Skip to main content

Precautionary Guidelines for Mobile Users.

Important for All mobile phone users. Very Useful.

Mobile users are advised to take following precautionary measures while using a mobile handset:

1. Keep distance – Hold the cell phone away from body to the extent possible.

2. Use a headset (wired or Bluetooth) to keep the handset away from your head.

3. Do not press the phone handset against your head. Radio Frequency (RF) energy is inversely proportional to the square of the distance from the source -- being very close increases energy absorption much more.

4. Limit the length of mobile calls.

5. Use text (SMS) as compared to voice wherever possible.

6. Put the cell phone on speaker mode.

7. Use your phone where reception is good. If the radio signal is weak, a mobile phone will increase its transmission power. Find a strong signal and avoid movement.

8. Metal water are good conductors of radio waves so avoid using a mobile phone while wearing metal-framed glasses or having wet hair.

9. Let the call connect before putting the handset on your ear or start speaking and listening – A mobiles phone first makes the communication at higher power and then reduces power to an adequate level. More power is radiated during call connecting time.

10. If you have a choice, use a landline (wired) phone, not a mobile phone.

11. When your phone is ON, don't carry it in chest/breast or pants pocket.
When a mobile phone is ON, it automatically transmits at high power every one or two minutes to check (poll) the network.

12. Reduce mobile phone use by children as a younger person will likely have a longer lifetime exposure to radiation from cell phones.

13. People having active medical implants should preferably keep the cell phone at least 15cm away from the medical implant.


While Purchasing a Mobile Handset check the SAR value of the mobile phone. It can be searched on internet if its model number and make is known.


14. The RF radiation is increased by Mobile phones when used in a car to overcome the window shielding.


15. It severely affects the reproductive systems of both male and females;deformity of unborn babies in the womb itself.
www.articlesbeam.com

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...