Born and brought up in Tamil Nadu(a state in Southern India) and having lived close to 23 years in the state,I have never done a post on my home state – how did it happen? Let’s get started right away…:) Here are a few points about my beloved state:
These are a few things that I could think of that make Tamil Nadu…can you think of anything else? Add them in comments below! 🙂
This post is my sixth post for my #MyFriendAlexa by @Blogchatter.
The Information security world is a deep one and sometimes it is quite shocking to know the things that can be done. Did you know that ‘Black widow’ is not just the name of a spider…but it is a actual software that is used for ‘reconnaissance’ too(Of course, InfoSec professionals will know :))
‘Reconnaissance’ is the ability to obtain freely available information about a website. Vocabulary.com defines “Reconnoitering as checking something out, but in a sneaky way!”
Once this information is obtained one can seal the extra unwanted information that is unintentionally creeping out(for example, maybe passwords and employee details are visible with the reconnaissance tools) One of the ways that a site can be ripped is by employing website downloaders like ‘Black Widow’, Website downloader and Httrack.
Most of these tools will allow you to download the entire website and the directory structure, external links, bad links and email addresses. The picture below shows a screen shot of the ‘Black Widow’ software…
The details provided above are for informational purposes only! Please do not use it in any inappropriate way!
This is my fifth post for #MyFriendAlexa by @Blogchatter!
Liked this post? Please comment and share! 🙂
He got up at the same time of 4:30 every morning. Not one morning had he ever gotten up late. In fact, the alarm always needed him to get up… 🙂 He had his fixed morning routines that he would follow everyday. Whether it was the gym or walking – it was followed meticulously and perfectly. Neither rain nor shine could ever disrupt anything. He would leave for work at the exact same time everyday and get back home at the exact time everyday. Breakfast, lunch, dinner was had at the same time of day. Exercise was reserved for certain days of the week. Personal phone calls were made at the exact time intervals(nobody gets extra free calls in his routine!! :)) Even the move to India had not thrown his schedule out of gear.
If he was busy doing something, it had to be at a particular time of day…There was no need to to look at the clock in this house as there was already a “clock” roaming around! 🙂 Once you see him in a particular location, you knew the time of the day.
She knew the routine as she was married to him for a very long time. While most people maintain a routine, he was an absolute stickler for it…from food habits to exercise to sleep and work – everything followed the hands of the clock. No wonder she thought she was married to the clock rather than him!! 🙂
Most of you must have guessed this “clock” – if you haven’t as yet guessed, come home – I will introduce you to him! 🙂
This is the fourth post for #MyFriendAlexa by @Blogchatter
The online world unfortunately is not a fun place as it seems. There are other types of people around too seeking to grab credit card numbers, bank account numbers, steal pictures of children and/or any personal data that is floating around.
Let us assume that you would like to visit a website, www.abac.com (a fictitional website) What happens when you visit www.abac.com and do a bit shopping and submit your bank account details or any other personal details only to realize after a day – that the website that you visited was actually a fake one?
This type of attack is known as ‘Pharming’. ‘Pharming’ is done by modifying the victim’s file or by a more complicated technique known as ‘DNS poisoning’.
To protect oneself:
The best way to protect oneself from ‘Pharming’ attacks is to:
We have seen yet another concept of ‘Information security’ in this post.
This is the third post for ‘MyFriendAlexa’ by @Blogchatter!
She was busy in the kitchen. It was a Monday morning. The school bus would be here anytime. It was idli for breakfast. While the first kid was unhappy about idli being the breakfast for the day, the second kid was super excited! One preferred coriander chutney. The other one preferred sambhar. Husband was already rushed and late for a meeting(what’s new?! :)) It was a super busy morning making breakfast/lunch – sending the kids and husband off to school/work and getting herself ready for work too!
After work, she had to give attention to both kids as each of them had separate requirements. One needed chart paper for a project, the other needed a printout. Home work, exams, were all over the place and seemed to be solely her responsibility. Dinner had to made and her own needs had to be met too. While her husband did step in every once in a while to help out…he could never keep with all the things she could do…
Sounds like a familiar story? It is not mine 🙂 but I am sure it is many a woman’s story…
Multi-tasking is the art of doing multiple things simultaneously in my view. Who does this better?
Working moms, stay at home moms, work from home moms, young ladies are all into multiple things at once. They will don multiple hats during the day and night. They create yummy food for their family according to each one’s taste, teach their kids, do their projects, become a doc for their kids during medical crisis, shuttle the kids from class to class, support their families, keep up with their own personal interests and more! I feel like they are demi-gods brandishing the ‘multi-tasking’ sword…
With all the above points, I have a faint idea about who is the better multi-tasker.. don’t you? 🙂
This post is my second post for #MyFriendAlexa by #Blogchatter!
Have a wonderful day! 🙂
While ‘Information security’ always gives us images of breaches, hacks, stolen credit card numbers and bank account numbers, my blog has always been associated with the concepts of ‘Information security’ or the many defenses that are there to keep your information safe.
In this post, I will like to delve into the reality of letting off the ‘Information security’defenses down. Apart from the breaches and hacks, what are the other ugly things that are possible? While this may be common knowledge to those in InfoSec domain – it may not be known to every one. It is always a common thought – “it will not happen to me” – it is a reality that it does happen quite frequently and everybody gets affected at some point or other!
There are a variety of ways in which one can remotely control another person’s Android or Apple device. There are plenty of apps that allow you to control an Android device from a PC, via an another Android device, via WiFi, via Bluetooth and really the possibilities are endless!
I am sure most of you remember the time when Saket Modi, the co-founder and CEO of Lucideus hacked the phone of a person sitting in the audience. Through this hacking, he was able to procure the subject’s SMSes, contacts, call logs, GPS locations and more! (Source: https://www.youtube.com/watch?v=3fT6pUQrY6M)
2. Hacking cars?
Is this even possible? Yes – maybe in the future! Researchers have shown that hackers can remotely kill your engine, lock the doors to your car, put the car in reverse gear without your permission and many other frightening moves!
Automotive hacking may be a distinct possibility as the years roll by!
3. ATM skimming
Many people are sure to have fallen to this type of hack. A small skimmer is attached to the ATM machine by means of which bank details are retrieved. The numbers are then transferred to blank ATM cards and money and data are stolen!
‘Keylogger’ is a type of surveillance software which when installed on your system, can monitor every key stroke, record passwords, captures screenshots and more. It can be run in invisible mode and thereby the user will have no clue of its presence. This is commonly used by employers to keep tabs on their employees.
In addition to all this, the devious mind can find ways to see your private Facebook picture, Instagram pictures and any other private information. In short, the more you want to keep it private online, the more someone is eager to see it! 🙂
This is just the tip of the wild side of security hacks… anything is possible for a determined mind!
How do we protect ourselves from all this?
Maintain a minimal online presence. And it is good to keep up with all security updates and install all patches and upgrades as and when posted.
This is my first post for #MyFriendAlexa. I am taking my Alexa rank to the next level with #Blogchatter