Friday, April 1, 2011

India would have reached final despite loss

There was something very shocking yet interesting things on ibn news, i am putting odd post but hackers take lods of interst in sports so thought of sharing this with them.

Had India lost the World Cup semi-final match to Pakistan at Mohali on Wednesday, the Indian government would have been under pressure to demand a repeal of the result. If Prime Minister Manmohan Singh had not stepped in to prevent a controversy that had the potential to snowball into an international crisis, India could have come close to invoking a rarely-cited section of the International Cricket Council (ICC) code of conduct to annul a Pakistani victory.According to highly placed sources at the Prime Minister’s Office, Singh, in an uncharacteristic display of firmness, set aside moves by the Indian cricket board to invoke a dusty law in the ICC rulebook that would have disqualified Pakistani players of disputed domicile. This exclusive comes in the backdrop of a highly anticipated World Cup final between India and Sri Lanka at Mumbai’s Wankhede Stadium, even as the foreign secretaries of India and Pakistan met marking the resumption of official contacts, which India broke off after militants attacked Mumbai in late 2008.ICC’s Law 1.4 (11), that explicates the eligibility criteria for players, clearly states that to play Under-19 cricket or above at the international level, a player has to be a) a national or b) be born in a recognized country or c) is resident in the country for at least 90 days in each of the immediately preceding seven years. A sub-section of the law that enumerates a "disputed domicile" states that any player from a country/state not recognized by all Test-playing and associate members of the ICC can be disqualified at any time if they fail to submit a certificate of clearance issued by the world cricketing body 30 hours prior to a match to the host country. Several players of the current Pakistani World Cup squad were born in Pakistan occupied Kashmir (PoK) and have stated PoK as their domicile in documents submitted to the Ministry of External Affairs.However, due to a technical snag at the Pakistani Foreign Ministry the players reportedly could not submit their ICC clearance certificate to the MEA on time, a technicality the Indian side was ready to pursue had they lost to Pakistan in the semis.
This basically means that had India lost to Pakistan in the semis it would be still eligible to play Sri Lanka in the final had it invoked Law 1.4(11) to get some of Pakistan’s top spinners and a middle-order batsman disqualified. The law further states that if four or more players are disqualified then the match result is null and void and the defeated team is automatically eligible for a walkover.
Senior Bharatiya Janata Party (BJP) politician and Leader of Opposition in the Rajya Sabha, Arun Jaitley, told IBNLive in an exclusive interview that he first came to know of the delayed certificates through a MEA leak. “After a hectic midnight meeting with the BJP top brass before the crucial semifinal match, I immediately brought it to the notice of Mr S M Krishna,” Jaitley said.India has not won the Cup in 28 years and emotions are riding high in a country hungry for a win that eluded them several times. Even as a billion people in India sat glued to their television sets as India took on Pakistan at Mohali, Krishna and Jaitley, along with senior leaders from both Congress and BJP, met ICC President Sharad Pawar Wednesday evening to discuss the possibilities of a repeal in the event that India lost the match.Sources at the MEA said an emergency cabinet meeting was called at around 5 pm, when the Indian innings seemed to be floundering after in-form Yuvraj Singh lost his wicket to a full toss and Pakistani spinners took control leaving India gasping at 194/5.“That’s when I told Mr Krishna, a win looks impossible,” Jaitley told Pawar, who Jaitley said was open to the idea of a match reversal asked to see the official papers of four Pakistani cricketers who we are told originated from PoK. MEA sources said the identity of the Pakistani players were not to be divulged for security reasons. But there are two spinners and a middle-order batman among the four, the sources said.
A reversal would not only result in the Pakistani team being disqualified from the semifinal and India being given a secured final spot but had the potential to trigger off a major diplomatic row between the two nuclear-capable cross-border rivals.Pakistani Prime Minister Yousuf Raza Gilani watched the epic encounter at Mohali from the VVIP stand along with his wife at the invitation of the Indian Prime Minister.A cricket controversy would not only have resulted in a bitter feud between the two nations but sour diplomatic ties as well, which are gradually on the mend after the 2008 Mumbai terror attacks that claimed over 160 lives.Krishna, who reportedly contacted Singh to apprise him of the latest development, was asked by him not to go ahead with plans of a match reversal in case India lost to Pakistan to uphold the spirit of the game.Singh is said to have told Krishna that “India will always play fair, be in war or in cricket, and there will be no exception to that rule.” A united Opposition led by Jaitley said they were ready to dispute Singh’s decision to “play the game fair” had India lost to Pakistan, in Parliament’s monsoon session starting July 26.As it turned out, India won the match, making all of this a hypothetical possibility only. But it remains to be seen whether Singh’s refusal to take this drastic step will be continued in his management of India-Pakistan relations in the face of a belligerent Opposition.Said the editor of to all readers when publishing this report, “Considering the date of the day before the World Cup final, there is no reason to believe any of this.” He confirmed that this report was a figment of the imagination, in keeping with the spirit of the first of April

R45c4l,micr0,javed,chaota hacker, Vaibhav and Cat techi to conduct Hacking seminar all over India

We are here to set trends in hacking world, where ever you go some play with key loggers, some provide you kits and some teach you basics to drag you to slaughter house called ethical hacking classes. They mint money you learn what you never wanted to.. And land up seeking help from others because the one who showed wasted dreams to you is never at your disposal. hacking, Hackers, Crackers ,How to become a Hacker,Information gathering of target Information gathering of target network..Oh ho all this is old time story..There is much more to explore and much more to experiment..Don’t create brand..Become one

Only basic knowledge of computer and Internet requiredWorkshop benefits

Our approach is to aware common population to fight against cyber-terrorism, online threats and there cure, some vocational trainings and 24/7 support

Good and respective carer

Workshop Duration

12hours (6 hours /day)

Certification Policy

Certificate will be given to all participants onthe successful completion of workshop.

Contact detailed

Are you satisfied about the seminars which you have attended?if not contact us at


Wednesday, March 30, 2011

Hacker5 to conduct security seminar for all hackers,students and corporate sectors- special lectures by Rascal,Javed and cattechie

securing India (Awareness Workshop on ethical hacking and Information security)

Our basic concern is to aware our Young generation from upcoming online threats to move towards secure India by empowering our country through education medium lets be unite and tell our enemy countries we are Indian's not a easy bolt to crack

The most popular information security and hacking training would go in-depth into the techniques used by malicious, black hat hackers and the dangers they pose. While these hacking skills can be used for malicious purposes, this class would teach how to use the same hacking techniques to perform a white-hat, ethical hack, on one’s organizations. One would leave with the ability to quantitatively assess and measure threats to information assets; and discover where his organization is most vulnerable to hacking in this network security training course.The goal of this seminar is to help one master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical security training course has a significant Return on Investment as you gain knowledge of ethical hacking and walk out with skills that are highly in demand in today’s digital world.Nowadays with the increased advancement of technology, cyber threats too have taken a modern form. At one side where computers have made our day to day lives easier and faster, on the other hand it has also become a tool to many people for committing various criminal activities.

why should it required ?

We believe that next world war is not fight by arms or atom bombs its cyberwar result may be drawn our country 20 years back. So we are preparing our country for securing them self

Another big issue of our country is employment there is huge gape between a good education and employment all courses are so much theoretical that cant fill the requirement of upcoming industry need we design a very good syllabus to reduce the gap between eduction and employment as much is possible

"NASSCOM predicts requirement of 1,88,000 professionals by the year 2010. Currently the number of security professionals in India is around 22,000."

What do you expect from Hacking classes and seminar?

More practical less theory
live demo

New and latest technology

Knowledge about Cyber Terrorism

Use of manual methods rather then use of automated tools

Who should attend ?
IT Students & Professionals

Network Engineers

System Administrators
Every Indian how using computer


Only basic knowledge of computer and Internet required

Course benefits

Our approach is to aware common population to fight against cybertarisum

online threats and there cure
Good and respective carer

Workshop Duration18 hours

Certification PolicyCertificate will be given to participants on completion of workshop.

Contact detailed
Are you satisfied about the seminars which you have attended?
if not contact us at

Tuesday, March 29, 2011

Phishing scams in India and legal provisions

phishing, noun, the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

SUPPOSE, ONE day you open your email, and find a weird looking mail from your bank, beware, it could be something phishy! A message in your inbox from your bank with which you have an internet enabled account asking to update your account with your personal information, login detail, etc., on the pretext of upgradation of server of the bank, should not be opened. You would also see a link, by clicking on which you would be linked to a look alike website of your bank, which looks quite authentic and convincing. However, you may be smart enough to know that this is a trap by a con to get your vital personal information to make fraudulent financial transactions and swindle your money. But there are many others who are not as smart as you, and fall into the trap and pass on their vital login details and lose their valuable money.

Phishing is an internet-age crime, born out of the technological advances in internet age. “Phishing" is a newer form of social engineering. Typically, Phishing is a form of social engineering, characterised by attempts to fraudulently acquire sensitive information, such as passwords, usernames, login IDs, ATM PINs and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message.

The phishing attacks will then direct the recipient to a web page (mirror webpage) so exactly designed to look as a impersonated organization’s (often bank & financial institution) own website and then they cleverly harvest the user's personal information, often leaving the victim unaware of the attack.Phishing has become so rampant that even the Oxford English Dictionary added “Phishing” to its latest publication making it a definitive word of English Language.

It defines “Phishing” as:

As per the American Banker’s Association “Phishing attacks use 'spoofed' e-mails and fraudulent Web sites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, Social Security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5 percent of recipients to respond to them.”

The Anti-Phishing Working Group (APWG), which is an industry association focused on eliminating identity theft and fraud from the growing problem of phishing and email spoofing defines Phishing as a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. According to the Annual Report of the Indian Computer Emergency Response Team (CERT-In), Deptt. of Information Technology, Ministry of Communications & Information Technology, (Govt. of India) in the year 2009, the CERT-In handled about 374 phishing incidents.

Major factors for increase in Phishing Attacks:

There are three major factors behind the recent spurt in phishing attacks worldwide particularly in India: Lack of awareness among public: Worldwide, particularly in India, there has been lack of awareness regarding the phishing attacks among the common masses. The users are unaware that their personal information is actively being targeted by criminals and they do not take proper precautions when they conduct online activities.Lack of awareness about policy – The fraudsters often count on victim’s unawareness of Bank/financial institution policies and procedures for contacting customers, particularly for issues relating to account maintenance and fraud investigation. Customers unaware of the policies of an online transaction are likely to be more susceptible to the social engineering aspect of a phishing scam, regardless of technical sophistication.Technical sophistication – Fraudsters are now using advanced technology that has been successfully used for activities such as spam, distributed denial of service (DDoS), and electronic surveillance. Even as customers are becoming aware of phishing, criminals are developing techniques to counter this awareness. These techniques include URL obfuscation to make phishing emails and web sites appear more legitimate, and exploitation of vulnerabilities in web browsers that allow the download and execution of malicious code from a hostile web site.

Techniques of Phishing attacks Man-in-the-middle attacks: In this class of attack, the attacker sits between the customer and the real web-based application, and proxies all communications between the systems. This form of attack is successful for both HTTP and HTTPS communications. The customer connects to the attackers server as if it was the real site, while the attackers server makes a simultaneous connection to the real site. The attackers server then proxies all communications between the customer and the real web-based application server – typically in real-time.

URL Obfuscation Attacks: Using URL obfuscation techniques which involves minor changes to the URL, the fraudster tricks the user to follow a hyperlink (URL) to the attacker's server, without the users realizing that he has been duped. URL Obfuscation uses the unspoken, unwritten secrets of the TCP/IP protocol to trick users into viewing a website that they did not intend to visit.

XSS (Cross-site Scripting): Cross-site scripting attacks (XSS) make use of custom URL or code injection into a valid web-based application URL or imbedded data field. In general, these XSS techniques are the result of failure of a site to validate user input before returning it to the client’s web-browser.

Phishing scenario in XSS:

•Victim logs into a web site

•Attacker has spread “mines” using an XSS vulnerability

•Victim fall upon an XSS mine

•Victim gets a message saying that their session has terminated, and they have to to authenticate again

•Victim’s username and password are send to attacker

(To be continued)

Monday, March 28, 2011


News makers achievers awards in IT sector Best ethical hacker -Manu Zacharia, black hat hacker –r00t, Hacking seminar- Null Con, security agency- AAA technologies, Cyber security officer – Vijay Mukhi, Best ethical hacking coaching Innobuzz.

Not everybody pays their life for society. A person in any field whether an artist or a social worker should be appreciated, if he has contributed his time and efforts for the sake of society. We, Newsmakers Broadcasting and Communications Pvt. Ltd., (NBC) comprehending the importance of such people in society who have never claimed for their name to be cherished for their contribution; not only salute their hard work to improve the society but also like to count them amongst deserving citizens for awards which will be honoured on May 1st, 2011.


NewsMakers Broadcasting and Communications Pvt. Ltd, has set new horizons of ethical journalism is honouring unsung heroes of our society through the NewsMakers Achievers' Awards to the people who have risen from the rank and file of the common man to act as the beckon light for the multitude of humanity to rise to a notch above the ordinary.

NOMINATION: This honour will be presented at a grand function which will be attended by delegates of many countries, celebrities, business dignitaries, politicians, et al. A star studded event that will be remembered and cherished by every Indian. To be unbiased and transparent, the nomination procedure is kept open to the public. One can nominate their favourite heroes by sending us SMS or via email.


NBC has within a brief span of time become a name to reckon within the media. Our publication are fast being recognized for comprehensive analysis of events covering a wide range of subjects, the magazine has been appreciated on more than one occasion for its bold presentation of facts. The exclusive news, views and interviews have become the talk of the town. Our readership profile comprises of, besides the common man, the businessmen, hoteliers, entertainment industry, medical profession and others interested in gaining in-depth understanding of the subject. In-depth coverage of top stories dealt with responsibility, courage and honesty has made our presence felt in the market in a matter of just seven months! It was launched on 3rd July, 2009 and it has reached majority of the stalls all over the city with a wide readership.

Our core competency lies in providing extensive and exclusive coverage to all spheres of information, which is made possible by our dynamic team, comprising of the right blend of youth and experience. This provides our publications freshness and depth. Honest reporting with an emphasis on ethics is our forte. We are a multi-dimensional media company involved in a multitude of activities in electronic and print media, which includes, among others, production of TV serials and documentaries and our leading publications include Beyond the News, the international fortnightly magazine and a daily eveninger Afternoon Voice; both being printed and published from Mumbai.

'Afternoon Voice' is a Mumbai daily covering all aspects of the city. Besides the daily diet of news, sports and business; readers are served stimulating columns and features related to the theme of the day. With an ever-expanding readership base, our newspaper tries to be different by not just focusing on city-centric reporting but also present the relevant national events with the city's viewpoint. Detailed contents of these are available on our websites and respectively. Maritime Bridges is our monthly trade magazine which gives the readers an insight on the shipping industry and maritime events happening along the country's vast coastline. Soon to reach stands are Mee Mumbaikar, a monthly Marathi magazine and Mumbai Manoos, a Marathi daily; both shall have superlative and fresh content specially drafted for the niche readers. Today, everyone is speaking in hushed voice about the growing popularity of our publications and even veterans in the field are feeling threatened by this fledging. We set new trends in the industry and our production and editing standards are being taken note of by even well established print and production houses

more details on