Saturday, December 4, 2010
IT SPECIALIST/Professional/security: CBI’S COMPUTER HACKED BY PAKISTAN’S CYBER PROFESSI...
IT SPECIALIST/Professional/security: CBI’S COMPUTER HACKED BY PAKISTAN’S CYBER PROFESSI...: "CBI’S COMPUTER HACKED : Hi Guys This news stunned me to my soul. How come a nation which is under scanned by many countries for his ille..."
CBI’S COMPUTER HACKED BY PAKISTAN’S CYBER PROFESSIONALS
CBI’S COMPUTER HACKED :
Hi Guys
This news stunned me to my soul. How come a nation which is under scanned by many countries for his illegal links
With Terrorists and Involvement in such acts. This is very serious concern for India. CBI Known for his Investigation
Agency of govt. of India. Then what were they doing about security concerns. However wiki leaks are common now days , but your prime investigating agency’s computer was hacked by professional hackers working for ISI.Where
CBI fails due to ignorance, The IT professional’s are not capable to detect a Intruder & nor Stopped why? They Simply Enjoys the party (Hackers).What for they are paid , if they don’t even known to Network Security. Shame
On These Professionals, who just come for salary purpose rather serves the nation?
Performance: Zero, The information was stolen.
Soft/Hard: our equipments are of no use, why don’t they upgrade to the new technology.
Involvement: Hack a computer is not a easy cake put into mouth. One can required MAC Address (physical Address)
Of the System to Intrude. but on the network only IP/DNS are shown to everybody not the Mac tables. Its conspiracy
Between hackers and systems Administrators, for providing MAC address to the enemy to control defense computers Remotely.
in 1997 Intrusion was made into Defense Ministry’s confidential data stole by someone from china, I repeatedly wrote
These Guys That, What Happens (nothing) convict is in china and information stolen was related to indo-pak relations.
But they never reply to me, what they did.
Request: Pls handover this case to me , I want to investigate this incident , and CBI is not at all required now.
Genius IT Pro’s go abroad for more money because they can’t get the Job, like me.
I want all the details pertaining abt. This case, what did they intrude, for which particular data they were supposed to
Stole, The Exact Time and but did you guys do after this theft. You are hiring a pro wrongly, we have pool of experts
In this regard. Why wasting money and time on Idiots Sitting there.
Regards
Gurbinder Sharma
Electronic Security & Digital Forensics.
Computers & Network Security.
Microsoft Certified IT Professional
9216432873
Hi Guys
This news stunned me to my soul. How come a nation which is under scanned by many countries for his illegal links
With Terrorists and Involvement in such acts. This is very serious concern for India. CBI Known for his Investigation
Agency of govt. of India. Then what were they doing about security concerns. However wiki leaks are common now days , but your prime investigating agency’s computer was hacked by professional hackers working for ISI.Where
CBI fails due to ignorance, The IT professional’s are not capable to detect a Intruder & nor Stopped why? They Simply Enjoys the party (Hackers).What for they are paid , if they don’t even known to Network Security. Shame
On These Professionals, who just come for salary purpose rather serves the nation?
Performance: Zero, The information was stolen.
Soft/Hard: our equipments are of no use, why don’t they upgrade to the new technology.
Involvement: Hack a computer is not a easy cake put into mouth. One can required MAC Address (physical Address)
Of the System to Intrude. but on the network only IP/DNS are shown to everybody not the Mac tables. Its conspiracy
Between hackers and systems Administrators, for providing MAC address to the enemy to control defense computers Remotely.
in 1997 Intrusion was made into Defense Ministry’s confidential data stole by someone from china, I repeatedly wrote
These Guys That, What Happens (nothing) convict is in china and information stolen was related to indo-pak relations.
But they never reply to me, what they did.
Request: Pls handover this case to me , I want to investigate this incident , and CBI is not at all required now.
Genius IT Pro’s go abroad for more money because they can’t get the Job, like me.
I want all the details pertaining abt. This case, what did they intrude, for which particular data they were supposed to
Stole, The Exact Time and but did you guys do after this theft. You are hiring a pro wrongly, we have pool of experts
In this regard. Why wasting money and time on Idiots Sitting there.
Regards
Gurbinder Sharma
Electronic Security & Digital Forensics.
Computers & Network Security.
Microsoft Certified IT Professional
9216432873
Thursday, December 2, 2010
IT SPECIALIST/Professional/security: Dedicated to my Mom
IT SPECIALIST/Professional/security: Dedicated to my Mom: "Getting a gentle touch from mother can be nearly as effective as a medicine after a tough event.According to research conducting in UK , the..."
Dedicated to my Mom
Getting a gentle touch from mother can be nearly as effective as a medicine after a tough event.According to research conducting in UK , the levels of a stress hormone , Cortisol , and oxytocin , among 61 young girls who had to make a presentation in public , the volunteers aged seven to 12 , were asked to do public speaking and then carry out an oral arithmatic test in front of people. Immediately after the event , a third of the girls comforted by their mother ; another third recieved the phone call from mom but did not see or touch them & remaining third recieved no support but wathed a neutral film for 75 min.. As expected , cortisol levels , measured in saliva soared as the youngsters became stressed by having to address the public.
Magic Touch: But amazingly after 30 minutes of the event , cortisol level returned to normal among children who experienced direct physical contact with their mother.
gurbinder
Magic Touch: But amazingly after 30 minutes of the event , cortisol level returned to normal among children who experienced direct physical contact with their mother.
gurbinder
Monday, November 29, 2010
CHINA NABBED AGAIN IN PIRACY NEXUS
Hi
I was Declared Earlier Also , that the matter is serious know.They Are Addicted To Counterfiet Anything
Whether Software or Hardware.No body listen to me and loose 2 billions (Till 2007).Now Its Worsens
Even More And we are going to loose 5 billion app.
Culprit: Vendors having license to sell microsoft products , Re-Sellers , Institute All used Pirated CD's And DVD's( In India) .
Raids and arrests in China over the past two weeks mark the culmination of a multiyear investigation into a major software counterfeiting syndicate based in the southern China province of Guangdong. The syndicate is allegedly responsible for manufacturing and distributing more than $2 billion worth of counterfeit Microsoft® software. The investigation into this syndicate, which is believed to be the largest of its kind in the world, was led by the FBI and China’s Public Security Bureau (PSB). Microsoft Corp., hundreds of Microsoft customers and scores of Microsoft partners also assisted in the investigation.
These raids and arrests by the PSB, drawing on information provided by the FBI Los Angeles and Microsoft, targeted sources behind the illegal commercial production of Microsoft software, software components and certificates of authenticity. Law enforcement authorities and forensic specialists identified numerous replication plant lines that were involved in the CD production and were the source of counterfeit Microsoft products that had been supplied and sold to business customers and consumers around the world. The counterfeit software, found in 27 countries and on five continents, contained fake versions of 13 of Microsoft’s most popular products — including Windows Vista®, the 2007 Microsoft Office release, Microsoft Office 2003, Windows® XP and Windows Server®. The counterfeits were produced in at least eight languages: Croatian, Dutch, English, German, Italian, Korean, Simplified Chinese and Spanish.
“Microsoft deeply appreciates the work of China’s Public Security Bureau in taking such strong enforcement action with these arrests and raids in Southern China,” said Brad Smith, senior vice president and general counsel at Microsoft. “This case represents a milestone in the fight against software piracy — governments, law enforcement agencies and private companies working together with customers and software resellers to break up a massive international counterfeiting ring. This case should serve as a wake-up call to counterfeiters. Customers around the world are turning you in, governments and law enforcement have had enough, and private companies will act decisively to protect intellectual property.”
During the course of the multiyear investigation, more than 55,000 sophisticated-quality copies of counterfeit software were traced back to the same southern China criminal syndicate. These counterfeit products came from seizures by law enforcement and customs authorities, through submissions made by Microsoft customers and partners, and from test purchases. The 55,000 examined discs are believed to constitute less than 1 percent of the millions of counterfeit copies that are estimated to have been produced and shipped to distributors and countries across Europe, the Middle East, Asia, Australia, the United States and Canada. Countries around the world are expected to experience a significant decrease in the volume of counterfeit software as a direct result of this action.
According to World Customs Organization Secretary General Michel Danet, “Customs around the world, from Cairo to London, Vancouver to Hamburg, and New York to Beijing, seized dozens of shipments numbering thousands of counterfeit Microsoft software products produced by these criminals. This clearly shows that customs around the world are at the forefront of the battle to protect consumers from harm by counterfeit goods, and that sharing information is vital in order to build strong enforcement.”
Customers and Resellers Report on Syndicate
Microsoft customers and software resellers played a major role in ultimately helping the FBI and the PSB identify and build the case against the China-based counterfeiting syndicate. Tens of thousands of customers used Microsoft’s anti-piracy technology in Windows Genuine Advantage to identify the software they were using as fake. More than 1,000 of these customers then submitted physical copies of counterfeit Windows XP for analysis, which Microsoft was then able to forensically link to the counterfeit syndicate. In addition, more than 100 Microsoft resellers played a key part in helping to trace the counterfeit software and provided physical evidence critical to building the case, such as e-mail messages, invoices and payment slips.
“The evidence provided by Microsoft customers through the Microsoft piracy reporting tool proved to be essential in tracking down this criminal syndicate,” said David Finn, associate general counsel for Worldwide Anti-Piracy and Anti-Counterfeiting at Microsoft. “It is no exaggeration to say that the ability of our customers to identify counterfeit software through Windows Genuine Advantage, and the subsequent help of our customers and partners, was absolutely critical in ultimately identifying this massive counterfeit manufacturing and distribution network. We take seriously our responsibility to protect customers from the productivity and security risks associated with counterfeit software, and we are committed to educating customers on what to look for and what to avoid, deploying engineering innovations to better protect the software, and pursuing criminal prosecutions to protect customers and partners when appropriate.”
Protecting Customers From the Risks of Counterfeit Products
Customers expect to receive genuine, high-quality software, but counterfeit copies often contain malicious code and/or malware and fail to operate properly, presenting real risk through potential security breaches and the loss of business data, reputation and cost to recover from them.
According to an October 2006 IDC white paper sponsored by Microsoft, acquiring and using counterfeit product keys, pirated software, key generators and crack tools for Windows XP and the Microsoft Office system may increase the risk of exposure to viruses, worms and other damaging code, including spyware, Trojan horses and modified code. The study can be found at http://www.microsoft.com/athome/security/update/wga/default.mspx.
The Costs of Piracy
Globally, counterfeiting robs the software industry of an estimated $40 billion (U.S.) per year. Lost industry revenue is just the beginning; the fourth annual BSA and IDC global software piracy study (May 2007) estimated worldwide piracy rates at 35 percent in 2006. According to the study, reducing this rate by just 10 percent over four years could potentially generate 2.4 million new jobs, $400 billion in economic growth and $67 billion in additional tax revenue for the world economy. In the last 18 months alone, worldwide law enforcement agencies have seized more than 914,177 units of counterfeit Microsoft software.
The Microsoft Genuine Software Initiative
Microsoft launched the Genuine Software Initiative in 2006, and since then it has intensified its efforts to protect customers and channel partners from the risks of counterfeit software through an increased focus on education, engineering and enforcement.
More information about Microsoft’s Genuine Software Initiative is available at http://www.microsoft.com/genuine.
Windows Genuine Advantage
As part of the Genuine Software Initiative, Microsoft is continuing to invest in anti-counterfeiting technologies and product features that protect the company’s intellectual property and alert consumers to the presence of counterfeit software. Windows Genuine Advantage enables customers to validate their software remotely with Microsoft, giving customers the power to check whether they are using genuine software. Since July 2005, 512 million users worldwide have validated their copy of Windows through Windows Genuine Advantage. In 2006, there were nearly 400 million validations, with a failure rate of 22.3 percent.
About Microsoft
Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.
I was Declared Earlier Also , that the matter is serious know.They Are Addicted To Counterfiet Anything
Whether Software or Hardware.No body listen to me and loose 2 billions (Till 2007).Now Its Worsens
Even More And we are going to loose 5 billion app.
Culprit: Vendors having license to sell microsoft products , Re-Sellers , Institute All used Pirated CD's And DVD's( In India) .
Raids and arrests in China over the past two weeks mark the culmination of a multiyear investigation into a major software counterfeiting syndicate based in the southern China province of Guangdong. The syndicate is allegedly responsible for manufacturing and distributing more than $2 billion worth of counterfeit Microsoft® software. The investigation into this syndicate, which is believed to be the largest of its kind in the world, was led by the FBI and China’s Public Security Bureau (PSB). Microsoft Corp., hundreds of Microsoft customers and scores of Microsoft partners also assisted in the investigation.
These raids and arrests by the PSB, drawing on information provided by the FBI Los Angeles and Microsoft, targeted sources behind the illegal commercial production of Microsoft software, software components and certificates of authenticity. Law enforcement authorities and forensic specialists identified numerous replication plant lines that were involved in the CD production and were the source of counterfeit Microsoft products that had been supplied and sold to business customers and consumers around the world. The counterfeit software, found in 27 countries and on five continents, contained fake versions of 13 of Microsoft’s most popular products — including Windows Vista®, the 2007 Microsoft Office release, Microsoft Office 2003, Windows® XP and Windows Server®. The counterfeits were produced in at least eight languages: Croatian, Dutch, English, German, Italian, Korean, Simplified Chinese and Spanish.
“Microsoft deeply appreciates the work of China’s Public Security Bureau in taking such strong enforcement action with these arrests and raids in Southern China,” said Brad Smith, senior vice president and general counsel at Microsoft. “This case represents a milestone in the fight against software piracy — governments, law enforcement agencies and private companies working together with customers and software resellers to break up a massive international counterfeiting ring. This case should serve as a wake-up call to counterfeiters. Customers around the world are turning you in, governments and law enforcement have had enough, and private companies will act decisively to protect intellectual property.”
During the course of the multiyear investigation, more than 55,000 sophisticated-quality copies of counterfeit software were traced back to the same southern China criminal syndicate. These counterfeit products came from seizures by law enforcement and customs authorities, through submissions made by Microsoft customers and partners, and from test purchases. The 55,000 examined discs are believed to constitute less than 1 percent of the millions of counterfeit copies that are estimated to have been produced and shipped to distributors and countries across Europe, the Middle East, Asia, Australia, the United States and Canada. Countries around the world are expected to experience a significant decrease in the volume of counterfeit software as a direct result of this action.
According to World Customs Organization Secretary General Michel Danet, “Customs around the world, from Cairo to London, Vancouver to Hamburg, and New York to Beijing, seized dozens of shipments numbering thousands of counterfeit Microsoft software products produced by these criminals. This clearly shows that customs around the world are at the forefront of the battle to protect consumers from harm by counterfeit goods, and that sharing information is vital in order to build strong enforcement.”
Customers and Resellers Report on Syndicate
Microsoft customers and software resellers played a major role in ultimately helping the FBI and the PSB identify and build the case against the China-based counterfeiting syndicate. Tens of thousands of customers used Microsoft’s anti-piracy technology in Windows Genuine Advantage to identify the software they were using as fake. More than 1,000 of these customers then submitted physical copies of counterfeit Windows XP for analysis, which Microsoft was then able to forensically link to the counterfeit syndicate. In addition, more than 100 Microsoft resellers played a key part in helping to trace the counterfeit software and provided physical evidence critical to building the case, such as e-mail messages, invoices and payment slips.
“The evidence provided by Microsoft customers through the Microsoft piracy reporting tool proved to be essential in tracking down this criminal syndicate,” said David Finn, associate general counsel for Worldwide Anti-Piracy and Anti-Counterfeiting at Microsoft. “It is no exaggeration to say that the ability of our customers to identify counterfeit software through Windows Genuine Advantage, and the subsequent help of our customers and partners, was absolutely critical in ultimately identifying this massive counterfeit manufacturing and distribution network. We take seriously our responsibility to protect customers from the productivity and security risks associated with counterfeit software, and we are committed to educating customers on what to look for and what to avoid, deploying engineering innovations to better protect the software, and pursuing criminal prosecutions to protect customers and partners when appropriate.”
Protecting Customers From the Risks of Counterfeit Products
Customers expect to receive genuine, high-quality software, but counterfeit copies often contain malicious code and/or malware and fail to operate properly, presenting real risk through potential security breaches and the loss of business data, reputation and cost to recover from them.
According to an October 2006 IDC white paper sponsored by Microsoft, acquiring and using counterfeit product keys, pirated software, key generators and crack tools for Windows XP and the Microsoft Office system may increase the risk of exposure to viruses, worms and other damaging code, including spyware, Trojan horses and modified code. The study can be found at http://www.microsoft.com/athome/security/update/wga/default.mspx.
The Costs of Piracy
Globally, counterfeiting robs the software industry of an estimated $40 billion (U.S.) per year. Lost industry revenue is just the beginning; the fourth annual BSA and IDC global software piracy study (May 2007) estimated worldwide piracy rates at 35 percent in 2006. According to the study, reducing this rate by just 10 percent over four years could potentially generate 2.4 million new jobs, $400 billion in economic growth and $67 billion in additional tax revenue for the world economy. In the last 18 months alone, worldwide law enforcement agencies have seized more than 914,177 units of counterfeit Microsoft software.
The Microsoft Genuine Software Initiative
Microsoft launched the Genuine Software Initiative in 2006, and since then it has intensified its efforts to protect customers and channel partners from the risks of counterfeit software through an increased focus on education, engineering and enforcement.
More information about Microsoft’s Genuine Software Initiative is available at http://www.microsoft.com/genuine.
Windows Genuine Advantage
As part of the Genuine Software Initiative, Microsoft is continuing to invest in anti-counterfeiting technologies and product features that protect the company’s intellectual property and alert consumers to the presence of counterfeit software. Windows Genuine Advantage enables customers to validate their software remotely with Microsoft, giving customers the power to check whether they are using genuine software. Since July 2005, 512 million users worldwide have validated their copy of Windows through Windows Genuine Advantage. In 2006, there were nearly 400 million validations, with a failure rate of 22.3 percent.
About Microsoft
Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.
Subscribe to:
Comments (Atom)