Archive for 2016
Introducing IoT Cloud
The new IoT Cloud, powered by Thunder, harnesses the power of the Internet of Things and transforms all the data generated by every one of your customers, partners, devices, and sensors into meaningful action.
Watch this sneak peek to learn how IoT Cloud will allow you to process massive quantities of data, build business rules with simple, intuitive tools, and engage proactively with customers in real time.
Trusted by companies of any size, in every industry, including:
This man deleted his entire company with one line of wrong code.
Man accidentally ‘deletes his entire company’ with a one line of wrong code
A man accidentally deleted his entire company because of one mistaken line of code. Yes, you heard it right. According to the Independent, hosting provider Marco Marsala removed all traces of his company and the websites he manages for his customers after he accidentally told his computers to delete everything in its servers.
Marsala wrote on a forum for server experts called Server Fault, that he was stuck after mistakenly running destructive code on his own computers, which immediately went into a bit of a panic afterwards.
The command he mistakenly typed in was ‘rm -rf’. To put it simply: “rm” is short for “remove,” “r” means “this directory” and “f” means “force,” which in this context means “Do not open any dialogue boxes or trigger any warnings.” Normally the code will delete everything it is told to but because of the way it was written, no particular area was specified. Thus, it deleted everything on the servers.
In other words, this innocent-looking little five-character code actually tells the computer to delete everything, overriding all of the usual warnings that pop up when files are being deleted.
As a result of the wrong command, not only the sites got wiped off, but it also deleted all his backups because the drives that were backing up the computers were mounted to it.
‘All servers got deleted and the offsite backups too, because the remote storage was mounted just before by the same script (that is a backup maintenance script),’ he wrote.
Unfortunately for him, the other experts also couldn’t be of much help to him – basically informing him that he had possibly destroyed his whole business and was unlikely he would be able to recover any of the data.
“I feel sorry to say that your company is now essentially dead,” wrote a user called Sven. “You might have an extremely slim chance to recover from this if you turn off everything right now and hand your disks over to a reputable data recovery company.”
Another poster commented that: “You’re going out of business. You don’t need technical advice, you need to call your lawyer.”
“Well, you should have been thinking about how to protect your customers’ data before nuking them,” wrote one person calling himself Massimo. “I won’t even begin enumerating how many errors are simultaneously required in order to be able to completely erase all your servers and all your backups in a single strike.
“This is not bad luck: it’s astonishingly bad design reinforced by complete carelessness,” he added.
Search Engine Optimization Services in Vellore
Search Engine Optimization Services :
1.Search Engine Marketing Services
2.Internet Marketing Services
3.PPC Management Services
4.Link Building Services
5.CPC Advertising
6.Search Engine Submissions
7.Newsletter Advertising
8.Online Advertising Services
9.Directory Submissions
10.Blog Creation
11.Forum Submission
12.Press Release Services
13.Link Exchange Request and Follow Up Services
14.Website Promotion
CYBER CRIMES AND THE LAW
In the era of cyber world as the usage of computers became more popular, there was expansion in the growth of technology as well, and the term ‘Cyber’ became more familiar to the people.
The evolution of Information Technology (IT) gave birth to the cyber space wherein internet provides equal opportunities to all the people to access any information, data storage, analyse etc. with the use of high technology.
Due to increase in the number of netizens(Citizens of the net), misuse of technology in the cyberspace was clutching up which gave birth to cyber crimes at the domestic and international level as well.
Though the word Crime carries its general meaning as “a legal wrong that can be followed by criminal proceedings which may result into punishment” whereas Cyber Crime may be “unlawful acts wherein the computer is either a tool or target or both”.
The world 1st computer specific law was enacted in the year 1970 by the German State of Hesse in the form of ‘Data Protection Act, 1970’ with the advancement of cyber technology. With the emergence of technology the misuse of technology has also expanded to its optimum level and then there arises a need of strict statutory laws to regulate the criminal activities in the cyber world and to protect technological advancement system.
It is under these circumstances Indian parliament passed its “INFORMATION TECHNOLOGY ACT, 2000” on 17th oct to have its exhaustive law to deal with the technology in the field of e-commerce, e-governance, e-banking as well as penalties and punishments in the field of cyber crimes.
Cyber Crimes Actually Means: It could be hackers vandalizing your site, viewing confidential information, stealing trade secrets or intellectual property with the use of internet. It can also include ‘denial of services’ and viruses attacks preventing regular traffic from reaching your site.
Cyber crimes are not limited to outsiders except in case of viruses and with respect to security related cyber crimes that usually done by the employees of particular company who can easily access the password and data storage of the company for their benefits. Cyber crimes also includes criminal activities done with the use of computers which further perpetuates crimes i.e. financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail, spoofing, forgery, cyber defamation, cyber stalking, unauthorized access to Computer system, theft of information contained in the electronic form, e-mail bombing, physically damaging the computer system etc.
Classifications Of Cyber Crimes: Cyber Crimes which are growing day by day, it is very difficult to find out what is actually a cyber crime and what is the conventional crime so to come out of this confusion, cyber crimes can be classified under different categories which are as follows:
1. Cyber Crimes against Persons:
There are certain offences which affects the personality of individuals can be defined as:
- Harassment via E-Mails: It is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter etc. increasing day by day.
- Cyber-Stalking: It means expressed or implied a physical threat that creates fear through the use to computer technology such as internet, e-mail, phones, text messages, webcam, websites or videos.
- Dissemination of Obscene Material: It includes Indecent exposure/ Pornography (basically child pornography), hosting of web site containing these prohibited materials. These obscene matters may cause harm to the mind of the adolescent and tend to deprave or corrupt their mind.
- Defamation: It is an act of imputing any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar language to unknown persons mail account.
- Hacking: It means unauthorized control/access over computer system and act of hacking completely destroys the whole data as well as computer programmes. Hackers usually hacks telecommunication and mobile network.
- Cracking: It is amongst the gravest cyber crimes known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems without your knowledge and consent and has tampered with precious confidential data and information.
- E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates.
- SMS Spoofing: Spoofing is a blocking through spam which means the unwanted uninvited messages. Here a offender steals identity of another in the form of mobile phone number and sending SMS via internet and receiver gets the SMS from the mobile phone number of the victim. It is very serious cyber crime against any individual.
- Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals for their monetary benefits through withdrawing money from the victim’s bank account mala-fidely. There is always unauthorized use of ATM cards in this type of cyber crimes.
- Cheating & Fraud: It means the person who is doing the act of cyber crime i.e. stealing password and data storage has done it with having guilty mind which leads to fraud and cheating.
- Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children.
- Assault by Threat: refers to threatening a person with fear for their lives or lives of their families through the use of a computer network i.e. E-mail, videos or phones.
2. Crimes Against Persons Property:
As there is rapid growth in the international trade where businesses and consumers are increasingly using computers to create, transmit and to store information in the electronic form instead of traditional paper documents. There are certain offences which affects persons property which are as follows:
- Intellectual Property Crimes: Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, infringement of copyright, trademark, patents, designs and service mark violation, theft of computer source code, etc.
- Cyber Squatting: It means where two persons claim for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that previously. For example two similar names i.e. www.yahoo.com and www.yaahoo.com.
- Cyber Vandalism: Vandalism means deliberately destroying or damaging property of another. Thus cyber vandalism means destroying or damaging the data when a network service is stopped or disrupted. It may include within its purview any kind of physical harm done to the computer of any person. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer.
- Hacking Computer System: Hacktivism attacks those included Famous Twitter, blogging platform by unauthorized access/control over the computer. Due to the hacking activity there will be loss of data as well as computer. Also research especially indicates that those attacks were not mainly intended for financial gain too and to diminish the reputation of particular person or company.
- Transmitting Virus: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computerize system of the individuals.
- Cyber Trespass: It means to access someone’s computer without the right authorization of the owner and does not disturb, alter, misuse, or damage data or system by using wireless internet connection.
- Internet Time Thefts: Basically, Internet time theft comes under hacking. It is the use by an unauthorised person, of the Internet hours paid for by another person. The person who gets access to someone else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s knowledge. You can identify time theft if your Internet time has to be recharged often, despite infrequent usage.
3. Cybercrimes Against Government:
There are certain offences done by group of persons intending to threaten the international governments by using internet facilities. It includes:
- Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as global concern. The common form of these terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism activities endanger the sovereignty and integrity of the nation.
- Cyber Warfare: It refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.
- Distribution of pirated software: It means distributing pirated software from one computer to another intending to destroy the data and official records of the government.
- Possession of Unauthorized Information: It is very easy to access any information by the terrorists with the aid of internet and to possess that information for political, religious, social, ideological objectives.
4. Cybercrimes Against Society at large:
An unlawful act done with the intention of causing harm to the cyberspace will affect large number of persons. These offences includes:
- Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children. It also includes activities concerning indecent exposure and obscenity.
- Cyber Trafficking: It may be trafficking in drugs, human beings, arms weapons etc. which affects large number of persons. Trafficking in the cyberspace is also a gravest crime.
- Online Gambling: Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. There are many cases that have come to light are those pertaining to credit card crimes, contractual crimes, offering jobs, etc.
- Financial Crimes: This type of offence is common as there is rapid growth in the users of networking sites and phone networking where culprit will try to attack by sending bogus mails or messages through internet. Ex: Using credit cards by obtaining password illegally.
- Forgery: It means to deceive large number of persons by sending threatening mails as online business transactions are becoming the habitual need of today’s life style.
Affects To Whom: Cyber Crimes always affects the companies of any size because almost all the companies gain an online presence and take advantage of the rapid gains in the technology but greater attention to be given to its security risks. In the modern cyber world cyber crimes is the major issue which is affecting individual as well as society at large too.
Need of Cyber Law: information technology has spread throughout the world. The computer is used in each and every sector wherein cyberspace provides equal opportunities to all for economic growth and human development. As the user of cyberspace grows increasingly diverse and the range of online interaction expands, there is expansion in the cyber crimes i.e. breach of online contracts, perpetration of online torts and crimes etc.
Due to these consequences there was need to adopt a strict law by the cyber space authority to regulate criminal activities relating to cyber and to provide better administration of justice to the victim of cyber crime. In the modern cyber technology world it is very much necessary to regulate cyber crimes and most importantly cyber law should be made stricter in the case of cyber terrorism and hackers.
Penalty For Damage To Computer System: According to the Section: 43 of ‘Information Technology Act, 2000’ whoever does any act of destroys, deletes, alters and disrupts or causes disruption of any computer with the intention of damaging of the whole data of the computer system without the permission of the owner of the computer, shall be liable to pay fine upto 1crore to the person so affected by way of remedy.
According to the Section:43A which is inserted by ‘Information Technology(Amendment) Act, 2008’ where a body corporate is maintaining and protecting the data of the persons as provided by the central government, if there is any negligent act or failure in protecting the data/ information then a body corporate shall be liable to pay compensation to person so affected. And Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine, which may extend up to 2 years or both.
Case Study-Attacks on Cyberspace:
Worm Attack: The Robert Tappan Morris well Known as First Hacker, Son of former National Security Agency Scientist Robert Morris, was the first person to be prosecuted under the ‘Computer and Fraud Act, 1986’. He has created worm while at Cornell as student claiming that he intended to use the worm to check how large the internet was that time. The worm was uncontrollable due to which around 6000 computer machines were destroyed and many computers were shut down until they had completely malfunctioned. He was ultimately sentenced to three years probation, 400 hours of community service and assessed a fine of $10500. So there must be strict laws to punish the criminals who are involved in cyber crime activities.
Hacker Attack: Fred Cohen, a Ph.D. student at the University of Southern California wrote a short program in the year 1983, as an experiment, that could “infect” computers, make copies of itself, and spread from one machine to another. It was beginning & it was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk and many computers were sold which can be accommodate at present too. Other computer scientists had warned that computer viruses were possible, but Cohen’s was the first to be documented. A professor of his suggested the name “virus”. Cohen now runs a computer security firm.
Internet Hacker: Wang Qun, who was known by the nickname of “playgirl”, was arrested by chinese police in the Hubei province first ever arrest of an internet hacker in China. He was a 19 year old computing student, arrested in connection with the alleged posting of pornographic material on the homepages of several government-run web sites. Wang had openly boasted in internet chat rooms that he had also hacked over 30 other web sites too.
Preventive Measures For Cyber Crimes:
Prevention is always better than cure. A netizen should take certain precautions while operating the internet and should follow certain preventive measures for cyber crimes which can be defined as:
- Identification of exposures through education will assist responsible companies and firms to meet these challenges.
- One should avoid disclosing any personal information to strangers via e-mail or while chatting.
- One must avoid sending any photograph to strangers by online as misusing of photograph incidents increasing day by day.
- An update Anti-virus software to guard against virus attacks should be used by all the netizens and should also keep back up volumes so that one may not suffer data loss in case of virus contamination.
- A person should never send his credit card number to any site that is not secured, to guard against frauds.
- It is always the parents who have to keep a watch on the sites that your children are accessing, to prevent any kind of harassment or depravation in children.
- Web site owners should watch traffic and check any irregularity on the site. It is the responsibility of the web site owners to adopt some policy for preventing cyber crimes as number of internet users are growing day by day.
- Web servers running public sites must be physically separately protected from internal corporate network.
- It is better to use a security programmes by the body corporate to control information on sites.
- Strict statutory laws need to be passed by the Legislatures keeping in mind the interest of netizens.
- IT department should pass certain guidelines and notifications for the protection of computer system and should also bring out with some more strict laws to breakdown the criminal activities relating to cyberspace.
- As Cyber Crime is the major threat to all the countries worldwide, certain steps should be taken at the international level for preventing the cybercrime.
- A complete justice must be provided to the victims of cyber crimes by way of compensatory remedy and offenders to be punished with highest type of punishment so that it will anticipate the criminals of cyber crime.
Conclusion:
Since users of computer system and internet are increasing worldwide, where it is easy to access any information easily within a few seconds by using internet which is the medium for huge information and a large base of communications around the world. Certain precautionary measures should be taken by netizens while using the internet which will assist in challenging this major threat Cyber Crime.
Posted by Sivapriya
Web Development Company Vellore | PHP Web Development Services
Redback is a Web Development Company in Vellore. We provide end-to-end solutions for all your web development needs. Website Design and Web Development is so important to that of human eyes. Just a static website without dynamic elements would just be a show case. On the other hand a very good dynamic website without a clean and professional design would not have a good reach. So in short both and web development needs to be taken care very seriously.
Redback gives you the latest in technology blended with creativity to offer state-of-the-art trends in website design and development. We keep up with the changing pace in design and technology that cater to interactive web development needs under one roof.
We at Redback engage ourselves in the following Web Development activities.
- PHP Development
- Wordpress & Bloggers
- HTML
- Website Designing
- NGO Websites
- Web Portal Development
- Job Portal Development
- Matrimony Portal Development
- Real Estate Portal Development
- Content Management System
- E-Commerce Website Development
- Payment Gateway Integration
Web Development Process
- Requirement Analysis
- Building Specification
- Design and Development
- Content Writing
- Website Coding
- Website Testing
- Website Promotion
- Maintenance & Updations
1. Requirement Analysis
The requirement analysis is the first step that we take into consideration during the web development process. We need to get into the nerves of the client to understand their requirement in detail. We prepare Minutes of the Meeting (MOM) along with our Scope. Understanding on the project, assumptions, clarifications and suggestions on each project. Client would provide their inputs on these points and from there we take things forward.
2. Building Specification
Spec building is a very important aspect in dealing with dynamic project. After analysing the requirement, we normally provide the spec of the project. If it is website development project, then we take into consideration the overall structure of the site, graphic user interface, navigation structure, front end and back end tools to be used etc., Once this is done, we proceed towards preparing the proposal which would include, project outline, project cost and schedule for the project delivery.
3. Design and Development
Once the project is declared and the initial deposit has been done, we start working on the prototype design for the website. During the process, there would be some suggestions from both the end on various design elements. We normally give options of two prototype design to the clients and once that is selected we proceed with html conversion for the same.
The next step would be inserting the content for static pages and start working on the dynamic part of the website on other hand.
4. Content Writing
Content writing plays a very important role in website development life cycle. We have very professional and experienced content writers who can write content based on each industry. Spell check and grammar check would be done and then implemented into the web pages.
5. Website Coding
Its time for us now when the website designer and the developer would work hand in hand to make this project a success. Developer would implement the code into the design without disturbing the design and the designer on other hand would closely work with the developer and supply all the design elements needed.
6. Website Testing
Now the website testing team would come in to the scene and start their work to make the website development project an error free website. Website testing team would have the bug tracking system in place and keep shooting the errors available with the application and on other hand both designers and developers would fix all the errors available with application.
7. Website Promotion
Once the website project is completed and now its time for us to spend some time on making this website available with various search engines. The website elements should be optimized in such a way that it is getting listed in various major search engines like Google, yahoo, MSN, Bing and other search engines. Top ranking Keywords and Meta Tags need to be inserted in all the pages of the site.
8. Maintenance & Updations
Website updations need to be done very frequently to keep the website live. Whenever we do the modification on the website, the development life cycle need to be repeated again. For a huge website, it is recommended that you have the Web design & Web development, Testing and Copywriters in-house to update the website frequently without time loss.
Contact :
Redback Studios
studios@redbacks.in
8189985551
Friday, 29 January 2016
Posted by Sivapriya
In-Demand Technical Certifications for Beginners in 2016
Computer certifications exist for a single purpose: to provide a measurable account of a specific set of skills and/or product knowledge. If you are an expert, a certification is proof. If you are not yet an expert, the path you must take to become certified will provide you with the tools to become one.
There are many paths to certification and the first step is to do some research. Spend some time defining your current skills, deciding where you want to take your career, and then look at the certifications that are applicable to your goals.
There are several resources on this site that will help you decide what, if any, certifications are right for you to help you in crafting your personal certification strategy, here are some of the certifications that are expected to be most in demand in 2015.
Demand for project management skills continues to increase, especially as IT projects continue to increase in complexity. The PMP has emerged as one of the most in-demand certifications today, precisely because it demonstrates proficiency in managing those complex projects. The PMP test itself is rigorous, and maintaining the certification requires ongoing testing and effort, which makes the PMP certification all the more valuable to potential employers.
2. Cisco CCNA :
The CCNA is the first of three levels of certification offered by Cisco. The next two are the CCNP and CCIE. I would put all three on this list, but that would be redundant. The CCIE is one of the most respected certifications out there. Getting a CCNA is just one step to that goal. There are six different tracks to choose from for the CCNA and you have the ability to focus on a specific area by getting a specialist certification.
3.Certified Ethical Hacker (CEH) :
A Certified Ethical Hacker V8 is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
4. Microsoft Certified Information Technology Professional (MCITP) :
Microsoft certifications continue to be in high demand, because Microsoft continues to enjoy a strong presence in the corporate computing landscape. Like its predecessor the MCSE, the MCITP candidate can choose to specialize in a number of different domains, from desktop support to server administration to a number of specific applications, like Exchange and Lync. Some of the most valuable MCITP specializations include virtualization on the Microsoft Hyper-V platform, and SharePoint Server administration, to name a couple.
5.Certified Information Systems Security Professional (CISSP) :
The CISSP certification demonstrates knowledge of IT security across a number of domains, covering everything from network security to application security to formation and management of security policies for the enterprise. The CISSP also requires more than simply passing a test to maintain the certification - those who hold the certification are required to demonstrate on-going experience and education in the field of IT security over time.
6.Red Hat Certified Engineer (RHCE) :
According to a recent survey by jobs site Dice.com, 8 out of 10 respondents indicated that hiring Linux talent was a priority for 2012, and Red Hat Linux continues to make serious headway in the enterprise. The RHCE is a challenging certification to obtain, and requires advanced knowledge of a range of Red Hat systems administration tasks. The RHCE becomes even more valuable with the completion of any of a number of optional Certificates of Expertise, which cover a range of topics such as system clustering and virtualization.
7.Information Technology Infrastructure Library (ITIL) v3 Foundation :
The Information Technology Infrastructure Library (ITIL) Foundation certification demonstrates knowledge of the ITIL framework, which has evolved into the de facto standard for IT management in many enterprises. Companies are on the lookout for those who can demonstrate knowledge of ITIL and IT service management, especially as corporate IT organizations begin to treat IT more like a business by introducing service management standards and practices.
8.VMware Certified Professional (VCP) :
Virtualization has been a very hot area in IT for years now, and demand for IT professionals with virtualization skills will only continue to increase throughout 2012 and beyond. While there are a number of options for virtual platforms in today's marketplace, most private clouds (and many public clouds) in the enterprise utilize VMware as their preferred virtualization platform. The VCP demonstrates a level of proficiency in provisioning, maintaining and supporting VMware-based virtualization platforms, and indicates a level of general proficiency in virtualization as an IT skill.
9. CompTia Security+ :
Two years of networking experience is recommended for this certification so the true IT newbie might be in over their head with this one. However, security is a big issue and if you have the familiarity to take the one exam required, the Security+ cert works as a prerequisite for the MCSA and CNE.
10. CompTia's Network+ :
The Network+ certification is excellent for those who need general networking knowledge that is not vendor-based. It covers the basics of installing, troubleshooting, and configuring networking protocols and services. Most people need some experience before taking the $150 exam and an A+ certification is recommended. The Network+ combined with an A+ certification can be used as an elective towards a Microsoft MCSA.
To know more.. redbackacademy.com
Logo Designing at Vellore
Fetching from its name itself, logo is a short abbreviation that is use in order to provide name to any company organization or enterprise. It’s either in the pure graphic mode or it’s written in the letters form in order.
A company’s logo is somewhat synonymously same as a company’s brand name or trade mark. It is an stylish name, uniquely made design to represent any organization. If the logo is well known to the public then logo sometimes uses its unique identity.
History
The very much techniques and invention has given face of to the logo. Including cylinder seals. The arts were expanding in purpose from expression and decoration. Commercial arts were growing at Avery fast speed.
Functions of Logo Company
Logo is shadow of the company. Which determines the contents and about the information of company. There it should be very content conscious. Companies that take lightly their command over logons suffer after the long run process. Similarity a poor logo can be disastrous for the company.
1.A good logo should follow the basic design principles- The main necessity of the logo is that it should be designed nicely and in an attracting manner. It is in popularity that the company bears some goodwill from the logo only.
2.Functional- A logo should be spreadative and commentive. It means that a person if watches a logo hen should grab all the related knowledge about the company or product. Therefore it should be functional. a poor logo does not mean that it should be simple. At various categories of logo today is made in a simple.
3.A good logo should reflect the company- A great logo should not just be a logo in its name. But it should reflect the company. It should be uniquely made and should be copied.
4.A logo should be unique- A good logo should always carry a unique identification unidentical from others. A unique logo only gives good branding to the organization.
For Details Contact :
Redback IT Solutions Private Limited
#AL 24, TNHB , Phase III,
SAthuvacheri, Vellore 632009
Landmark : Near Vallalar Water Tank .
Mail : info@redbacks.in
Mobile : 8189985551
Sunday, 24 January 2016
Posted by Sivapriya