9
Aug

Cattle sale norms based on SC order of 2016

NEW DELHI: The notification from the Ministry of Environment prohibiting the sale of livestock for slaughter or slaughter in livestock markets is based on the order of the Supreme Court in July last year, when the highest court had ordered the establishment of the Rules of the 1960 Act on the Prevention of Cruelty to Animals stop cross-border animal trafficking and protect animals against cruelty.
It all began with a lawsuit filed by animal rights activists Gauri Maulekhi in 2014, drawing the attention of the SC in cattle smuggling large-scale Nepal to be sacrificed to Gadhimai. The festival is celebrated every five years in the village of Bariyarpur where more than five lakh animals died in two days, making it the largest animal slaughter in the world.
Maulekhi, Maneka Gandhi board member, People for Animals (PFA), had requested the intervention of SC so that cross-border traffic could be disrupted with the involvement of various agencies, including border guards Police State, and livestock was available to farmers at reasonable prices for agriculture.
The court then approved an order of July 13, 2015, to establish guidelines to prevent the animals eviction against India for the festival and create a committee in charge of the Director General of Sahastra Seema Bal. The group presented a list of 20 recommendations, paving the way for South Carolina for the final order of July 12 last year asking the Ministry to establish standards under section 38 of the 1960 Act.
The fact that the new rules are a long time ago told TOI Maulekhi on Tuesday that the measure could save livestock cruelty, eliminate illegal sale and smuggling and to help farmers who can now buy livestock for Agricultural purposes. Animal markets, which were “agricultural markets” became “butcher markets in recent years.” The result is that there are more animals to buy from farmers. Prices have been raised by butchers and not a farmer wants an Animal for ploughing can afford. More small farmers are bankrupt because they can not afford the mechanical means. ”
In declaring that the new rules have returned the hope of small and marginalized farmers, Maulekhi said: “The price will fall and small farmers will give them back, they recover some kind of wealth.”

5
Jun

Judy malware infects millions of Android smartphones via Play Store, how to check if your smartphone is infected

A malicious campaign called “Judy” had wrapped up much of the Google Play Store and infected anywhere between 8.5 million and 36.5 million users. Check Point’s security research firm said it had discovered the malware after which it had alerted Google. Meanwhile, Google began to remove infected many applications from the Play Store. However, malware Judy got 4.5 to 18.5 million downloads in the Google Play Store. Check Point posted a blog on the subject, which says Judy Malware is an “automatic click of advertising programs.” This essentially means that pirates put money by creating clicks on fake ads after infecting smartphones. The research firm has identified certain applications developed by a company based in South Korea.
The researchers said that the name of the South Korean company is Kinikini and was mentioned in the Google Play Store as ENISTUDIO Corp and is said to develop applications for Android, iOS. The malicious software or automatic click user essentially uses infected devices to create false clicks on ads and, in turn, generates revenue for the one behind this cyber crime. Check Point wrote in its blog post: “Malicious applications have achieved a surprising gap between 4.5 million and 18.5 million downloads. Some of the applications that we have discovered in Google Play for several years, but all have recently updated. “The researchers said they found many other applications containing malware, the Google Play Store. Curiously, they were developed by other companies. According to the checkpoint, the program has operated in an application since April 2016. This essentially means that it had managed to hide the Google review for over a year Judy malware works like this: .. creates false clicks on ads, and Ultimately increases the revenue of these companies basically Judy malware manages to escape the Google Play Store and protection software against hackers could create an “apparently benign applications bridgehead to establish a connection to the device Of the victim, and inserts it into the application store. ” Once you download the application, a connection is established with the control server and control. This furnace server defines the actual malicious load. The wrong program includes “JavaScript, a user agent string and URL controlled by the malware author,” says the checkpoint.

4
May

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!