tracker

TQMC

TQMC has acquired wide Domain Knowledge and Experience. You can FREELY access it here and here

DISCLAIMER: This matter here is a guide only. For authentic and up-to-date information, please contact TQMC.

The DIRECTIVES and STANDARDS listed here may have been subsequently REVISED . You must refer to the CURRENT REVISION and AMENDMENTS if any.

Sunday, August 17, 2008

Disaster Management - Helplines

Helplines for Mumbai and Thane


MUMBAI
Police 100
Fire Brigade 101
Life Guard, BMC 1916

DELHI
Police Control Room
100
Terrorism(Your identity will be kept secret)
1090
Children
1098
Women
1091 & 011-24121234
Senior Citizens
1091 & 1291
Traffic
011-23010101
Vigilance Cell
011-23213355
Anti-Corruption Cell
011-23890018 & 011-23890019
Legal Cell
011-23490258 & 011-23490010 Ext.4258
Find nearest help here
--- Select --- CENTRAL DISTRICT CRIME AGAINST WOMEN CELL CRIME BRANCH EAST DISTRICT ECONOMIC OFFENCES WING F.R.R.O. FINGER PRINT BUREAU HELPLINE IGI AIRPORT LICENSING BRANCH NARCOTICS BRANCH NEW DELHI DISTRICT NORTH DISTRICT NORTH-EAST DISTRICT NORTH-WEST DISTRICT OUTER DISTRICT POLICE POSTS RAILWAYS/METRO SOUTH DISTRICT SOUTH-WEST DISTRICT SPECIAL BRANCH WEST DISTRICT

more



Sunday, June 22, 2008

Cyber crime helplines
A victim of Cyber Crime? Here's help

Have you ever been stalked online, blackmailed or received email threats? If your answer is "yes", you are among the thousands today who are being attacked by Net criminals.

Like other parts of the world, India too is constantly under the threat of these heinous acts. Those of us who use our computers at home without proper security measures are often the easy victims for these crimes. In the physical world, if a crime is committed, we usually know what to do. Usually the nearest police station comes to the rescue. But what should you do for something you have no real proof, or someone who is not even visible? We bring you some tips which will help you get help quickly.

Cyber stalking or online harassment
This is one of the most common cyber crimes in India. If you are being stalked or harassed, don’t take it as a passing phase. Act fast.
• Avoid all contact with the stalker. Be assertive and diplomatic while communicating with him/her.
• Don’t change your phone number; instead let your answering machine or voice mail take the calls. This will prevent him from adapting ulterior contact strategies.
• Safeguard any evidence of threats like letters, email and voice messages. All this would be needed for legal action.
• Report it to the nearest cyber crime cell.
• If attempts of physical attack take place, file an FIR immediately.


Online Fraud
If you suddenly find out that your money has disappeared from your bank account or there have been discrepancies in your credit statements, your accounts might have been compromised.
• Contact your bank and start the process to ensure that you don’t lose any more money. Ask your bank how you can dispute charges and recover funds.
• Set up a fraud alert with cyber crime cell.
• Watch your credit card and other statements and see if there are transactions that you have not made. This is to ensure that there has been no identity theft.
• File a police report in your area


Spam/Abuse
If obnoxious unsolicited emails fill your inbox every day and refuse to go away, the simple solution is not just to delete them. Effective reporting of spam will ensure prosecution, fining or even jailing of spammers.
Report to: Coalition Against Unsolicited Commercial Email, India (CAUCE India)
Web: http://www.india.cauce.%20org/


Hacking
If you find out that you have been hacked, there are broadly two ways to fix the problem.
Rollback: Backup all your important data and reinstall Windows.
System clean: You may also use freely downloadable utilities like Fport, TCP View, etc to clean up the files left by the hacker), but this is not recommended for the novice computer user since it requires a certain degree of technical know-how.


However, it is best to start afresh by reinstalling the operating system so that you can be sure that you machine is void of any infection. Call your service engineer for this. But if you have lost data, or credit card and other critical numbers, it’s best to speak with your banks and get necessary changes done to ensure no money loss occurs.

Cyber crime helplines
a) Superintendent of Police, Cyber Crime Investigation Cell (CCIC); Web: http://cbi.nic.in/; Email: mailto:cbiccic@bol.net.in
b) Resource Center for Cyber Forensics (RCCF); Web: http://www.cdactvm.in/; Email: mailto:cyber@cdactvm.in
c) India Computer Emergency Response Team (CERT-In): http://www.cert-in.org.in/
Contributed by: Girish Kumar. M
Posted by Prerna231 Group at 9:10 PM


more


Firewall

In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), especially in NATO contexts, or packet filter in BSD contexts.

A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.


Proper configuration of firewalls demands skill from the administrator. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool.

Definitions provided by Wikipedia - The Free Encyclopedia
Firewall Related Products
GB-Ware

The GB-Ware is a software firewall powered by GNAT Box® System Software certified to ICSA 4.0 Corporate criteria. The GNAT Box System Software was designed from the ground up as an integrated firewall system with interoperability of features, easy installation and remote management. We supply the OS and firewall software – you supply the hardware.
More information
Secure SnapGear

SnapGear can be deployed as just a firewall, as a VPN gateway, a UTM security appliance, or as a complete office network-in-a-box Internet appliance for small businesses, with all of the wide area networking tools needed to serve large enterprise remote offices.
More information
Secure Firewall CommandCenter

Secure Firewall CommandCenter provides a central interface for easy management of ten, fifty or literally hundreds of Secure Firewall (Sidewinder) appliances. Maximize operational efficiency, simplify policy control, prove regulatory compliance, and relax with the security that comes only from Secure Firewall(Sidewinder).
More information
Websense Enterprise

Websense Enterprise is the leading employee Internet management (EIM) solution, used by more than 18,100 organizations worldwide, including half of the Fortune 500. As a server-based software solution, Websense allows you to transparently monitor, manage and report traffic flowing from your internal networks to the Internet.
More information
GB-250

The GB-250 and GB-250e Firewall Appliances are entry-level firewalls in GTA's RoBoX family with support for optional Mail Sentinel Anti-Spam and Mail Sentinel Anti-Virus add-on features, offering more power and flexibility than comparable appliances.
More information

more

No comments:

Post a Comment