enquiries in Cyber law knowledgebuildup is cordially invited.
Jaigopal Tiwari,
C-in-Cyber Laws (ignou), PGDBM,Member AIMA-INTACH-MMA,
LLB Final year Student - results awaited.
jgtiwari@gmail.com, 9411093193
Jaigopal Tiwari (final year student of LLB) 14 February 2012
enquiries in Cyber law knowledgebuildup is cordially invited.
Jaigopal Tiwari,
C-in-Cyber Laws (ignou), PGDBM,Member AIMA-INTACH-MMA,
LLB Final year Student - results awaited.
jgtiwari@gmail.com, 9411093193
Jaigopal Tiwari (final year student of LLB) 14 February 2012
Democratic Indian (n/a) 14 February 2012
Power of defense is immense. It is even more immense in cyber laws provided that the advocate and his client are skillful enough to understand the basics and know what they need to know. The very basis of cyber communications is binary i.e. 1s and 0s. You toggle 1 it becomes 0. You toggle 0 it becomes 1. The pattern and flow in which they are toggled, gives them a desired meaning. The pattern and flow in which they are toggled, encrypts them to give no meaning. Contents of files if overwritten with 1s and 0s in a random pattern sufficient number of times, it becomes impossible to recover the original 1s and 0s in the file. The meta data of the files(1s and 0s) can be changed resulting in misleading dates(1s and 0s), like when file was created or last accessed. All this is available to everyone including prosecution or defense or viruses or hackers. Please read the following you will get more idea:
1. https://www.lawyersclubindia.com/forum/Ip-address-in-email-for-threatening-47909.asp
I don't need to know everything, I just need to know where to find it, when I need it. - Albert Einstein