Author: Deepjeevani

Kothimbir vade or Kothimbir Wadi

Click here to see Kothimbir Wade recipe in Marathi

Kothimbir Wadi (Kothimbir vade)

 

Kothimbirchya VadyaIngredients:

  • 2 Bunches of Coriander leaves (Cilantro leaves)
  • 1 tsp red chili powder
  • 5-7 Garlic cloves paste
  • 1 inch Ginger paste
  • 1 Cup Gram flour
  • 2 tsp thin suji
  • Salt for taste
  • ½ tsp turmeric powder
  • Pinch of asafetida (Hing)
  • Pinch of Baking soda
  • Oil for Deep Frying

Procedure:

  1. Take 2 bunches of coriander (Cilantro leaves). Clean them and chop finely. We have to wash these chopped coriander leaves and have to keep them spread on cloth for some time so that it dries.
  2. In one Bowl take these dried chopped coriander leaves along with, 1 cup gram flour, red chili powder, Ginger and garlic paste, Turmeric powder, asafetida, Salt for taste, 2 tsp Suji (thin Rava), and Pinch of Backing soda. Mix all well
  3. Heat the oil in a Kadai. From above batter create the flattened wade deep in to heated oil. Fry them till they shown up in golden color.

 

Click here to see Kothimbir Wade recipe in Marathi

Check our all other recipes in English here 

To Go back to Home page and explore other categories please click here

 


Fathers day special greetings and graphics

Simple greetings for father day !!

Fathers day GreetingsClick here to Download     Downloaded so far:- 71 

Greetings for Father day !!

Fathers day Greetings1Click here to Download     Downloaded so far:- 41 

Love you dad Greetings for Father day

I love you dad GreetingsClick here to Download     Downloaded so far:- 41 

Worlds Best Dad -Fathers day special greetings

Worlds Best Dad GreetingsClick here to Download     Downloaded so far:- 41 

Miss you my Father

Miss you my FatherClick here to Download     Downloaded so far:- 39 

Father day wishes and Greetings !!

Fathers Day wishesClick here to Download     Downloaded so far:- 37 

TOP 9 Alert Computer user Tips !!

With the popularity of Internet now a days and with tremendous growth of information Technology or IT sectors new oceans are getting born. These oceans are not filled with water but with lots of information, data which is easily accessible to Authorized users. On daily, per minute and per sec uncountable waves of Information, data flows from one user to another, one device to another or to millions and billions. This data might be secured or unsecured. The unsecured data could be theft or attacked by attackers or attackers may destroy the data. The unsecured networks may help attackers control your systems and misuse your personal information.

Even secured Data networks may get attacked and misused or destroyed. Having secured systems layers or Softwares (Eg: Network security layers, Antivirus, Host intrusion prevention, DLP) may provide some amount of protection from these attackers (Eg: Malwares, Viruses, worms, Trojans etc ) however the network or systems or even home PCs will not be 100% secured anytime unless users i.e we are not 100% Alert always i.e  while we are working over internet, checking emails, connecting removable or any external storage devices. If we are not Alert computer users then its invitation to attackers to attack the PCs and perform destruction or miss use of your data and it could be your official data as well which may be useful to your competitors.

So how to avoid viruses, worms and Trojan attacks?

To answer to above question is simple, be Alert, cautious and follow the below simple Steps. The following steps can provide significant protection against the spread of malware code or malicious code however these steps require end user judgment call.

I had shared one of the example of malware infection recently in my article which is about browsers Hijacker malware.please go through it. Being a Alert computer user we could avoid such malware attacks easily.

Alert computer user Top 9 Tips and steps:

  1. Don’t open any attachments or emails from strangers. Generally these emails may look like below examples shown

Source emailSource email 2Source email 3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2. Only accept or open emails which are expected and from trusted senders. We should have prior knowledge about such attachments or emails.

3. Use genuine Antivirus softwares on systems/Pcs which is upto date on regular basis with latest signatures files. Enable email protection. Recommendation is to do not use any freely available Antivirus or non-trusted one

4. Turn off the “Use Macros” feature in spreadsheet applications (Eg: MS Excel application) and word processors. Most of the malwares getting spread now a days using these files and exploiting these features.

The following article from Microsoft shall help you providing detailed information on how to disable macros in MS excel application

https://support.office.com/en-us/article/Change-macro-security-settings-in-Excel-3b5ec213-efcc-4d48-9efd-83d097397a7e

5. Avoid downloading untrusted, pirated softwares from internet.

6. While you are using the Removable devices (USB Devices i.e Pen devices or Mass storage devices) before accessing the data from it, scan them for known malwares. To cover maximum protection your antivirus should be running with latest or current available Anti-malware signatures.

Below are some of the screenshots of Removable device which got infected when it was connected to malware affected system and data got transferred to these devices.MALWARE Trojan1

Malware Symptoms

 

 

 

  1. While browsing on internet avoid downloading torrents or any third party setup files which do not have author or company details.
  2. Run the full Scan of systems atleast once in a week.
  3. Patch your operating systems and applications running with latest patch and hotfixes available. Generally the patches and hotfixes fix known bugs and vulnerabilities in that program or in operating system. This is the most important and basic step securing your PC.

Hope the above information helps. These are just basic Tips for computer users (Could be using their personal PC, Office PC ) and mostly related endpoint systems and not covering information backend security (Eg: Network security).

Hope it helps. Be good, alert computer user and contribute to secure your data.
Happy Alert computer User with smile