Friday, December 31, 2010

New Year 2011, Greetings

It is easy to be overwhelmed by the negatives. We cannot deny economic realities, uncertainties, wrongdoings and sufferings. Yet, there is always the silver lining of hope, achievement and the triumph of human spirit. And it all starts with a positive energy and wishes for the future from each of us. Because Sun glows for a day, Candle for an hour, Matchstick for a minute. But a wish can glow days forever. So here is Tabrez Ahmad on behalf of all the authors Wishes the Blog Readers a Very happy and prosperous New Year.  Due to the kind of faith and confidence shown by various readers to us within a short time almost all the blogs and specially Technolexindia, IPlex, and Conferencelex have got lot of name and fame not only in India but also in different parts of the world. There are around one thousand and five hundred e-mail subscribers of our various blogs. Hope the same kind of cooperation, comment and suggestion will be provided to us and that will further help to upgrade the standard of blog postings.


My wishes for your glowing life in NEW YEAR, 2011.


Oh my Dear, Forget ur Fear,
Let all ur Dreams be Clear,
Never put Tear, Please Hear,
I want to tell some thing in ur Ear
I pray! This New Year may bring to you.
The joy that never sees the eclipse, 
The hope which never meets the despair, 
The mind that fastens human bonds, 
The heart which bleeds for the love of man, 
The soul that buries all its ills, 
The world which aspires for the lasting peace, 
The passion that even the angels envy, 
The humility which placates the Divine Wrath,  

This is beginning of a new year!
Like birds, let us, leave behind what we don't need to carry…
Life is beautiful, Enjoy it.

Thanks all of you once again for all cooperation and encouragement shown to us in the last one year. 

Bye. Take care.

Dr.Tabrez Ahmad,
Associate Professor of Law, KIIT Law School, 
Campus-16,KIIT University, PATIA, Bhubaneswar, Odisha, India, 751024.
Research Papers:
Mobile: +91 9438303042

Monday, December 20, 2010

Aligarh Muslim UniversityImage via Wikipedia

Aligarh: To mark the Minority Rights Day (Dec. 18), a round-table conference on the topic “Minority Rights Day: Policies and Issues" was organized by Dr. Ambedkar Chair in collaboration with the Faculty of Law of Aligarh Muslim University (AMU) on Saturday.
In his speech, Dr. Arshi Khan, Prof. Dept. of Political Science, AMU, talked about “the present situation of the Muslim minority community” and said that “they are backward, deprived, discriminated and excluded in the public sphere.”
Dr. Khan said that socio-economic and educational backwardness and exclusion of Muslims are self-speaking facts, mentioned by the Gopal Singh Committee (1983), Justice Sachar Committee (2006), Justice Ranganath Mishra Commission (2007) and the Andhra Pradesh Backward Class Commission in 2004.
“The Declaration on rights of minorities which was adopted by the General Assembly of the United Nations on December 18, 1992, unequivocally declared that principle of non-discrimination or equality before the law, was not enough to protect minorities from marginalization and exclusion,” said Dr. Mohibul Haque.
“It called upon states to adopt special measures for the preservation and promotion of the rights of minorities,” he further added.

At the end of the conference a resolution was passed which had several demands including establishment of judicial inquiry in all cases of bomb blasts since 1998, end of the harassment of Muslim youths on the pretext of terrorism, establishment of special tribunal to look into the cases of riots and riots' related incidents, setting up an national level compensation commission for the riot victims and strengthening of the National Commission for Minorities.

Source: TCN News
Enhanced by Zemanta

Thursday, December 16, 2010

cyber security are in demand

Information Security Components layering the I...Image via Wikipedia

There are many courses that train computer professionals who can ensure appropriate steps in the design, development, operation, and maintenance of security systems.

Good prospects: Students with the right qualification in cyber security are in demand.

In the three previous issues we discussed the essentials of cyber security, bringing out its significance in the safe use of computers and the Internet. We need technically trained professionals to ensure appropriate steps in the design, development, operation, and maintenance of security systems. Those who possess the right qualification have fine career opportunities. Most of the programmes would touch on several vital areas of security including the following:
Advanced computer architecture and security analysis
Application-level vulnerabilities, attacks, and defences
Attacker tools
Blended attack
Containment, eradication, and recovery
Cryptographic protocols
Database and application security
Digital hardware modelling
Hacker techniques, exploits and incident handling
Information security and risk management
Information theory and coding
Internetworking and security
Legal issues in incident handling
Mobile and wireless network security
Multimedia systems
Non-malware threats
Pattern recognition for computer security
Proactive and reactive defences
Secure Internet programming
Server software
Viruses, Worms, Trojan Horses, Malicious Mobile Code
Web technologies
Let us look at some of the facilities for training in this discipline.
Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, offers M.Tech. degree course in computer science with specialisation in information security. It is a four-semester programme with two semesters devoted to thesis research. Candidates are required to register for at least three security-related elective courses offered by the department. The Department of Information Technology, Government of India, supports the programme. Eligibility for admission is a B.Tech. or equivalent degree and a valid GATE score. Candidates with professional qualifications like AMIE recognised by AICTE are also eligible to apply. Ph: 0361-2582400; e-mail:
ABV-Indian Institute of Information Technology and Management, Morena Link Road, Gwalior, offers M.Tech. degree course in information communication technology with specialisation in information security (Main courses: information privacy and computer security, modern cryptography, network management and security as core subjects, and lightweight security, verification of security protocols, access control system and methodology, telecommunications, network and Internet security, digital rights management, special topics in information security, cyber laws and information crime as electives. Admission is done through GATE followed by personal interview. Phone: 0751-2449720; web site:;
Indian Institute of Information Technology, Deoghat, Jhalwa, Allahabad, offers two-year M.Sc. course in cyber law and information security. Eligibility: BE / B.Tech. / PG degree / L.L.B. or equivalent. Main courses: legal dimensions of IPR in cyber world; e-business security; IT Act, information assurance and e-governance/ data information and cryptography; Internet architecture and network security/ networking and network security; secured software engineering; identity and access management; wireless network and security; data/ information and cryptography; computer forensics and digital evidence; security audit; technical risk assessment software protection; BCP and DRP plagiarism detection tools; cryptographic protocol modelling and simulation; authentication protocol IP packet analysis. Phone: 91-532-2922000; e-mail:; web site:
The selection through entrance examination (65 per cent marks) and interview (35 per cent marks). Syllabus for entrance examination: Law: Constitution of India, CRPC, IPC, Contract Act, Negotiable Instruments Act, information technology: fundamentals of computer, Internet technologies, analytical and reasoning capabilities, and general knowledge.
National Institute of Technology, Calicut, offers M.Tech. course in computer science and engineering with specialisation in information security. Eligibility: BE / B.Tech. in computer science and engineering with 60 per cent marks, or a first class MCA and a valid GATE score in computer science and engineering. The selection is based on the GATE score.
For sponsored candidates and foreign nationals GATE score is not required. The selection of these candidates is based on marks in the qualifying examination and /or performance in the interview. Phone: 0495-2286118; e-mail:; web site:
National Institute of Technology, Rourkela, offers M.Tech. degree course in computer science and engineering with specialisation in information security. Eligibility: BE/ B.Tech. or equivalent degree in any branch of engineering, or MCA with GATE scores in computer science. The selection is based on GATE percentile. Phone: 0661-2462031; e-mail:; web site:
Amrita School of Engineering, Ettimadai, Coimbatore, offers M.Tech. degree course in cyber security. Eligibility: BE/ B.Tech. degree course in computer science and engineering/ IT / ECE or equivalent with a minimum of 60 per cent marks. The admission based on academic merit and an Interview / Group Discussion. Candidates with a valid GATE score are given preference. Phone: 0422-2656422; e-mail:; web site: http://engineering.amrita.
Ambedkar Institute of Technology, Geeta Colony, East Delhi, affiliated to Guru Gobind Singh Indraprastha University, Delhi, offers M.Tech. degree course in information security. Phone: 011 22048047; web site:
SRM University, SRM Nagar, Kattankulathur, Kancheepuram District, Tamil Nadu, offers M.Tech. degree course in information security and computer forensics. Eligibility: BE/ B. Tech. degree (CSE/ IT/ ECE / EEE), M.Sc. degree (computer science/ IT/ electronics), or MCA. Main areas covered: cryptology, network security, computer forensics, secure coding, ethical hacking, mobile and wireless security, virus programming, Unix administration and security, computer and Internet security management, information security risk analysis, information security audit, database security, multimedia security. Phone: 044-27452270;; web site:
The selection is on the basis of performance in the All India Engineering Entrance Examination of SRM University (SRMEEE). Candidates with a valid GATE score can also apply for admission.
Kalasalingam University, Anand Nagar, Krishnankoil, Virudhunagar, Tamil Nadu, M.Tech. degree course in computer science and engineering with specialisation in information assurance and security. The selection is on the basis of performance in the entrance examination of Kalasalingam University.
GATE-qualified students will get scholarships. Entry qualification: BE / B.Tech. in computer science and engineering, IT, electronics and communication or allied branches, or MCA, or M.Sc. degree in computer science / IT / electronics. Phone: 04563-289042,; web site:
Jawaharlal Nehru Technological University, Kukatpally, Hyderabad, offers M.Tech. degree course in computer networks and information security. The selection is based on an all-India examination conducted by the university at different centres spread all over the country, followed by an interview. Entry qualification BE / B.Tech. degree in computer science and engineering/ IT. Phone: 040-23158661; web site:
International Institute of Information Technology, Gachibowli, Hyderabad, offers M.Tech. degree course in computer science and information security. Eligibility: B.Tech. degree in computer science/ ECE/ IT or MCA with B.Sc.(maths) or M.Sc.(maths/ computer science). The selection is based on the performance at the postgraduate and Ph.D. entrance examination and an interview to be held at Hyderabad. Phone: 040-66531000; web site:
School of Computer Science, Devi Ahilya Vishwavidyalaya, Takshashila Campus, Khandwa Road, Indore, offers M.Tech. degree course in computer science with specialisation in network management and information security. Eligibilty: GATE-qualified in computer science and engineering/ ECE with four years of study in computer science/ computer applications at university level BE/ B.Tech. degree course (in CSE/ IT/ computer-related subject) / M.C.A / M.Sc.(CS /IT) / M.Sc.(mathematics/ statistics) with at least 55 per cent marks in aggregate. For non-GATE candidates, admission through written test and interview. Phone: 0731-2438546; e-mail:; web site:
DOEACC Centre, NIT Campus, Calicut, offers six-month long postgraduate diploma in information security and system administration. Eligibility: Graduates with IT, computer science or electronics as optional subjects, graduate in engineering, MCA, DOEACC - O level, A Level, B Level, PGDCA or diploma. Phone: 0495-2287266; e-mail:
There are several foreign universities and other institutions that provide opportunities for higher studies and research in different areas of cyber security. A few such institutions are indicated below:
Johns Hopkins University, USA, offers Master of science degree in security informatics. Web link:
University of Bristol, U.K., offers, M.Sc. degree in advanced computing. Web
SANS Technology Institute, Maryland, USA, offers Master's degree in information security. Web site:
This list is only indicative. Full details have to be gathered, if you aim at graduate study or research abroad in the realm of cyber security.

Enhanced by Zemanta

Monday, December 13, 2010

Now, you can track your lost laptop

A woman typing on a laptopImage via Wikipedia

To allow law enforcement agencies access a novel method of tracking and recovering lost laptops, leading anti-virus solution provider Quick Heal launched a service today.
All that a laptop owner has to do is register with 'Quick Heal' on its website for the service through Mac-id and it keeps continuous track of where the laptop is.

If the laptop is stolen the tracker service traces it on the basis of Mac-id and IP addresses. This information can then be used by the police to track the laptop down and retrieve it, said the company press release.
The method is aimed at helping police by providing them an interface with the website, said the company managing director and CEO Kailash Katkar.
"This technology from Quick Heal will provide a powerful tool to the society at large and to the police, thus reducing their burden," he said .
Launched as part of corporate social responsibility, the service is free of charge and can be availed by anybody, whether a 'Quick Heal' user or not, he said.
The service, already launched in Indore and Jaipur, would soon be started in other cities.
Besides, the company also aims to create a database of stolen laptops for the help of users and potential buyers.

Enhanced by Zemanta

Tuesday, December 7, 2010

The Federal Communications Commission is Investigating Google

Image representing Google as depicted in Crunc...Image via CrunchBase

The number of lawsuits against Google grew rapidly in the last few months. So to avoid the multilitigation problem Google filed a motion in the US Judicial Panel on Multidistrict Litigation attempting to amalgamate the lawsuits into one case, as almost all of the complaints contended some claim under the federal Wiretap Act. Google was concerned with conflicting pretrial motions “especially with respect to the proper scope and extent of discovery, class certification and other factual and legal matters” and espoused joining the complaints because “all of the claims make very similar factual allegations, and thus any necessary discovery will be of common facts.”
The Federal Trade Commission launched an investigation to determine whether Google’s recording of the unencrypted data violated federal privacy law. The investigation was halted in October when Google vowed to strengthen privacy controls by hiring an extensive privacy team, training employees in an advanced securities awareness program, and requiring internal engineers to maintain privacy design documents detailing the techniques used when collecting user data.
This October, Electronic Privacy Information Center, a privacy advocacy group, filed a complaint with the Federal Communications Commission alleging Google broke federal privacy law regarding “electronic eavesdropping” and possibly violated Section 705 of the Communications Act. Following the filing of the complaint and Google’s public disclosure of the mistake, FCC Enforcement Bureau Chief Michele Ellison stated the “Enforcement Bureau is looking into whether these actions violate the Communications Act” and confirmed an FCC investigation into Google’s data inception process. The FCC investigation is largely bolstered by global concerns as countries in Europe, which have greater privacy laws than the United States, are increasingly concerned with Google’s acquisition of sensitive personal data. The investigation is currently underway.

Enhanced by Zemanta

Monday, December 6, 2010

National Law University Orissa (NLUO) NOT to join CLAT

Seal of OrissaImage via Wikipedia

The National Law University of Orissa, Cuttack has decided to continue to conduct its own test as it has been doing so far.
The university, under the able leadership of Vice-Chancellor Prof. Faizan Mustafa is two years old but has already seen an amazing rise in its reputation and profile. Keeping this in mind, the University’s Executive Council Decided to go with its previous decision of taking its own test.
“No CLAT. Our executive council decided to go alone as our test is better”, said the prominent VC, in a private conversation with CG.”
It spells good news for students who’d have wanted a “back-up” plan and even the University as it’d only admit students of a certain standard. CG’s editorial view tends to lean heavily in the same direction.
It is also the University’s pursuit to prepare an entrance test that tests aptitude as against memory, however, “We want to change the pattern but students want CLAT like paper otherwise they will have to prepare differently”
NLU-O, in its nascent stage has carved a niche for itself, and hence, ClatGyan would encourage all Law School aspirants to attempt the test as well, as the quality of the paper tends to be perhaps the best amongst all mainstream law school entrances, and also because the NLU-O offers a new paradigm for students interested in “doing” law rather than “studying it”.
Enhanced by Zemanta