solartech company

solartech company

Friday, March 13, 2015

safeguare your bank.


Hackers Stole $300 Million from 100 Banks Using Malware
Despite increased online and mobile banking security, banks are more often being targeted by hackers. A hacker group has infiltrated a number of banks and financial institutions in several countries, stealing hundreds of Millions of dollars in possibly the biggest bank heist the world has ever seen.

According to a report published by the New York Times on Saturday, hackers have stolen as much as $1 Billion from more than 100 banks and other financial companies in almost 30 nations, making it "the most sophisticated attack the world has seen to date."

In late 2013, banks in Russia, Japan, Europe, the United States and other countries fell victim to a massive, sophisticated malware hack that allowed the hackers to spy on bank officials in order to mimic their behavior, according to an upcoming report by Kaspersky Labs received by the NY Times.

CARBANAK BANKING MALWARE IN THE WILD
In order to infect bank staffs, the hacker group sent malicious emails to hundreds of employees at different banks. Once open, the email downloads a malware program called Carbanak, that allegedly allowed perpetrators to transfer money from the banks to fake accounts or ATMs monitored by criminals.
CARBANAK BANKING MALWARE
The exact figure of the stolen amount is unclear, though, according to the cybersecurity firm, the total theft could be more than $300 Million. Because, the hackers only swiped $10 million at a time and some banks were targeted more than once.
"This is likely the most sophisticated attack the world has seen to date in terms of the tactics and methods that cybercriminals have used to remain covert," Chris Doggett, manager of Kaspersky's North American office in Boston, told the Times.
However, the cyber security firm does not name the banks and financial institutions involved in the massive theft operation in its report. But, the interesting part is that no banks have come forward to reveal that they have been hacked in this largest theft.
CARBANAK BANKING MALWARE
HISTORY OF CYBER HEIST
This is not first time when hackers have made banks and financial institutions as their target. In past, they had carried out a number of bank crimes. The list is given below:
  • In March, 2012 - A Russian hacker was sentenced to two years in US prison for his involvement in a global bank Million Dollar Fraud scheme that used hundreds of phony bank accounts to steal over $3 million from dozens of U.S.accounts. He was responsible for the Zeus banking malware that was used to carry out the fraud.
  • In October, 2012 - FBI arrested 14 people who used cash advance kiosks at casinos located in Southern California and Nevada and robbed over $1 million from Citibank.
  • In May, 2013 - A gang of cyber-criminals operating in 26 countries stole $45 Million by hacking into the database of prepaid debit cards, making it the biggest bank robbery in the history.
  • In July, 2013 - A hacker group allegedly broke into the computer networks of more than a dozen of major American and International corporations and stole 160 million credit card numbers over the course of 7 years, making it the largest data theft case ever prosecuted in the U.S.
  • In October, 2013 - The Dutch police arrested four people who used TorRat Malware to target two out of three major Banks in the Netherlands and stole over Millions of Dollars from Banking Accounts.
Posted by Solartech at 1:11 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

usb that can kill you.

Can Hackers turn a remote computer into a bomb and explode it to kill someone, just like they do in hacker movies? Wait, wait! Before answering that, Let me tell you an interesting story about Killer USB drive:

A man walking in the subway stole a USB flash drive from the outer pocket of someone else's bag. The pendrive had "128" written on it. After coming home, he inserted the pendrive into his laptop and instead discovering any useful data, he burnt half of his laptop down. The man then took out the USB pendrive, replaced the text "128" with "129" and put it in the outer pocket of his bag… Amen!

I’m sure, you would really not imagine yourself being the 130th victim of this Killer perdrive, neither I.

This above story was told to a Russian researcher, nicknamed Dark Purple, who found the concept very interesting and developed his own computer-frying USB Killer pendrive.

He is working with electronic manufacturing company from where he ordered some circuit boards from China for creating his own USB killer stick.
"When we connect it up to the USB port, an inverting DC/DC converter runs and charges capacitors to -110V," the researcher explained. "When the voltage is reached, the DC/DC is switched off. At the same time, the field transistor opens."
Killer USB hacking
At last, he successfully developed a well functioning USB killer pendrive which is able to effectively destroy sensitive components of a computer when plugged-in.
"It is used to apply the -110V to signal lines of the USB interface. When the voltage on capacitors increases to -7V, the transistor closes and the DC/DC starts. The loop runs till everything possible is broken down. Those familiar with the electronics have already guessed why we use negative voltage here."
It is not possible for hardware to prevent all damage to physical systems in some scenarios. It may be possible for an attacker to exploit SCADA vulnerabilities and remove safety controls used by power plants or put it into an unstable state.
exploit SCADA vulnerabilities
Stuxnet worm is one of the real example of such cyber attacks, which was designed to destroy centrifuges at the Nuclear facility and all this started from a USB drive.
Also in 2014, a security firm demonstrated an attack on Apple’s Mac computer by overriding temperature controls, which can actually set the machine on fire.

So if we say that a computer could be converted into a bomb, then of course it’s true, a hacker can probably make your computer explode as well.

Therefore, next time when you find an unknown USB flash drive, just beware before inserting it into your laptop. Because this time it will not fire up your important files or data stored on your laptop like what malwares do, instead it will fire up your Laptop.
Posted by Solartech at 12:54 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Thursday, March 12, 2015

medical tips.

Taking alcohol while taking paracetamol can adversely affect the liver.
Posted by Solartech at 8:38 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Nigerian pdp politics

BREAKING!!!
GHOST TENSION IN ASO ROCK AS PDP NATIONAL CHAIRMAN TENDERS RESIGNATION LETTER
While the various State Chapters of the Peoples Democratic Party (PDP) wax stronger with hopes of winning the States they currently lead, especially the South South States; information filtering in from the nation’s capital is that the National leadership is currently in disarray.
A source close to the presidency squealed to Secrets Reporters that there was high tension in Aso Rock on Wednesday as its National Chairman, Adamu Mua’zu have finally bowed to pressure from his Northern brothers to resign his enviable position. We reliably gathered that Muazu complained bitterly to President Goodluck on Monday over the insult meted out to his people by his wife, Dame Patience Jonathan where she denigrated their culture and insulted their people. He reportedly told the President that he wants the party to disown the stand of the First Lady through the publicity National Secretary, Olisa Metuh, but this request was allegedly turned down by the President who explained that it would cause disaffection, an action which infuriated Muazu
According to the source, Muazu have been under fire especially from the traditional rulers to either choose his allegiance to the party or his people. In a clear case of loyalty, he was said to have gone to Aso Rock today to tender his resignation letter after complaining how Gov. Ayo Fayose of Ekiti State and the Director of Media and Publicity, Fani Kayode making mockery of the campaign strategy. "Fani- Kayode & Ayo Fayose have destroyed all our campaign strategies. They have turned PDP to an opposition party." He stated.
The presidency is currently jittery and pleading with him to take back his job, stating that this action is enough to cause the PDP massive loss in the presidential election. Barring any change in plan, the party boss will be bidding final farewell on Friday.
Muazu is expected to meet with Northern leaders on Friday to discuss the over some yet to be disclosed discussion, squealed a source close to him.
"BREAKING!!!

GHOST TENSION IN ASO ROCK AS PDP NATIONAL CHAIRMAN TENDERS RESIGNATION LETTER

While the various State Chapters of the Peoples Democratic Party (PDP) wax stronger with hopes of winning the States they currently lead, especially the South South States; information filtering in from the nation’s capital is that the National leadership is currently in disarray.

A source close to the presidency squealed to Secrets Reporters that there was high tension in Aso Rock on Wednesday as its National Chairman, Adamu Mua’zu have finally bowed to pressure from his Northern brothers to resign his enviable position. We reliably gathered that Muazu complained bitterly to President Goodluck on Monday over the insult meted out to his people by his wife, Dame Patience Jonathan where she denigrated their culture and insulted their people. He reportedly told the President that he wants the party to disown the stand of the First Lady through the publicity National Secretary, Olisa Metuh, but this request was allegedly turned down by the President who explained that it would cause disaffection, an action which infuriated Muazu

According to the source, Muazu have been under fire especially from the traditional rulers to either choose his allegiance to the party or his people. In a clear case of loyalty, he was said to have gone to Aso Rock today to tender his resignation letter after complaining how Gov. Ayo Fayose of Ekiti State and the Director of Media and Publicity, Fani Kayode making mockery of the campaign strategy. "Fani- Kayode & Ayo Fayose have destroyed all our campaign strategies. They have turned PDP to an opposition party." He stated.

The presidency is currently jittery and pleading with him to take back his job, stating that this action is enough to cause the PDP massive loss in the presidential election. Barring any change in plan, the party boss will be bidding final farewell on Friday.
Muazu is expected to meet with Northern leaders on Friday to discuss the over some yet to be disclosed discussion, squealed a source close to him."

More stories
Posted by Solartech at 6:51 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

India's biggest bank aims to cut bad debt with huge online property auction

Thu Mar 12, 2015 8:51am EDT
  • Tweet
  • inShare
  • Share this
  • Email
  • Print
* State Bank of India holds $200 mln auction
* Selling 300-plus properties
* Indian banks struggle to recover bad debt
By Devidutta Tripathy
MUMBAI, March 12 (Reuters) - India's largest bank will hold a record online auction this weekend to sell repossessed flats, warehouses and offices worth a total of nearly $200 million as the state lender seeks to chip away at its $10 billion mountain of bad debt.
The State Bank of India auction will be the biggest nationwide online sale to date and is a rare public move to turn distressed loans into ready cash.
It comes weeks ahead of rule changes that will force Indian banks to take on much larger provisions for such loans, with what were previously labelled as restructured debts being reclassified in accounts as bad debt.
Including both bad and restructured debt, more than a tenth of Indian bank loans have soured. India Ratings and Research, part of the Fitch agency, estimates impaired loans could hit 13 percent of the total by March next year.
That has left debt-burdened banks scrambling for cash, even resorting to flash sales of repossessed properties that on their own can be worth as little as a few thousand dollars.
"We are now a lot more aggressive," said Parveen Kumar Malhotra, a deputy managing director at SBI, who leads a special unit managing stressed assets.
"We are in a better position to do all the things required, from (phone) calls to auctions and everything in between, including legal cases."
UNDER PRESSURE
India's state-owned banks have all have experienced a jump in bad loans over the past two years as borrowers, particularly companies, struggled to service loans when the economy slowed.
With less cash from the government and new global prudential rules on the horizon, Indian banks are under increased pressure to clean up their balance sheets.
SBI's sale pulls together more than 300 pieces of property from two dozen Indian cities in what its advertising described as a "mega e-auction" of prime commercial and residential properties, many of which were put up as collateral by fledgling entrepreneurs.
Efforts by Indian banks to claw back bad debt have been complicated by the country's lack of a bankruptcy code. Central bank data shows that, as of March last year, Indian lenders had received only 16 percent of the value of loans they had sought to recover through tribunals.
SBI itself was involved in one of the most high-profile cases in recent years after the collapse of Kingfisher Airlines, which still owes banks $1.5 billion. Creditors, led by SBI, took possession of Kingfisher offices in Mumbai last month after trying for almost two years.

Overseas, options for banks have included packaging the loans and selling them to other businesses that will seek to recover the cash. But such sales in India were badly hit after rules tripled the upfront payment for buyers of bad debt. ($1 = 62.4579 Indian rupees) (Editing by Clara Ferreira Marques and David Goodman)
Posted by Solartech at 6:30 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Wednesday, March 11, 2015

HOW TO ENTER BISS KEY FOR DESCRAMBLING TV3 GHANA ON QSAT AND STRONG DECODER
Good morning guys out there I had been away from the forum since our dearest dongles has started on/off while CCCAM account were dead totally I thought QSAT will battle it out with DSTV when QSAT is up and running with great stability following 50% increment of the avatarcam account but QSAT is still off and view days later DSTV also announced increment of the subscription which there's no option fortheir customers due monopoly on this business we pray and hope to have our dongles and iks account back on air shortly we are all sorry for the inconvenience.
Many people find it difficult to watch football on free to air package like TV3 GHANA, IRIB FROM IRAN AND SUPER SPORT 3 FEED ON DAARSAT POSITION I will insh'ALLAH drop how to enter biss key on major decoder
PRE-REQUISITES TO FOLLOW
-first you must know the frequency and the symbol rate use to scan the channel into your decoder and it's not require on some decoder like 4922,4669X series pls note that your decoder must be MPEG4 designed or better use any HD decoder like 4922,4950 and QSAT
- Tune to any of the channels you want to descrambling e.g tv3 or irib
STEP TO FOLLOW ON QSAT, SPEED HD S1 AND SS SAT
-Press Menu
-Goto Settings press OK button
-Scroll to XCAM setup press OK button
- press OK button on PATCH
- Press red button to add or enter frequency press blue button to confirm leave untouchable SID skip to the line to enter the biss key press blue button to confirm then you are done press exits to the normal screen note that you must enter the key correctly if not the channel will remain scramble and you must interchange the channel if it doesn't come up or better off and power on it again
STEP TO FOLLOW ON STONG DECODER
- press 8280 on 4669X, 4669XII, 4922, and 4940 but if you are using 4950 press F1+ 8280
-add or edit the key no needs to add frequency but on 4950 you will need to press F1 to add or edit the frequency you use to scan the channel then you must select OK to confirm at the left button corner of any operation only on 4950 after you fill the key as shown in the picture press the exit button to the screen interchange the channel if doesn't open or better off and on the decoder again so you are done to enjoy of the channel
Feel free to contact me on omokunmiayoola@gmail.com or on whatsapp +2348036143281 or Skype @ayokunmi8 and on wechat@ayokunmi4iksdongle
Omokunmi Ayoola's photo.
Omokunmi Ayoola's photo.
Like · 
Posted by Solartech at 2:26 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
HOW TO ENTER BISS KEY FOR DESCRAMBLING TV3 GHANA ON QSAT AND STRONG DECODER
Good morning guys out there I had been away from the forum since our dearest dongles has started on/off while CCCAM account were dead totally I thought QSAT will battle it out with DSTV when QSAT is up and running with great stability following 50% increment of the avatarcam account but QSAT is still off and view days later DSTV also announced increment of the subscription which there's no option fortheir customers due monopoly on this business we pray and hope to have our dongles and iks account back on air shortly we are all sorry for the inconvenience.
Many people find it difficult to watch football on free to air package like TV3 GHANA, IRIB FROM IRAN AND SUPER SPORT 3 FEED ON DAARSAT POSITION I will insh'ALLAH drop how to enter biss key on major decoder
PRE-REQUISITES TO FOLLOW
-first you must know the frequency and the symbol rate use to scan the channel into your decoder and it's not require on some decoder like 4922,4669X series pls note that your decoder must be MPEG4 designed or better use any HD decoder like 4922,4950 and QSAT
- Tune to any of the channels you want to descrambling e.g tv3 or irib
STEP TO FOLLOW ON QSAT, SPEED HD S1 AND SS SAT
-Press Menu
-Goto Settings press OK button
-Scroll to XCAM setup press OK button
- press OK button on PATCH
- Press red button to add or enter frequency press blue button to confirm leave untouchable SID skip to the line to enter the biss key press blue button to confirm then you are done press exits to the normal screen note that you must enter the key correctly if not the channel will remain scramble and you must interchange the channel if it doesn't come up or better off and power on it again
STEP TO FOLLOW ON STONG DECODER
- press 8280 on 4669X, 4669XII, 4922, and 4940 but if you are using 4950 press F1+ 8280
-add or edit the key no needs to add frequency but on 4950 you will need to press F1 to add or edit the frequency you use to scan the channel then you must select OK to confirm at the left button corner of any operation only on 4950 after you fill the key as shown in the picture press the exit button to the screen interchange the channel if doesn't open or better off and on the decoder again so you are done to enjoy of the channel
Feel free to contact me on omokunmiayoola@gmail.com or on whatsapp +2348036143281 or Skype @ayokunmi8 and on wechat@ayokunmi4iksdongle
Omokunmi Ayoola's photo.
Omokunmi Ayoola's photo.
Like · 
Posted by Solartech at 2:21 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Tuesday, March 10, 2015

Uu

10 VPN service providers who provide privacy and security

Virtual Private Network -VPN is a network technology which links the private network over internet using encryption methods. VPN is generally preferred by corporates, educational institutions, Government agencies and private citizens to facilitate easy access of remote users to secured private networks. VPN is economical as it is much cheaper when compared to private networks, it provides flexibility, not only that VPN users can maintain their anonymity as well as protect themselves from being snooped. VPN works on 4 protocols:
  • IP security (IPSec): IPSec utilizes two methods to encrypt its user’s data :a) transport mode or b) tunneling mode. Transport mode means encryption of  message within the data packet also termed as Payload. Tunneling mode means encryption of the entire data packet.
  • Point-To-Point Tunneling Protocol (PPTP): This is the most widely used protocol; PPTP uses the tunneling method wherein PPTP stores data within the PPP packets which are further stored inside the IP packets which are transported to their destination.
  • Layer 2 Tunneling Protocol (L2TP): It works on two  major features: L2TP Access Concentrator (LAC) and  L2TP Network Server (LNS). LAC: this is a device which terminates the call and LNS: this authenticates the PPP packets as seen earlier in the PPTP.
  • Transport Layer Security (TLS) and Secure Sockets Layer (SSL) i.e. TSL/SSL: This method uses a combination of the authentication and encryption methods which leads to transportation of the data between the servers and client.
There are several VPN service providers which vary in the way the data is secured during its transit over the public network infrastructure. Out of the various VPN providers, Techworm brings you the Top 10 VPN service provide you with privacy and data security :

TorGuard:

No logs are monitored. In addition to a strict “no logging policy” TorGuard also provides second layer of data security with a shared IP configuration due to which it becomes next to impossible to trace the user’s IP address. TorGuard VPN has multiple Socks proxy servers and VPN’s around the world. The entire data is wrapped into single packet by encryption via  tunnel method through secure servers and then this data is again connected to the BitTorrent cloud which gives it the second layer of insulation from being attacked. TorGuard currently maintains 1000+ servers in over 44 countries across the world and are in continuous expansion. TorGuard retains its control on all hardware though it seeks partnerships with data centers who can adhere to strict security criteria. All servers are arranged and managed exclusively by TorGuard’s in house networking team through a single, secure key. TorGuard advises its clients to use OpenVPN connections only and for encryption use AES256 with 2048bit RSA for better security. URL : bit.ly/torguardvpn

Mullvad

Logs are not monitored. Here again a second layer of data security is ensured by making users to share their IP addresses both for IPv4 and IPv6.  Users are normally not monitored however only in case of extreme network abuse the basic tools are used to tackle such network exploitation. This service does not maintain any personal information of the user. It supports BitTorrent. Open VPN using Mullvad client program is the most secured VPN connection. Mullvad assigns a unique number to each downloaded program. This account number identifies user’s account which can be used to make payments and to enable the program to connect. Due to the unique number assigned it helps in the security of the data. URL : mullvad.net/en

IPVanish

This creates a secure environment for day to day web usage. Before user logs onto the net, it is essential to establish IPVanish VPN connection, which will convert entire online data into encrypted tunnel including emails, data transfers, online banking, instant messaging and all online browsing. The encrypted data cannot be intercepted by any third party including  ISP (Internet Service Provider). It supports P2P traffic. It uses OpenVPN, L2TP, and PPTP Protocols for its operations. URL : bit.ly/ipvanis

LiquidVPN

Logs are not retained. LiquidVPN  uses the ‘Modulating IP’ technology, wherein the user’s IP address is changed continuously making it very difficult to track the actions of user on internet. Added to this  is the use of shared IPs, great encryption standards, and a very low starting price. For mitigation of network abuse the SNMP and Mikrotik Layer 7 firewall rules works at hardware level and Zabbix and OSSEC at host level. Their data centers are on short term lease across the world. URL : liquidvpn.com

BTGuard

This service is based on proxy service where the user is able to hide their true IP address from the rest of the world. This is a service specially built for the BitTorrrent users to protect their anonymity. BTGuard was just a basic proxy service that user would need to configure to avail the BitTorrent service however now BTGuard is becoming a handy tool with its easy to install software to protect their anonymity. BTGuard also has an encryption tunnel software for users who require special security for their data. BTGuard stores username, password and e-mail addresses however the IP addresses are never stored. URL : btguard.com

BolehVPN

It hides true location of the user by encrypting and encapsulating the entire data which passes through the VPN hence making it difficult for the snoopers or the third party to intercept or decode the internet traffic. Various features of  BolehVPN can be listed as : it protects the user by masking the IP address, the data is encrypted throughout i.e. to and fro when it passes the VPN server, it accelerates the P2P, It also hides the true location of user due to which user appears to hail from a different location and last it also helps users to bypass certain corporate firewalls. It is based on Open VPN and SSL VPN. URL : bolehvpn.net

HideIPVPN

It is based on combination of  PPTP, SSTP, L2TP, IPSec, OpenVPN and SmartDNS. It is compatible with a huge list of operating systems Windows, Mac, Linux, Routers etc. HideIPVPN offers a very high quality of anonymity to its users on the internet wherein user can access even the blocked websites, surf the web anonymously, hide the IP address and encrypt user’s data. HideIPVPN does not restrict access to any online sites or services. All data going out and coming in via VPN is encrypted, secured and it also hides IP address which  means one can safely access secure websites without anyone intercepting the connections. The encrypted data is hidden from user’s ISP and network administrator too which means only user and the destination will be able to see what is being sent. SmartDNS service helps the user to access more than 35 online media services from around the world hence it is ideal for anyone who has limited cable access to TV channels, by using HideIPVPN user can change their DNS name and hence get easy access to the blocked TV / media servers. URL : hideipvpn.com

SlickVPN

An IP address acts as a digital signature which helps to detect the location of the user to any website or to the Internet Service Provider i.e. ISP. SlickVPN hides the true IP address of user by assigning them an anonymous one hence enabling user to hide their location from snoopers. If any user connects to SlickVPN, a connection will be created between user’s computer and our servers. SlickVPN encrypts any data transmissions or online activity so that user’s presence is anonymous; in addition the connection is also secured by SlickVPN so that the Internet activity, usernames, passwords, emails, instant messages, downloads, uploads, etc. are shielded from third party. URL : slickvpn.com

Unspyable

This uses an Off-Shore VPN service wherein VPN encrypts the entire internet connection and creates an encrypted tunnel between the user’s computer and the server chosen by user from the preferred list of servers. Now whenever user browses the internet, all the web sites which user visited would see the address of the remote server and not the real IP address of the user. Due to the encrypted tunnel between user and server, user’s IP address is now anonymous. Hence none of user’s information is available on the local network nor to the local ISP or to government censors and monitoring. For users who want a higher security Unspyable also offers the Multiple Hop VPN wherein just as in Off Shore VPN the data is made to pass through a multiple off shore hops / servers which is very difficult to crack. Major benefits of this VPN :Provide secure and private offshore email logs which is not saved or monitored, correspondence is secured using hot spots, Anonymity of IP address. URL : unspyable.com

NordVPN

This provides a great 256bit AES OpenVPN protection and there are PPTP and L2TP/IPSec connections available. As soon as user connects to the NordVPN a tunnel is created between user and the server and all the data in this route is encrypted. NordVPN is also one of the only VPNs to allow Tor over VPN and has a double-hop encryption system which cannot be cracked. Tor over VPN is an advanced privacy solution provided by NordVPN.
The basic principle here : User first connects to NordVPN server which then routes all traffic through a widely known Tor network. Here the data is encrypted within NordVPN layer at the initial stage and later sent to the Tor network. The Tor is more safer for privacy as the encrypted data is made to route through a few Tor hops and finally reach its destination helping in maintaining the anonymity of user’s vital information and also DNS traffic is also routed through the Tor network user’s will be able to access ” .onion websites” or the hidden websites just using NordVPN. URL : nordvpn.com
The above are the top VPN services that we like, however there may be others which are better those given above. If you have found a better VPN service, drop the name of the provider in the comments section so it can help other users to stay secure and private.
Posted by Solartech at 9:24 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, March 9, 2015

A Complete Guide about Solar Panel Installation. Step by Step Procedure with Calculation and Images

solar Panel Installation: Step by Step Procedure

A-Complete-Note-on-Solar-Panel-Installation.-Calculation-about-No-of-Solar-Panels-batteries-Rating-Backup-time-InverterUPS-Rating-Load-and-required-WattsA Complete Guide about Solar Panel Installation
A Complete Note on Solar Panel Installation. Calculation about No of Solar Panels, batteries Rating / Backup time, Inverter/UPS Rating, Load and required Watts. with Circuit Diagrams.
If you pick this post related to solar panel installation, You will be able to;
→ To calculate the no of solar panel (with rating)

→ To calculate the rating of Solar panel
→ To calculate the rating of batteries for Solar panel system
→ To calculate the back up time of batteries

→ To calculate the charging current for batteries
→ To Calculate Charging time for batteries
→ UPS Rating for load requirement and much more…
Before starting, We recommend to read this Article about Solar panel installation and Photovoltaic Pane Selection for home.
PV: Types of Solar Panel and Which one is the best PV Panel
 
 Now lets begin,
Suppose,
Load = 800 Watts
Inverters Rating =?
Required Backup time for batteries = 3 Hours
Required No of Solar Panel =?
No of batteries =?
 
Solution:
Inverter should be greater 25% than the total Load
800 x (25/100) = 200
800+200 = 1000 Watts
This is the rating of the UPS (Inverter)
 
Now the required Back up Time in Hours = 3 Hours
Suppose we are going to install 100Ah, 12 V batteries,
12V x 100Ah = 1200 Wh
Now for One Battery (i.e. the Backup time of one battery)
1200 Wh / 800 W = 1.5 Hours
But our required Backup time is 3 Hours.
Therefore, 3/1.5 = 2→ i.e. we will now connect two (2) batteries each of 100Ah, 12V.
If the number of batteries given, and you want to know the Backup Time for these given batteries, then Use this formula.
 1200 Wh x 2 Batteries = 2400 Wh
 2400 Wh / 800 W = 3 hours.
So this is a 12 V inverter system, Now we will install two (2) batteries (each of 12V, 100 Ah) in Parallel.

Why Batteries in Parallel, not in Series?

Because this is a 12Vinverter System, so if we connect these batteries in parallel, then the Voltage of batteries (12 V) remains same, while it’s Ah (Ampere Hour) rating will be increase
(Remember: In parallel Connection, Voltage will be same in each wire or section, while current will be different i.e current is additive e.g. I1+I2+I3…+In = 100Ah +100Ah = 200Ah
In Series Circuits, Current is same in each wire or section while voltage is different i.e. Voltage is additive e.g.V1+V2+V3….Vn..
For The above system if we connect these batteries in series instead of parallel, then
The rating of batteries become V1+V2 = 24V while the current rating would be same i.e.100Ah.
 
We will now connect 2 batteries in parallel (each of 100Ah, 12V)
Therefore for 2 Batteries,
200 Ah 12V,
Now Required Charging Current for these two batteries.
 (Charging current should be 1/10 of batteries Ah)
200Ah x (1/10) = 20A
Now the required No of Solar Panels
P = VI
P = 12V x 20 A
P = 240Watts
 
This is our required watts for solar panel (only for battery charging, and then battery will supply power to the load)
Now
240W/60W = 4 Solar panels
 
Therefore, we will connect 4 Solar Panels (each of 60W,12V,5A) in parallel.
Circuit Diagram for the above Calculation for Solar Panel Installation
Click image to enlarge
Solar Panel Installation
This was only for battery Charging (and then battery will supply power to the desired Load) i.e. for those electrical appliances, which will get power through inverter (from charged batteries)
Now suppose there is some (Directly connected to the panels through inverters (without battery) load about 10A, which we have connect directly to the solar panel (No batteries required)
In this case, required current (20 A for Batteries Charging and 10 A for direct connected load through Inverters during sunshine only but batteries will be also charging while panel supply power to the direct connected load.  
In this case, total current,
20A + 10 A = 30A
Now I = 30 A, then required Power
P = V x I = 12V x 30A = 360Watts
(This is for both Direct Load and Batteries Charging)
Now,
360/60W = 6
Therefore, we will Connect 6 No of Solar panels (each of 60W, 12V,5A)
And We use Charge Controller about ampere rating i.e, the charging current for 200Ah battery is 20-22 Amperes (22A (For Battery Charging)+10A(for direct DC Load)…So we can use a charge controller about 30-32 Amp.
 Note: this calculation is base on ideal case, so it is recommended to always choose a Panel some bigger then we need. Because when Solar Panel charges the battery so it is wasting some power on charging too.
this is another Circuit Diagram for the above Calculation for Solar Panel Installation
Click image to enlarge
calculate the no of solar panel, rating of Solar panel & batteries , Charging time & current for Solar Panel Installation with image and calculations.
By: Engr Wasim Khan
Copyright material @ www.electricaltechnology.org/
You May Also Read
How much Watts Solar Panel We need for our Home Electrical appliances?
Easy Charging Time and Charging Current formula for Batteries (With Example of 120Ah Battery)
Posted by Solartech at 1:30 AM 27 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Facebook Badge

Sunday Owen Udoukpong

Create Your Badge

Facebook Badge

Sunday Owen Udoukpong

Create your badge

About Me

Solartech
View my complete profile

Blog Archive

  • ►  2023 (3)
    • ►  November (1)
    • ►  June (2)
  • ►  2017 (3)
    • ►  August (3)
  • ►  2016 (5)
    • ►  December (2)
    • ►  October (1)
    • ►  July (2)
  • ▼  2015 (12)
    • ▼  March (11)
      • safeguare your bank.
      • usb that can kill you.
      • medical tips.
      • Nigerian pdp politics
      • India's biggest bank aims to cut bad debt with hu...
      • HOW TO ENTER BISS KEY FOR DESCRAMBLING TV3 GHAN...
      • HOW TO ENTER BISS KEY FOR DESCRAMBLING TV3 GHAN...
      • Uu
      • A Complete Guide about Solar Panel Installation. S...
      • Fight Against Boko Haram: The Untold Story Of US I...
      • You can Turn Your Smartphone into Mouse To Control...
    • ►  February (1)
  • ►  2014 (12)
    • ►  May (1)
    • ►  March (3)
    • ►  February (5)
    • ►  January (3)
  • ►  2013 (14)
    • ►  December (7)
    • ►  November (7)
  • ►  2011 (1)
    • ►  March (1)

Followers

call 2348034416506

Name

Email *

Message *

Awesome Inc. theme. Powered by Blogger.