer responsible for obtain them,
4. The borrowers should be asked to sign in full signatures in same style throughout the documents.

5. Unless there is a specific requirement in the document, it should not be got attested or witnessed as such attestation may change the character of the instruments and the documents may subject to ad volrem stamp duty.

6. The paper on which the bank documents are made should be pilfer proof. It should be unique and available to the banks only.

7. The printing of the bank documents should have highly artistic intricate and complex graphics.

8. The documents executed between Banker and Borrowers must be kept in safe custody,

CHANGES IN LEGISLATIONS AFTER ELECTRONIC TRANSACTIONS

1. Section 91 of IPC shall be amended to include electronic documents also.

2. Section 92 of Indian Evidence Act, 1872 shall be amended to include commuter based communications

3. Section 93 of Bankers Book Evidence Act, 1891 has been amended to give legal sanctity for books of account maintained in the electronic form by the banks.

4. Section 94 of the Reserve Bank of India Act, 1939 shall be amended to facilitate electronic fund transfers between the financial institutions and the banks. A new clause (pp) has been inserted in Section 58(2).

RECENT TRENDS OF BANKING SYSTEM IN INDIA

In the banking and financial sectors, the introduction of electronic technology for transactions, settlement of accounts, book-keeping and all other related functions is now an imperative. Increasingly, whether we like it or not, all banking transactions are going to be electronic. The thrust is on commercially important centers, which account for 65 percent of banking business in terms of value. There are now a large number of fully computerized branches across the country.

A switchover from cash-based transactions to paper-based transactions is being accelerated. Magnetic Ink character recognition clearing of cheques is now operational in many cities, beside the four metro cities. In India, the design, management and regulation of electronically-based payments system are becoming the focus of policy deliberations. The imperatives of developing an effective, efficient and speedy payment and settlement systems are getting sharper with introduction of new instruments such as credit cards, telebanking, ATMs, retail Electronic Funds Transfer (EFT) and Electronic Clearing Services (ECS). We are moving towards smart cards, credit and financial Electronic Data Interchange (EDI) for straight through processing.

Financial Fraud (Investigation, Prosecution, Recovery and Restoration of property) Bill, 2001

Further the Financial Fraud (Investigation, Prosecution, Recovery and Restoration of property) Bill, 2001 was introduced in Parliament to curb the menace of Bank Fraud. The Act was to prohibit, control, investigate financial frauds; recover and restore properties subject to such fraud; prosecute for causing financial fraud and matters connected therewith or incidental thereto.

Under the said act the term Financial Fraud has been defined as under:

Section 512 - Financial Fraud

Financial frauds means and includes any of the following acts committed by a person or with his connivance, or by his agent, in his dealings with any bank or financial institution or any other entity holding public funds;

1. The suggestion, as a fact, of that which is not true, by one who does not believe it to be true;

2. The active concealment of a fact by one having knowledge or belief of the fact;

3. A promise made with out any intention of performing it;

4. Any other act fitted to deceive;

5. Any such act or omission as the law specially declares to be fraudulent.
Provided that whoever acquires, possesses or transfers any proceeds of financial fraud or enters into any transaction which is related to proceeds of fraud either directly or indirectly or conceals or aids in the concealment of the proceeds of financial fraud, commits financial fraud.

513(a) - Punishment for Financial Fraud

Whoever commits financial fraud shall be: (a) Punished with rigorous imprisonment for a term, which may extend to seven years and shall also be liable to fine.

(b)Whoever commits serious financial fraud shall be punished with rigorous imprisonment for a term which may extend to ten years but shall not be less than five years and shall also be liable for fine up to double the amount involved in such fraud.

Provided that in both (a) and (b) all funds, bank accounts and properties acquired using such funds subjected to the financial fraud as may reasonably be attributed by the investigating agency shall be recovered and restored to the rightful owner according to the procedure established by law.

CONCLUSION

The Indian Banking Industry has undergone tremendous growth since nationalization of 14 banks in the year 1969. There has an almost eight times increase in the bank branches from about 8000 during 1969 to mote than 60,000 belonging to 289 commercial banks, of which 66 banks are in private sector.

It was the result of two successive Committees on Computerization (Rangarajan Committee) that set the tone for computerization in India. While the first committee drew the blue print in 1983-84 for the mechanization and computerization in banking industry, the second committee set up in 1989 paved the way for integrated use of telecommunications and computers for applying technogical breakthroughs in banking sector.

However, with the spread of banking and banks, frauds have been on a constant increase. It could be a natural corollary to increase in the number of customers who are using banks these days. In the year 2000 alone we have lost Rs 673 crores in as many as 3,072 number of fraud cases. These are only reported figures. Though, this is 0.075% of Rs 8,96,696 crores of total deposits and 0.15% of Rs 4,44,125 crores of loans & advances, there are any numbers of cases that are not reported. There were nearly 65,800 bank branches of a total of 295 commercial banks in India as on June 30, 2001 reporting a total of nearly 3,072 bank fraud cases. This makes nearly 10.4 frauds per bank and roughly 0.47 frauds per branch.

An Expert Committee on Bank Frauds (Chairman: Dr.N.L.Mitra) submitted its Report to RBI in September 2001. The Committee examined and suggested both the preventive and curative aspects of bank frauds.

The important recommendations of the Committee include:

o A need for including financial fraud as a criminal offence;

o Amendments to the IPC by including a new chapter on financial fraud;

o Amendments to the Evidence Act to shift the burden of proof on the accused person;

o Special provision in the Cr. PC for properties involved in the Financial Fraud.

o Confiscating unlawful gains; and preventive measures including the development of Best Code Procedures by banks and financial institutions.

Thus it can be concluded that following measures should necessarily be adopted by the Ministry of Finance in order to reduce cases of Fraud.

o There must be a Special Court to try financial fraud cases of serious nature.

o The law should provide separate structural and recovery procedure. Every bank must have a domestic enquiry officer to enquire about the civil dimension of fraud.

o A fraud involving an amount of ten crore of rupees and above may be considered serious and be tried in the Special Court.

The Twenty-ninth Report of the Law Commission had dealt some categories of crimes one of which is "offences calculated to prevent and obstruct the economic development of the country and endanger its economic health." Offences relating to Banking Fraud will fall under this category. The most important feature of such offences is that ordinarily they do not involve an individual direct victim. They are punishable because they harm the whole society. It is clear that money involved in Bank belongs to public. They deposit there whole life' security in Banks and in case of Dacoity or Robbery in banks the public will be al lost. Thus it is important that sufficient efforts should be taken in this regard.

There exists a new kind of threat in cyber world. Writers are referring it as "Salami Attack" under this a special software is used for transferring the amount from the account of the individual. Hence the culprits of such crimes should be found quickly and should be given strict punishment. Moreover there is requirement of more number of IT professionals who will help in finding a solution against all these security threats.

Banking Fraud - Prevention and Control
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Written By:
Apoorva Yadav and Juhi Malviya,
Final Year, National Law Institute University, Bhopal.

1. Extracts from the paper presented by Dr. Srinivasan, National Seminar on Economic Crimes, and Committee on Criminal Justice Reforms, International Institute of Revenue Research.
2. Report on Trend and Progress of Banking in India, 2001, p. 73, Rath DP, RBI, 2001.
3. Banking System, Frauds and Legal Control, R.P Nainta, Deep & Deep Publications Pvt. Ltd., 2005
4. H.L. Bedi, V.K Hardikar, Practical Banking (Advances) 1982, p.472
5. B.R Sharma, Bank Frauds Prevention and Detection (2001), p. 33
6. The H.P State Cooperative Bank Ltd., H.O No. 66/2001, dated 9.8.2001.
7. State of Andhra Pradesh v. IBS Prasad Rao and Other AIR 1970, SC 648;
8. V.C. Shukla v. State (1980), 25 CC 665.
9. S.N Maheshwari, Banking Law and Practice (1994), p. 635

Sunday, January 20, 2013

How to Password Protect a USB Flash Drive

USB flash drives are great but how to password protect your USB flash drive just in case it gets lost?

Being able to carry around lots of files in a small device that easily fits your pocket is something fairly new to most of us. Until recently, we used floppy disks or burned information to a CD. But all that's changed with the advent of neat little USB flash drives that can hold gigabytes of data - ideal for the files that you need access to regardless of where you are.

Individual files can easily be password protected. PDFs, Word documents, Excel spreadsheets, Access databases can all have a password set when you save them. This makes them reasonably safe from prying eyes. I say reasonably safe as nothing is completely uncrackable. Sorry.

How to Password Protect a USB Flash Drive

But what do you do if you want to protect more of your files than just a few? Or if you'd prefer the convenience of only typing in one password and then everything it was protecting becomes available?

If you don't mind the hassle, there's a free program called Cryptania LE. It's easy enough to use and free to download but you need to split your USB drive up into 25Mb segments. Nowadays, that's pretty small. Just a handful of full resolution photographs from your digital camera, for instance.

Failing that, you will need to find a program that password protects individual folders on your flash drive. These programs are quite inexpensive and quite convenient.

Just remember the password you choose and don't keep it anywhere obvious. Which means that scribbles on the USB drive itself and Post-It notes would be bad ideas!

How to Password Protect a USB Flash Drive
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Find out more ways to password protect USB flash drive and keep your confidential data safe and secure. Just click here.