R U L E 4 9 - O - The real deal!


49-O. Elector deciding not to vote
.-If an elector, after his electoral roll number has been duly entered in the register of voters in Form-17A and has put his signature or thumb impression thereon as required under sub-rule (1) of rule 49L, decided not to record his vote, a remark to this effect shall be made against the said entry in Form 17A by the presiding officer and the signature or thumb impression of the elector shall be obtained against such remark.

Rule 49-O falls under the Chapter II of Part IV of the Rules which was introduced in 1992 and deals only with voting by electronic voting machines or EVMs. The remark referred to here is an offline entry by the presiding offer (accompanied by the voter’s signature) to record the fact that a vote was not electronically recorded even though the voter had registered in the register of voters. This would allow reconciliation of mismatches arising from a situation where you have lesser votes polled in the machines than the names entered and signed in the register of voters. There is no provision for polling to be cancelled based on the number of 49-O votes.


In general most of us reluctant to vote as we do not feel candidates deserve . Do you know that there is a system in our constitution, as per the 1969 act, in section " 49-O" that a person can go to the polling booth, confirm his identity, get his finger marked and convey the presiding election officer that he doesn't want to vote anyone!

Yes such a feature is available, but these leaders have never disclosed it for obvious reasons. This is called "49-O".


It is suggested to use the facility . Now if a candidate wins, say by 123 votes, and that particular ward has received "49-O" votes more than 123, then that polling will be cancelled and will have to be re-polled.

Not only that, but the candidature of the contestants will be removed and they cannot contest the re-polling, since people had already expressed their decision on them.
This would bring fear into parties and hence look for genuine candidates for their parties for election. This would change the way; of our whole political system.it is seemingly surprising why the election commission has not revealed such a feature to the public....

The Indian Democracy reveals such surprises sometimes. And here is the really good part. If the rejections exceed the number of votes polled, a re-election is ordered, but the rejected candidates do not have the right to contest again.

But there is a fundamental flaw in this. The fact that the voter opted for Rule 49 (O) will be known to everyone in the polling station. The secrecy of the ballot - one of the few unalienable rights of an Indian citizen - is lost. The Constitution bars even the courts from knowing a voter's choice of candidate under section 94 of the Representation of Peoples Act, 1954.


Please spread this news to as many as you know...and pass this info on...


Seems to be a wonderful weapon against corrupt parties in India .show your power, expressing your desire not to vote for anybody, is even more powerful than voting.so don't miss your chance. So either vote, or vote not to vote (vote 49-O)



Use your voting Right for a Better INDIA

Seguir leyendo...

GSM Technology


Network structure


The network behind the GSM seen by the customer is large and complicated in order to provide all of the services which are required. It is divided into a number of sections and these are each covered in separate articles.

* the Base Station Subsystem (the base stations and their controllers).
* the Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network.
* the GPRS Core Network (the optional part which allows packet based Internet connections).
* all of the elements in the system combine to produce many GSM services such as voice calls and SMS.

Subscriber Identity Module (SIM)


One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.

In Australia, North America and Europe many operators lock the mobiles they sell. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to avoid subsidising competitor's mobiles. A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of ample software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account (which is identified by the SIM card).

In some countries such as Bangladesh, Belgium, Costa Rica, India, Indonesia, Malaysia, and Pakistan, all phones are sold unlocked. However, in Belgium, it is unlawful for operators there to offer any form of subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when selling subsidized combinations of handsets and accounts became legal, though operators have to unlock phones free of charge after a certain period (at most 24 months).

GSM security

GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[13] The system supports multiple algorithms so operators may replace that cipher with a stronger one.

Seguir leyendo...

GSM vs CDMA

In cellular service there are two main competing network technologies:
Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA).
Cellular carriers including Sprint PCS (Personal Communication Services), Cingular Wireless, Verizon and T-Mobile use one or the other. Understanding the difference between GSM and CDMA will allow you to choose a carrier that uses the preferable network technology for your needs.
The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA, a proprietary standard designed by Qualcomm in the United States, has been the dominant network standard for North America and parts of Asia. However, GSM networks continue to make inroads in the United States, as CDMA networks make progress in other parts of the world. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other. That said, to the non-invested consumer who simply wants bottom line information to make a choice, the following considerations may be helpful.

Seguir leyendo...