Concurrent RDP connections hack – XP

by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the registry or set create a restore point of your system. I assume reader know what a windows remote terminal service is. If not please refer to http://en.wikipedia.org/wiki/Terminal_Services In Windows XP when a remote user tries […]

Infosec Scenario in 2009

1. Business continuity to get focus over disaster recovery BCM is a process issue related to building the framework to increase business resiliency and restoration capability, while DR is about building redundancy through infrastructure investments. It is quite likely that new DR site investments might happen fewer than they did in 2008. But I would […]

Reasons for Failure of Business Continuity Plans

I was recently attending a conference on Business Continuity Management, and happened to attend an enlightening talk given by Mr. Vijay Sethi, CIO of Hero Honda – the world’s single-largest two wheeler company. The focus of the talk was on “Reasons for BCP Failure”, and I believe the points given below are highly applicable to […]

First conviction under IT Act

Finally, we have our first conviction under the IT Act 2000 in India. After more than a 100 cases being lodged, and about half of them actually reaching the courts, we have our first conviction of an orthopaedic surgeon in Chennai being convicted of recording and uploading pornographic images. He and his brother in the […]

Forensics Awareness week at Mumbai

The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th Jan 2008. The Director — Dr.Mrs R.Krishnamurthy is pleased to invite persons from the corporate world especially those who are working in the area of Risk management, frauds detection and In house Investigations to their […]

Indian IT Act 2000 – An Insight

from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying legal implications. To quote from the preamble of the Act, “An Act to provide legal recognition for the transactions carried our by means of electronic data interchange and other means of electronic communication, commonly referred […]

CHFI Workshop

From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” certificate course. As an Accredited Training Provider (ATP), NII is certified to teach the authorized curricula for security technologies. The CHFI certification is awarded after successfully passing the EC0 312-49 exam. (The training fees include […]

Changes proposed to Indian IT Act

By, K K Mookhey At long last there is news that changes will definitely be made to the Indian IT Act, purportedly due to the latest series of BPO scams. These have ranged from employees leaking out customer information to actually transferring customer money into their own bank accounts. Given the list of changes that […]

What ails India’s cyber crime cells?

by K K Mookhey, NII Consulting Scott Carney over at Trailing Technologies did an interesting post on the Chennai Cyber Crime Cell needing an upgrade. The officers informed him that their lack of success was due to a lack of proper equipment, and that they needed a Rs. 1 crore (USD 200,000) investment to actually […]

Article on Dissecting NTFS Hidden Streams

NII Consulting’s Chetan Gupta (GCFA) has published an article at ForensicFocus on the Alternate Data Streams in NTFS, and how these can be detected. This article discusses a “…particular feature of this file system which was designed to offer compatibility with Macintosh Hierarchical File System (HFS) and store additional data called metadata for a file. […]