Sarbanes Oxley Act Part 1 Read

Birth of Sarbanes Oxley Act Well known scams of early 21st century like Enron and WorldCom were based on malicious/fraudulent accounting practices like inflating revenues, inadequate financial reporting and improper accounting entries. The companies indulged in these activities to hide their debts …

Case Study – Section 66C Read

Vinod Kaushik and Ors. V. Madhvika Joshi and Ors., Before Sh. Rajesh Aggarwal, Adjudicating Officer,Information Technology Act, 2000, Government of Maharashtra, At Mantralaya,Mumbai- 400032, Complaint No.2 of 2010192 The adjudicating officer held that the act of the wife to access information from …

Content-Type Attack: Dark Hole in a Secure Environment Read

Introduction Content-Type attacks are related to the vulnerabilities in client side software that are used to read the content like adobe reader, Microsoft office, Image viewer. Attackers attempt to exploit programming flaws in that code to induce memory corruption issues, resulting in …

InCTF – National Level Capture The Flag Contest 2013 Read

Not a day passes without one hearing about email scams, stolen passwords, cyberwar and terrorism; cyber threats and crimes have been skyrocketing. An effective strategy to combat these threats would be to provide an awareness on vulnerability detection-exploitation-patching mechanisms and secure programming …

Scan Your Home Network With Nmap Read

Who should read this article? Everyone that is interested in computer security and computer networking should read this article. Introduction If you run a network, a small or big one, you need a flexible and productive way to monitor it. You need …