-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
-
Naavi
IICA Qualified Independent Director
- Schedule Meeting with Naavi
-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
-
This is an AI Conversational Agent that can answer your queries. https://elevenlabs.io/app/talk-to?agent_id=agent_2901k3kgecvferkbr1vyjkszrrde
Author Archives: Vijayashankar Na
Charter of Demand on behalf of Netizens of Bangalore
Naavi has developed a charter of demand on behalf of the Netizens of Bangalore in the context of the forthcoming polls. Details are available at http://www.aifon.org.in/wp/?p=87 The essential part of the demand are: 1. Recognize the existence of Netizens as part … Continue reading
Posted in Uncategorized
Leave a comment
Let there be the rule of law
It is unfortunate that persons like Justice Katju, Digvijay Singh, Jayaprada and others are speaking of some kind of pardon for Mr Sanjay Dutt, who is convicted by the Supreme Court of India to undergo imprisonment for possession of illegal … Continue reading
Posted in Cyber Crime
1 Comment
Who is causing denial of access?
When some spamming is detected by web hosting companies or spam filters, the concerned IP addresses are blocked automatically. At present I have observed that BSNL ip addresses are frequently found in the blocked lists. When a particular IP address … Continue reading
Posted in Uncategorized
2 Comments
Botnet steals US$6 million from advertisers
Simulating visitors to a website who click on advertisements, a botnet named “Chameleon” is reported to have stolen around US$ 6 million in the form of false clicks on advertisements. The botnet used about 120000 hosts simulating the ad-clicking. Report: … Continue reading
Posted in Uncategorized
Leave a comment
Cyber attack on South Korea
South Korean networks were down in what is believed to be a Cyber Attack from North Korea. The attack has crippled Bank transactions including the ATM networks. Report here:
Posted in Uncategorized
Leave a comment
MD5 to SHA256..but password cracking becomes easier
In an interesting evelations, it is stated that CISCO has recently started using a different method for storing user’s passwords which involves shifting from MD5 to SHA 256 which makes passwords more vulnerable to cracking. We are aware that MD5 … Continue reading
Posted in Cyber Crime, ITA 2008
Leave a comment