Social Icons

Showing posts with label data. Show all posts
Showing posts with label data. Show all posts

Sunday, July 13, 2014

Facebook and Law strings

1.   The way Facebook has made an impact pan globe in most of our lives is undoubtedly phenomenal.Facebook has become a way of life for many who are addicted...it gives us a medium to express self in the digital world with a digital self avatar.It is seen that people who remain silent in their physical lives may become more verbose on Facebook...people who generally remain non reactive in informal group discussions become unexpectedly high on expressing themselves ...and so it be that for the first few years when every one was expressing loudly on the Facebook ...it didn't matter but now with the IT act and laws propping up in each country...things are not so easy to express.Each time anyone expresses anger or happiness over something... it is associated and linked with a act which may or may not be legally authorized.Here in this post ahead I bring you few FAQs which each one of us will associate with our lives and associated punishments effected as per IT act 2008 amended (India).

FAQs ex ROHAS NAGPAL @ http://www.facebooklaw.in/

Is it legal to ridicule a Government official or Minister on Facebook?

NO. This is a very serious offence and could get someone in jail for life! And unlike what is shown in Hindi movies, life imprisonment means imprisonment for life and not just 14 years! Ridiculing a Government official or Minister on Facebook could be illegal under the following laws:

Sedition
Defamation
Sending offensive electronic messages

Plus, if the Minister or official is a woman, it could also be covered under indecent representation of women

Is it legal to ridicule a celebrity or even an ordinary person on Facebook?

No. This is a serious offence and could get someone in jail for upto 3 years! Ridiculing a celebrity or even an ordinary person on Facebook could be illegal under the following laws:

Defamation
Sending offensive electronic messages


Is it legal to ridicule a religion on Facebook?

No.This is a serious offence and could get someone in jail for upto 3 years! Ridiculing a religion on Facebook could be illegal under the following laws:

Promoting enmity on grounds of religion8
Outraging religious feelings9
Wounding religious feelings10
Sending offensive electronic messages11
Imputations, assertions prejudicial to national-integration


Is it legal to call someone an “idiot” on Facebook?

No.This is a serious offence and could get someone in jail for upto 3 years!The dictionary meaning of “idiot” is a “person of low intelligence” or a “mentally deficient person”.Since it is impossible to prove that a person is actually an “idiot”, calling someone an idiot would amount to defamation and would be punishable under two laws:

Defamation
Sending offensive electronic messages


I have ordered some stuff from a famous ecommerce website. They have not sent
it even after a month but my credit card has been charged for the transaction. Is it legal to post my complaint about this on my Facebook wall?

Is it legal to open a Facebook account in a fake name?
No.This is a serious offense and simply creating the account in a fake name (or someone else’s name) makes the creator liable for 2 years imprisonment.If the person sends even one message, posts one comment or sends even one friend request using this account, the liability could be another 3 years in jail!Simply creating the account in the fake name (or someone else’s name) amounts to forgery.If the account is used, then it amounts to sending offensive electronic messages.Further if the fake account was created for the purpose of harming someone’s reputation, then it amounts to forgery for purpose of harming reputation.
If I use asterisk marks instead of abusive words, can I still get into trouble?

Yes.Even if you use asterisk marks (e.g. instead of fool, you say f**l), if the meaning is apparent, then it would be punishable with upto 3 years imprisonment.

 
As a joke, I have put a morphed photo of my friend on Facebook. She has taken
it as a joke, but her father is very angry with this. Can he file a case against me?
What kind of posts can land me in prison?

Yes.If her father finds it offensive, he can file a case and it can be penalized as “sending offensive messages” and is punishable with upto 3 years imprisonment.If the photo is obscene then there is an additional liability for 3 years imprisonment.

Someone has sent me a threatening message on Facebook. Is that a crime?

Yes.Sending threatening messages on Facebook can be penalized as “sending offensive messages” and is punishable with upto 3 years imprisonment.Additionally, depending upon the threat in the message, additional punishment could vary from 2 years imprisonment to 7 years imprisonment.Additionally, if the threatening message is sent using a fake account (or in any manner to hide the name and details of the sender), then an additional 2 years punishment can be given.

FAQs ex ROHAS NAGPAL @ http://www.facebooklaw.in/

Friday, June 13, 2014

CLOUDUSB : Another way to secure yourself....

1.     "Cloud" has been easily the most buzzy term in past few years for the computing industry. Case in point is the CloudUSB distribution, a project that promises to provide automatic backups and data along with privacy protection. The cloud name is catchy but the security is far less than promised....it is actually a USB-based Linux distribution based on Ubuntu 10.04 LTS(though old but works for general user..now I m on 14.04 LTS though). The idea is that you can carry your own Linux distribution with you for use anywhere, thus allowing anyone to use Linux on any computer and keep their data safe in the event the USB key is lost.

2.    CloudUSB uses the Dropbox service to synchronize data, so users who don't already have a Dropbox account will need to set up an account before being able to use the synchronization service. CloudUSB sets up a data and private-data folder for keeping sensitive files in. The setup.sh script that comes with the distribution uses encfs to set up an encrypted directory. It appears the script isn't properly encrypting the directory, though. When the system is rebooted, it does use encfs to mount the Dropbox/private-data directory as Desktop/.private-data. A step by step screen shot is shown below...i run this on a Virtual Box....and this can be downloaded at http://cloudusb.net/?DOWNLOAD












and there you are ready sett...go!!!!!!!!!!!!!

Thursday, August 08, 2013

Creating ISO images in Linux : FEDORA 19

1.  Few useful commands to create ISO images in linux :

First install mkisofs from root by typing :

yum install mkisofs

In most of the recent linux distros...this would invariably be pre-installed...the above command will work for yum installations

If u require to create an iso file from a directory containing other files and sub-directories via the terminal, you can use the following command:

mkisofs -o image.iso -R /path/to/folder/

An example is shown below : here YOURFILE is the name of the ISO image that will be created and then is the route where the data is stored.

mkisofs -o YOURFILE.iso -R /run/media/kurta/CEH\ Tools\ Vol-1/


Friday, July 12, 2013

Cyber Security Tips for Home Users

Maximum percentage of internet users will remain the naive Home users and it is this major percentage that needs to be acquainted with the basic cyber security hygiene. This presentation will equip the basic user with a small set of skills to be slightly better on handling security front on their respective PCs.

Wednesday, December 12, 2012

SMART TVs : OUTSMARTED & HACKED



1.   In the land of Hacking,no one can be spared.We all keep hearing about how websites have been hacked,how smartphones are getting out smarted by various exploits in recent times.Now comes something new ,that makes smart TV owners prone .Yess!!all the proud owners of Smart TVs(SAMSUNG LEDs specifically)...can start checking if they are the lucky ones to get bitten here..this one is all about SMART TVs getting HACKED...So now on all the data that is available in their respective HDDs connected vide the USB is vulnerable to be accessed by undesired third party.So now it is not just that you watch the TV....its time for the TV to watch you.Few valuable briefs given out here :

- The Vulnerability exposed in all Samsung's Smart LED TV Software.

- This Vulnerability allows remote attackers to swipe data.

- ReVuln,a Malta-based security firm claims to have discovered this vulnerability.

- Remains a zero-day vulnerability as on date.

- A demo video by ReVuln shows how a "vulnerability for such devices can be used to retrieve sensitive information, monitor and root the device.Click on the video below to have a glimpse of how the vulnerability is exploitable.


2.   I am sure whatever efforts are made by the typical user as on date,he remains vulnerable round the clock in all the fields.How can a normal user who is not so tech savvy be aware of securing his PC,his Laptop,his smartphone,his TV,his external HDD with his personal data without encryption,his pendrives and the list is actually endless.He simply remains one of the choices by any hacker..if he is chosen he is gone...or he can remain lucky ..but how long can anyone remain lucky? The hackers community is growing at a pace which is pretty fast owing to the lure of what else but DOLLARs and more DOLLARs.With "Crimeware as a Service" readily available as a service at the click, NO ONE IS SECURE.It will actually take years to stabilize the current security environment from perspective of a typical user as he understands that giving an equal importance to his IT assets security is more important then locking his house as he leaves for work.

Monday, May 16, 2011

McMurdo station & more DATA CENTRE Locations

1.    We all keep reading on issues like heating when we discuss data centres......now with the problems that datacenters have with cooling, the Antarctic is perhaps the ideal site for such a facility....i thought that was a joke before i first read about this and saw the pics on site at here

2.     The station's datacentre is dedicated to supporting scientific work and running the station - with 64 servers and more than 2PB of storage connected to hundreds of desktops by a gigabit Ethernet network.McMurdo Station is the telecoms hub for science projects, field camps and operations in western Antarctica funded by the National Science Foundation (NSF).To provide these services, it has a central telephone exchange and a wide spectrum of network, radio-frequency and satellite-communication systems.At the South Pole, every day up to 100GB of science data is transferred from the station to the US via satellite-communication links in support of multiple NSF-funded science projects.

3.    Thanks DIGIT.

Monday, November 01, 2010

Bredolab grabs Attention

1.    A 27-year-old Armenian man has been charged as being the mastermind behind the Bredolab botnet, a network of millions of compromised computers worldwide.Main features of this trojan botnet are enumerated below for info : 
  • Users of computers with viruses from this network will receive a notice of at the time of next login with information on the degree of infection. 
  • Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infected at least 30 million computers.
  • Spread via drive-by attack websites and spam email attachments.
  • Infecting machines with a backdoor that downloads additional malware without the victim's knowledge. 
  • Sends out spoofed password reset messages to Facebook users in an attempt to spread malware and infect users of the social network.
  • Has the power to obtain information on the user's computer including the ability to copy, change or delete files and other information," 
  • Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns users that their Facebook password has been reset.
  • Majority of infections are in the U.S. and the U.K. and many Western European countries.
  • Discovered by the Dutch High Tech Crime Team in the late summer.
  • Capable of infecting 3 million computers a month. The botnet network used servers hired in the Netherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, and one of the largest hosts in Europe.
  • Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Like other botnets, the Trojan communicated with the command-and-control server using encrypted messages.

Wednesday, June 16, 2010

"GOOGLE STREET VIEW" - FIGHTING PRIVACY ISSUES

1. Ever heard of google's street view application...m sure many of you must have...for those who have not heard of it...in brief it refers to a technology featured in Google Maps and Google Earth that provisions isometric views from various positions along many streets in the world. Launched on May 25, 2007 the application displays images taken from a fleet of specially adapted cars. Areas not accessible by car are sometimes covered by Google tricycles. On each of these vehicles there are nine directional cameras for 360° views at a height of about 2.5 meters, GPS units for positioning and three laser range scanners for the measuring of up to 50 meters 180° in the front of the vehicle. There are also 3G/GSM/Wi-Fi antennas for scanning 3G/GSM and Wi-Fi hotspots.

2. No about the fighting issue that i have reffered in the subject topic.Now whether it is a facility for the world base users to utilize viewing live views of streets world vide or it is an attempt to log in to the private data of the users across.....yess...I repeat it is the private data of the users avaiable from the open WiFi signals from their home computers and laptops.The intresting thing is that Google has accepted this collection of data from unencrypted wireless networks....and they have put the blame on a masoom software engineer.Google says the massive furore over Wifi snooping by Street View cars was all the fault of one software engineer.In an interview ,CEO Eric Schmidt said the whole affair came about because a software engineer inserted unauthorised code into the Street View system software. The man is now under investigation internally by the company as per posts on google blog.


3. Now what ever answer that google may come up with in form a mistake or simply putting the blame on that software engineer(...where was the Software Testing deptt and QC then otherwise?),the point that I intend putting accross is that just take care of envryting your WiFi router.Google has at least accepted the fact and mistake and they are taking measures to rectify it...but it will not be always like that.....there are so many mis adventurists present all around that looking around that unencrypted wireless networks for misuse.....just read this post again to avoid becoming a target like others.

Wednesday, March 31, 2010

DATA RECOVERY FROM RAM?

1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to limitations/possibilities of recovery of data from RAM inside a computer?

2. Thanks.


Powered By Blogger