WHATSAPP & INDIAN CYBERLAW

Amazon Price: N/A (as of September 19, 2017 22:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

WHATSAPP & INDIAN CYBERLAW

India is already undergoing a huge mobile revolution. The numbers of smartphones that are continuing to be sold in India are an indication of the growing dependence on smartphones by Indians. Consequently, Indians are using various mobile applications. WhatsApp is one of the most popular mobile applications in India. Primarily because WhatsApp is free, it appeals to large number of Indian users who find the said platform very convenient for the purposes of communicating audio, video, image and text. However, the usage of WhatsApp has got distinct legal ramifications in India, thanks to the Indian Cyberlaw being in place.
Continue reading “WHATSAPP & INDIAN CYBERLAW”

Detecting and modeling polymorphic shellcode: A new approach

Amazon Price: $71.00 $50.25 You save: $20.75 (29%). (as of September 20, 2017 18:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The problem of modeling and detecting polymorphic engines shellcode is adressed in this book. By polymorphic engines, we mean programs having the ability to transform any piece of malware into many instances consisting of different code but having the same functionality as the original malware. Typically, polymorphic engines work by encrypting the target malware using various encryption techniques and providing a decryption module in order to execute the newly encrypted instance. Moreover, those engines have the ability to mutate their decryption routine making them unique from one instance to another and hard to detect. We propose a new concept of signatures, shape signatures, which cope with the highly mutated nature of those engines. The shape signatures try to identify the constant part as well as the mutated part of the deciphering routines. This combination is able to cope with the highly mutated nature of those engines in a much more efficient way compared to traditional signatures used in most intrusion detection systems. We also aim at modeling those polymorphic engines by showing that they exhibit a specific byte composition.

Age of Context: Mobile, Sensors, Data and the Future of Privacy

Rating: 
Amazon Price: N/A (as of September 20, 2017 14:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we’ll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we’re running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

Troubleshooting with Wireshark: Locate the Source of Performance Problems

Rating: 
Amazon Price: $49.95 $49.95 (as of September 20, 2017 17:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Whether you are a Wireshark newbie or an experienced Wireshark user, this book streamlines troubleshooting techniques used by Laura Chappell in her 20+ years of network analysis experience. Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more.

Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more.
Continue reading “Troubleshooting with Wireshark: Locate the Source of Performance Problems”

INDIAN NATIONAL CYBER SECURITY POLICY-A LEGAL ANALYSIS

Amazon Price: N/A (as of September 20, 2017 12:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

INDIAN NATIONAL CYBER SECURITY POLICY-A LEGAL ANALYSIS

In today's era, cyber security is becoming increasingly very significant. Cyber security is increasingly engaging the attention of the relevant lawmakers across the world and India is no exception.
Continue reading “INDIAN NATIONAL CYBER SECURITY POLICY-A LEGAL ANALYSIS”