https://www.deccanchronicle.com/business/trai-moves-curb-mobile-phone-theft-313 The gist of the above link is summarized as below: In order to curb the menace of mobile thefts TRAI has decided that all telecoms should deploy EIR and share the in... Read more
This blog has been inspired by the recent events surrounding Wiki-Leaks – a Tit-for-Tat ideology. What exactly is a DDOS Attack? It is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for... Read more
Email Server Audit Tool (E.S.A.T.) will assist administrators / Pen-Testers in 1: Troubleshooting , Configuration Verification. 2: Mail Server Deployment vis’a’vis the configuration of the mail server. 3: Securing the mail server deployment. Tes... Read more
Very recently I came across a USB scam, which has been briefly explained. Modus Operendi: A salesman comes to you and offers to sell a USB Pen-Drive at throw-away prices. In this case the salesman was offering 32GB or 16 GB Transcend pendrives f... Read more
This blog is inspired by the recent events and the new-found interest of the masses – Wiki Leaks. Let us revisit the earlier post “How easy can it get?” Thumb Rule for “Information”: Information should be available only on need to know basis and... Read more
Time and again we have come across viruses / malware which have put our gray cells to test. One such malware is the GPCode. The Attack vector of GPCode is to encrypt the files, whose extensions are in its list. This malware searches for files fr... Read more