Monday, February 25, 2013

One Method of Data Recovery from a Dead Hard Drive

Here is the situation. A laptop comes to us with a dead hard drive. Unfortunately, the user needs some files off the dead drive. After much research on the internet and a couple of data recovery quotes we decide to try and recover the information ourselves.

Luckily for us the drive won't spin up at all. I say luckily because the usual problem is that the circuit board on the bottom of the drive went bad. That doesn't mean that something else isn't the problem, but replacing the circuit board is the simplest thing to try.

The first thing needed is another hard drive. That may sound easy but it isn't. You need an identical hard drive, and by identical I mean the same model number, part number, firmware, everything. In our case we had a Hitachi Travelstar hard drive that had three numbers to match. The important numbers were the model number, part number, and MLC number. I believe the MLC number has something to do with the firmware revision but don't quote me on that. After speaking with Hitachi I was referred to a company called CueTech. They specialize in finding "hard to find" or obsolete computer parts. The wanted to charge between 0 and 0 for the drive, which I thought was reasonable for the work required to find one. Instead of using them I decided to search on my own and after two days, still had not found another drive for sale that met my needs. We then started looking in house for similar laptops and found one that had an identical drive. Now we were in business.

One Method of Data Recovery from a Dead Hard Drive

Now that we had our drive, we needed to protect ourselves because the user wanted their machine back in working order. So before we started any kind of surgery we made a ghost image of their hard drive. After waiting the 20 minutes or so for the backup to finish we began the surgery. First we removed the hard drive from the working system and laid it on a static pad with the circuit board up. We then used a T-5 Torx drive to remove the screws securing the circuit board to the hard drive. Your drive may need a different size or style of screwdriver. We then repeated the process on the bad drive. We put the circuit board from the good drive onto the dead hard drive and placed it back in the laptop. It booted! As soon as we new it worked we then setup the system to make a quick drive image. After waiting another 20 minutes we had a drive image of the bad hard drive and our data was recovered.

To finish the process we had to put the circuit board back on the original good hard drive and verify that it was working correctly. Once that was completed and the laptop returned to its owner, we installed a brand new hard drive in the system that had the original issue. The last step was to restore the drive image to the new hard drive, verify that it worked, and give the laptop back to the owner.

One Method of Data Recovery from a Dead Hard Drive
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Gary Higbee

[http://www.greatnorthcomputing.com] - A community for SysAdmins and Programmers.

watch cell phone Buy 2008 2010 Mitsubishi Lancer Without Turbo Radiator

Sunday, February 17, 2013

Banking Fraud - Prevention and Control

Banking Fraud is posing threat to Indian Economy. Its vibrant effect can be understood be the fact that in the year 2004 number of Cyber Crime were 347 in India which rose to 481 in 2005 showing an increase of 38.5% while I.P.C. category crime stood at 302 in 2005 including 186 cases of cyber fraud and 68 cases cyber forgery. Thus it becomes very important that occurrence of such frauds should be minimized. More upsetting is the fact that such frauds are entering in Banking Sector as well.

In the present day, Global Scenario Banking System has acquired new dimensions. Banking did spread in India. Today, the banking system has entered into competitive markets in areas covering resource mobilization, human resource development, customer services and credit management as well.

Indian's banking system has several outstanding achievements to its credit, the most striking of which is its reach. In fact, Indian banks are now spread out into the remotest areas of our country. Indian banking, which was operating in a highly comfortable and protected environment till the beginning of 1990s, has been pushed into the choppy waters of intense competition.

Banking Fraud - Prevention and Control

A sound banking system should possess three basic characteristics to protect depositor's interest and public faith. Theses are (i) a fraud free culture, (ii) a time tested Best Practice Code, and (iii) an in house immediate grievance remedial system. All these conditions are their missing or extremely weak in India. Section 5(b) of the Banking Regulation Act, 1949 defines banking... "Banking is the accepting for the purpose of lending or investment, deposits of money from the purpose of lending or investment, deposits of money from the public, repayable on demand or otherwise and withdraw able by cheque, draft, order or otherwise." But if his money has fraudulently been drawn from the bank the latter is under strict obligation to pay the depositor. The bank therefore has to ensure at all times that the money of the depositors is not drawn fraudulently. Time has come when the security aspects of the banks have to be dealt with on priority basis.

The banking system in our country has been taking care of all segments of our socio-economic set up. The Article contains a discussion on the rise of banking frauds and various methods that can be used to avoid such frauds. A bank fraud is a deliberate act of omission or commission by any person carried out in the course of banking transactions or in the books of accounts, resulting in wrongful gain to any person for a temporary period or otherwise, with or without any monetary loss to the bank. The relevant provisions of Indian Penal Code, Criminal Procedure Code, Indian Contract Act, and Negotiable Instruments Act relating to banking frauds has been cited in the present Article.

EVOLUTION OF BANKING SYSTEM IN INDIA

Banking system occupies an important place in a nation's economy. A banking institution is indispensable in a modern society. It plays a pivotal role in economic development of a country and forms the core of the money market in an advanced country.

Banking industry in India has traversed a long way to assume its present stature. It has undergone a major structural transformation after the nationalization of 14 major commercial banks in 1969 and 6 more on 15 April 1980. The Indian banking system is unique and perhaps has no parallels in the banking history of any country in the world.

RESERVE BANK OF INDIA-ECONOMIC AND SOCIAL OBJECTIVE

The Reserve Bank of India has an important role to play in the maintenance of the exchange value of the rupee in view of the close interdependence of international trade and national economic growth and well being. This aspect is of the wider responsibly of the central bank for the maintenance of economic and financial stability. For this the bank is entrusted with the custody and the management of country's international reserves; it acts also as the agent of the government in respect of India's membership of the international monetary fund. With economic development the bank also performs a variety of developmental and promotional functions which in the past were registered being outside the normal purview of central banking. It also acts an important regulator.

BANK FRAUDS: CONCEPT AND DIMENSIONS

Banks are the engines that drive the operations in the financial sector, which is vital for the economy. With the nationalization of banks in 1969, they also have emerged as engines for social change. After Independence, the banks have passed through three stages. They have moved from the character based lending to ideology based lending to today competitiveness based lending in the context of India's economic liberalization policies and the process of linking with the global economy.

While the operations of the bank have become increasingly significant banking frauds in banks are also increasing and fraudsters are becoming more and more sophisticated and ingenious. In a bid to keep pace with the changing times, the banking sector has diversified it business manifold. And the old philosophy of class banking has been replaced by mass banking. The challenge in management of social responsibility with economic viability has increased.

DEFINITION OF FRAUD

Fraud is defined as "any behavior by which one person intends to gain a dishonest advantage over another". In other words , fraud is an act or omission which is intended to cause wrongful gain to one person and wrongful loss to the other, either by way of concealment of facts or otherwise.

Fraud is defined u/s 421 of the Indian Penal Code and u/s 17 of the Indian Contract Act. Thus essential elements of frauds are:

1. There must be a representation and assertion;

2. It must relate to a fact;

3. It must be with the knowledge that it is false or without belief in its truth; and

4. It must induce another to act upon the assertion in question or to do or not to do certain act.

BANK FRAUDS

Losses sustained by banks as a result of frauds exceed the losses due to robbery, dacoity, burglary and theft-all put together. Unauthorized credit facilities are extended for illegal gratification such as case credit allowed against pledge of goods, hypothecation of goods against bills or against book debts. Common modus operandi are, pledging of spurious goods, inletting the value of goods, hypothecating goods to more than one bank, fraudulent removal of goods with the knowledge and connivance of in negligence of bank staff, pledging of goods belonging to a third party. Goods hypothecated to a bank are found to contain obsolete stocks packed in between goods stocks and case of shortage in weight is not uncommon.

An analysis made of cases brings out broadly the under mentioned four major elements responsible for the commission of frauds in banks.

1. Active involvement of the staff-both supervisor and clerical either independent of external elements or in connivance with outsiders.

2. Failure on the part of the bank staff to follow meticulously laid down instructions and guidelines.

3. External elements perpetuating frauds on banks by forgeries or manipulations of cheques, drafts and other instruments.

4. There has been a growing collusion between business, top banks executives, civil servants and politicians in power to defraud the banks, by getting the rules bent, regulations flouted and banking norms thrown to the winds.

FRAUDS-PREVENTION AND DETECTION

A close study of any fraud in bank reveals many common basic features. There may have been negligence or dishonesty at some stage, on part of one or more of the bank employees. One of them may have colluded with the borrower. The bank official may have been putting up with the borrower's sharp practices for a personal gain. The proper care which was expected of the staff, as custodians of banks interest may not have been taken. The bank's rules and procedures laid down in the Manual instructions and the circulars may not have been observed or may have been deliberately ignored.

Bank frauds are the failure of the banker. It does not mean that the external frauds do not defraud banks. But if the banker is upright and knows his job, the task of defrauder will become extremely difficult, if not possible.

Detection of Frauds

Despite all care and vigilance there may still be some frauds, though their number, periodicity and intensity may be considerably reduced. The following procedure would be very helpful if taken into consideration:

1. All relevant data-papers, documents etc. Should be promptly collected. Original vouchers or other papers forming the basis of the investigation should be kept under lock and key.

2. All persons in the bank who may be knowing something about the time, place a modus operandi of the fraud should be examined and their statements should be recorded.

3. The probable order of events should thereafter be reconstructed by the officer, in his own mind.

4. It is advisable to keep the central office informed about the fraud and further developments in regard thereto.

Classification of Frauds and Action Required by Banks

The Reserve Bank of India had set-up a high level committee in 1992 which was headed by Mr. A... Ghosh, the then Dy. Governor Reserve Bank of India to inquire into various aspects relating to frauds malpractice in banks. The committee had noticed/observed three major causes for perpetration of fraud as given hereunder:

1. Laxity in observance of the laid down system and procedures by operational and supervising staff.

2. Over confidence reposed in the clients who indulged in breach of trust.

3. Unscrupulous clients by taking advantages of the laxity in observance of established, time tested safeguards also committed frauds.

In order to have uniformity in reporting cases of frauds, RBI considered the question of classification of bank frauds on the basis of the provisions of the IPC.
Given below are the Provisions and their Remedial measures that can be taken.

1. Cheating (Section 415, IPC)

Remedial Measures.

The preventive measures in respect of the cheating can be concentrated on cross-checking regarding identity, genuineness, verification of particulars, etc. in respect of various instruments as well as persons involved in encashment or dealing with the property of the bank.

2. Criminal misappropriation of property (Section 403 IPC).

Remedial Measure

Criminal misappropriation of property, presuppose the custody or control of funds or property, so subjected, with that of the person committing such frauds. Preventive measures, for this class of fraud should be taken at the level the custody or control of the funds or property of the bank generally vests. Such a measure should be sufficient, it is extended to these persons who are actually handling or having actual custody or control of the fund or movable properties of the bank.

3. Criminal breach of trust (Section 405, IPC)

Remedial Measure

Care should be taken from the initial step when a person comes to the bank. Care needs to be taken at the time of recruitment in bank as well.

4. Forgery (Section 463, IPC)

Remedial Measure

Both the prevention and detection of frauds through forgery are important for a bank. Forgery of signatures is the most frequent fraud in banking business. The bank should take special care when the instrument has been presented either bearer or order; in case a bank pays forged instrument he would be liable for the loss to the genuine costumer.

5. Falsification of accounts (Section 477A)

Remedial Measure

Proper diligence is required while filling of forms and accounts. The accounts should be rechecked on daily basis.

6. Theft (Section 378, IPC)

Remedial Measures

Encashment of stolen' cheque can be prevented if the bank clearly specify the age, sex and two visible identify action marks on the body of the person traveler's cheques on the back of the cheque leaf. This will help the paying bank to easily identify the cheque holder. Theft from lockers and safe deposit vaults are not easy to commit because the master-key remains with the banker and the individual key of the locker is handed over to the costumer with due acknowledgement.

7. Criminal conspiracy (Section 120 A, IPC)

In the case of State of Andhra Pradesh v. IBS Prasad Rao and Other, the accused, who were clerks in a cooperative Central Bank were all convicted of the offences of cheating under Section 420 read along with Section 120 A. all the four accused had conspired together to defraud the bank by making false demand drafts and receipt vouchers.

8. Offences relating to currency notes and banks notes (Section 489 A-489E, IPC)
These sections provide for the protection of currency-notes and bank notes from forgery. The offences under section are:

(a) Counterfeiting currency notes or banks.

(b) Selling, buying or using as genuine, forged or counterfeit currency notes or bank notes. Knowing the same to be forged or counterfeit.

(c) Possession of forged or counterfeit currency notes or bank-notes, knowing or counterfeit and intending to use the same as genuine.

(d) Making or passing instruments or materials for forging or counterfeiting currency notes or banks.

(e) Making or using documents resembling currency-notes or bank notes.

Most of the above provisions are Cognizable Offences under Section 2(c) of the Code of Criminal Procedure, 1973.

FRAUD PRONE AREAS IN DIFFERENT ACCOUNTS

The following are the potential fraud prone areas in Banking Sector. In addition to those areas I have also given kinds of fraud that are common in these areas.

Savings Bank Accounts

The following are some of the examples being played in respect of savings bank accounts:

(a) Cheques bearing the forged signatures of depositors may be presented and paid.

(b) Specimen signatures of the depositors may be changed, particularly after the death of depositors,

(c) Dormant accounts may be operated by dishonest persons with or without collusion of bank employees, and

(d) Unauthorized withdrawals from customer's accounts by employee of the bank maintaining the savings ledger and later destruction of the recent vouchers by them.

Current Account Fraud

The following types are likely to be committed in case of current accounts.

(a) Opening of frauds in the names of limited companies or firms by unauthorized persons;

(b) Presentation and payment of cheques bearing forged signatures;

(c) Breach of trust by the employees of the companies or firms possessing cheque leaves duly signed by the authorized signatures;

(d) Fraudulent alteration of the amount of the cheques and getting it paid either at the counter or though another bank.

Frauds In Case Of Advances

Following types may be committed in respect of advances:

(a) Spurious gold ornaments may be pledged.

(b) Sub-standard goods may be pledged with the bank or their value may be shown at inflated figures.
(c) Same goods may be hypothecated in favour of different banks.

LEGAL REGIME TO CONTROL BANK FRAUDS

Frauds constitute white-collar crime, committed by unscrupulous persons deftly advantage of loopholes existing in systems/procedures. The ideal situation is one there is no fraud, but taking ground realities of the nation's environment and human nature's fragility, an institution should always like to keep the overreach of frauds at the minimum occurrence level.

Following are the relevant sections relating to Bank Frauds

Indian Penal Code (45 of 1860)

(a) Section 23 "Wrongful gain".-

"Wrongful gain" is gain by unlawful means of property to which the person gaining is not legally entitled.

(b) "Wrongful loss"

"Wrongful loss" is the loss by unlawful means of property to which the person losing it is legally entitled.
(c) Gaining wrongfully.

Losing wrongfully-A person is said to gain wrongfully when such person retains wrongfully, as well as when such person acquires wrongfully. A person is said to lose wrongfully when such person is wrongfully kept out of any property, as well as when such person is wrongfully deprived of property.

(d) Section 24. "Dishonestly"

Whoever does anything with the intention of causing wrongful gain to one person or wrongful loss to another person, is said to do that thing "dishonestly".

(e) Section 28. "Counterfeit"

A person is said to "counterfeit" who causes one thing to resemble another thing, intending by means of that resemblance to practice deception, or knowing it to be likely that deception will thereby be practiced.

BREACH OF TRUST

1. Section 408- Criminal breach of trust by clerk or servant.

2. Section 409- Criminal breach of trust by public servant, or by banker, merchant or agent.

3. Section 416- Cheating by personating

4. Section 419- Punishment for cheating by personation.

OFFENCES RELATING TO DOCMENTS

1) Section 463-Forgery

2) Section 464 -Making a false document

3) Section 465- Punishment for forgery.

4) Section 467- Forgery of valuable security, will, etc

5) Section 468- Forgery for purpose of cheating

6) Section 469- Forgery for purpose of harming reputation

7) Section 470- Forged document.

8) Section 471- Using as genuine a forged document

9) Section 477- Fraudulent cancellation, destruction, etc., of will, authority to adopt, or valuable security.

10) Section 477A- Falsification of accounts.

THE RESERVE BANK OF INDIA ACT, 1934

Issue of demand bills and notes Section 31.

Provides that only Bank and except provided by Central Government shall be authorized to draw, accept, make or issue any bill of exchange, hundi, promissory note or engagement for the payment of money payable to bearer on demand, or borrow, owe or take up any sum or sums of money on the bills, hundis or notes payable to bearer on demand of any such person

THE NEGOTIABLE INSTRUMENTS ACT, 1881

Holder's right to duplicate of lost bill Section 45A.

1. The finder of lost bill or note acquires no title to it. The title remains with the true owner. He is entitled to recover from the true owner.

2. If the finder obtains payment on a lost bill or note in due course, the payee may be able to get a valid discharge for it. But the true owner can recover the money due on the instrument as damages from the finder.

Section 58

When an Instrument is obtained by unlawful means or for unlawful consideration no possessor or indorse who claims through the person who found or so obtained the instrument is entitled to receive the amount due thereon from such maker, acceptor or holder, or from any party prior to such holder, unless such possessor or indorse is, or some person through whom he claims was, a holder thereof in due course.

Section 85:

Cheque payable to order.

1. By this section, bankers are placed in privileged position. It provides that if an order cheque is indorsed by or on behalf of the payee, and the banker on whom it is drawn pays it in due course, the banker is discharged. He can debit his customer with the amount so paid, though the endorsement of the payee might turn out to be a forgery.

2. The claim protection under this section the banker has to prove that the payment was a payment in due course, in good faith and without negligence.

Section 87. Effect of material alteration

Under this section any alteration made without the consent of party would be void. Alteration would be valid only if is made with common intention of the party.

Section 138. Dishonour of cheque for insufficiency, etc., of funds in the account.

Where any cheque drawn by a person on an account maintained by him with a banker for payment of any amount of money to another person from out of that account for the discharge, in whole or in part, of any debt or other liability, is returned by the bank unpaid. either because of the amount of money standing to the credit of that account is insufficient to honour the cheque or that it exceeds the amount arranged to be paid from that account by an agreement made with that bank, such person shall be deemed to have committed an offence and shall, without prejudice.

Section 141(1) Offences by companies.

If the person committing an offence under Section 138 is a company, every person who, at the time the offence was committed, was in charge of, and was responsible to, the company for the conduct of the business of the company, as well as the company, shall be deemed to be guilty of the offence and shall be liable to be proceeded against and punished accordingly.

SECURITY REGIME IN BANKING SYSTEM

Security implies sense of safety and of freedom from danger or anxiety. When a banker takes a collateral security, say in the form of gold or a title deed, against the money lent by him, he has a sense of safety and of freedom from anxiety about the possible non-payment of the loan by the borrower. These should be communicated to all strata of the organization through appropriate means. Before staff managers should analyze current practices. Security procedure should be stated explicitly and agreed upon by each user in the specific environment. Such practices ensure information security and enhance availability. Bank security is essentially a defense against unforced attacks by thieves, dacoits and burglars.

PHYSICAL SECURITY MEASURES-CONCEPT

A large part of banks security depends on social security measures. Physical security measures can be defined as those specific and special protective or defensive measures adopted to deter, detect, delay, defend and defeat or to perform any one or more of these functions against culpable acts, both covert and covert and acclamations natural events. The protective or defensive, measures adopted involve construction, installation and deployment of structures, equipment and persons respectively.

The following are few guidelines to check malpractices:

1. To rotate the cash work within the staff.

2. One person should not continue on the same seat for more than two months.

3. Daybook should not be written by the Cashier where an other person is available to the job

4. No cash withdrawal should be allowed within passbook in case of withdrawal by pay order.

5. The branch manager should ensure that all staff members have recorder their presence in the attendance registrar, before starting work.

Execution of Documents

1. A bank officer must adopt a strict professional approach in the execution of documents. The ink and the pen used for the execution must be maintained uniformly.

2. Bank documents should not be typed on a typewriter for execution. These should be invariably handwritten for execution.

3. The execution should always be done in the presence of the officer responsible for obtain them,
4. The borrowers should be asked to sign in full signatures in same style throughout the documents.

5. Unless there is a specific requirement in the document, it should not be got attested or witnessed as such attestation may change the character of the instruments and the documents may subject to ad volrem stamp duty.

6. The paper on which the bank documents are made should be pilfer proof. It should be unique and available to the banks only.

7. The printing of the bank documents should have highly artistic intricate and complex graphics.

8. The documents executed between Banker and Borrowers must be kept in safe custody,

CHANGES IN LEGISLATIONS AFTER ELECTRONIC TRANSACTIONS

1. Section 91 of IPC shall be amended to include electronic documents also.

2. Section 92 of Indian Evidence Act, 1872 shall be amended to include commuter based communications

3. Section 93 of Bankers Book Evidence Act, 1891 has been amended to give legal sanctity for books of account maintained in the electronic form by the banks.

4. Section 94 of the Reserve Bank of India Act, 1939 shall be amended to facilitate electronic fund transfers between the financial institutions and the banks. A new clause (pp) has been inserted in Section 58(2).

RECENT TRENDS OF BANKING SYSTEM IN INDIA

In the banking and financial sectors, the introduction of electronic technology for transactions, settlement of accounts, book-keeping and all other related functions is now an imperative. Increasingly, whether we like it or not, all banking transactions are going to be electronic. The thrust is on commercially important centers, which account for 65 percent of banking business in terms of value. There are now a large number of fully computerized branches across the country.

A switchover from cash-based transactions to paper-based transactions is being accelerated. Magnetic Ink character recognition clearing of cheques is now operational in many cities, beside the four metro cities. In India, the design, management and regulation of electronically-based payments system are becoming the focus of policy deliberations. The imperatives of developing an effective, efficient and speedy payment and settlement systems are getting sharper with introduction of new instruments such as credit cards, telebanking, ATMs, retail Electronic Funds Transfer (EFT) and Electronic Clearing Services (ECS). We are moving towards smart cards, credit and financial Electronic Data Interchange (EDI) for straight through processing.

Financial Fraud (Investigation, Prosecution, Recovery and Restoration of property) Bill, 2001

Further the Financial Fraud (Investigation, Prosecution, Recovery and Restoration of property) Bill, 2001 was introduced in Parliament to curb the menace of Bank Fraud. The Act was to prohibit, control, investigate financial frauds; recover and restore properties subject to such fraud; prosecute for causing financial fraud and matters connected therewith or incidental thereto.

Under the said act the term Financial Fraud has been defined as under:

Section 512 - Financial Fraud

Financial frauds means and includes any of the following acts committed by a person or with his connivance, or by his agent, in his dealings with any bank or financial institution or any other entity holding public funds;

1. The suggestion, as a fact, of that which is not true, by one who does not believe it to be true;

2. The active concealment of a fact by one having knowledge or belief of the fact;

3. A promise made with out any intention of performing it;

4. Any other act fitted to deceive;

5. Any such act or omission as the law specially declares to be fraudulent.
Provided that whoever acquires, possesses or transfers any proceeds of financial fraud or enters into any transaction which is related to proceeds of fraud either directly or indirectly or conceals or aids in the concealment of the proceeds of financial fraud, commits financial fraud.

513(a) - Punishment for Financial Fraud

Whoever commits financial fraud shall be: (a) Punished with rigorous imprisonment for a term, which may extend to seven years and shall also be liable to fine.

(b)Whoever commits serious financial fraud shall be punished with rigorous imprisonment for a term which may extend to ten years but shall not be less than five years and shall also be liable for fine up to double the amount involved in such fraud.

Provided that in both (a) and (b) all funds, bank accounts and properties acquired using such funds subjected to the financial fraud as may reasonably be attributed by the investigating agency shall be recovered and restored to the rightful owner according to the procedure established by law.

CONCLUSION

The Indian Banking Industry has undergone tremendous growth since nationalization of 14 banks in the year 1969. There has an almost eight times increase in the bank branches from about 8000 during 1969 to mote than 60,000 belonging to 289 commercial banks, of which 66 banks are in private sector.

It was the result of two successive Committees on Computerization (Rangarajan Committee) that set the tone for computerization in India. While the first committee drew the blue print in 1983-84 for the mechanization and computerization in banking industry, the second committee set up in 1989 paved the way for integrated use of telecommunications and computers for applying technogical breakthroughs in banking sector.

However, with the spread of banking and banks, frauds have been on a constant increase. It could be a natural corollary to increase in the number of customers who are using banks these days. In the year 2000 alone we have lost Rs 673 crores in as many as 3,072 number of fraud cases. These are only reported figures. Though, this is 0.075% of Rs 8,96,696 crores of total deposits and 0.15% of Rs 4,44,125 crores of loans & advances, there are any numbers of cases that are not reported. There were nearly 65,800 bank branches of a total of 295 commercial banks in India as on June 30, 2001 reporting a total of nearly 3,072 bank fraud cases. This makes nearly 10.4 frauds per bank and roughly 0.47 frauds per branch.

An Expert Committee on Bank Frauds (Chairman: Dr.N.L.Mitra) submitted its Report to RBI in September 2001. The Committee examined and suggested both the preventive and curative aspects of bank frauds.

The important recommendations of the Committee include:

o A need for including financial fraud as a criminal offence;

o Amendments to the IPC by including a new chapter on financial fraud;

o Amendments to the Evidence Act to shift the burden of proof on the accused person;

o Special provision in the Cr. PC for properties involved in the Financial Fraud.

o Confiscating unlawful gains; and preventive measures including the development of Best Code Procedures by banks and financial institutions.

Thus it can be concluded that following measures should necessarily be adopted by the Ministry of Finance in order to reduce cases of Fraud.

o There must be a Special Court to try financial fraud cases of serious nature.

o The law should provide separate structural and recovery procedure. Every bank must have a domestic enquiry officer to enquire about the civil dimension of fraud.

o A fraud involving an amount of ten crore of rupees and above may be considered serious and be tried in the Special Court.

The Twenty-ninth Report of the Law Commission had dealt some categories of crimes one of which is "offences calculated to prevent and obstruct the economic development of the country and endanger its economic health." Offences relating to Banking Fraud will fall under this category. The most important feature of such offences is that ordinarily they do not involve an individual direct victim. They are punishable because they harm the whole society. It is clear that money involved in Bank belongs to public. They deposit there whole life' security in Banks and in case of Dacoity or Robbery in banks the public will be al lost. Thus it is important that sufficient efforts should be taken in this regard.

There exists a new kind of threat in cyber world. Writers are referring it as "Salami Attack" under this a special software is used for transferring the amount from the account of the individual. Hence the culprits of such crimes should be found quickly and should be given strict punishment. Moreover there is requirement of more number of IT professionals who will help in finding a solution against all these security threats.

Banking Fraud - Prevention and Control
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Written By:
Apoorva Yadav and Juhi Malviya,
Final Year, National Law Institute University, Bhopal.

1. Extracts from the paper presented by Dr. Srinivasan, National Seminar on Economic Crimes, and Committee on Criminal Justice Reforms, International Institute of Revenue Research.
2. Report on Trend and Progress of Banking in India, 2001, p. 73, Rath DP, RBI, 2001.
3. Banking System, Frauds and Legal Control, R.P Nainta, Deep & Deep Publications Pvt. Ltd., 2005
4. H.L. Bedi, V.K Hardikar, Practical Banking (Advances) 1982, p.472
5. B.R Sharma, Bank Frauds Prevention and Detection (2001), p. 33
6. The H.P State Cooperative Bank Ltd., H.O No. 66/2001, dated 9.8.2001.
7. State of Andhra Pradesh v. IBS Prasad Rao and Other AIR 1970, SC 648;
8. V.C. Shukla v. State (1980), 25 CC 665.
9. S.N Maheshwari, Banking Law and Practice (1994), p. 635

watch cell phone Buy Bern Berkeley Winter Snowboarding Helmet Best Price Dual Motor Deluxe Power Unit For

Saturday, February 9, 2013

Booting Your Arnova 10 G2 Into Recovery Mode

Are you an owner of an Arnova 10 G2? If so, then you know that these 10 inch tablets are perfect for surfing the web but, with their stock Android OS they don't have too much more to offer. Thankfully, some very talented people found ways to root the 10 G2 allowing us to make administrative modifications or permitting the replacement of the stock Android operating system. There are even methods to installing Google Play, previously known as Google Market, and this alone has made the 10 G2 worth owning. Adding Google Play has leveled the practicality playing field for this device. Although, it can't quite compete with quad-core power monster tablets with their high definition screens, it's still a great tablet for 0, if you are willing to root it.

Rooting has become an almost effortless task for most devices with the advent of 1 click style rooting software. For the users out there that stumble upon this article and don't know what "rooting an Android device" means; let me tell you. Rooting is a process that gives you, the user, administrative privileges on an Android operating system powered device. This allows you to circumvent restricted features, in the 10 G2's case, removing bloat ware (unwanted applications that typically cannot be removed) or changing your ROM (a data file that is a version of the whole Android operating system.)

The Process
Here are the steps to gaining recovery mode access to your Arnova 10 G2:

Booting Your Arnova 10 G2 Into Recovery Mode

Plug the power cable and USB cable into your Arnova 10 G2. You should plug the other end of the USB cable into the computer and the power into the wall socket. Stick a paperclip into the reset slot and hold the reset button down. Push and hold the Volume + key. So now you are depressing the reset button and the Volume + button. Wait 15 seconds and release the reset button, but still hold the Volume + key. Give the device a few moments to cycle on. The screen will remain black. This black screen is the only visual proof that the Arnova is in recovery mode. You can release the Volume + button.

That's it! You can now add your drivers and run your recovery software so that you can install a custom ROM or even the stock ROM which is located at Arnova's support page.

There are lots of places to find information on the rest of the process. I implore you to search for different ROM's and test them out. Some are great and some are even greater. Find what works for you and most of all, best of luck!

Booting Your Arnova 10 G2 Into Recovery Mode
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

TJ Moynihan is the CEO for a computer repair business located in Toledo, Ohio. He loves Macs as much as PC's. He holds 6 technology certifications and creates websites for fun. You can usually find him hard at work or surfing the Google Forums.

watch mobile phone Buy Acdelco D1483D Ignition Lock Cylinder For 118 Buy Auburn Gear 5420113 High Performance Series Differential

Wednesday, February 6, 2013

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive

Yikes, your hard drive crashed! Now I know the first thing running through your head. Is there anyway to restore data from damaged hard drive? I remember this happened to me once before. I ended losing about 20 GB's worth of information. Music files, multimedia, word documents, priceless photos of my family and I - all erased forever. What I didn't understand at the time was you can restore lost data from a damaged or corrupted hard drive quite easily. What you need is the proper file recovery software to do it!

There are numerous ways a hard drive can be damaged. You could have suffered a serious system error. A terrible virus can take over your computer and corrupt your hard drive. Problems in the Windows registry can cause severe hard drive failure. Or perhaps it was due to human error or some kind of physical damage. Whatever the reason, you will need to recover lost files quickly before it is too late.

In order to recover data from crashed hard drive, the first thing you need to do is protect the integrity of the drive. The files are there but can be lost forever if you do not take the proper steps. Do not mess around with it or make any alterations whatsoever. A crashed hard drive is hypertensive to any kind of changes and it can be very hard to troubleshoot.

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive

To restore lost data you need to use file recovery software. After my own incident I smartened up and selected the best data recovery software I could find. I found an excellent program that makes the process so easy all you need to do is click the mouse a few times and you can rescue your data. Download the software for free and see what files it can recover.

Restore Data From Damaged Hard Drive - A Quick Way to Recover Files From Crashed Hard Drive
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Did you accidentally delete or lose data that you actually needed? Want an easy way to get it back? Learn how to go about recovering deleted files the easy way. Simply scan your computer and choose which files you want to restore. It costs absolutely nothing to try!

Jim Marshall is a computer technician expert with over 15 years in the industry. He has worked on restoring hundreds of hard drives, storage devices, iPods, partitioned drives,and much more. He has compiled reviews of some of the top data recovery programs based on his experiences. After extensive testing see what he considers the best.

http://www.recovering-deleted-files.net/

mobile phone watches Buy Acdelco D1483D Ignition Lock Cylinder For 118 Buy 2008 2010 Mitsubishi Lancer Without Turbo Radiator

Sunday, February 3, 2013

Password Recovery on the Cisco ASA Security Appliance

In this article, I'll explain how to perform a password "reset" on your Cisco ASA security appliance. The more commonly used term for this procedure is "password recovery" which is left over from the days when you could actually view passwords in configuration files in plain text. Today, such passwords are encrypted and not actually recoverable. Instead, you will gain access to the appliance via the console port and reset the password(s) to known values.

This procedure requires physical access to the device. You will power-cycle your appliance by unplugging it at the power strip and plugging it back in. You will then interrupt the boot process and change the configuration register value to prevent the appliance from reading its stored configuration at boot. Since the device ignores its saved configuration on boot, you are able to access its configuration modes without passwords. Once you're in configuration mode, you will load the saved configuration from flash memory, change the passwords to a known value, change the configuration register value to tell the device to load its saved configuration on boot, and reload the device.

Caution: As with all configuration procedures, these procedures should be tested in a laboratory environment prior to usage in a production environment to ensure suitability for your situation.

Password Recovery on the Cisco ASA Security Appliance

The following steps were designed using a Cisco ASA 5505 Security Appliance. They are not appropriate for a Cisco PIX Firewall appliance.

1. Power-cycle your security appliance by removing and re-inserting the power plug at the power strip.

2. When prompted, press Esc to interrupt the boot process and enter ROM Monitor mode. You should immediately see a rommon prompt (rommon #0>).

3. At the rommon prompt, enter the confreg command to view the current configuration register setting: rommon #0>confreg

4. The current configuration register should be the default of 0x01 (it will actually display as 0x00000001). The security appliance will ask if you want to make changes to the configuration register. Answer no when prompted.

5. You must change the configuration register to 0x41, which tells the appliance to ignore its saved (startup) configuration upon boot: rommon #1>confreg 0x41

6. Reset the appliance with the boot command: rommon #2>boot

7. Notice that the security appliance ignores its startup configuration during the boot process. When it finishes booting, you should see a generic User Mode prompt: ciscoasa>

8. Enter the enable command to enter Privileged Mode. When the appliance prompts you for a password, simply press (at this point, the password is blank): ciscoasa>enable Password: ciscoasa#

9. Copy the startup configuration file into the running configuration with the following command: ciscoasa#copy startup-config running-config Destination filename [running-config]?

10. The previously saved configuration is now the active configuration, but since the security appliance is already in Privileged Mode, privileged access is not disabled. Next, in configuration mode, enter the following command to change the Privileged Mode password to a known value (in this case, we'll use the password system): asa#conf t asa(config)#enable password system

11. While still in Configuration Mode, reset the configuration register to the default of 0x01 to force the security appliance to read its startup configuration on boot: asa(config)#config-register 0x01

12. Use the following commands to view the configuration register setting: asa(config)#exit asa#show version

13. At bottom of the output of the show version command, you should see the following statement: Configuration register is 0x41 (will be 0x1 at next reload)

14. Save the current configuration with the copy run start command to make the above changes persistent: asa#copy run start Source filename [running-config]

15. Reload the security appliance: asa# reload System config has been modified. Save? [Y]es/[N]o:yes

Cryptochecksum: e87f1433 54896e6b 4e21d072 d71a9cbf

2149 bytes copied in 1.480 secs (2149 bytes/sec) Proceed with reload? [confirm]

When your security appliance reloads, you should be able to use your newly reset password to enter privileged mode.

Copyright (c) 2007 Don R. Crawley

Password Recovery on the Cisco ASA Security Appliance
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Don R. Crawley, CCNA Security, is a Seattle-based author, speaker, and trainer for the I.T. industry. He is president/chief technologist at the I.T. training firm soundtraining.net and is the author of The Accidental Administrator: Cisco ASA Security Appliance Step-by-Step Configuration Guide and numerous other books for I.T. professionals. For more information and to purchase copies of his books, visit soundtraining.net/bookstore.

watches mobile phone Cheap Deals Mason 5C025 Pad Anti Vibration