Eating Habits to Combat Long Working Hours

Everybody loves food! We know you do too! But do you know how much does your body require to stay fit and function efficiently? Research shows that distributing your meals, with tiny and healthy ‘snack-ons’ would be the right approach towards healthy eating as opposed to ‘hogging’ your heart out every time you have a craving.

Munch on fruits

For once, control that craving to ravish a double cheese burger and eat a couple of apples instead. It would make a lot of difference. Don’t believe us? Read on. Fruits are rich in potassium, fiber, vitamin C and folate. A diet rich in fruits helps reduce the risk of strokes and type 2 diabetes, protects you against certain types of cancer and lower blood pressure. A freshly squeezed glass of juice for breakfast, an easy to carry fruit to have post lunch and may be some dry fruits before you leave for the day. There you have it.

Home cooked food

Carry your lunch from home. Eating frozen parathas or ordering Chinese every day can completely mess up your taste buds. Not to mention your tummy too. Although take-away food is apparently appealing and irresistible, it is not really healthy. You are never sure of the oil used, or whether the kitchen where the food was cooked lived up to your hygiene standards. Plus, kitchens at average restaurants, use refined flour and the overtly unhealthy ingredient MSG – all of which only add to the list of cons.

Be Punctual

It’s not just ‘what’ you eat, but ‘when’ you eat that matters too. What is the use of calling it a lunch if you end up having it during your tea break? Don’t skip breakfast, it’s the most important meal of the day. You should ideally have breakfast within an hour after you get up. Try and get into the habit of having your meals at regular timings every day. Irregular timings upsets your system and drains your body of energy. You also end up feeling hungry at odd hours. As a result you snack on junk food items which only add to the unwanted flab in your body.

A routine of healthy eating will definitely lead to more productive working hours as it will keep you active post lunch or during the day. If you are fit and feel healthy, you can enjoy life to the fullest! But then, reading this article alone will not help. Remember to follow it up with an action plan.

Yoga is the answer!

Any form of exercise helps you burn calories while stabilizing blood circulation in the body. Combine this with a healthy diet & it even helps in weight loss. Physical workout will help you tone the body, but there is more to life than hitting the gym every day! Say hello to the ancient secrets of Yoga – a form of exercise that promotes physical, mental and spiritual well-being; thus leading to a healthy lifestyle. Here are a few ‘asanas’ that you should know about and practice.

Muscle toning

Surya Namaskar – the most common and effective form of exercise. It not only helps tone the muscles and improves flexibility, but also strengthens the spine and improves digestion. Combined with early morning sun rays and Vitamin D, this is an excellent start to the day.

Improved breathing

Kapalbhati – a technique of breathing focused on exhaling, that ensures cleansing of the respiratory system. It betters flexibility of the diaphragm and helps stay protected from cold, allergies and infections.

Relaxation guaranteed

Pranayam – it soothes the nerves and helps control your temper, keeping you calmer during obstacles as compared to other. It is also known to be an extremely good form of exercise for the heart. So ‘whoosaa’ your stress away.

Enhances concentration

Shavasan – Lying flat on your back in complete oblivion, draining your mind of all thoughts and focusing solely on your breathing; an effective cure for insomnia for sure.
While any form of yoga will not only help you rejuvenate but sciences have proved that if you believe in it whole-heartedly and follow it sincerely, it will infuse a wonderful sense of positivity into your thinking as well. Now breathe in and breathe out! Smile!

Reference by ICICI Bank

Healthy Habits for a Healthy Lifestyle

Bad habits are hard to get rid of but good habits are harder to cultivate. It has scientifically been proven that the average time required for any new initiative to be registered as a habit into the human brain, takes a minimum of 21 days. Only if one dedicatedly and repeatedly follows a routine does it eventually becomes a habit. And it is but naturally a logical conclusion that a healthy lifestyle is directly proportional to the things that you do every day. Here’s what you can do.

Skip late nights, not meals

Your body needs the daily quota of nutrients to function properly. Carbohydrates, proteins and minerals are the three most essential components your body needs every day. So include lots of leafy greens and fruits in your diet. Just try and wake up early, your day will be much better. Avoid working late nights. Try and have your dinner by 9 P.M. That should help you stay up for at least an hour after dinner – the much needed time to digest your food.


Be it an hour in the gym, 30 minutes of yoga or a mere 20 minute brisk walk, any form of exercise practiced consistently without any gap is a must. Yoga helps relieve stress, improve immunity, increase energy, and, better flexibility and posture. Even if you walk your dog for an hour, you burn up to 130 calories!

‘To do’ list in advance

Last minute spontaneity may seem fun, but in order to be spontaneous once, you have to be meticulous otherwise. Setting a deadline and aiming to achieve a measurable goal helps motivate your purpose. Making a checklist will prove to be beneficial; it can help you plan, sort and organize your life in a much more systematic manner. And when you do that, don’t forget to plug in your meal timings too.

While what you eat is important, remember that our bodies are not built for a sedentary lifestyle. Take care of yourself and make sure you follow some simple but regular exercise regime to stay healthy. Now get up and exercise!

Reference by ICICI Bank

Admin Quarantine for inbound and outbound Emails

“Quarantine Manager” is added in Google Apps for work increase the Email Control.

The admin quarantine feature provides greater email security and control by allowing admins to moderate when messages satisfying certain conditions are encountered in their domain’s mail traffic.

Gmail administrators can use email quarantines to moderate messages that meet specified criteria. When a message is flagged by a policy for quarantine (e.g. subject contains the word ‘confidential’), it will not be delivered to the intended recipient. Instead, this message will show up in the admin’s quarantine review UI. Admins can then review the message, choose to allow delivery to the intended recipient, deny delivery with or without rejection notice or do nothing. If no action is taken, messages expire and are removed from quarantine after 30 days.

For a quarantined outbound message, the message appears in the sender’s Sent folder but isn’t delivered to the recipient unless the administrator releases it from quarantine. After an outbound message appears in the quarantine, if the sender deletes the message from his or her Sent folder, the message remains in the quarantine until the administrator acts on it or the 30 days passes.

Where the administrator can do one of the following:

  • Allow delivery of the message to the intended recipient

  • Deny delivery of the message

  • Do nothing, in which case the message expires after 30 days

If an inbound message includes multiple recipients, the message appears in the quarantine once for each recipient—for example, a message with five recipients appears in the quarantine five times, once per recipient. If you set the option to send a reject message for denied messages and then deny a message sent to multiple recipients, the sender receives a reject message for each recipient.

Do any of the following:

View quarantined, allowed, or denied messages

View message content

Search for messages

Allow delivery of one or more quarantined messages

Deny delivery of one or more quarantined messages

Coutersy : google apps

Admin quarantine for inbound and outbound email

quarantine2 kb

The admin quarantine feature provides greater email security and control by allowing admins to moderate when messages satisfying certain conditions are encountered in their domain’s mail traffic.

When a message is flagged by a policy for quarantine (e.g. subject contains the word ‘confidential’), it will not be delivered to the intended recipient. Instead, this message will show up in the admin’s quarantine review UI. Admins can then review the message, choose to allow delivery to the intended recipient, deny delivery with or without rejection notice or do nothing. If no action is taken, messages expire and are removed from quarantine after 30 days.

To make quarantine management easier, up to 25 named quarantines may be set up with unique quarantine criteria. Admins may choose to put messages in different quarantines based on several classification criteria by setting mail flow policies (content compliance, objectionable content, etc.).

Reference by :

Gmail labels in Google Vault email search results

To make it easier for Google Apps admins to locate specific emails in Google Vault search, Gmail labels are now included in search results. Admins can now view both system labels―i.e. the status of the message as viewed by the user – Unread, Inbox, Spam, Sent, etc―and user-applied labels:

To view Gmail labels and basic header information for a message, click show details in your Vault search results.

Gmail user label metadata will also now be included in XML file exports to aid with deeper analysis.

Reference : Google apps


“Last seen” indication in Hangouts

To make it easier to know when people using Hangouts are available to chat, we’ve added timestamps as part of status (e.g. ‘last seen 2h ago’), indicating when one was last using Hangouts.


Individuals can control whether this info is shared from Hangouts chat settings.

This feature is now available on Hangouts in Gmail (gradual rollout), as well as on the latest versions of the Hangouts Android and iOS apps.


 courtesy:google apps

WHOIS – Search-Domain Name-Website-IP Tools

WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format.

WHOIS information has to be made publicly available to everyone via the public WHOIS database as required by ICANN, the international governing body for domain names and Everyday, this valuable source of accurate contact information is targeted and harvested by spammers and telemarketers resulting in unwanted and unsolicited contact. Also since your contact information is public, you are at risk for identity theft and fraud and of being contacted by harassers and stalkers. Privacy Protection ensures that your private information is not published by replacing all your publicly visible contact details with alternate contact information.


1. See Website Information

Search the whois database, look up domain and IP owner information, and check out dozens of other statistics.

2.Save and Follow Domains

Organizing domains across multiple registrars for quick reference has never been so easy.

3.On Demand Domain Data

Get all the data you need about a domain and everything associated with that domain anytime with a single search.

4.New TLD Watcher

New endings to the right of the dot like .Blog, .Web, and .App etc.


Courtesy by :

How to remove PostgreSQL in Windows machine

Comprompt-PostgreSQL in Windows machine
PostgreSQL in Windows machine
Auto Uninstallation :-

i)Go to the Add/Remove Programs

ii) uninstall postgresql server
go to the postgresql server installation directory
run the uninstaller.
Manual Uninstallation:
i) Remove the postgresql server installation directory.
 Suppose following default location then command on cmd
 (rd /s /q “C:\Program Files\PostgreSQL\8.3”)
ii) Delete the user ‘postgres’
net user postgres /delete
iii) Remove the Registry entries. (HKEY_LOCAL_MACHINE\SOFTWARE\PostgreSQL\Installations\postgresql-8.3) and (HKEY_LOCAL_MACHINE\SOFTWARE\PostgreSQL\Services\postgresql-8.3)
iv) Remove the postgresql-8.3 service.
sc delete postgresql-8.3
Courtesy :- 
Embedded System testing

Man in the middle attack

man in middle attack


A man-in-the-middle (MITM) attack is an attack where the malicious actor attempts to intercept, read or alter information moving between two computers.

There are a variety of ways that attackers can insert themselves in the middle of your online communications.

  • By distributing malware, a Trojan virus or a malicious script
  • By exploiting the design vulnerabilities in the Wi-Fi networks
  • By exploiting inherent and un-fixed vulnerabilities of an unpatched desktop browser,
  • By exploiting vulnerabilities which are introduced due to a mis-configuration or non-hardening of the operating system

MITM attacks allows the attacker  to :-

  • Receive and request personal information posing as a trusted party (such as a website that you regularly use).
  • Hijack a browser session and steal credit card number,personal detail etc.
  • Deep dive insight into applications of a computer, and gain the usage pattern and other personal details of a person .
  • Record an entire authentication session, decipher the userid and password information from it, which he can use to impersonate the victim and create damage to a greater extent

Having a correctly defined security perimeter defense design, server and network component’s hardening, implementing robust patch management system and following best security practices can help fix MITM attacks.