Sunday, April 18, 2010

IPL: Mallya’s daughter questioned by I-T










The Income Tax department plans to enlarge its current inquiry into the IPL’s financial transactions to cover all the franchises amidst allegations of murky deals even as it questioned the ‘mystery’ woman and Vijay Mallya’s daughter who works for IPL Commissioner Lalit Modi.

Laila Mahmood, the step daughter of Mallya who owns the Royal Challengers Bangalore team, was identified as the woman who exited Modi’s office in a plush hotel in Mumbai minutes before I-T officials visited it for probe on Thursday.

The IT authorities probing various aspects of the Indian Premier League controversy have been able to ascertain the identity of the ‘mystery’ woman as Laila, a source in the department told on reporters.

Mallya also said in a statement that “my step daughter Laila Mahmood works for Lalit Modi. I know nothing about this. I called Lalit Modi and he confirmed that she has given a statement to Income Tax.”


Suspecting that the woman, who was seen carrying what appeared like a laptop and some documents, might have carried away some important documents, the IT authorities got into action and identified her.

Notwithstanding claims by IPL Commissioner Lalit Modi that it was routine questioning on Thursday by officials at the premises of BCCI and his office in Mumbai, I-T department sources said the special team has prepared a voluminous report on the operations and sent it to the Finance Ministry in Delhi.

Top sources said that in the wake of the report, plans were afoot to summon representatives of the various IPL team owners for questioning and for production of teams.

It may also include search operations on their officials premises, the source said adding it could be a long process, the sources said.

Officially there has been no no word on the operations in Mumbai but sources said the department in Mumbai has been asked to carry out further inquiries and, if necessary, even surveys and raids on IPL premises and those of its franchises.

“We are widening our inquiry. However, it will take some time before we obtain all details about IPL’s transactions,” the sources said.

Earlier indications were that only the new franchisees Kochi and Pune could be investigated but now the department may be expected to scrutinise the bid process of all the franchises in the wake of allegations about the sourcing of the funds of the teams.
Asked about the ‘mystery’ woman, Modi suggested that his staff could have brought papers for him from a hotel room which was caught on close circuit TV before tax officials went there.

“All I know is I was not at the hotel (Four Seasons where he reportedly has a temporary office). They (staff) do bring things to me in my office... because the I-T has asked us to bring some documents, it must be...,” he said when asked about reports that a woman removed important documents from the hotel in Mumbai before the I-T officials came there.

To another query, he said did not know whether his lap-top has been taken away by officials. “I have no idea about it, who has taken what,” he said.

Modi said the I-T officials were doing a job and he had no problems with that. “We have nothing to hide. The I-T has asked us information, that’s fine. There is no reason to be upset about”.

He reiterated the charge that Union Minister Shashi Tharoor stepped into the picture and asked him not to go into the details of the shareholders when he had put some questions to those who had come on behalf of the bid.

“I was just sitting in the room and asking all shareholders who the shareholders are. It became an issue when the shareholders did not know the names of other shareholders. That’s when the red flag was raised, when I asked who these people are.

“At that point of time they said they did not know who they were. They made a call to their father. Shailendra Gaikwad made a phone call to his father. At that point of time, he said he will get back to us. Then the phone call that came back to us was that of Mr Tharoor who said why are you inquiring into these items. At that point of time I still did not know whether these four people were linked or not”, Modi said.

The IPL Commissioner said he was signing the documents subject to confirmation but next day he saw in a Mumbai newspaper a news item (appararently referring to a reported proposal of Tharoor marrying his friend Sunanda Pushkar).

Asked how the conversation ended, he said the conversation did not end and he told Tharoor that he was recording the conversation.

“We have minuted it. It is in black and white. There is nothing to worry”, he said.

How ID Thieves see what you type

A Closer Look at Malicious Keyloggers:

Part of iolo's ongoing series exposing malicious software
With iolo's Security Spotlight series, you can read about the various malicious programs that infect computers, destroy data and steal personal information, and get some valuable pointers on how to protect yourself.
Knowledge is power—knowing more about what the high-tech vandals are up to can give you a powerful defense against their tactics.
This part of the series takes a closer look at a stealthy type of malware often used in financial cybercrimes, keyloggers.


 

 

 

 

 

What is a keylogger?

A keylogger, also called a keystroke logger, captures all of the keystrokes you make on your keyboard. A criminal can see your passwords, bank account information, credit card numbers, personal email and instant messaging conversations—any and every thing that you type is covertly captured.
How it works is that as you type, all of your keystrokes are saved to a small file that is then silently sent to an email address, web site or waiting server. The hacker can then sift through the data, pull out all the private information needed to access your financial accounts and begin the theft.
A little history
Early keyloggers were designed for legitimate monitoring purposes, such as for parents wishing to track their children's computer activity (and legitimate keyloggers—software that is intentionally and knowingly installed—are still in use today). However, it didn't take long for criminals to see the potential of this technology; malicious keyloggers first began to appear in the early 1990s.
Keyloggers of today
Today's malicious files are more and more often being designed with a profit motive, and keyloggers are a perfect example of this growing trend—the creators of modern keyloggers don't want to destroy data or cause havoc; they just want to steal money.
Some infamous keyloggers
  • From 2005 to 2006, a large criminal ring in Brazil captured people's bank user IDs and passwords through the use of keyloggers. Before the group of 55 thieves was caught and arrested, an estimated $4.7 million was stolen from 200 different accounts.
  • In 2005, Joe Lopez, the owner of a small computer supply company in Florida, sued his bank after hackers stole $90,000 from his business account through the use of a keylogger. Initially the bank refused to return the stolen money, asserting that the theft was due to a security breach of Lopez's computer, not the bank's. The case was eventually settled out of court.

Where do keyloggers come from?

To install keyloggers, cyber criminals typically exploit the tools we use to communicate over the web: email, instant messaging and social networking sites are the most common ways these malicious programs are distributed. The thieves send attachments or links that, if clicked, install the keylogger. Keyloggers are also often hidden inside of malicious trojans—and it's easy to be tricked into installing a trojan because it disguises itself as program that serves a beneficial purpose. (Click here to read more about trojans.)
Another common source of keylogger infections are peer-to-peer (P2P) file-sharing networks. These networks allow users to share their own digital content and download the content of others, but unfortunately hackers often use P2P networks to "share" keyloggers and other malware that appear to be useful but in reality are very dangerous.

What do keyloggers do?

Keyloggers are designed to steal—your login credentials, your personal data, and ultimately your money. Once your name and login information are known, it's easy for hackers to begin the theft; keylogger-based crimes typically involve setting up wire transfers from people's back accounts or making online purchases with stolen credit card numbers.
While other types of malware can waste system resources, conflict with valid programs and generally just slow your PC down, keyloggers are much more stealthy and are designed to hide themselves unobtrusively: you can't tell when a keylogger is installed. The infiltration may only be discovered when mysterious charges appear on your credit card or your bank account is emptied.

How you can protect yourself

  • Think before you click. Many keyloggers are sent through email, social networking postings and instant messages. And the more sophisticated criminals know better than to use an unknown name—often these malicious messages will arrive under the guise of someone you know. Avoid the temptation to be "click happy": think before you click and if anything looks a little off, check with your contact to make sure they sent it to you.
  • Be cautious of peer-to-peer sites. There are dozens of file-sharing networks out there that offer free access to files. And every one of them is full of keyloggers, viruses and every other form of malware that exists. Either avoid these sites or use them with caution: you're not getting something for free if your bank account ends up getting wiped out.
  • Use anti-malware software. Even with the most diligent preventative measures, malware can still find its way onto your computer. Install and run anti-malware software and turn on the program's "real-time" feature: this will detect and block a keylogger from sending information from your computer.

How System Shield® can protect you

iolo's System Shield® protects your PC from all types of malicious files: keyloggers as well as dozens of other types of malware. Some highlights of System Shield:

Flexible options for scans System Shield's malware scans can run automatically when your computer isn't being used—you don't have to think about it—and you also can run scans whenever you want to: a smart choice for after you download files.

Automated protection 2 ways For total peace of mind, System Shield offers two automated protection features:
  • Real-time is an invisible form of protection that runs quietly behind-the-scenes to check files as they're opened, changed, moved, copied, and saved—a critical defense against malware silently making changes to your PC.
  • Email protection automatically scans email messages and attachments before they're received or sent—both you and the people you communicate with are protected.

Safe quarantine System Shield's Quarantine is a safe holding area that gives you total control over suspicious files. The Quarantine prevents infections from causing any damage, but still allows you to keep the files you know are safe.

Up-to-date malware definitions Old definition files can't protect you against the most recent attacks—and the criminals come up with newly designed malware every day. System Shield updates its definitions in real-time as threats emerge, sometimes even 8-10 times in a single day, based on the latest research from iolo Labs.

 

Thursday, April 15, 2010

How to Get Blood in Emergency

God could not be everywhere; so He made mothers.












Now it has become easier to get the blood we need.

All you have to do is just type "BLOOD and send SMS to 96000 97000" (in India )

EX: "BLOOD B+"

A BLOOD DONOR WILL CALL YOU!!

So please pass this message to all. It certainly would save many lives.

It's a Must to Know & Share. Do it now....

Forward this to all your friends whom you care ....as the minute you spare to share this information can save somebody's life with rare Blood Group!

Sunday, April 4, 2010

Can I Borrow Rs.25/-?

Can I Borrow Rs.25/-?


A woman came home from work late, tired and irritated, to find her 5-year old son waiting for her at the door.

SON: 'Mummy, may I ask you a question?'

MUM: 'Yeah sure, what it is?' replied the woman.

SON: 'Mummy, how much do you make an hour?'

MUM: 'That's none of your business. Why do you ask such a thing?' the woman said angrily.
SON: 'I just want to know. Please tell me, how much do you make an hour?'

MUM: 'If you must know, I make Rs. 50 an hour.'

SON: 'Oh,' the little boy replied, with his head down.

SON: 'Mummy, may I please borrow Rs.25?'

The mother was furious, 'If the only reason you asked that is so you can borrow some money to buy a silly toy or some other nonsense, then you march yourself straight to your room and go to bed. Think about why you are being so selfish. I don't work hard everyday for such childish frivolities.'

The little boy quietly went to his room and shut the door..

The woman sat down and started to get even angrier about the little boy's questions. How dare he ask such questions only to get some money?

After about an hour or so, the woman had calmed down , and started to think:

Maybe there was something he really needed to buy with that Rs.25.00 and he really didn't ask for money very often.The woman went to the door of the little boy's room and opened the door.

'Are you asleep, son?' She asked.

'No Mummy, I'm awake,' replied the boy.

'I've been thinking, maybe I was too hard on you earlier' said the woman. 'It's been a long day and I took out my aggravation on you. Here's the Rs.25 you asked for.'

The little boy sat straight up, smiling. 'Oh, thank you Mummy!' he yelled. Then, reaching under his pillow he pulled out some crumpled up bills.

The woman saw that the boy already had money, started to get angry again.

The little boy slowly counted out his money, and then looked up at his mother.

'Why do you want more money if you already have some?' the mother grumbled.

'Because I didn't have enough, but now I do,' the little boy replied.

'Mummy, I have Rs.50 now. Can I buy an hour of your time? Please come home early tomorrow. I would like to have dinner with you.'

The mother was crushed. She put his arms around her little son, and she begged for his forgiveness.

It's just a short reminder to all of you working so hard in life. We should not let time slip through our fingers without having spent some time with those who really matter to us, those close to our hearts. Do remember to share that Rs.50 worth of your time with someone you love.

If we die tomorrow, the company that we are working for could easily replace us in a matter of hours. But the family & friends we leave behind will feel the loss for the rest of their lives.