Dr Rajiv Desai

An Educational Blog

PRIVACY

Privacy:  _____   _____ Section-1    Prologue:    Many people consciously respect other people’s property yet sometimes fail to respect something even more important to a person which is his/her privacy.  Every individual value his/her privacy. A private time with no one around gives you room to reflect on the most important issues in your life while private time with another helps to build close personal relationship with the one whom we choose to draw close to. To intrude in this is like stealing from someone or trespassing on the person’s domain. The right to privacy could refer to your right to be left alone or to your right not to share every detail with someone. The most common retort against privacy advocates — by those in favour of ID checks, cameras, databases, data mining and other wholesale surveillance measures — is this line: “If you aren’t doing anything wrong, […]

119 Comments

DIGITAL TRANSACTION

Digital transaction: ___ ____ Prologue: History of banking dates back to 2000 B.C. Archaeologists believe that depositing and lending have always been human way of business and economy during renowned Roman, Chinese, and Indian empires. In fact, if we really think about it, there can actually be no trusted way of keeping earned money safe to be used when required other than a trusted group that also provides interest on such deposits. From that time banks and their ways have evolved tremendously. Computing revolution has been the biggest step forward here. For what was confined to signatures and psychical presence, has now been replaced by plastic money and virtual presence. John Shepherd-Barron, the Scotsman is credited with inventing the world’s first automated cash machine. Shepherd-Barron said once that he came up with the idea of the cash machines after being locked out of his bank. Plastic bank cards had not […]

154 Comments

INTERNET CENSORSHIP

INTERNET CENSORSHIP:   _ Caveat: Please do read my previous article on ‘The computer and internet” before you read this article as it will make basics of computer & internet easy. Various circumvention techniques discussed in this article are purely for educational purpose and cannot evade existing laws of land. All court orders by competent court must be respected regarding viewing and/or publishing objectionable content on Internet. In many jurisdictions, accessing blocked content is a serious crime, particularly content that is considered child pornography, a threat to national security, or an incitement of violence. Thus it is important to understand the circumvention technologies and the protections they do or do not provide and to use only tools that are appropriate in a particular context. Great care must be taken to install, configure, and use circumvention tools properly. I am not expert on computers, internet or information technology; and therefore technical […]

433 Comments





Designed by @fraz699.