A Blog for all job aspirants in fullfilling their dreams through the body charged with a very sensitive and sacred task of making selection of the most capable and deserving persons for manning the civil services and posts which has a direct bearing on the quality of governance. It brings about PSC Training an PSC Coaching Online.
The Knowledge documents in this blog meant only to increase the general awareness of the readers. E&OE.
സൈബർ കുറ്റകൃത്യങ്ങൾ തടയാൻ ഇന്ത്യ ഗവണ്മെന്റ് ഇൻഫർമേഷൻ ടെക്നോളജി ആക്ടിനു രൂപം നല്കി . ഇത് ഇൻഫർമേഷൻ ടെക്നോളജി ആക്ട് - 2000 എന്ന് അറിയപ്പെടുന്നു . ഈ നിയമം 2008-ൽ ഭേദഗതി ചെയ്യപ്പെട്ടു .
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both.
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.
Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as
a. Unauthorized access & Hacking:-
Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.
By hacking web server taking control on another persons website called as web hijacking
b. Trojan Attack:-
The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well.
c. Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are called as worms.
d. E-mail & IRC related crimes:-
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: attacks, clone attacks, and flood attacks.
e. Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
1. The digital security system that uses some unique characteristic of human biology to identify authorized users: (A) Biometrics (B) PIN Number (C)Encryption (D)Password
2. ‘Do no evil ‘ is the tag line of
(a)Yahoo b)IBMc) Wiprod) Google
3. The concept of ‘stored program computer’ is first proposed by (a) John Von Neumann (b) Charles babage (c) Lady Ada (d) George Bool
4.PDF is the acronym for
(a) Personal digital assistant form (b) Personal digital file (c) Portable document Format (d) Portable digital file
5. An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment. (A) Virtual Reality (B)Digital Reality (C)Dream (D)Artificial Reality
Getting a job based on graduation is the dream of millions of job seekers in India. Assistant popularly known as Secretariat Assistant is such a job. It is a common rank list for appointment in a few major organizations in Kerala. They are Government Secretariat, Public Service Commission, Local Fund Audit, Advocate General’s Office and Anti Corruption Bureau.
Getting in the Rank List doesn’t guarantee a job in Secretariat. But majority of vacancies are filled in the three wings of Secretariat – Finance Department, Legislature, and General Administration of Secretariat. So once a candidate enters in the rank list, he has 60% chance to get into Secretariat Service. No one needs to be worried about this; other services are also equally attractive.
The most attractive feature of Secretariat Assistant is its promotion scope, growth, authority and power.
Spamming , Spoofing , Phishing , Hacking etc
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.
Types of Hackers & Ethical hacking
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.
? The chemical name of Vitamin E is
(C) Riboflavin (D) Tocopherol ? Vegetables grown by the roadside have a higher content of which mineral? (A) Sodium
(B) Potassium (C) Lead
(D) All the above ? Sodium metal is kept under
(C) petrol (D) kerosene ? Who is known as the Father of Internet?
(A) Charles Babbage (B) Vinton G Cerf
(C) Sabir Bhattia
(D) Ray Tomilson ? Which game is associated with ‘Bulls Eye’?
This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.