Connect with us

Technology

Will The XSR 155 Come To India This Festive Season?

Published

on

XSR 155

The XSR 155 is the most awaited Yamaha offering among youngsters and died-hard Japanese-tech heads ever since its launch in Thailand last year.

Why? , India has been known for its love For retro motorcycles. The Royal Enfield Lineup is an example, later on, the Jawa Lineup came matching the same pricepoint. Also, the RD’s and Rx’s lineup always had a Place in our hearts.

So when the JapaneseTitan offers a new retro or to be more precise. A “neo-retro” motorcycle, it’s sure it will get the welcome it deserves. If that doesn’t work for you may be the tech specs will. Yamaha’s 155cc lineup.

The track built R15 and the street-fighter legend MT-15 has a well-proven engine which is currently one of the most provenEngineswhich gives out the right power without recommending you to buy an entire gas station. Also, the Japanese offer better build quality which has been proven over the years.

XSR 155 – Power Delivery

Power Delivery XSR 155
Power Delivery XSR 155

So the XSR is built exactly the same as its brothers; the same liquid-cooled Single-cylinder 4-stroke(58mm-stroke) 4-valve fuel-injected bs6 SOHC 155cc engine coupled with a 6-speed gearbox(Wet multi-plate clutch) which has a slipper-clutch and clutch-assist feature, and that’s not all it also comes with a VVA (variable valve actuation) feature, so on paper, it gives out a peak power of 19.3ps power @10000rpm and 14.7Nm torque@8500rpm. Which as per the ThailandReviews gives enough juice for whatever you throw at it and you can keep up with the traffic even without much down-shifting.

Moreover, it’s said to have given upto48Kmplin real-life use and a max speed of 130Kmph.So slightly more than the MT-15owing to the Lighter body. Even though the engine is the Same, the performance comes down to the tuning and weight of the whole bike.

Though it’s a café-racer kind of design, the real place where the XSR shines over its brothers is the Rough roads, Unlike its brothers, the XSR comes with dual-purpose tubeless tires ( 100/80-17 front and 140/70-17rear), and probably the same sprocket from the MT-15Which has extra 4 teeth which enables the instant power delivery.

XSR 155 – Design and Constrains

Yamaha XSR 155 Bike
Yamaha XSR 155 Bike

Underneath that retro skin and the slight performance difference, it still shares the same aluminium delta-box frame. Even the alloy wheels (431.8mm front,431.8mm rear) and disc-brakes(282mm front220mm rear) are similar. Further into the details, yes, it’s a self-start (TCI) only. And unlike the Thailand version Indian version will probably get single-channel abs in the front(or maybe a dual-channel one, after all, Yamaha had disclosed the dual-channel option in the updated MT-15version) and box-type aluminium swing arm (single shock) in the back and also conventional telescopic forks in the front.

But comparing with the other 155 lineup Its quite similar. Coming to the electricals powered by a (Maintenance-free ETZ-5 12V 4Ah battery, it has an all-LEDsetup.Owing to the retro style you will get Circular headlamps and taillamps. The head-lamps (which is obviously not a projector-type)feature semi-circular all LED DRL, the headlight itself is split into two halves .

The top area hosting the low beam and the lower part hosting the high beam and pass light, which is quite similar to the one you see in the current Hasqvarna 250 lineup. Also, it includes a circular digital negative display speedometer Console which also includes an odometer, fuel gauge, gear indicator, low fuel warning, trip meter, clock, and low-oil indicator.

XSR 155’s Chassis

Coming to the chassis itself its 2000mm in length 805mm in width 1080mm in overall height and 810mmin seat height1330mm wheelbase 170mm ground clearance 2200mm turn radius. The bike offers a decent 10L fuel tank andThe entire bike just weighs about 134kg And is pretty small and nimble to handle. Also due to slightly lesser aggressive seating Position, long rides are easier achievable, still, the footpegs are slightly positioned to the back

Colours for XSR 155

Coming to the colors, it comes in one glossy Red-White color and three matte shades(Elegant Black, Premium-grey, and Olive Green)Out of which the Premium-grey comes with the one-piece brownish leather ribbed seats, others have similarly designed black seats.Which is overall comfortable even with a passenger in the pillion. Pillion foot-rests are also available and owing to the lesser aggressive seat position compared to the MT-15, the pillion also gets a comfortable ride.

Price and Availability ( India )

XSR 155 - 2020
XSR 155 – 2020

So, this whole package would be priced around 1.4lk or similar to the MT-15 price-tag Which sounds quite expensive for that segment, but overall you get a well-built light-weight motorcycle with good refinement and ergonomics with higher-capacity motorcycle features like VVA Moreover it’s a retro-styled motorcycle with quality perfectioned design which Yamaha itself is advertising as “Timeless Quality Impression”. After all, it has to live up to its predecessor 1960’s original XSR from where it derives its “sport heritage” stamp or it’ll have to at least live up to its bigger siblings like XSR 700 and XSR 900

Currently, due to the rising covid cases, the manufacturer is facing labor-related issues and the current manufacturing plants are far behind 50% in production. But the Yamaha sales have increased by as far as 17% his September and considering XSR is brought to more and more regions, last launched in Phillippines using the internet media platform, Yamaha could launch it in India.


This festive season, if not next year ( which is kind of a long wait, after all it was delayed thrice ie; last December, auto expo this February, and bs6 shift this April )

Jyothir Adithya is a Full-Time Mechanical Engineer who works and studies about Automobiles and their Technologies. He now Helps in writing about Automobile Technologies at The Tech Vamps.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Hacking – A Fullstop On E-system

Published

on

Hacking

Hacking – A Fullstop On E-system

Passion or Madness: Now days, it has become a passion to learn how to hack. Some of us do it for the sheer challenge, some for the sheer love for learning and new technologies. Regardless of what the reason is, with every hack someone is trying to improve the technology we rely on.

There are many hacking related skills one can learn, depending on the person and the type of hacking they want to do. As there are many opportunities and facets to the hacking world, it makes it complex to learn all things related to it.

But, it is never too late if you have the right information and the right techniques. In order to make sure that you have all the information you need, you can always study and learn hacking. The best part of it all is that, for all you know, you can be the next hacker that redefines the way we think about security.

Mentoring: There are many opportunities available for collaboration and snooping on hackers. If you have an interest in snooping on hackers or have the opportunity to learn from them, consider taking a class or participating in a workshops. You might be surprised how much knowledge they have about the technologies they use… and you can use what you’ve learned and put it to good use.

Sniffer: We have tools now that can let us track IP addresses. We can also tell how far away the IP address is from us, and we can sniff for firewalls, viruses, and other threats. We can also reveal a lot of other information about the person/company that we are dealing with.

Cache: We refer to the temporary files that store all the information that has been fetched over the net. Actually, the term ‘cache’ is a bit misleading. The information is not stored in order and there is no order to it. The information is usually stored in memory and while it is loading it is also stored in a temporary location so that it is not immediately discarded. The temporary location is emptied when the request for the information is finished and then the information is discarded.

Many hacking tools use a variety of modes of communication Protocols (Speakers, Morse code, Direct Sensing, etc.)

Protocols

•http which is a general term used for HTTP/ActiveX and often used by many InternetBrowsers, presents significant security risks. It is a specification supported by the Internet Engineering Task Force (IETF) and is responsible for the functioning of the World Wide Web. The primary concern of the IETF is the transfer of files and processes over the Internet.

The subsequent technologies, which are often but not always classified, follow between HTTP and TCP/IP and SPI.

Internet Protocol (IP)

•IP over SSL

• Internet Protocol (IP) is a set of protocols that offers Internet users the ability to communicate online using the TCP network. The IP protocol applies resource sharing and addressing methods among the computers on a network and is responsible for the flow of information exchanged during online transactions. Online users consists of computers that have been granted access by an Internet service provider (ISP).

Online Systems Management (OSMP)

•http://security.symantec.com/sscv6chery/hosts.htm

•http://www.cert.org/vul_notes/VN219|

o Virus Bulletin No. 9110 provides updates on viruses that are specific to the Microsoft IIS 5.0 Extended Validation SSL Certificate. This Microsoft SSL certificate enables you to secure private data that pass through, including documents, e-mail messages, and on to databases, which store user credentials and other private information. This certificate also enables your site to display a secured page now and later, when your users click a protected link.

The CSR data must be verified and properly transformed in the digital object before it can be authenticated and then encrypted. Therefore, to access the signed certificate, the user must have the Bit-Authentication turned on for the Microsoft Exchange 2007 Online Explorer (E), which comes with the SSL functionality.

Effects of Certificate Fraud

A fraudulent Certificate could cause several problems for the user. The certificate could be fraudulent in the sense that the name of the sender or any essential part of the signature block is misrepresented or false. Physical inspection of the AIA may also be performed by an authorized third party, such as an auditor, in order to confirm the fact that the web site is legitimate. If SSL authentication is possible and has been enabled on the site, the browser will display a padlock and indicate that an SSL certificate is secured.

Reasons to Prevent Certificate Fraud

The instances of certificate fraud may be reduced if users and businesses implement evolving strategies and are informed about how the security process & monitoring mechanisms work.

Continue Reading

Technology

How To Avoid Spyware Before It’s Too Late!

Published

on

Spyware

How To Avoid Spyware Before It’s Too Late!

Unfortunately, most people don’t pay much attention to the threat posed by spyware until their level of infection has become acute and their private information has been compromised. The final result is that they become subject to an identity theft attempt. New methods of attack are being developed all the time and you need to get up to speed on the subject and stay informed of changes as they occur in order to know how to protect yourself.

First of all, if you are a careless surfer you are living dangerously and eventually you will get nailed. The smart thing is to set your computer environment up with a secure defensive perimeter and to prevent unauthorized access to your computer and check out any personal information that you have stored on your hard disk. If you surf the web, open attachments or use peer to peer applications then you risk being victimized.

The statistics are staggering and reveal just some of the tremendous amount of personal information that is present across the internet. According to requirements imposed by the federal government, we can all be traced back to our IP address. With that information in the wrong hands, a lot of people have a lot of problems.

The only solution is to minimize your risk of exposure. This requires you to be careful about the type of information that you divulge while online. Don’t assume that you can just offload your personal information to sites that are willing to accept financial information. Sites that are willing to acquire your information will have an address that you can contact them to confirm their legitimacy.

Other risk factors include file sharing programs, so you should download and install programs like the well-known P2P file sharing programs like BeXTRA or CoolWebSearch that help you keep your computer free from harmful viruses, hackers and worms. Surfing anonymously will also help keep your privacy since no one will be able to trace you and your actions.

Why should you risk it?

Secure surfing is one of the best ways to protect your identity and personal information. It’s not hard to understand why most people begin to take a liking to the idea and begin to make regular trips to the local library to surf the internet and download files. The truth is that they should avoid these activities because it is possible that they are the victims of online thieves.

The trailblazing technology of today has helped to make the whole process much safer and understanding students to use the internet and avoid harmful viruses. However, these efforts have not been able to totally rid the internet of its infamous reputation as a source of crimes and victim of fraud. Users that have criminal intent will never be able to track you using your IP address because mobile malware and other malicious programs will also be unable to track you.

Using this technology will also help you to stay protected since you will be able to encrypt your data which will render it totally unrecoverable once it is deleted from your computer. There are numerous applications available when it comes to protecting yourself from cyber crimes; one of which that is available is the IP hiding software. This software enables you to surf the web undetected through the IP address of origin. After the IP address is hidden, the site you visit will pretend to be from the computer you are using.

This is because the site is actually acting as a proxy server; one that originates from the computer you are using. If you are currently using a site that you are not sure of, then visit a local library or search online for a few reviews about the product.

Continue Reading

Newsletter

Advertisement

Trending