ethical hacking

Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should have access to the information.
What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization’s network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.
What is a phishing attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.
Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as
natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
epidemics and health scares (e.g., H1N1)
economic concerns (e.g., IRS scams)
major political elections
holidays
Phishing Attack
How do you avoid being a victim?

Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.
Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
Don’t send sensitive information over the Internet before checking a website’s security .
Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).
Install and maintain anti-virus software, firewalls, and email filters to reduce some of this traffic .
Take advantage of any anti-phishing features offered by your email client and web browser.
What do you do if you think you are a victim?

If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.
If you believe your financial accounts may be compromised, contact your financial institution immediately and close any accounts that may have been compromised. Watch for any unexplainable charges to your account.
Immediately change any passwords you might have revealed. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
Watch for other signs of identity theft .
Consider reporting the attack to the police, and file a report with the Federal Trade Commission (http://www.ftc.gov/).
Stay Safe..

Standard

AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

Avoiding Social Engineering and Phishing Attacks

 

 

 

 

 

Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should have access to the information.

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization’s network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.

What is a phishing attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.

Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as

  • natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
  • epidemics and health scares (e.g., H1N1)
  • economic concerns (e.g., IRS scams)
  • major political elections
  • holidays
Standard

Windows Remote Desktop Client vulnerability could allow remote code execution

 

 

A  vulnerability in Microsoft Remote Desktop ActiveX Control could upon successful exploitation, allow an attacker to execute code and take control of an affected system.

 

 

 

 

Detailed Description:

 

 

Microsoft has released a security update to address a vulnerability in the Remote Desktop ActiveX control (mstscax.dll). The vulnerability was caused by a memory corruption condition that arises when attempting to access a deleted object in memory. Upon successful exploitation, an attacker could be able to execute code and take control of the affected system.

 

 

This issue has been fixed by introducing a modification in the way that Remote Desktop Client handles objects in memory. Users are recommended to install the latest update as a protection measure against possible exploit attempts.

Aside

Trojan horse

TROJAN HORSE

A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.

A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. The Trojan and backdoors are not themselves easily detectable, but if they carry out significant computing or communications activity may cause the computer to run noticeably slowly. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm). A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download.

Purpose and uses

A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker, or be caused unintentionally by program operation, on a targeted computer system include:

Crashing the computer, e.g. with “blue screen of death” (BSOD)
Data corruption
Formatting disks, destroying all contents
Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)
Electronic money theft
Infects entire Network banking information and other connected devices
Data theft, including confidential files, sometimes for industrial espionage, and information with financial implications such as passwords and payment card information
Modification or deletion of files
Downloading or uploading of files for various purposes
Downloading and installing software, including third-party malware and ransomware
Keystroke logging
Watching the user’s screen
Viewing the user’s webcam
Controlling the computer system remotely
Encrypting files; a ransom payment may be demanded for decryption, as with the CryptoLocker ransomware
Modifications of registry
Using computer resources for mining cryptocurrency
Linking computer to Botnet
Using infected computer as proxy for illegal activities and attacks on other computers.

More likely to be unintended or merely malicious, rather than criminal, consequences:

Trojan horses in this way may require interaction with a malicious controller (not necessarily responsible for distributing the Trojan horse) to fulfill their purpose. It is possible for those involved with Trojans to scan computers on a network to locate any with a Trojan horse installed, which the hacker can then control.

Some Trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage, enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the infected computer or its IP address. The host’s computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Later generations of the Trojan horse tend to “cover” their tracks more efficiently. Several versions of Sub7 have been widely circulated in the US and Europe and became the most widely distributed examples of this type of Trojan horse.

In German-speaking countries, spyware used or made by the government is sometimes called govware. Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries like Switzerland and Germany have a legal framework governing the use of such software. Examples of govware trojans include the Swiss MiniPanzer and MegaPanzer and the German “state trojan” nicknamed R2D2.

Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users’ privacy, Trojan horses are becoming more common. According to a survey conducted by BitDefender from January to June 2009, “Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world.” Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.

The anti-virus company BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.
Common Trojan horses

Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Back Orifice (Sir Dystic)
Beast
Zeus
Flashback Trojan (Trojan BackDoor.Flashback)
ProRat
ZeroAccess
Koobface
WinLock
Darkcomet
OPTIMIZER PRO

Standard

Cricket history

The game of cricket has a known history spanning from the 16th century to the present day, with international matches played since 1844, although the official history of international Test cricket began in 1877. During this time, the game developed from its origins in England into a game which is now played professionally in most of the Commonwealth of Nations.

Early cricket

Main article: History of cricket to 1725
Origin

No one knows when or where cricket began but there is a body of evidence, much of it circumstantial, that strongly suggests the game was devised during Saxon or Norman times by children living in the Weald, an area of dense woodlands and clearings in south-east England that lies across Kent and Sussex. It is generally believed that cricket survived as a children’s game for many generations before it was increasingly taken up by adults around the beginning of the 17th century. Possibly cricket was derived from bowls, assuming bowls is the older sport, by the intervention of a batsman trying to stop the ball from reaching its target by hitting it away. Playing on sheep-grazed land or in clearings, the original implements may have been a matted lump of sheep’s wool (or even a stone or a small lump of wood) as the ball; a stick or a crook or another farm tool as the bat; and a stool or a tree stump or a gate (e.g., a wicket gate) as the wicket.
Derivation of the name of “cricket”

A number of words are thought to be possible sources for the term “cricket”. In the earliest known reference to the sport in 1598 (see below), it is called creckett. The name may have been derived from the Middle Dutch krick(-e), meaning a stick; or the Old English cricc or cryce meaning a crutch or staff.[1] Another possible source is the Middle Dutch word krickstoel, meaning a long low stool used for kneeling in church and which resembled the long low wicket with two stumps used in early cricket.

According to Heiner Gillmeister, a European language expert of Bonn University, “cricket” derives from the Middle Dutch met de (krik ket)sen (i.e., “with the stick chase”), which also suggests a Dutch connection in the game’s origin. It is more likely that the terminology of cricket was based on words in use in south east England at the time and, given trade connections with the County of Flanders, especially in the 15th century when it belonged to the Duchy of Burgundy, many Middle Dutch words found their way into southern English dialects.
First definite reference

John Derrick was a pupil at The Royal Grammar School in Guildford when he and his friends played creckett circa 1550

Despite many prior suggested references, the first definite mention of the game is found in a 1598 court case concerning an ownership dispute over a plot of common land in Guildford, Surrey. A 59-year old coroner, John Derrick, testified that he and his school friends had played creckett on the site fifty years earlier when they attended the Free School. Derrick’s account proves beyond reasonable doubt that the game was being played in Surrey circa 1550.

The first reference to cricket being played as an adult sport was in 1611, when two men in Sussex were prosecuted for playing cricket on Sunday instead of going to church.In the same year, a dictionary defined cricket as a boys’ game and this suggests that adult participation was a recent development.
Early 17th century

A number of references occur up to the English Civil War and these indicate that cricket had become an adult game contested by parish teams, but there is no evidence of county strength teams at this time. Equally, there is little evidence of the rampant gambling that characterised the game throughout the 18th century. It is generally believed, therefore, that village cricket had developed by the middle of the 17th century but that county cricket had not and that investment in the game had not begun.
The Commonwealth

After the Civil War ended in 1648, the new Puritan government clamped down on “unlawful assemblies”, in particular the more raucous sports such as football. Their laws also demanded a stricter observance of the Sabbath than there had been previously. As the Sabbath was the only free time available to the lower classes, cricket’s popularity may have waned during the Commonwealth. Having said that, it did flourish in public fee-paying schools such as Winchester and St Paul’s. There is no actual evidence that Oliver Cromwell’s regime banned cricket specifically and there are references to it during the interregnum that suggest it was acceptable to the authorities provided that it did not cause any “breach of the Sabbath”. It is believed that the nobility in general adopted cricket at this time through involvement in village games.
Gambling and press coverage

Cricket certainly thrived after the Restoration in 1660 and is believed to have first attracted gamblers making large bets at this time. In 1664, the “Cavalier” Parliament passed the Gaming Act 1664 which limited stakes to £100, although that was still a fortune at the time, equivalent to about £13 thousand in present day terms . Cricket had certainly become a significant gambling sport by the end of the 17th century. There is a newspaper report of a “great match” played in Sussex in 1697 which was 11-a-side and played for high stakes of 50 guineas a side.

With freedom of the press having been granted in 1696, cricket for the first time could be reported in the newspapers. But it was a long time before the newspaper industry adapted sufficiently to provide frequent, let alone comprehensive, coverage of the game. During the first half of the 18th century, press reports tended to focus on the betting rather than on the play.
18th-century cricket

See also: 1697 to 1725 English cricket seasons and Overview of English cricket 1726–1815
Patronage and players

Gambling introduced the first patrons because some of the gamblers decided to strengthen their bets by forming their own teams and it is believed the first “county teams” were formed in the aftermath of the Restoration in 1660, especially as members of the nobility were employing “local experts” from village cricket as the earliest professionals.The first known game in which the teams use county names is in 1709 but there can be little doubt that these sort of fixtures were being arranged long before that. The match in 1697 was probably Sussex versus another county.

The most notable of the early patrons were a group of aristocrats and businessmen who were active from about 1725, which is the time that press coverage became more regular, perhaps as a result of the patrons’ influence. These men included the 2nd Duke of Richmond, Sir William Gage, Alan Brodrick and Edward Stead. For the first time, the press mentions individual players like Thomas Waymark.
Cricket moves out of England

Cricket was introduced to North America via the English colonies in the 17th century, probably before it had even reached the north of England. In the 18th century it arrived in other parts of the globe. It was introduced to the West Indies by colonists and to India by British East India Company mariners in the first half of the century. It arrived in Australia almost as soon as colonisation began in 1788. New Zealand and South Africa followed in the early years of the 19th century.

Cricket never caught on in Canada, despite efforts by an imperial-minded elite to promote the game as a way of identifying with the British Empire. Canada, unlike Australia and the West Indies, witnessed a continual decline in the popularity of the game during 1860–1960. Linked to upper class British-Canadian elites, the game never became popular with the general public. In the summer season it had to compete with baseball. During the First World War, Canadian units stationed in Britain played baseball, not cricket.
Development of the Laws

See also: Laws of Cricket

The basic rules of cricket such as bat and ball, the wicket, pitch dimensions, overs, how out, etc. have existed since time immemorial. In 1728, the Duke of Richmond and Alan Brodick drew up Articles of Agreement to determine the code of practice in a particular game and this became a common feature, especially around payment of stake money and distributing the winnings given the importance of gambling.

In 1744, the Laws of Cricket were codified for the first time and then amended in 1774, when innovations such as lbw, middle stump and maximum bat width were added. These laws stated that the principals shall choose from amongst the gentlemen present two umpires who shall absolutely decide all disputes. The codes were drawn up by the so-called “Star and Garter Club” whose members ultimately founded MCC at Lord’s in 1787. MCC immediately became the custodian of the Laws and has made periodic revisions and recodifications subsequently.
Continued growth in England

The game continued to spread throughout England and, in 1751, Yorkshire is first mentioned as a venue. The original form of bowling (i.e., rolling the ball along the ground as in bowls) was superseded sometime after 1760 when bowlers began to pitch the ball and study variations in line, length and pace.Scorecards began to be kept on a regular basis from 1772 and since then an increasingly clear picture has emerged of the sport’s development.

An artwork depicting the history of the cricket bat

The first famous clubs were London and Dartford in the early 18th century. London played its matches on the Artillery Ground, which still exists. Others followed, particularly Slindon in Sussex which was backed by the Duke of Richmond and featured the star player Richard Newland. There were other prominent clubs at Maidenhead, Hornchurch, Maidstone, Sevenoaks, Bromley, Addington, Hadlow and Chertsey.

But far and away the most famous of the early clubs was Hambledon in Hampshire. It started as a parish organisation that first achieved prominence in 1756. The club itself was founded in the 1760s and was well patronised to the extent that it was the focal point of the game for about thirty years until the formation of MCC and the opening of Lord’s Cricket Ground in 1787. Hambledon produced several outstanding players including the master batsman John Small and the first great fast bowler Thomas Brett. Their most notable opponent was the Chertsey and Surrey bowler Edward “Lumpy” Stevens, who is believed to have been the main proponent of the flighted delivery.

It was in answer to the flighted, or pitched, delivery that the straight bat was introduced. The old “hockey stick” style of bat was only really effective against the ball being trundled or skimmed along the ground.
Cricket and crisis

Cricket faced its first real crisis during the 18th century when major matches virtually ceased during the Seven Years War. This was largely due to shortage of players and lack of investment. But the game survived and the “Hambledon Era” proper began in the mid-1760s.

Cricket faced another major crisis at the beginning of the 19th century when a cessation of major matches occurred during the culminating period of the Napoleonic Wars. Again, the causes were shortage of players and lack of investment. But, as in the 1760s, the game survived and a slow recovery began in 1815.

On 17 June 1815, on the eve of the Battle of Waterloo British soldiers played a cricket match in the Bois de la Cambre park in Brussels. Ever since the park area where that match took place has been called La Pelouse des Anglais (the Englishmen’s lawn).

MCC was itself the centre of controversy in the Regency period, largely on account of the enmity between Lord Frederick Beauclerk and George Osbaldeston. In 1817, their intrigues and jealousies exploded into a match-fixing scandal with the top player William Lambert being banned from playing at Lord’s Cricket Ground for life. Gambling scandals in cricket have been going on since the 17th century.

In the 1820s, cricket faced a major crisis of its own making as the campaign to allow roundarm bowling gathered pace.
19th-century cricket

Main article: Overview of English cricket from 1816 to 1863

View of Geneva’s Plaine de Plainpalais with cricketers, 1817

The game also underwent a fundamental change of organisation with the formation for the first time of county clubs. All the modern county clubs, starting with Sussex in 1839, were founded during the 19th century.

A cricket match at Darnall, Sheffield in the 1820s.

No sooner had the first county clubs established themselves than they faced what amounted to “player action” as William Clarke created the travelling All-England Eleven in 1846. Though a commercial venture, this team did much to popularise the game in districts which had never previously been visited by high-class cricketers. Other similar teams were created and this vogue lasted for about thirty years. But the counties and MCC prevailed.

The growth of cricket in the mid and late 19th century was assisted by the development of the railway network. For the first time, teams from a long distance apart could play one other without a prohibitively time-consuming journey. Spectators could travel longer distances to matches, increasing the size of crowds.

In 1864, another bowling revolution resulted in the legalisation of overarm and in the same year Wisden Cricketers’ Almanack was first published.

The “Great Cricketer”, W G Grace, made his first-class debut in 1865. His feats did much to increase the game’s popularity and he introduced technical innovations which revolutionised the game, particularly in batting.
International cricket begins

The first ever international cricket game was between the USA and Canada in 1844. The match was played at the grounds of the St George’s Cricket Club in New York.[14]

The English team 1859 on their way to the USA

In 1859, a team of leading English professionals set off to North America on the first-ever overseas tour and, in 1862, the first English team toured Australia.

Between May and October 1868, a team of Australian Aborigines toured England in what was the first Australian cricket team to travel overseas.

The first Australian touring team (1878) pictured at Niagara Falls

In 1877, an England touring team in Australia played two matches against full Australian XIs that are now regarded as the inaugural Test matches. The following year, the Australians toured England for the first time and were a spectacular success. No Tests were played on that tour but more soon followed and, at The Oval in 1882, arguably the most famous match of all time gave rise to The Ashes. South Africa became the third Test nation in 1889.
National championships

A major watershed occurred in 1890 when the official County Championship was constituted in England. This organisational initiative has been repeated in other countries. Australia established the Sheffield Shield in 1892–93. Other national competitions to be established were the Currie Cup in South Africa, the Plunkett Shield in New Zealand and the Ranji Trophy in India.

The period from 1890 to the outbreak of the First World War has become an object of nostalgia, ostensibly because the teams played cricket according to “the spirit of the game”, but more realistically because it was a peacetime period that was shattered by the First World War. The era has been called The Golden Age of cricket and it featured numerous great names such as Grace, Wilfred Rhodes, C B Fry, K S Ranjitsinhji and Victor Trumper.
Balls per over

In 1889 the immemorial four ball over was replaced by a five ball over and then this was changed to the current six balls an over in 1900. Subsequently, some countries experimented with eight balls an over. In 1922, the number of balls per over was changed from six to eight in Australia only. In 1924 the eight ball over was extended to New Zealand and in 1937 to South Africa. In England, the eight ball over was adopted experimentally for the 1939 season; the intention was to continue the experiment in 1940, but first-class cricket was suspended for the Second World War and when it resumed, English cricket reverted to the six ball over. The 1947 Laws of Cricket allowed six or eight balls depending on the conditions of play. Since the 1979/80 Australian and New Zealand seasons, the six ball over has been used worldwide and the most recent version of the Laws in 2000 only permits six ball overs.
20th-century cricket
Growth of Test cricket

Sid Barnes, traps Lala Amarnath lbw in the first official Test between Australia and India at the MCG in 1948

When the Imperial Cricket Conference (as it was originally called) was founded in 1909, only England, Australia and South Africa were members. India, West Indies and New Zealand became Test nations before the Second World War and Pakistan soon afterwards. The international game grew with several “affiliate nations” getting involved and, in the closing years of the 20th century, three of those became Test nations also: Sri Lanka, Zimbabwe and Bangladesh.

Test cricket remained the sport’s highest level of standard throughout the 20th century but it had its problems, notably in the infamous “Bodyline Series” of 1932–33 when Douglas Jardine’s England used so-called “leg theory” to try and neutralise the run-scoring brilliance of Australia’s Don Bradman.
Suspension of South Africa (1970–91)

See also: International cricket in South Africa from 1971 to 1981

The greatest crisis to hit international cricket was brought about by apartheid, the South African policy of racial segregation. The situation began to crystallise after 1961 when South Africa left the Commonwealth of Nations and so, under the rules of the day, its cricket board had to leave the International Cricket Conference (ICC). Cricket’s opposition to apartheid intensified in 1968 with the cancellation of England’s tour to South Africa by the South African authorities, due to the inclusion of “coloured” cricketer Basil D’Oliveira in the England team. In 1970, the ICC members voted to suspend South Africa indefinitely from international cricket competition. Ironically, the South African team at that time was probably the strongest in the world.

Starved of top-level competition for its best players, the South African Cricket Board began funding so-called “rebel tours”, offering large sums of money for international players to form teams and tour South Africa. The ICC’s response was to blacklist any rebel players who agreed to tour South Africa, banning them from officially sanctioned international cricket. As players were poorly remunerated during the 1970s, several accepted the offer to tour South Africa, particularly players getting towards the end of their careers for which a blacklisting would have little effect.

The rebel tours continued into the 1980s but then progress was made in South African politics and it became clear that apartheid was ending. South Africa, now a “Rainbow Nation” under Nelson Mandela, was welcomed back into international sport in 1991.
World Series Cricket

See also: World Series Cricket

The money problems of top cricketers were also the root cause of another cricketing crisis that arose in 1977 when the Australian media magnate Kerry Packer fell out with the Australian Cricket Board over TV rights. Taking advantage of the low remuneration paid to players, Packer retaliated by signing several of the best players in the world to a privately run cricket league outside the structure of international cricket. World Series Cricket hired some of the banned South African players and allowed them to show off their skills in an international arena against other world-class players. The schism lasted only until 1979 and the “rebel” players were allowed back into established international cricket, though many found that their national teams had moved on without them. Long-term results of World Series Cricket have included the introduction of significantly higher player salaries and innovations such as coloured kit and night games.
Limited-overs cricket

In the 1960s, English county teams began playing a version of cricket with games of only one innings each and a maximum number of overs per innings. Starting in 1963 as a knockout competition only, limited overs grew in popularity and, in 1969, a national league was created which consequently caused a reduction in the number of matches in the County Championship.

Although many “traditional” cricket fans objected to the shorter form of the game, limited-over cricket did have the advantage of delivering a result to spectators within a single day; it did improve cricket’s appeal to younger or busier people; and it did prove commercially successful.

The first limited-over international match took place at Melbourne Cricket Ground in 1971 as a time-filler after a Test match had been abandoned because of heavy rain on the opening days. It was tried simply as an experiment and to give the players some exercise, but turned out to be immensely popular. limited-over internationals (LOIs or ODIs—one-day internationals) have since grown to become a massively popular form of the game, especially for busy people who want to be able to see a whole match. The International Cricket Council reacted to this development by organising the first Cricket World Cup in England in 1975, with all the Test-playing nations taking part.
Analytic and graphic technology

Limited-overs cricket increased television ratings for cricket coverage. Innovative techniques introduced in coverage of limited-over matches were soon adopted for Test coverage. The innovations included presentation of in-depth statistics and graphical analysis, placing miniature cameras in the stumps, multiple usage of cameras to provide shots from several locations around the ground, high-speed photography and computer graphics technology enabling television viewers to study the course of a delivery and help them understand an umpire’s decision.

In 1992, the use of a third umpire to adjudicate run-out appeals with television replays was introduced in the Test series between South Africa and India. The third umpire’s duties have subsequently expanded to include decisions on other aspects of play such as stumpings, catches and boundaries. From 2011, the third umpire was being called upon to moderate review of umpires’ decisions, including LBW, with the aid of virtual-reality tracking technologies (e.g., Hawk-Eye and Hot Spot), though such measures still could not free some disputed decisions from heated controversy.[15]
21st-century cricket

In June 2001, the ICC introduced a “Test Championship Table” and, in October 2002, a “One-day International Championship Table”. As indicated by ICC rankings,[16] the various cricket formats have continued to be a major competitive sport in most former British Empire countries, notably the Indian subcontinent, and new participants including the Netherlands. As of August 2013, the top rankings were held by South Africa (Tests), India (one-day internationals), and Sri Lanka (Twenty20 champion).

The ICC expanded its development programme, aiming to produce more national teams capable of competing at the various formats. Development efforts are focused on African and Asian nations, and on the United States. In 2004, the ICC Intercontinental Cup brought first-class cricket to 12 nations, mostly for the first time. Cricket’s newest innovation is Twenty20, essentially an evening entertainment. It has so far enjoyed enormous popularity and has attracted large attendances at matches as well as good TV audience ratings. The inaugural ICC Twenty20 World Cup tournament was held in 2007. The formation of Twenty20 leagues in India – the unofficial Indian Cricket League, whic

Standard

About wipro

Wipro Limited (formerly Western India Products Limited) is a multinational IT Consulting and System Integration services company headquartered in Bangalore, Karnataka, India. As of December 2013, the company has 147,000 employees servicing over 900 large enterprise corporations with a presence in 61 countries. Wipro is the third largest IT services company in India and 7th largest worldwide On 31 March 2013, its market capitalisation was INR 1.07 trillion ($19.8 billion), making it India’s 10th largest publicly traded company. Azim Premji is a major shareholder in Wipro with over 50% of shareholding.

To focus on core IT Business, it demerged its non-IT businesses into a separate company named Wipro Enterprises Limited with effect from 31 March 2013.The demerged company offers consumer care, lighting, healthcare and infrastructure engineering and contributed to approx. 10% of the revenues of Wipro Limited in previous financial year.

History

Early formative years

The company was incorporated on 29 December 1945, in Mumbai by Mohamed Premji as ‘Western India Products Limited’, later abbreviated to ‘Wipro’. It was initially set up as a manufacturer of vegetable and refined oils in Amalner, district Jalgaon, Maharashtra, under the trade names of Kisan, Sunflower and Camel.The company logo still contains a sunflower to reflect products of the original business.

In 1966, after Mohamed Premji’s death, his son Azim Premji returned home from Stanford University and took over Wipro as its chairman at the age of 21.

During the 1970s and 1980s, the company shifted its focus to new business opportunities in the IT and computing industry, which was at a nascent stage in India at the time. On 7 June 1977, the name of the company changed from Western India Vegetable Products Limited, to Wipro Products Limited.

The year 1980 marked the arrival of Wipro in the IT domain. In 1982, the name was changed from Wipro Products Limited to Wipro Limited. Meanwhile Wipro continued to expand in the consumer products domain with the launch of “Ralak” a tulsi-based family soap and “Wipro Jasmine”, a toilet soap.

1966–1992

In 1988, Wipro diversified its product line into heavy-duty industrial cylinders and mobile hydraulic cylinders. A joint venture company with the United States’ General Electric in the name of Wipro GE Medical Systems Pvt. Ltd. was set up in 1989 for the manufacture, sales, and service of diagnostic and imaging products. Later, in 1991, tipping systems and Eaton hydraulic products were launched. The Wipro Fluid Power division, in 1992, developed expertise to offer standard hydraulic cylinders for construction equipment and truck tipping systems. The market saw the launch of the “Santoor” talcum powder and “Wipro Baby Soft” range of baby toiletries in 1990.

1994–2000

In 1994, Wipro set up an overseas design centre, Odyssey 21, for undertaking projects and product developments in advanced technologies for overseas clients. Wipro Infotech and Wipro Systems were amalgamated with Wipro in April that year. Five of Wipro’s manufacturing and development facilities secured the ISO 9001 certification during 1994–95. In 1999, Wipro acquired Wipro Acer. Wipro became a more profitable, diversified corporation with new products such as the Wipro SuperGenius personal computers (PCs). In 1999, the product was the one Indian PC range to obtain US-based National Software Testing Laboratory (NSTL) certification for the Year 2000 (Y2K) compliance in hardware for all models.

Wipro Limited joined hands with a global telecom major KPN (Royal Dutch telecom) to form a joint venture company “Wipro Net Limited” to provide internet services in India. The year 2000 was the year Wipro launched solutions for convergent networks targeted at Internet and telecom solution providers in the names of Wipro OSS Smart and Wipro WAP Smart. In the same year, Wipro got listed on New York Stock Exchange. In early 2000 Wipro Vice Chairman Vivek Paul and Azim Premji approached KPMG Consulting Vice Chairman Keyur Patel and CEO Rand Blazer to form an mega-outsourcing joint venture between the two organizations.

2001–present

In February 2002, Wipro became the first software technology and services company in India to be certified for ISO 14001 certification. Wipro also achieved ISO 9000 certification to become the first software company to get SEI CMM Level 5 in 2002. Wipro Consumer Care and Lighting Group entered the market of compact fluorescent lamps, with the launch of a range of CFL, under the brand name of Wipro Smartlite. As the company grew, a study revealed that Wipro was the fastest wealth creator for 5 years (1997–2002). The same year witnessed the launch of Wipro’s own laptops with Intel’s Centrino mobile processor.Wipro also entered into an exclusive agreement with the owners of Chandrika for marketing of their soap in select states in India. It set up a wholly owned subsidiary company viz. Wipro Consumer Care Limited to manufacture consumer care and lighting products. In 2004 Wipro joined the billion dollar club. It also partnered with Intel for i-shiksha. The year 2006 saw Wipro acquire cMango Inc., a US-based technology infrastructure Consulting firm Enabler, and a Europe based retail solutions provider. In 2007, Wipro signed a large deal with Lockheed Martin. It also entered into a definitive agreement to acquire Oki Techno Centre Singapore Pte Ltd (OTCS) and signed an R&D partnership contract with Nokia Siemens Networks in Germany. The year 2008 saw Wipro’s foray into the clean energy business with Wipro Eco Energy. In April 2011, Wipro signed an agreement with Science Applications International Corporation (SAIC) for the acquisition of their global oil and gas information technology practice of the commercial business services business unit. The year 2012 saw Wipro make its 17th acquisition in IT business when it acquired Australian analytics product firm Promax Applications Group (PAG) for $35 million.Wipro is the No. 1 employer of H-1B visa professionals in the United States in 2012.

In 2012 Wipro Ltd. announced the demerger of its Consumer Care & Lighting (incl. Furniture business), Infrastructure Engineering (Hydraulics & Water business), and Medical Diagnostic Product & Services business into a separate company to be named Wipro Enterprises Ltd. Wipro’s scheme of arrangement for demerger turned effective from 31 March 2013.

Standard

About Google

Google is an American multinational corporation specializing in Internet-related services and products. These include search, cloud computing, software, and online advertising technologies.[6] Most of its profits are derived from AdWords.[7][8]

Google was founded by Larry Page and Sergey Brin while they were Ph.D. students at Stanford University. Together they own about 16 percent of its shares. They incorporated Google as a privately held company on September 4, 1998. An initial public offering followed on August 19, 2004. Its mission statement from the outset was “to organize the world’s information and make it universally accessible and useful”,[9] and its unofficial slogan was “Don’t be evil”.[10][11] In 2006 Google moved to headquarters in Mountain View, California, nicknamed the Googleplex.

Google on ad-tech London, 2010

Rapid growth since incorporation has triggered a chain of products, acquisitions and partnerships beyond Google’s core search engine. It offers online productivity software including email (Gmail), an office suite (Google Drive), and social networking (Google+). Desktop products include applications for web browsing, organizing and editing photos, and instant messaging. The company leads the development of the Android mobile operating system and the browser-only Chrome OS[12] for a netbook known as a Chromebook. Google has moved increasingly into communications hardware: it partners with major electronics manufacturers in production of its high-end Nexus devices and acquired Motorola Mobility in May 2012.[13] In 2012, a fiber-optic infrastructure was installed in Kansas City to facilitate a Google Fiber broadband service.[14]

The corporation has been estimated to run more than one million servers in data centers around the world (as of 2007)[15] and to process over one billion search requests[16] and about 24 petabytes of user-generated data each day (as of 2009).[17][18][19][20] In December 2013 Alexa listed google.com as the most visited website in the world. Numerous Google sites in other languages figure in the top one hundred, as do several other Google-owned sites such as YouTube and Blogger.[21] Its market dominance has led to prominent media coverage, including criticism of the company over issues such as copyright, censorship, and privacy.[22][23]

Standard

Cyber security

Cybersecurity standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cybersecurity attacks. These guides provide general outlines as well as specific techniques for implementing cybersecurity. For certain standards, cybersecurity certification by an accredited body can be obtained. There are many advantages to obtaining certification including the ability to get cybersecurity insurance. (Spelling of Cyber Security or Cybersecurity depends on the institution, and there have been discrepancies on older documents.However, since the U.S. Federal Executive Order (EO) 13636 on the subject was spelled “Improving Critical Infrastructure Cybersecurity”, most forums and media have embraced spelling “cybersecurity” as a single word.)

Standard