IRJMST Volume 3 Issue 3 Online ISSN 2250 - 1959 International Research Journal of Management Science & Technology http:www.irjmst.com Page 243 Cyber crime How and Why Hackers attacks Systems - IRJMST By Jagmender Singh How and Why Attackers Use Proxies Masking one ’s IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity‚ thereby frustrating law enforcement efforts to identify the original location of
Premium IP address
Cyber bullying is the fastest growing trend in bullying among teens and probably the most dangerous. It gives anonymity to those who don’t want people to actually see them bullying in school. Also‚ cyber bullying takes away the last sanctuary some of these kids have‚ their home. What an awful feeling that must be‚ to come home from a day of being picked on just to be picked on more via internet. Cyber bullying can come in many ways: text message‚ email‚ website‚ blogs‚ They can be pictures taken
Premium
various lucrative investment schemes over a period of 4-5 years. The chief financial regulatory bodies like SEBI and RBI failed to sense the possibility of any fraud involved in the rosy schemes. The doubts began to roll in 1995-96 following which the scam came in light. CRB Group Bhansali was born in a jute trader’s house in Calcutta. After obtaining a degree in commerce‚ Bhansali became Chartered Accountant in 1980. In the same year‚ he started a financial consultancy firm‚ CRB Consultancy.
Premium Bank Hedge fund Mutual fund
Introduction to scams Various scams‚ scandals and stigmas that have surfaced in the recent years. These may not all be attributable to the antics and bungling of politicians‚ but they have been facilitated largely because of the vitiated atmosphere that the politicians and the political system have created in the country. Scams and scandals have manifested themselves in large numbers over the past few years. The latest‚ the Petrol Pump Scam concerning 3‚158 allotments of petrol pumps‚ LPG agencies
Premium Fraud Bihar Names of large numbers
Commonwealth Games… The insights – Intro: The Commonwealth Games Scam - Tuesday‚ 03.08.2010 The 2010 Commonwealth Games are the nineteenth Commonwealth Games‚ and the ninth to be held under that name. The Games are scheduled to be held in Delhi‚ India between 3 October and 14 October 2010. The games will be the largest multi-sport event conducted to date in Delhi and India generally‚ which has previously hosted the Asian Games in 1951 and 1982. The opening ceremony is scheduled to take place
Premium India 2010 Commonwealth Games Indian National Congress
The Future of Cyber-Sex and Relationship Fidelity: Rapid Growth of Technology by Marlene M. Maheu‚ Ph.D. The combination of the telephone and the Internet will provide more uses and conveniences than imagined just ten years ago. The telephone is likely to be the pivotal technology‚ so that people will have personal numbers that can be taken with them as they transfer from job to job‚ and home to home. It is already possible to use the telephone for receiving email messages and surfing the net
Premium Internet Mobile phone Telephone
Colgate Scam is the recent coal scandal that happened in the country due to poor allocation of coal blocks. This scam is also called the “Mother of all scams’. CAG report shows that private companies had gain around Rs 1.86 lakh crore from coal blocks that were allocated to them on nomination basis instead of competitive bidding‚ which amounted to the loss to national exchequer.194 coal blocks were not auctioned between 2004 and 2011 which causes these huge losses. The losses occurred in a way that
Premium Manmohan Singh
a letter he wrote to the company’s board of directors (Ramachandran‚ 2009). This report is going to focus on‚ an overview of the events that happened in Satyam‚ its consequences on Satyam’s stakeholders‚ the auditors involved and their role in the scam and the current situation of those responsible for the fraud. OVERVIEW OF EVENTS IN SATYAM FROM 1987-2009 Raju formed Satyam in 1987 in Hyderabad‚ India with fewer than 20 employees which then became one of India’s biggest IT services firm (Atesci
Premium Mahindra Group Mahindra Satyam International Financial Reporting Standards
w h i t e p a p e r JUNE 2006 The X-Internet Connecting the Physical World with the Cyber World contents 3 E xecutive Summary 4 I ntroducing the Future: The Extended Internet 5 T echnologies Enabling Seamless Mobility in the X-Internet World 5 A dvanced‚ cooperative wireless technology 5 Context awareness 5 P eer-to-peer awareness‚ self-organization and autonomous action 7 E nergy efficiency and self-generation of power 7 New form factors 8 T he X-Internet Architecture 8 Standards
Premium Wireless RFID
Corporate Governance at SATYAM | | Submitted to-Prof. Rajan Mani | Submitted by- Khushbu Gumber | Shivi Singh | Siddharth Talokar Vikrant Shinde | 9/26/2011 | | Table of Contents Content | Pg. No. | Company Background
Premium Corporate governance Board of directors Mahindra Group