securitylinkindia

MassMediaLink India LLP SecurityLink India

Dahua

Dahua H.265 Wi-Fi Cameras A26/C26

Dahua Technology has released its H.265 consumer series products earlier this year – the indoor cube model C26 and the pan & tilt model A26. In an era when people are less at home, they can connect to it with A26/ C26. C26 supports intelligent human detection and instant alert, keeping consumers aware of what is going on at home any time they want. Smart Tracking of A26/ C26 automatically tracks and keeps tracking any moving object around the camera. Highlights Fluent high-resolution video based upon H.265 With 2MP image sensor, A26/ C26 delivers crystal clear image. The latest H.265 compression saves up to 50% bandwidth and storage, eliminating users’ worry about the network bandwidth or storage while enjoying better video. Cloud services through Easy4ip App With an Easy4ip cloud account, one has access to camera through smart phone as long as Internet is available. One can record daily or motion videos on Easy4ip Cloud and playback anytime anywhere. Also, Dahua Easy4ip platform supports IFTTT, which enables Dahua cameras to interact with other smart home applications, such as Philippe Hue, Amazon Alexa etc. Instant alert via motion detection A home surveillance camera that supports motion detection sends alerts whenever motion event happens. 24/7 protection with Smart IR LED With high quality IR LED and Dahua Smart IR algorithm the cameras automatically switches the night mode on and off, and they can adjust the brightness of the IR LED automatically when the light condition changes. Two-way audio Dahua indoor Wi-Fi cameras support built-in Mic and Speaker so all the recorded motion or daily videos support Two-way Talk. When someone breaks in you’ll receive an alarm alert at the real time. Special specifications of camera A26 supports 355° pan & 90° tilt, so it can rotate to see all directions with no blind points. Smart Tracking based upon advanced tracking algorithm enables the camera to automatically focus on and follow moving objects in both horizontal and vertical way, even when the camera is installed on the ceiling. C26, with super wide 130° horizontal field of view, can see a whole room through 1 camera. And with the magnetic base you can stick it to any metal surface. With Human Detection based upon powerful image processing technology, C26 detects people by recognizing human heads, greatly reducing false alerts to situations such as falling leaves and light change. Applications Dahua A26/ C26 cameras are a perfect solution for vacant home and shops.

Read More
VIVOTEK

VIVOTEK New Flagship H.265 Cameras

VIVOTEK has revealed five new flagship H.265/ HEVC cameras to add to its H.265 product line. The release includes three 2-megapixel fixed dome cameras – FD9165- HT, FD9365-HTV and FD9365-EHTV and two 2-megapixel bullet cameras – IB9365-EHT and IB9365-HT. The series of cameras are embedded with Trend Micro’s antiintrusion software, which empowers them to automatically detect and prevent credential-based attack as well as block suspicious events, enabling users to enjoy higher levels of network security. Moreover, the newly added H.265 cameras are equipped with the new generation of technology, including Smart Stream III and SNV II (Supreme Night Visibility II), making these cameras capable of optimizing both bandwidth and storage efficiency by up to 90% while ensuring safety and security around the clock. “Cyberattacks have recently become a serious issue for many different industries, and of course to the IP surveillance industry as well,” said Shengfu Cheng, Director of VIVOTEK Marketing and Product Development Division, “As the global leading IP surveillance provider, VIVOTEK places enormous importance on this issue. We aim to provide our users with products of the highest levels of reliability and quality. With this goal in mind, VIVOTEK is proud to launch this new H.265 series of cameras, and to continue to provide our users the experience of a safer and better solution.” These latest flagship cameras have employed VIVOTEK’s Smart Stream III technology to maximize bandwidth and storage efficiency. By adopting Smart Stream III and H.265 technology, users will benefit from reduced bandwidth and data storage demands by up to 90% over systems employing traditional H.264 without smart stream functionality. In addition, the five 2-megapixel cameras feature SNV II, WDR Pro II and Smart IR II, providing users the best quality image during night by reducing IR hotspots and optimizing IR intensity control. Furthermore, the built-in IR illuminators are now effective up to 50 meters, placing VIVOTEK ahead of the field in H.265 IP surveillance solutions.

Read More
Honeywell

Honeywell Vector Occupant App

Honeywell has recently added new capabilities to the Honeywell Vector Occupant App that give occupants more control over their experiences within a building with the swipe of a screen. The most significant new feature is indoor navigation, which uses GPSlike technology to help users find their way around complex buildings that are difficult to navigate without directions. The benefits of the indoor navigation feature have been demonstrated in the Minneapolis Skyway System, a complex interlinked network of enclosed pedestrian walkways spanning 80 city blocks. The walkways protect Minnesotans from the harsh winter elements and summer humidity, allowing them to comfortably walk between more than 30 buildings in downtown Minneapolis. “For anyone who’s not a local, and for even some who are, finding your way around the skyway system can be a big challenge,” said Steve Cramer, President and CEO, Minneapolis Downtown Council, “With our initial use of the Honeywell Vector Occupant App, we’ve seen an immediate impact. The interactive map makes it really easy and intuitive to know exactly where you’re going, and how to get there.” In addition to the indoor navigation feature, the app also now includes a location-based feature to rate spaces, allowing those within a building to highlight comfort issues to building staff for quick resolution. Both features combine the convenience of today’s mobile devices with Internet of Things (IoT) building connectivity to help improve a user’s experience inside a building. “Much of a building’s success hinges on how happy and satisfied its occupants are. They’re the lifeblood of an organization, and their experience within a building is what keeps them coming back,” said Aseem Joshi, Country General Manager, Honeywell Building Solutions, India, “The Honeywell Vector Occupant App has given users more power to shape their building experiences from their smartphones. Now, we’re adding even more features to deepen the connections between occupants and the spaces around them so they can be as comfortable as possible, and can more easily and efficiently move about a building.” Indoor navigation Enabled by strategic partner Insiteo’s indoor location solution for smart buildings, the indoor navigation feature offers accurate indoor location, mapping, routing, presence, proximity notifications and analytics – all embedded into an integrated platform. Backed by location technology installed within a facility and software, the app’s indoor navigation provides easy-to-use way finding, with turn-by-turn voice assistance and location accuracy up to five feet. The app promotes better collaboration and improved safety via its ‘share my location’ feature, which gives users a way to more easily find each other in a building. For building owners and managers, in addition to promoting occupant satisfaction, the app also provides insights into foot traffic patterns, which building personnel can use to better inform measures like messaging placement to better serve their occupants. Location based space rating The rating feature builds on the app’s original one-click hot/ cold call capability, which lets users raise comfort issues with building personnel for resolution. Building owners and managers can view ratings and feedback on dashboards to pinpoint where building spaces need attention and improvements. They can also visualize longer-term trends and space rankings to uncover patterns and improvement opportunities to promote occupant comfort, satisfaction and productivity. Vector occupant App capabilities The new capabilities build on the Honeywell Vector Occupant App’s base functionality, which includes digital identification, mobile access control and the ability to communicate temperature discomfort to prompt adjustments by facility teams. The Honeywell Vector Occupant App is part of Honeywell’s connected services portfolio, which leverages the connectivity of buildings to improve how they operate and the experiences they offer for those who visit and work within them. The Honeywell Vector Occupant App works with Apple and Android products.

Read More
dss

DDS Protocol Analysis Software

In late 1970s to late 1980s, ATT offered a pure private line digital data service called Dataphone Digital Service, or DDS. Supported rates of 2.4, 4.8, 9.6, and 19.2 were standard with higher rates such as 56kbps; and nx56kbps also possible but rarely. These circuits although legacy, are still quite common today – because they really work. Specialized channel cards called OCU-DP (Office Channel Unit Data Port) are connected to standard CSU/ DSUs with datacomm interfaces. Both synchronous and asynchronous data is formatted and fit cleanly into a 64kbps time-slot (by repeating the data bits or bytes). The bit repetition had the added advantage of providing error correction and thus better performance. The channel data is then inserted into time-slots of a standard T1. In this manner many data circuits can be packed into a private line T1.” “GL supports non-intrusive monitoring and analysis of DDS frames using T1 Analyzer hardware. The captured data can be decoded and analysed by GL’s DDS Protocol Analyzer,” Vijay Kulkarni, the CEO of the company said, “Non-intrusive TAPs are used to passively duplicate the signal between two end points on a network link without disturbing the actual network activity. GL’s T1 Analyzer hardware can be used with RJ48 Y Bridge – splits one RJ48 into two complete and non-intrusively tap and capture the DDS frames on a T1 line.” He added, “The DDS data is formatted into frames separated by one or more bytes. The data channel may utilize multiple, all or a fractional timeslot of the T1 line. Also, there may be multiple data channels within the T1 line. The captured data is analyzed using GL’s DDS Protocol Analyzer.”  

Read More
India-Electronics-and-Semiconductor-Association

India Electronics and Semiconductor Association Vision Summit 2018

India Electronics and Semiconductor Association (IESA), the premier trade body representing the Indian electronic system design and manufacturing space in collaboration with MarketsAndMarkets launched an industry report on Indian semiconductor fabless startup ecosystem at the this year’s Vision Summit. The report was launched by Ashwini K Aggarwal, Chairman, IESA; Anilkumar Muniswamy, Director, SLN Technologies Ltd., and Jitendra Chaddah, Chair, Fabless CIG and Senior Director, Strategic Relations and Operations, Intel India. It reveals that the Indian semiconductor component market is expected to be worth USD32.35 billion by 2025, growing at a CAGR of 10.1% between 2018 and 2025. The inaugural session was presided over by Priyank M Kharge, Honorable Minister for IT, BT and S&T, GoK. H.E. Ms. Dana Kursh, Consul General of Israel to South India and Shailendra Tyagi, Director, STPI Bangalore, were also shared the stage. The Vision Summit is a global leadership conclave for the Electronics System Design & Manufacturing (ESDM) industry. This year the theme is ‘Resurgent India: Electronics, Entrepreneurship and Economy,’ which attracted a powerful line-up of industry experts, thought leaders, policy makers, government officials, business and technology experts, venture capitalists, entrepreneurs who shared their views and vision on the future of the ESDM industry as well as the trends, challenges and opportunities shaping the Indian industry. Ashwini K Aggarwal said, “We are witnessing the rise of a new India with a stable government clearing policy logjams, taking bold decisions and ambitious targets. With digital as the growth hack and aggressive engagement from the government’s ‘Make in India’ campaign, the ESDM industry will benefit and is projected to see investment proposals over $1.5 bln over next 2 years. We believe that now is the time to build the future of design led manufacturing. The fabless report clearly highlights the opportunities for the Indian fabless ecosystem. This year’s theme at IESA Vision Summit 2018 is dedicated towards building the industry success by highlighting opportunity areas and addresses the challenges being faced.” Highlights of the Indian Semiconductor Fabless Startup report: The key trends identified in the report include smart industrial automation, defense and rural broadband. It elaborates on the Indian semiconductor design ecosystem, and highlights the various opportunities for major global semiconductor players to consider India as their global R&D destination. It revealed that India is a highly attractive destination for global R&D centers owing to the availability of talent, as well as lower cost (compared with the US and Western Europe).

Read More
infinova

Infinova VT210-A2-B0 Series Camera

Infinova’s VT210-A2-B0 series H.265 HD megapixel smart starlight WDR IP box camera allows image output resolution up to 1920×1080@30fps. The camera provides excellent resolution and color reproduction, acquires richer and more accurate details, and guarantees intelligent analysis accuracy in a more effective way, which caters for different application needs. The camera boasts of rich intelligent functions, such as wire cross detection, regional invasion detection, field of view change detection, defocus detection, too dark detection and too light detection. VT210-A2-B0 series camera is designed for safe city, rail transit and municipal construction. Particularly, it is widely used in city public security, highway, metro, station, exhibition hall etc. . ● 1/2.8” progressive scan CMOS sensor. IR-Cut removable (ICR) filter for day/ night switching. Star-grade sensitivity: 0.0015 lux. Supports frame integration WDR, with dynamic range up to 132dB (True WDR). High-resolution image signal output: 1920×1080@30fps. Auto back focus (ABF). Smart functions for perimeter protection (wire cross and regional invasion detection) and feature protection (field of view change, de-focus, too dark, and too light detection). Three simultaneous video streams: Dual H.265 & M-JPEG or dual H.264 & scalable M-JPEG. Supports built-in storage/ NAS. Support alarm recording and event recording (including broken network). Supports alarm snapshot and event snapshot. Bi-directional audio, G.711a and G.711u. 2 alarm inputs, 1 on-off output. Support multiple ways to trigger and handle alarms. Up to four definable privacy mask areas. Up to eight ROI (Region of Interest) areas. Support simultaneous access and parameter setting via Web Server from multiple clients. Compatible or able to integrate with digital video surveillance software, and other video surveillance software. ONVIF Profile S & G compliant. Standard SDK is provided for easy integration with other video surveillance software. Wide voltage design.

Read More
matrix_nvr

Matrix NVR for IP Cameras

A network video recorder (NVR) is primarily used to record the video streams of cameras. In medium and large scale enterprises where a huge number of cameras are installed, it becomes a necessity to incorporate a network of NVRs. It provides a systematic log of various camera video recordings and the space required to store the same. However, with the advancement in technology, NVRs are now able to assist or perform many other functions which enhance the security and ease of operation. Some of these features are unique with respect to IP NVR system, while some are found in most of the NVRs produced these days. Matrix NVRs hold one of the unique features called Cascading that eliminates the need of a server to operate CMS (Centralized Management System) as it works on client-server architecture where each NVR is divided into two parts, client and server. The client of one NVR can communicate with the other one’s server and vice versa. Therefore, each network video recorder can supervise and interface with several other NVRs, bypassing the need of a server to do the same, which makes this solution very cost-effective. For example, if multiple NVRs exist in a network, they can still be governed from one of them locally. A single device can act as the server (or a master device) and can control 19 other client (or slave) NVRs. Similarly, there can be multiple master devices as well, monitoring various sets of other (slave) NVRs. Finally, the master device can be directly connected to a screen and output from all slave NVRs can be monitored. One of the major concerns of an IP NVR manufacturer is the storage space to store the recordings. Required storage capacity is determined by the number of factors such as IP cameras in the network, resolution, type of recording and retention duration. If many cameras are connected, optimizing storage becomes indispensable. To resolve this problem, following three features in a NVR come in handy: Motion based recording: There are instances when there is no motion at all but are still recorded, hogging storage space unnecessarily. With motion based recording enabled, the NVR stops recording when there is no motion. Therefore, the storage space is utilized for only those recordings in which motion has been observed. Adaptive recording: According to Indian Government policies for public areas, it is mandatory to record video streams persistently, irrespective of motion. To approach this requirement, NVRs have the option of adaptive recording, in which the number of frames per second change, adapting to the motion. This means, when there is no motion the NVR for IP cameras will still record, but with less frames as compared to when there is motion. Adaptive recording can economize storage space by as much as 50% Camera-wise recording retention: Each area in an industry fulfils a unique purpose and thus, the priority of camera recordings vary. Camera-wise recording retention provides flexibility to configure the number of days for retaining recordings based on the predominance of a camera and the area where it is installed. For example, recording retention for canteen can be set to 15 days, that of reception area, to 30 days while for the parking area recording retention can be set to 40 days. These are some of the many features that NVRs with modern technology come equipped with. There are, however, still a large amount of functions that a NVR can perform.

Read More
Smiths Detection

Smiths Detection to Boost Aviation Security in India

Smiths Detection, a leading player in threat detection and screening technologies for aviation, ports and borders, urban security and military markets, has recently been awarded a multi-million contract to boost aviation security in India. The Airports Authority of India (AAI) has placed an order for multiple CTX 9800 DSi™ systems at a combined value of over USD50 million. Through a global competitive tender process conducted by AAI, Smiths Detection won the bid to install and integrate high-speed explosives detection systems (EDS) for hold-baggage screening at 11 sites across nine airports in India including Chennai International Airport and Netaji Subhas Chandra Bose International Airport in Kolkata. the third-largest aviation market in the world by 2026, and so security is a mission-critical factor in enabling India’s airports to be futureready. Smiths Detection is honoured to partner with AAI – supporting airports to stay ahead of the evolving threat landscape with a technological solution that is fully compliant with regulatory requirements,” said Jerome de Chassey, General Manager of Smiths Detection in India. AAI manages a total of 125 airports in India and is responsible for creating, upgrading, maintaining and managing civil aviation infrastructure both on the ground and in the air. The organisation is also responsible for building new terminals for the many new small airports under development by the Government of India. Working in partnership with Smiths Detection, AAI will implement ECAC Standard 3 screening of hold baggage at Level 1 for inline systems across the country. This complies with regulations set by the Bureau of Civil Aviation Security (BCAS), the regulatory authority for civil aviation security in India. Powered by leading-edge computed tomography (CT) technology, CTX 9800 can be configured to deliver throughput of up to 1,800 bags per hour and can be tailored to meet the specific needs of any legacy or new baggage-handling system. Approved by the European Civil Aviation Conference as meeting Standard 3 requirements, CTX 9800 is also certified by the U.S. Transportation Security Administration and the Civil Aviation Administration of China. Smiths Detection has installed over 4000 hold baggage solution units worldwide and are located in more than 70 percent of the world’s 100 largest airports.  

Read More
transparency_corruption

Corruption Perceptions Index 2017 By Transparency International

An index recently released by Transparency International, which marks its 25th anniversary this year, reveals some disturbing information. Despite attempts to combat corruption around the world, the majority of countries are moving too slowly in their efforts. While stemming the tide against corruption takes time, in the last six years many countries have still made little to no progress. Even more alarming, further analysis of the index results indicates that countries with the lowest protections for press and nongovernmental organisations (NGOs) also tend to have the worst rates of corruption. The index, which ranks 180 countries and territories by their perceived levels of public sector corruption according to experts and business people, uses a scale of zero to 100, where zero is highly corrupt and 100 is very clean. This year, the index found that more than two-thirds of countries score below 50, with an average score of 43. Over the last six years, several countries significantly improved their CPI score, including Côte d’Ivoire, Senegal and the United Kingdom, while several countries declined including Syria, Yemen and Australia. This year, New Zealand and Denmark rank highest with scores of 89 and 88 respectively. Syria, South Sudan and Somalia rank lowest with scores of 14, 12 and 9 respectively. The best performing region is Western Europe with an average score of 66. The worst performing regions are Sub-Saharan Africa (average score 32) and Eastern Europe and Central Asia (average score 34). Every week a journalist is killed in a highly corrupt country Analysis of the index results by Transparency International further examined the relationship between corruption levels, the protection of journalistic freedoms and engagement of civil society. It found that almost all journalists killed since 2012 were killed in corrupt countries. fear for their lives when speaking out against corruption,” said Patricia Moreira, Managing Director of Transparency International, “Given current crackdowns on both civil society and the media worldwide, we need to do more to protect those who speak up.” The analysis, which incorporates data from the Committee to Protect Journalists, shows that in the last six years, more than 9 out of 10 journalists were killed in countries that score 45 or less on the Corruption Perceptions Index. This means that, on average, every week at least one journalist is killed in a country that is highly corrupt. In addition, one in five journalists that died were covering a story about corruption. Sadly, justice was never served in the majority of these cases. The efforts of Transparency International and its first-hand experience working with more than 100 chapters worldwide confirm close linkages between corruption and freedom of the press. For example, in Brazil, which scored 37 on this year’s index, 20 journalists died in the last six years. Targeted for their investigations into local government corruption and drug-related crime, among other issues, reporters in Brazil risk their lives everyday by simply doing their jobs. Corruption linked to shrinking space for civil society Transparency International also looked at the relationship between corruption levels and the freedom with which civic organisations are able to operate and influence public policy. The analysis, which incorporates data from the World Justice Project, shows that most countries that score low for civil liberties also tend to score high for corruption.] “Smear campaigns, harassment, lawsuits and bureaucratic red tape are all tools used by certain governments in an effort to quiet those who drive anti-corruption efforts,” said Moreira, “We’re calling on those governments that hide behind restrictive laws to roll them back immediately and allow for greater civic participation.” Hungary, which saw a ten-point decrease in the index over the last six years, moving from 55 in 2012 to 45 in 2017, is one of the most alarming examples of shrinking civil society space in Eastern Europe. If enacted, recent draft legislation in Hungary threatens to restrict NGOs and revoke their charitable status. This would have disastrous implications for many civil society groups already experiencing the constraining effects of a previous law that stigmatises NGOs based on their funding structures. “CPI results correlate not only with the attacks on press freedom and the reduction of space for civil society organizations,” said Delia Ferreira Rubio, Chair of Transparency International, “High levels of corruption also correlate with weak rule of law, lack of access to information, governmental control over social media and reduced citizens’ participation. In fact, what is at stake is the very essence of democracy and freedom.” India appears at the 40th position of CPI. About the corruptions perceptions index Since its inception in 1995, the Corruption Perceptions Index, Transparency International’s flagship publication, is the leading global indicator of public sector corruption. The index offers an annual snapshot of the relative degree of corruption by ranking countries from all over the globe. Their latest analysis, which looks at the relationship between corruption and freedom of the press, association and expression, uses statistics collected by the Committee to Protect Journalists, Reporters without Borders, the Varieties of Democracy Project and the World Justice Project.

Read More
Be Cautious:You are Sharing Password

Be Cautious: You could be Giving out your Own Passwords

There are two types of hacking or unauthorized access to accounts. The first involves password cracking tools, but most organizations have cyber security features in place to prevent these attacks. However, it’s the second type of attack that can cripple any organization or person’s accounts and databases, and that is a social engineering attack. 〈  “ Social engineers are criminals who take advantage of human behaviour to pull off an online scam or hacking attack. Successful social engineers are confident and in complete control of the situation “ 〉 Social engineers generally use two techniques – one is by simple observation while the other is the proactive effort. In the first case, the social engineer simply observes a person’s social networking profiles such as Linkedin profiles etc., and all other data available about him. Most people have passwords that they can easily remember, and for that they use the words that are closely related to them. People share every detail of their lives on social networking sites including their date of birth, favourite colour, pet’s name and everything possibly related to them. This information is freely available. This makes it pretty easy for the hackers/ social engineers to guess passwords in such a scenario and fix it. It’s always advisable to be discrete with respect to the data shared on social media. Such data is also collected by the online questionnaires and market research forms that people request to fill in public places. In the second case, the attack is pre-planned and a complete checklist is made of the person or companies including likes and dislikes, passions, hobbies and professional credentials etc. The second stage of physical access now comes into the picture. For example, three income tax officials turn up at your office for an inspection along with relevant badges and check all the office computers and documents. In the process they lodge key loggers into your computers, whereby they will receive an email of every key stroke made on the computers, thereby giving out your passwords and confidential data. An example of this kind of attack would be where a social engineer researches about a person let’s say Mr. A, and collects that the person is fond of foreign holidays. The social engineer calls up this person as the authorized representative from a reputed travel agency and offers a mind-blowing holiday package. He asks Mr. A the version of PDF reader he is using on his laptop. The conversation is very friendly and inspires trust in the mind of Mr. A. The social engineer sends the holiday proposal in a PDF format which is not compatible with the PDF reader installed by Mr. A, and along with the proposal sends a compatible PDF reader for Mr. A to download and read the proposal. The PDF reader has malware attached that gives the social engineer access into Mr. A’s computer Another example of this type of social engineering attack is where a very pretty woman, who is a journalist, goes to meet the system administrator of a big company, to get his opinion on cyber security. She goes easy and flirts with him and after taking his opinion pushes off. In the course she ‘accidently’ leaves her pen drive behind with him. The ensuing impact of the girl would make him curious to know more about her and hence he accesses her pen drive. The pen drive is infected with key logger and Trojan malware, which make the company’s networks very vulnerable. The 4 basic principles which most social engineers follow are: They project confidence: They do not sneak around, they proactively approach people and draw attention towards themselves. They give you something: Probably just a small favor which creates trust and a perception of indebtedness. They use humor as that is one tool which is endearing and disarming. They make a request and offer a reason and research shows people are likely to respond to any reasoned request. Attacks by social engineers are offences in India under Section 43 of the Information Technology Act, 2000. This section reads as under: Penalty and compensation for damage to computer, computer system etc. If any person without the permission of the owner or any other person who is in-charge; Accesses or secures access to such computer, computer system or computer network or computer resource; Downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; Damages or causes to be damaged any computer, computer system or computer network, data, computer database or any other programmes residing in such computer, computer system or computer network; Disrupts or causes disruption of any computer, computer system or computer network;] Denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder; Charges the services availed by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, Destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; he shall be liable to pay damages by way of compensation to the person so affected. 〈  “A victim is required to make a Complaint in the prescribed format along with the applicable fees to The Adjudicating Officer, Information Technology Act, 2000. Under the provisions of the Rules for the conduct of Adjudicating Proceedings, the Adjudicating officer shall decide every application in 4 months and the whole matter in 6 months “ 〉 The biggest weakness lies not in computer systems, but lies in human…

Read More