A FRIEND IN NEED IS A FRIEND INDEED :: Someone who comes to your aid when you're in difficulty is a true friend, unlike others who disappear when trouble arises. Meaning of the phrase is misunderstood sometimes as "a needy person becomes a friend to obtain help from others". WE TRY TO HELP YOU
Monday, August 16, 2010
42nd Engineer's Day
In India, Engineers' Day is celebrated on 15 September every year.The day is the birthday of Sir Mokshagundam Visvesvarayya, an eminent Indian engineer.He was also called the precursor of economic planning in India. He took an interest not in engineering alone, but was capable of applying his talent to many allied matters connected with the development of the nation. His learned discourse on economic planning in India entitled 'Planned Economy for India and Reconstructing India' was the first available document on the planning effort of the country and it is still held as the parent source matter for economic planners.
To commemorate the birthday of Bharat Ratna Sir M Visvesvaraya, the Council of the Institution decided to observe September 15 as the Engineers' Day every year. This is celebrated throughout the country through all the Centres of the Institution with learned discourses on a theme specified by the Council every year.
ABOUT SIR M. VISVESVARAYA
As earlier Said, Sir Mokshagundam Visvesvarayya born on 15 September 1860, was a notable Indian engineer, scholar, and statesman born at Muddenahalli, near Kanivenarayanapura, in present-day Chikballapur District of Karnataka State. . He was a recipient of the Indian Republic's highest honour, the Bharat Ratna, in 1955. He was knighted as a Commander of the Indian Empire by King George V for his myriad contributions to the public good. He is held in high regard as the first and pre-eminent engineer of India.
Career as Engineer and Diwan of Mysore: Upon graduating as an engineer, Visvesvaraya took up a job with the Public Works Department (PWD) of Bombay.
-Later invited to join the Indian Irrigation Commission and was successful in Deccan.
-designed and patented a system of automatic weir water floodgates that were first installed in 1903 at the Khadakvasla Reservoir near Pune.
-The same system was installed at the Tigra Dam in Gwalior and the Krishnaraja Sagara (KRS) Dam in Mandya/ Mysore, Karnataka.
-In 1906-07, Government of India sent him to Eden(Africa) and was successful in water supply and drainage system Project there.
-Visvesvaraya achieved celebrity status when he designed a flood protection system for the city of Hyderabad from floods.
-He was instrumental in developing a system to protect Vishakapatnam port from sea erosion.
-He was instrumental in charting out the plan for road construction between Tirumala and Tirupati.
-During his period of service with the Government of Mysore state, he was responsible for the founding of, (under the Patronage of Mysore Government) the Mysore Soap Factory, the Parasitoide Laboratory, the Mysore Iron & Steel Works (now known as Visvesvaraya Iron and Steel Limited) in Bhadravathi, the Sri Jayachamarajendra Polytechnic Institute, the Bangalore Agricultural University, the State Bank of Mysore, The Century Club, Mysore Chambers of Commerce and numerous other industrial ventures. He encouraged private investment in industry during his tenure as Diwan of Mysore.
He was known for sincerity, time management and dedication to a cause.
Honours: In 1915, while he was the Diwan of Mysore, Visvesvaraya was made Knight Commander of the Order of the Indian Empire by the British for his myriad contributions to the public good. After India attained independence, Sir M. Visvesvaraya was given the nation's highest honour, the Bharat Ratna, in 1955.
THIS Great and Eminent Engineer Physically expired on 14 April 1962 but is still alive in all his PROJECTS which remains in OUR COUNTRY! Lets Salute the Legendary Person who inaugurated the Revolutionary Development in INDIA...
The 17 Most Dangerous Places on the Web
Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system.
You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble. You can do everything you can think of to protect yourself and still be taken by a malware infection, a phishing scam, or an invasion of on¬¬line privacy. We'd like to provide a little help. Here are some of the hazards you may encounter, how dangerous they are, and what you can do to stay out of harm's way.
Not all Web dangers are created equal. Thankfully, our friends at the Department of Homeland Security have made our work of classifying Web threats a little easier. Will you get taken just by visiting that unfamiliar site? Or will you have to look for trouble? Let our threat level indicator be your guide.
Threat 1 >> Malicious Flash files that can infect your PC
The Place: Websites that use Flash
Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. But another danger you might not know about is associated with Flash cookies. Flash cookies are small bits of data that their creators can use to save Flash-related settings, among other things. But like regular cookies, Flash cookies can track the sites you visit, too. Worse still, when you delete your browser's cookies, Flash cookies get left behind.
If You Have to Go There: To help protect against Flash-based attacks, make sure you keep your Flash browser plug-ins up-to-date. And you can configure the Flash plug-in to ask you before it downloads any Flash cookies.
Threat 2 >> Shortened links that lead you to potentially harmful places
The Place: Twitter
Scammers love Twitter since it relies so much on URL shorteners, services that take long Internet addresses and re¬¬place them with something briefer.
And it's very simple to hide malware or scams behind shortened URLs. A shortened link that supposedly points to the latest Internet trend-du-jour may be a Trojan horse in disguise.
If You Have to Go There: Simply don't click links. Of course, that takes some of the fun out of Twitter. The other option is to use a Twitter client app. TweetDeck and Tweetie for Mac have preview features that let you see the full URL before you go to the site in question.
Some link-shortening services, such as Bit.ly, attempt to filter out malicious links, but it seems to be a manual process, not an automatic one. TinyURL has a preview service you can turn on.
Threat 3 >> E-mail scams or attachments that get you to install malware or give up personal info
The Place: Your e-mail inbox
Although phishing and infected e-mail attachments are nothing new, the lures that cybercrooks use are constantly evolving, and in some cases they're becoming more difficult to distinguish from legitimate messages. My junk mailbox has a phishing e-mail that looks like a legitimate order confirmation from Amazon. The only hint that something's amiss is the sender's e-mail address.
If You Have to Go There: Don't trust anything in your inbox. Instead of clicking on links in a retailer's e-mail, go directly to the retailer's site.
Threat 4 >> Malware hiding in video, music, or software downloads
The Place: Torrent sites
Torrent sites (such as BitTorrent) are often used for sharing pirated music, videos, or software, and are a trove of malware. No one vets the download files--they may be malware in disguise.
Ben Edelman, privacy researcher and assistant professor at Harvard Business School, thinks torrent sites are the most dangerous places to visit, since they don't have a business model or reputation to defend (by comparison, many porn sites rely on being deemed trustworthy). "The [torrent] customers, they really don't want to pay," he says.
If You Have to Go There: It's probably best to avoid torrent sites entirely, given their untrustworthy content, but if you must visit, use a secondary PC to protect your main system. Use antivirus software, and keep it up¬¬dated. Scan downloaded files and wait a couple of days be¬¬fore opening them. Brand-new malware can be tricky to catch, but the delay in opening may allow your antivirus software to get the necessary signatures.
Threat 5 >> Malware in photos or videos of scantily clad women
The Place: ‘Legitimate' porn sites
Porn sites have a reputation of being less secure than mainstream sites, but that assumption doesn't tell the whole story. "There is no doubt that visiting Websites of ill-repute is deadly dangerous. If you make a habit of it, it's a given that you'll be attacked at some point," says Roger Thompson, chief research officer with security firm AVG. "Unfortunately, staying away from those sites won't keep you safe by itself, because innocent sites get hacked all the time, and are used as lures to draw victims to the attack servers."
And as mentioned earlier, many porn sites operate as actual, legitimate businesses that want to attract and retain customers. That said, it may be hard to tell the "legit" porn sites from malware-hosting sites that use porn as a lure.
If You Have to Go There: Be suspicious of video downloads, or sites that require you to install video codecs to view videos (see the next threat, below). Using tools like AVG's LinkScanner and McAfee's SiteAdvisor (or SiteAdvisor for Firefox) can help you weed out the malicious sites.
And, again, consider visiting such sites on a secondary machine. You don't want your browser history on the family PC.
Threat 6 >> Trojan horses disguised as video codecs, infecting your PC with malware
The Place: Video download sites, peer-to-peer networks
If you watch or download video online, you've likely been told to download a video codec--a small piece of software that provides support for a type of video file--at least once. Usually, these bits of software are perfectly legitimate (for example, the popular DivX codec), but some less-than-reputable download services or video sites may direct you to download a piece of malware disguised as a codec. Security software company Trend Micro provides a good example of what these attacks look like.
If You Have to Go There: Your safest option is to stick with well-known video sites such as YouTube and Vimeo. And for catching up on the latest episodes of your favorite TV shows, sites and services like Hulu, TV.com, ABC.com, and iTunes are safer than peer-to-peer networks.
Threat 7 >> Geolocation--your smartphone and perhaps other parties know where you are
The Place: Your smartphone
The smartphone market is still in its infancy, really, and so are the threats. One possible concern is the use--or abuse--of geolocation. Although plenty of legitimate uses for location data exist, the potential for inappropriate uses also exists. In one case, a game listed on the Android Market was in reality a client for a spy app. In a less invidious example, a site called pleaserobme.com showed that--for a time--a stream of FourSquare check-ins indicated that a person was away from their home (the site's goal, mind you, wasn't to condone theft, but to raise awareness of the issue).
As in this example showing restaurants in a San Francisco neighborhood, some smartphone apps, such as Yelp for iPhone, use your physical location to provide you with information on nearby businesses or points of interest.Apple recently updated its privacy policy to reflect changes in how it handles location data in iOS 4. The policy now states that "to provide location-based services on Apple products, Apple and our partners and licensees may collect, use and share precise location data." You can read more on Apple's new privacy terms and what they mean for you.
If You Have to Go There: Be particular about the location-based sites, apps, and services that you use. As shown in the screenshot at right services such as Yelp provide good examples of useful location-aware apps. On the other hand, weigh the privacy implications of services like FourSquare or the new Facebook Places feature, and consider how much you feel comfortable divulging. (Read more on how to retain privacy on FourSquare and Facebook Places.)
Threat 8 >> 'Poisoned' search engine results that go to malware-carrying Websites
The Place: Search engines
Search engine poisoning is the practice of building tainted sites or pages that are designed to rank high in a search on a given topic. For example, according to a recent study by the security firm McAfee, 19 percent of search results for "Cameron Diaz and screensavers" had some sort of malicious payload. Breaking news topics and Facebook are also common search targets for attackers.
If You Have to Go There: Pick and choose which sites to go to. Don't just blindly click search results; check each URL first to make sure that it really leads to the site you want. Although any site can be hacked, visiting the Washington Post's story on a hot news topic, for example, is probably a wiser choice than following a link to a site you've never heard of before.
Threat 9 >> Malicious PDFs that try to fool you into installing malware
The Place: Hacked Websites, plus your inbox
As Microsoft has become more serious about Windows security over the past few years, would-be attackers have had to find new ways to infect PCs. Attacking flaws in Adobe Acrobat is one of these newer methods. So-called poisoned PDFs are PDF files that have been crafted in such a manner that they trigger bugs in Adobe Reader and Adobe Acrobat; posted on a hijacked Website, they may let an attacker commandeer your PC and access your files and personal info.
Feeling particularly paranoid? Uncheck 'Allow opening of non-PDF file attachments with external applications' (near the top) to head off certain PDF exploits.A newer variant takes an otherwise innocent-looking PDF document and inserts malware into it. Adobe Reader may pop up an alert asking if you want to run the malware, but hackers can edit those messages to trick you into opening the file.
How serious is this problem? In 2009, attacks using malicious PDFs made up 49 percent of Web-based attacks, according to security firm Symantec.
If You Have to Go There: First, always make sure that you're running the latest version of Adobe Reader.
You can also use a different PDF reader, such as Foxit Reader. This can protect you from attacks on holes in Adobe Reader itself, but it won't make you immune to all PDF attacks, such as the newer ones that embed malware inside the PDFs. Make sure, also, that you update to Adobe Reader 9.3.3 or later (Reader 8 users should update to version 8.3.3 or later); these updates change the way Adobe Reader handles non-PDF attachments and reduce the risk from such attacks.
You can turn off Adobe Reader's ability to open non-PDF attachments by going to Preferences, clicking Trust Manager, and unchecking Allow opening of non-PDF file attachments with external applications.
The next major release of Acrobat and Reader will provide a new "protected mode" against these attacks.
Threat 10 >> Malicious video files using flaws in player software to hijack PCs
The Place: Video download sites
Attackers have been known to exploit flaws in video players such as QuickTime Player and use them to attack PCs. The threats are often "malformed" video files that, like malicious PDFs, trigger bugs in the player software that let the attackers in to spy on you, plant other malware, and more.
If You Have to Go There: Keep your player software up-to-date. Apple and Microsoft periodically release patches for QuickTime and Windows Media Player, respectively. Avoid downloading videos at random. Stick to well-known video sites such as YouTube, or to download services like iTunes.
Threat 11 >> Drive-by downloads that install malware when you visit a site
The Place: Hacked legitimate sites
A drive-by download occurs when a file downloads and/or installs to your PC without you realizing it. Such downloads can happen just about anywhere. Some sites are built to lure people into a drive-by download; but in a common attack method, criminals will hack a Web page, often on an otherwise legitimate site, and insert code that will download malware to your computer.
If You Have to Go There: The first thing to do is to keep your security software up-to-date, and to run regular malware scans. Many security suites can flag suspicious downloads.
Threat 12 >> Fake antivirus software that extorts money--and your credit card information
The Place: Your inbox, hacked legitimate sites
Fake antivirus programs look and act like the real thing, complete with alert messages. It isn't until you realize that these alerts are often riddled with typos that you know you're in trouble.
Most fake antivirus software is best described as extortionware: The trial version will nag you until you purchase the fake antivirus software-which usually does nothing to protect your PC. Once you send the criminals your credit card information, they can reuse it for other purposes, such as buying a high-priced item under your name.
You can get infected with a fake antivirus app in any number of ways. For example, in drive-by downloads (see the previous item), a malicious payload downloads and installs without the user realizing it or having any time to react.
If You Have to Go There: If you get an alert saying you're infected with malware, but it didn't come from the antivirus software you knowingly installed, stop what you're doing. Try booting into Safe Mode and running a scan using your legitimate antivirus software.
However, such a scan may not clean up all of the malware-either the scanner doesn't have a signature for one fragment, or that piece doesn't act like traditional malware. This may render behavioral detection (which spots malware based on how it acts on your system) useless. If all else fails, you may need to call in a professional.
Threat 13 >> Fraudulent ads on sites that lead you to scams or malware
The Place: Just about any ad-supported Website
Hey--ads aren't all bad! They help sites pay the bills. But cybercriminals have taken out ads on popular sites to lure in victims. Last year, the New York Times site ran an ad from scammers, and earlier this year some less-than-scrupulous companies were gaming Google's Sponsored Links ad program and placing ads that looked like links to major companies' Websites.
"The bad guys have become very clever at exploiting online advertising networks, tricking them into distributing ads that effectively load malicious content--especially nasty, scaremongering pop-ups for rogue antispyware," says Eric Howes, director of research services for security firm GFI Software.
If You Have to Go There: Most large sites, such as PCWorld.com, have ad sales departments that work frequently with a core group of large advertisers, so it's probably safe to click a Microsoft ad on the New York Times site. But as the Google Sponsored Links incident shows, nothing is entirely fail-safe.
Threat 14 >> Questionable Facebook apps
The Place: Facebook
Facebook apps have long been an issue for security experts. You don't always know who's developing the apps, what they're doing with the data they may be collecting, or the developers' data security practices. Even though you have to approve apps before they can appear on your profile and access your personal information, from there the security of your data is in the developer's hands.
Take a few minutes to check your Facebook application settings to make sure that your app privacy settings are as you want them.If You Have to Go There: Be selective about the apps you add to your profile--don't take every quiz, for example. Check your privacy settings for Facebook apps, as well: Click the Ac¬¬count drop-down menu in the upper-right corner of Facebook's site, select Privacy Settings, and then click Edit your settings under ‘Applications and Websites'. There, you can control which apps have access to your data, and which of your friends can see what information from apps (such as quiz results); you can also turn off Facebook apps altogether.
Threat 15 >> Sites that lure you in, get you to sign up, then sell your e-mail address for spam
The Place: 'Free electronics' sites
You've no doubt seen sites around the Web blaring, Get a free iPad! Get a free notebook! A free iPod! It's easy! These sites aren't typically dangerous in the classical sense--you probably won't get infected with malware--but your personal information could be sold to other businesses, who can then use it to sell more stuff to you.
If You Have to Go There: Read the privacy policies. And then read them again. Also, beware of privacy policy loopholes--even though a site says that it won't sell your private data to third parties, depending on the language of the policy, they may still be able to give your information to "affiliates."
Threat 16 >> Phishing 2.0 on social networks that tricks you into downloading malware or giving your Facebook login information to a criminal
The Place: Social networks
Questionable Facebook apps and malicious shortened links aren't the only dangers lurking on social networks. Sites like Facebook have given rise to new forms of phishing. Scammers might hijack one person's Facebook account, then use it to lure that person's friend into clicking a malicious link, going to spam sites, or giving up their Facebook login information--thereby giving scammers one more Facebook account to hijack.
"One of the bigger dangers currently facing users is malware, adware, and spyware spread through social networks like Facebook and Twitter," says Eric Howes, director of malware research with Sunbelt Software. "Users may receive spam via these networks offering them free deals, links to interesting videos, or even widgets to enhance their Facebook profiles. In many cases what's really being pushed on users is adware, spyware, or even malicious software that can exploit users' PCs."
If You Have to Go There: Don't trust every link posted to Facebook, even if one of your friends posted it. Be especially suspicious if the post is out of the ordinary for that person. Check the person's wall or Twitter @-replies to see if anyone is concerned that the person's account has been compromised.
And if you suspect that your account has been hijacked, change your password immediately. Both Facebook and Twitter have resources to help you keep up-to-date on the latest threats on both sites. Facebook users should visit its security page; if you're on Twitter, be sure to follow @spam and @safety for Twitter security best practices.
Threat 17 >> Oversharing--exposing too much personal information on your social network profiles
The Place: Social networks
How many times have you seen friends on Facebook or Twitter publicly divulge a bit more information than is necessary? Oversharing isn't just a matter of getting a little too personal--it can leave your private information viewable to the general public. But it's avoidable.
"There is a subtle danger that few people understand with the social networking sites, and that is the idea of information leakage," says AVG's Roger Thompson. "People, particularly teens, put all sorts of information online, without realizing that many more people than just their friends can see that data."
Oversharing could very well lead to more serious privacy issues further down the road, Thompson adds. "As today's young teens reach an age to apply for a credit card, I fully expect an onslaught of fraudulent card applications on their behalf, because they un¬¬wittingly di¬¬vulged so much information. Harvesting is going on now, and we have no idea who is doing the harvesting."
If You Have to Go There: This particular threat is relatively easy to avoid, in that a little common sense can go a long way: Just be mindful of what you post. Do you really need to publish your home address and phone number to your Facebook profile?
Finally, be certain to check your privacy settings to make sure that you're not divulging your deepest, darkest secrets to all 500 million Facebook users.
Hosed!
What Happens When You Surf Unprotected?
11:55 a.m. I need to check my e-mail. I download what appears to be a résumé file. Strange, I'm not hiring. I open it anyway. My screen flickers a little, but nothing starts. Hmm...
12:00 p.m. I start poking around on the Web, and start out easy. I run a Google search for free smilies, and sure enough, I find some. Who am I to refuse?
12:29 p.m. A couple smiley packs later, I am up to three browser toolbars. Junkware, but no malware...yet.
12:41 p.m. I download some random freebie antivirus software I've never heard of. Let's see what this does...
12:48 p.m. More random downloads, and my desktop is getting junked up. I now have icons for free games and 1000 free songs littered all over, plus more browser toolbars than I care to have.
12:55 p.m. IE is hating me right now. Still no signs of malware, but something's sure eating up system resources.
1:03 p.m. My PC locks up for a few moments.
1:25 p.m. After a restart, Windows throws up a warning about a program at C:\Users\PCW\AppData\Roaming\host32.exe. I have no idea what it is.
1:40 p.m. I think I killed IE. I can't launch it. Malware? But I uninstall a couple of toolbars, and it seems to work again.
3:00 p.m. It's unclear whether I've gotten infected by anything on the Web, but so far I haven't done anything too terribly risky. However, I've got to check my e-mail again; I'm expecting an important file from a friend.
3:05 p.m. Whoops. I think I clicked on the wrong file. I've got fake antivirus!
3:25 p.m. I now have three or four fake antivirus programs running. Malware has also planted three shortcut links to porn sites on my desktop. And whenever I open something in IE, a fake antivirus app kicks in with a fake warning.
4:13 p.m. Something just forced my PC to shut down and restart. I think I've successfully hosed this computer
Tips from the Pros:
Top 5 Ways to Stay Safe Online
Stay up-to-date, stay paranoid, stay protected. That's the message from the security experts we spoke with while developing this story. Here are a few of their top tips and suggestions for protecting your computer against malware and hackers.
1) Keep up on patches.
Be sure to run Windows Update, as well as the software update features in the other programs that you use every day.
2) Be password smart.
As tempting as it is to use the same password in multiple places, don't. And use longer passwords, too-they're harder to crack. If you have lots of accounts to manage, use a password manager. (See "GPUs Power Games, Crack Passwords," for more on this issue.)
3) Use security software.
That may seem self-evident, but it can help block malware or software that is acting suspiciously, and security software companies are hard at work devising new ways to stop infections be¬¬fore they ever reach your PC. Check our antivirus and security software page regularly for the latest on security products.
4) If it sounds too good to be true... well, you know the rest.
No, someone in a faraway land isn't really offering you millions of dollars. No, attractive women from Russia probably aren't seeking you out specifically. No, those aren't magic cure-all pills.
5) Assume that everyone's out to get you.
PC security is one area where it pays to be paranoid. Just remember that no security software is fail-safe, and that you're still the one sitting at the keyboard. Assume that no site is safe. And don't automatically trust a link or file download, even if a friend sends it to you.
And a few final thoughts:
From Eric Howes, director of research services for security firm GFI Software:
"The user is always the weak link. Even the best antimalware protection and security patches cannot protect a PC from malware if the user sitting at the keyboard is being irresponsible while surfing the Web."
From Roger Thompson, chief research officer, PC security firm AVG:
"Good software designed to detect this stuff (in our case, LinkScanner) helps, but unfortunately, these are areas where the problem is in relative infancy, and is going to get much worse."
INDEPENDENCE DAY SPECIALS
India was under British rule in the 19th century. A number of flags with varying designs were used in the period preceding the Indian Independence Movement by the rulers of different princely states; the idea of a single Indian flag was first raised by the British rulers of India after the rebellion of 1857, which resulted in the establishment of direct imperial rule. The first flag, whose design was based on western heraldic standards, was similar to the flags of other British colonies, including Canada and Australia; the blue banner included the Union Flag in the upper-left quadrant and a Star of India capped by the royal crown in the middle of the right half. To address the question of how the star conveyed "Indianness", Queen Victoria created the Knight Commander of the Order of the Star of India to honour services to the empire by her Indian subjects. Subsequently, all the Indian states received flags with symbols based on the heraldic criteria of Europe.
In April 1921, Mohandas Karamchand Gandhi wrote in his journal Young India about the need for an Indian flag, proposing a flag with the charkha or spinning wheel at the centre.The idea of the spinning wheel was put forth by Lala Hansraj, and Gandhi commissioned Venkayya to design a flag with the spinning wheel on a red and green banner, the red colour signifying Hindus and the green standing for Muslims. Gandhi wanted the flag to be presented at the Congress session of 1921, but it was not delivered on time, and another flag was proposed at the session. Gandhi later wrote that the delay was fortuitous since it allowed him to realise that other religions were not represented; he then added white to the banner colours, to represent all the other religions. However, soon the Sikhs wanted the banner to include the black colour and Gandhi was forced to address these issues in his writings and speeches. Finally, owing to the religious-political sensibilities, in 1929, Gandhi moved towards a more secular interpretation of the flag colours, stating that red stood for the sacrifices of the people, white for purity, and green for hope.
On 13 April 1923, during a procession by local Congress volunteers in Nagpur commemorating the Jallianwala Bagh massacre , the Swaraj flag with the spinning wheel, designed by Venkayya, was hoisted. This event resulted in a confrontation between the Congressmen and the police, after which five people were imprisoned. Over a hundred other protesters continued the flag procession after a meeting. Subsequently, on the first of May, Jamnalal Bajaj, the secretary of the Nagpur Congress Committee, started the Flag Satyagraha, gaining national attention and marking a significant point in the flag movement. The satyagraha, promoted nationally by the Congress, started creating cracks within the organisation in which the Gandhians were highly enthused while the other group, the Swarajists, called it inconsequential. Finally, at the All India Congress Committee meeting in July, at the insistence of Jawaharlal Nehru and Sarojini Naidu, Congress closed ranks and the flag movement was endorsed. The flag movement was managed by Sardar Vallabhbhai Patel with the idea of public processions and flag displays by common people. By the end of the movement, over 1500 people had been arrested across all of British India.
While the flag agitation got its impetus from Gandhi's writings and discourses, the movement received political acceptance following the Nagpur incident. News reports, editorials and letters to editors published in various journals and newspapers of the time attest to the subsequent development of a bond between the flag and the nation. Soon, the concept of preserving the honour of the national flag became an integral component of the freedom struggle. While Muslims were still wary of the Swaraj flag, it gained acceptance among Muslim leaders of the Congress and the Khilafat Movement as the national flag. Detractors of the flag movement, including Motilal Nehru, soon hailed the Swaraj flag as a symbol of national unity. Thus, the flag became a significant structural component of the institution of India. In contrast to the subdued responses of the past, the British Indian government took greater cognisance of the new flag, and began to define a policy of response. The British parliament discussed public use of the flag, and based on directives from England, the British Indian government threatened to withdraw funds from municipalities and local governments that did not prevent the display of the Swaraj flag. The Swaraj flag became the official flag of Congress at the 1931 meeting. However, by then, the flag had already become the symbol of the independence movement.
Indian Flag, the first stamp of independent India, released on 21 Nov 1947, was meant for foreign correspondence.[15][16]A few days before India gained its freedom in August 1947, the Constituent Assembly was formed. To select a flag for independent India, on 23 June 1947, the assembly set up an ad hoc committee headed by Rajendra Prasad and including Maulana Abul Kalam Azad, Sarojini Naidu, C. Rajagopalachari, K. M. Munshi and B.R. Ambedkar as its members. On 14 July 1947, the committee recommended that the flag of the Indian National Congress be adopted as the National Flag of India with suitable modifications, so as to make it acceptable to all parties and communities.
The spinning wheel of the Congress flag was replaced by the Chakra (wheel) from the Lion Capital of Ashoka. According to Sarvepalli Radhakrishnan, the chakra was chosen as it was representative of dharma and law. However, Nehru explained that the change was more practical in nature, as unlike the flag with the spinning wheel, this design would appear symmetrical. Gandhi was not very pleased by the change, but eventually came around to accepting it. The flag was proposed by Nehru at the Constituent Assembly on 22 July 1947 as a horizontal tricolor of deep saffron, white and dark green in equal proportions, with the Ashoka wheel in blue in the centre of the white band. Nehru also presented two flags, one in Khadi-silk and the other in Khadi-cotton, to the assembly. The resolution was approved unanimously.
It served as the national flag of the Dominion of India between 15 August 1947 and 26 January 1950, and has served as the flag of the Republic of India since then.