Page 11 of 12 FirstFirst ... 9101112 LastLast
Results 101 to 110 of 118

Thread: Do You Know ?

  1. #101
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Glossary

    Search Engine Optimisation refers to the process of optimising a Web site so that it appears prominently in search engine results for specific keywords.

    Server-side code is executed on the web server with the finished result usually sent to the end user. Server-side code is commonly written in PHP, ASP, JSP, Cold Fusion, or Perl.

    Server Side Include - a file spliced into a Web document on the Web server. May be performed by the Web server itself, or commonly by a server side script such as Perl, ASP, ColdFusion or PHP.

  2. #102
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Windows Shortcuts for computer enthusiasts

    Shortcuts

    [Window] - Open or close start menu
    [Window]+D - View Desktop (+ means press both keys simultaneously)
    [Window]+M - Minimise
    [Window]+E - Open My Computer
    [Window]+F - Search for file or folder
    [Window]+ Pause - View system properties
    [Alt][Tab] - Switch over active programs
    [Shift][Delete] - Permanent delete of a selected file or folder
    [F1] - Help
    [F2] - Rename selected file or folder
    [F3] - Search for file or folder
    [F5] - Refresh active window
    [Alt][F4] - Closes a window

    Windows Explorer

    [End] - View the bottom of the active window
    [Home] - View the up of the active window
    [Ctrl]+N - Open new window

    Windows Run command

    Add/Remove - wix.cpl
    Add hardware wizard - hdwwiz.cpl
    Calculator - calc
    Checkdisk - chkdsk
    Disk defragment - dfrg.msc
    Disk partition manager - diskpart
    Registry editor - regedit

  3. #103
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default

    Cyber crime means any criminal activity in which a computer or network is the source, tool or target or place of crime. The Cambridge English Dictionary defines cyber crimes as crimes committed with the use of computers or relating to computers, especially through internet.

    Crimes involving use of information or usage of electronic means in furtherance of crime are covered under the scope of cyber crime. Cyber Crimes may be committed against persons, property and government. The common types of cyber crimes may be discussed under the following heads.

    1. Hacking - A hacker is an unauthorized user who attempts to or gains access to an information system. Hacking is a crime even if there is no visible damage to the system, since it is an invasion in to the privacy of data. There are different classes of Hackers.

    a) White Hat Hackers - They believe that information sharing is good, and that it is their duty to share their expertise by facilitating access to information. However there are some white hat hackers who are just “joy riding" on computer systems.

    b) Black Hat Hackers - They cause damage after intrusion. They may steal or modify data or insert viruses or worms which damage the system. They are also called ‘crackers’.

    c) Grey Hat Hackers - Typically ethical but occasionally violates hacker ethics Hackers will hack into networks, stand-alone computers and software. Network hackers try to gain unauthorized access to private computer networks just for challenge, curiosity, and distribution of information. Crackers perform unauthorized intrusion with damage like stealing or changing of information or inserting malware (viruses or worms).

  4. #104
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default

    2. Cyber Stalking - This crime involves use of internet to harass someone. The behavior includes false
    accusations, threats etc. Normally, majority of cyber stalkers are men and the majority of victims are women.

    3. Spamming - Spamming is sending of unsolicited bulk and commercial messages over the internet. Although irritating to most email users, it is not illegal unless it causes damage such as overloading network and disrupting service to subscribers or creates .negative impact on consumer attitudes towards Internet Service Provider.

    4. Cyber Pornography - Women and children are victims of sexual exploitation through internet. Pedophiles use the internet to send photos of illegal child pornography to targeted children so as to attract children to such funs. Later they are sexually exploited for gains.

    5. Phishing - It is a criminally fraudulent process of acquiring sensitive information such as username, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.

  5. #105
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default

    6. Software Piracy - It is an illegal reproduction and distribution of software for business or personal use. This is considered to be a type of infringement of copy right and a violation of a license agreement. Since the unauthorized user is not a party to the license agreement it is difficult to find out remedies.

    7. Corporate Espionage - It means theft of trade secrets through illegal means such as wire taps or illegal intrusions.

    8. Money Laundering - It means moving of illegally acquired cash through financial and other systems so that it appears to be legally acquired. eg. Transport cash to a country having less stringent banking regulations and move it back by way of loans the interest of which can rededucted from his taxes. This is possible prior to computer and internet technology, electronic transfers have made it easier and more successful.

    9. Embezzlement - Unlawful misappropriation of money, property or any other thing of value that has been entrusted to the offender’s care, custody or control is called embezzlement. Internet facilities are misused to commit this crime.

    10. Password Sniffers - Password sniffers are programmes that monitor and record the name and password of network users as they log in, jeopardizing security at a site. Whoever installs the sniffer can impersonate an authorized user and log in to access on restricted documents.

  6. #106
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cyber crimes

    11. Spoofing - It is the act of disguising one computer to electronically “look” like another computer, in order to gain access to a system that would be normally is restricted. Spoofing was used to access valuable information stored in a computer belonging to security expert Tsutomu Shimomura.

    12. Credit Card Fraud - In U.S.A. half a billion dollars have been lost annually by consumers who have credit cards and calling card numbers. These are stolen from on-line databases.

    13. Web Jacking - The term refers to forceful taking of control of a web site by cracking the password.

    14. Cyber terrorism - The use of computer resources to intimidate or coerce government, the civilian population or any segment thereof in furtherance of political or social objectives is called cyber terrorism. Individuals and groups quite often try to exploit anonymous character of the internet to threaten governments and terrorize the citizens of the country.

  7. #107
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Offence and it's punishment

    The Information Technology Act 2000 (India)

    1. Tampering with any computer source code used for a computer, computer programme,
    computer system or computer network, is punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. "Computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form. (Sec 65)

    2. Hacking with computer system is to be punished with imprisonment up to three years, or with fine which may extend up to five lakh rupees, or with both (Sec 66).

    3. Sending offensive or false information through computer or a communicative device is punishable
    with imprisonment up to three years and with fine (Sec 66a).

    4. Receiving or retaining stolen computer resource or communication device is an offence punishable
    with imprisonment up to three years and fine up to one lakh or with both (Sec 66b).

    The
    same punishment is prescribed for fraudulent use of electronic signature, password etc. of any other person (Sec 66c) and for cheating using computer, cell phone etc (Sec 66d).

    5. Capturing Transmitting or publishing the image of a private area of any person without consent is punishable with imprisonment up to three years and with fine up to two lakhs or with both (Sec 66e)

    6 Punishment for Cyber terrorism may extend to imprisonment for life (Sec 66f)

    7. Publishing transmitting information which is obscene in electronic form shall be punished on first conviction with imprisonment of either description for a term which may extend to three years and with fine which may extend to five lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees ( Sec 67).

    8. Publication and transmission of containing sexually explicit act or conduct is to be punished with imprisonment up to five years and fine up to ten lakh rupees and for second or subsequent conviction with imprisonment for a term up to seven years and fine up to ten lakh rupees (Sec 67a).

    The same punishment is prescribed for child pornography (Sec 67b)
    .

    9. Penalty for Misrepresentation Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case may be. Shall be punished with imprisonment for a term, which may extend to two years, or with fine which may extend to one lakh rupees, or with both (Sec 71).

    10. Penalty for Breach of Confidentiality and Privacy Any person who has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book. register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both ( Sec 72).

    11. Punishment for disclosure of information in breach of contract is imprisonment for a term up to three years or with fine up to five lakh rupees or with both ( Sec 72a).

    12. Punishment for publishing Digital Signature Certificate false in certain particulars.
    (1) No person shall publish a Digital Signature Certificate or otherwise make it available to any other person
    with the knowledge that

    (a) the Certifying Authority listed in the certificate has not issued it; or
    (b) the subscriber listed in the certificate has not accepted it; or
    (c) the certificate has been revoked or suspended, Violation of the above provision is punishable with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both(Sec 73).



  8. #108
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cyber safety Campaign 4 Cyber safe world

    What is Cybercrime ?

    A crime that involves a computer and a network. Criminal exploitation of the internet is common. Hackers can invade privacy, financial theft (Credit card/net banking), stole/destroy confidential information stored, stole source code of a software or even deface a site or make a site inaccessible to the site owner.

    There is no geographical boundary for the crime and it can be cross - border/ inter continental. As the different countries have different law of the land, it is finding difficult to punish the offenders. The various countries are thinking to form a common legal system and an International Criminal Court to deal with the Cyber criminals.

    A variety of scams target consumers (Nigerian scam offering huge amount).

    A computer or a network can be targeted by Viruses, malware or by Denial of Service attack.

    A cyberterrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.

    A person can be harassed by creating false profile with obscene/offensive/morphed content. This is common in chat rooms and in social network sites like facebook, orkut, twitter. etc.

    Drug sellers are using encrypted email and restricted chat rooms for the easy sale of drugs and other illegal items.

    Spam is the unsolicited sending of bulk emails for business purpose. The spammer send bulk SMS or email with a single click to a number of recipients.

  9. #109
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cyber forensics

    Computer Forensics

    Computer can be a source of evidence. Data is kept in encrypted form in hard disk by the Operating system. Even a deleted file, deleted browsing history, over written file and then deleted file can be retrieved by cyber forensic experts!.

    A Law enforcing official will enter the crime occurred premise with search warrant and seize and seal the hard disk in a cover. The seized object will be produced before the court with written complaint.

    Criminal investigators use sophisticated tools to recover the deleted data. Some cases, even after 5 years, experts are able to retrieve the deleted information/data from the hard disk. Temporary data files are giving valuable information to the investigator.

    Computer forensic software like FTK are very useful in tracing the evidence from hard disk.

  10. #110
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Cyber attacks

    1. Yahoo was attacked on Monday, 7 February 2000 for 3 hours, by high rate pinging.
    2. Fifty computers of Standford University, California were made inaccessible by DDoS attack by hacker.
    3. CBI site was attacked recently by Pakistan Cyber Army.

    Every country keeps a Cyber Army of which that of Iran and China are very active in hacking enemy Govt sites.

    India has more than 30 million internet users and 217 IT Act related crimes were recorded in 2007.

Page 11 of 12 FirstFirst ... 9101112 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •