Social Icons

Showing posts with label cyber protection. Show all posts
Showing posts with label cyber protection. Show all posts

Sunday, October 18, 2020

CYBER SECURITY : A Mathematical attempt to understand and interpret the mechanics behind

Well..after a long time of around few years I gave a talk that was exclusive to CYBER SECURITY otherwise I have generally hovered around Blockchain and bitcoin for quiet some time now.The unique thing about this presentation is the take on that I attempted. The difference between the usual presentations and this one is that I have tried to explain the technicals behind data collection and prediction through regression. While the common men isn't largely bothered about surfing anything, anywhere, anytime, believing what harm can one do if he has nothing to loose. But alas he should understand why is the need so.The strange patents that IT giants like facebook ,google ,MIcrosoft are currently holding and developing is worrisome to realise. The links below give the presenation download google drive link and the scribd direct link.

Google drive link at :

 https://drive.google.com/file/d/1zwo88ljDaJxJ8S7obKXkICtGDUGGVHZx/view?usp=sharing


Cyber Security : An attempt... by Anupam Tiwari

Workshop on Blockchain Technology and e-Governance: GNLU Center for Law and Technology

A one day Workshop on Blockchain Technology and e-Governance was organized by GNLU,Ahmedabad University through its GNLU Center for Law and Technology in collaboration with Gujarat Council on Science and Technology &  Department of Science and Technology, Government of Gujarat on 19 Sept 2020. The webinar link for the same is as below:

The presentation is available for download at the following link:

https://drive.google.com/file/d/1RT79-r5LhFXdbi2D_ZKgkwu8eH9v5225/view?usp=sharing

while also the scribd direct link for viewing is available as below:


Blockchain Technology and e-Governance by Anupam Tiwari on Scribd

Friday, December 21, 2012

Need of Encryption : Your files - Your Data


1.   In today's times when every spying eye,every hacker on the web is eyeing your info.... apart from hardening your OS and configuring your system securely what else can you do to secure your info after some one gate crashes into your system?.....I mean after someone gets your root privileges via remote access...what are the options to save your self from sharing your critical data with him?The answer is ENCRYPTION...

2.   Encryption is the process of encoding your information) in such a way that hackers cannot read it, but that authorized parties can.So without getting into the nitty gritties of what is Encryption and how it works..i am focusing here of what all opensource and free applications are available for encryption...

3.   First I would mention about TrueCrypt,this is the one I have been using for years...the reliability of this application can be gauged from the fact that in 2008, the FBI attempted to break encryption on hard drives using a program called TrueCrypt, but the equipment was finally returned after a year of failed tries.(Source : http://www.webcitation.org/query?url=g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html)

4.   The other strong opensource software's available for encryption are :

    - E4M ie ENCRYPTION for MASSES)
    - Free OTFE
    - Scramdisk

5.   TrueCrypt remains the best bet for all present users.The popularity can be gauged from another fact that this is being used by cyber criminals to!!

Friday, October 19, 2012

Is your ANTIVIRUS spying you ?


1.    Now as the Cyber Crime grows exponentially,so has the world of antivirus companies....the list is pretty endless....now how do all these antivirus companies work.Do they all research separately and develop separate signatures for each virus/malware found or do they have such common platform or standard wherein they share each others views and technologies.As I see on Wiki about the list of antivirus companies,they originate in different countries.Details of the page showing a compare of all such antivirus companies can be seen here.Well....what I am going to discuss here is importance of the country origin.

2.  Lets say I have antivirus company by the name of ABC that has its origin and complete team of researchers and developers from India.Now there is a user in some XYZ Country that uses this antivirus.Now while installing the antivirus,while he accepts the terms and conditions(who reads it anyway?),who stops the ABC antivirus from issuing some malware/spyware for that user PC.In the scan it can not be detected since it is being scanned by the installed antivirus.Now with some vested interest, the ABC Company can actually play havoc with confidential info of the user without giving a cue to the user.Who knows what all signatures released by the company contain? Even while submitting a sample virus,it is done mostly in a encrypted or a bundled form!!!!

3. Although institutes like EICAR (European Institute for Computer Antivirus Research) are there,but they also do not have any control over such issues!!!!If any one  has some idea on the subject ...please let me know vide email or comment here.....

Tuesday, September 20, 2011

DEEP FREEZE : A way to protect ur system!!!


1. Deep Freeze, by Faronics, is an application available for the Microsoft Windows, Mac OS X, and SUSE Linux operating systems which allows system administrators to protect the core operating system and configuration files on a workstation or server by restoring a computer back to its original configuration each time the computer restarts.The other interesting salient features are mentioned below :

-  Deep Freeze is a kernel-level driver that protects hard drive integrity by redirecting information being written to the hard drive or partition.

-  Leaves the original data intact. 

-  The directed information is no longer referenced once the computer is restarted, thus restoring the system to its original state at the disk sector level. 

-  Allows users to make 'virtual' changes to the system, giving them the appearance that they can modify core files or even delete them, and even make the system unusable to themselves, but upon reboot the originally configured 'frozen' state of the operating system is restored.

-  To make changes, a system administrator must 'thaw' the protected partition by disabling Deep Freeze, make any needed changes, and then 'freeze' it again by re-enabling Deep Freeze. These changes become part of the protected partition and will be maintained after restarts. 

2. Deep Freeze can also protect a computer from harmful malware, since it automatically deletes (or rather, no longer "sees") downloaded files when the computer is restarted. The advantage of using an application such as Deep Freeze antivirus / antimalware is that it uses almost no system resources, and does not slow your computer significantly. The disadvantage is that it does not provide real-time protection, therefore an infected computer would have to be restarted in order to remove malware. 

3. More at http://www.faronics.com/.Thanks WIKI......

Powered By Blogger