Pages

Wednesday, May 17, 2017

It's become like a warcry in last five days.. #wannacry, #wannacry.. I  really wanna cry. Why.. Because time and again it has been proven that we as user fail to learn and remain ostrich. Even now it's not too late
1. Do not open any email if it's suspicious, don't fall for lucrative offers.. Check for URL and also see details of sender.. If u don't  know the sender, don't open the link
2. Take backup of your laptop or pc data
3. Update Antivirus definitions.
4. If you are still using Windows Xp, download latest updates from MS
5. Upgrade to latest OS, choice is your depending upon your budget, requirements and preference. Better would be to upgrade to Linux.. Now is the time to take helping hand of TUX
6. Lastly you will find lots of advices and DIY links offering you assistance in case you have been infected.. Word of advice PROCEED WITH CAUTION.. Follow some reputed blogger or stick to well known security research companies for information.
Happy hunting
Follow my link on facebook
https://www.facebook.com/groups/3tips/

Thursday, March 23, 2017

Fuzzy Thoughts.. Are they really Scary!!!

Otherday when I just closed my eyes.... (Bcoz There are so many eye openers that you tend to get confused many times whether you are daydreaming with open eyes).. Just imagining how our lives have been changed over the years.. In fact more so in last decade.
Isn't this exactly what we get to hear from all historians...
.. Jokes apart
Now I am just typing this on my Smart Phone that more memory than my office laptop and it can have more apps.. And the operating system ie OS takes space identical to Windows 10 and Ubuntu on my PC or Laptop.. I realized that I no longer need the distant cousins of my *Smartphone*.. I can use it to get notified for emails received, open it, read it and then if required reply it or forward it to intended recipients or simply push back button twice on my smartphone to come out to home screen.
Now you would say what's special about it

Think the scenario in Year 2000...

We have just come out of fear of doom.. Of Y2K bug
Dialup modems have just started to gather speed
Blackberry has gained momentum with iPhone giving all competitors a good lead

Still sensing and recent email was a ritual


Cut to 2017
Now we are talking of Iot, Cloud computing, Machine Learning (never thought that machine can also learn), AI (Intelligence becoming Artificial?) Elastic Search, Quantum Computing, networked Home.. Office, Car becoming intelligent
And what's at the backbone for it.. High speed Internet

Yes.. The Moores law is not applicable here.. Neither is Murphys law
So we r going towards hi-tech super automated world..

But wait let me open my eyes now

What I'd I forget the password to my Smartphone.. What if it crashes.. What if it's been hacked and all my confidential information is stolen..
How's responsible for maintaining secrecy..
Keeping me secure
Of course.. Anyone but me
It's government duty
Peculiar problem
.. Ain't it

Not me

I have to reap the benefits and let government be damned if I get hacked... To be continued.. Fuzzy thoughts

Saturday, December 17, 2016

Who doesn't like to b a creator of something new..
Who doesn't want play God and feel devine
Well here is chance to play your own role as God while working on your computer.
Check out the God mode in MS Windows.  This feature has been available with all versions of MS Windows 7 onwards.. We will how it's done in Windows 10.. Follow the link given below
https://fossbytes.com/how-to-enable-godmode-windows/

Saturday, November 12, 2016

There have been frustrating times for coder and students and general Linux users while taking down notes ot just jotting  down their thought that they wish they had something simpler yet powerful notepad like tool.. Well there are a list of apps which augment features of notepad and features like Evernote..
Check these out
http://www.makeuseof.com/tag/top-notepad-apps-linux-can-sync/

Saturday, November 5, 2016

The emphasis on ensuring safety of your digital assets,  data included cannot go overboard ever.  This is one such field that would always remain Achilles heal for management and sore point of discussion in boardroom meetings whenever financial allocations are being carried out.. Check this out.. A primer

http://www.bizlibrary.com/article/cybersecurity-training-team-sport/

Saturday, October 29, 2016

  *Though a dated,  old article but give lots of basic information about different image formats that comes with tips on what format to be used and when..
This is a detailed summary of all popular image formats with comparisons also..  Handy reference
 Happy hunting

Ref http://blog.hubspot.com/insiders/different-types-of-image-files


(All copyrights of respective owners) 

Wednesday, August 10, 2016

Is Human factor weakest link in security?

Human factor: Weakest Link!
  • It has been always been a strong point of debate  whenever it is discussed for implementation of Cyber Security..  Who is the Weakest Link? Identification has never been difficult for Security team and they  have be univocally supported by both, Executives and /management…THE USER.
  • The User.. is known by many other names
    • Client
    • End user
    • field agents
    • office staff
    • non developers
  • Since ages the human link is taken as “Weakest Link” in security be it Physical or now “Cyber”.
  • However This fact has been overlooked more often that not that very same “HUMAN” factor is major contributor in implementing the ROBUST SECUTIY ARCHITECTURE.
  • Awareness : What Lets one down is the “Lack Of Awareness Training”..The basics are forgotten..what is the main factor to plug this?.. Create Awareness… How? Training is the best way of creating awareness.
    • It can be integral part of appraisals process.
    • Divide into various levels of training
      • Beginners ..for freshers and new recruits
      • Middle level…for those having completed some time in the company and those who are due for appraisal
      • Advanced and Refresher courses… At the time of change of any major policy or revision as well as on introduction of new equipment
  • Thus we can say its always the Onus on the Security Professionals as well as the Management
  • A detailed study carried out by eforensics magazine highlights such issues https://eforensicsmag.com/human_factor/

Saturday, April 25, 2015

Cost of data loss: How realistic we are about finances of data breaches?

  1. The data breach and subsequent loss of records for transactions and confidential details of customers are always a matter of concern for any company. However it becomes very difficult to put exact or near exact cost per record loss due to the breach.
  2. Verizone has tried to breach this barrier and to put cost per record and it comes out to be..... Dollars 0.58 . Amazingly low. Another research firm puts this between 188 to 210 dollars per record.
  3. Check out the details https://m.facebook.com/l.php?u=https%3A%2F%2Ffortune.com%2F2015%2F04%2F24%2Fdata-breach-cost-estimate-dispute&h=jAQHhn8X8

Monday, April 6, 2015

Facebook Thugging... new era of cyber threats

Ever heard of a term Cyber Bullying. Normally its associated with children being threatened by criminals, paedophiles etc online in chat rooms etc.
However a case of intimidating a facebook user by displaying a gun pointed towards camera with menacing smile has lead to arrest of a lady for "Facebook Thugging".
As per the details available, the lady posted a pic of herself pointing gun towards the camera that was followed by a comment something to the effect that "That's what you will get if you come lookin for me".
Though she took off the pic later on admitting that she thought it was intimidating, police arrested her on the charges of threatening on facebook.
Therefore be careful what you post and how I is going to be visualised by others.
Don't be impulsive. Think before you act.
http://www.techworm.net/2015/04/woman-arrested-for-facebook-thugging.html

Saturday, February 28, 2015

Digital Forensics Application Software EnCase

The Digital forensics or more precise computer forensics fascinated me a lot ever since I ssaw a demo on stenography. Later on while handling the same and using various forensic software suites further made me interested in exploring the various facets of Digital forensics.

However once i started pursuing my MS, it left little time to do something else.

Recent chance meeting, though long overdue, with a good friend who had switched his job made me think again about rekindling this area once again.

Today when I thought of starting once again, first thing about digital forensics struck me was , to know more about EnCase.

Came across this primer and advanced link. I thought of sharing with you all.

Digital Forensics Today Blog: A Treasure Trove of EnCase Version 7 Resources to Help You Make the Transition

Proud Blogger

Powered By Blogger