Wikipedia:WikiProject Spam/LinkReports/perry4law.co.in

Source: Wikipedia, the free encyclopedia.



Links

Users

Additions

  1. 2014-08-14 10:22:52 (UTC): User 59.177.200.190 t • c • dc • l • ef • b • bl; (25) to National Cyber Security Policy 2013 (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=25 (R/Xmeta/L- still there)
    Other links: perry4law.co.in/cyber_security/?p=25 (25, 37, 3, 1- R/X/L) ptlb.in/csrdci/?p=336 (25, 254, 10, 0- R/X/L) ptlb.in/csrdci/?p=57 (25, 254, 10, 0- R/X/L) ptlb.in/clpic/ (25, 254, 10, 0- R/X/L) perry4law.org/cecsrdi/?p=1017 (25, 204, 12, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2013/12/Cyber-Security-Trends-And-Developments-In-India-2013.pdf (25, 254, 10, 0- R/X/L) perry4law.org/cecsrdi/?p=1068 (25, 204, 12, 1- R/X/L)
  2. 2014-08-14 11:45:58 (UTC): User
    talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L- still there)
    Other links: perry4law.org/cyberlawsinindia/?p=98 (25, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=568 (25, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=453 (25, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=457 (25, 204, 12, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/Cyber-Security-Must-Be-An-International-Issue.pdf (25, 254, 10, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (25, 254, 10, 0- R/X/L) perry4law.org/clic/ (25, 204, 12, 1- R/X/L) perry4law.co.in/cyber_security/ (25, 37, 3, 1- R/X/L
    )
  3. 2014-08-14 12:20:10 (UTC): User 59.177.200.190 t • c • dc • l • ef • b • bl; (25) to Cyberwarfare (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L- still there)
    Other links: ptlb.in/csrdci/?p=294 (25, 254, 10, 0- R/X/L) perry4law.co.in/cyber_security/ (25, 37, 3, 1- R/X/L)
  4. 2014-08-15 03:52:45 (UTC): User
    talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/?p=46 (R/Xmeta/L- still there)
    Other links: perry4law.co.in/blog/?p=46 (19, 37, 2, 1- R/X/L) perry4law.org/cecsrdi/?p=1072 (19, 204, 12, 1- R/X/L) ptlbindia.blogspot.in/2012/01/huawei-and-zte-in-telecom-security.html (19, 5, 1, 1- R/X/L
    )
  5. 2014-08-15 07:26:26 (UTC): User 120.59.228.76 t • c • dc • l • ef • b • bl; (19) to Cyber-security regulation (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L- still there)
    Other links: perry4law.org/cyberlawsinindia/?p=98 (19, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=568 (19, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=453 (19, 204, 12, 1- R/X/L) perry4law.org/cecsrdi/?p=457 (19, 204, 12, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/Cyber-Security-Must-Be-An-International-Issue.pdf (19, 254, 4, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (19, 254, 4, 0- R/X/L) perry4law.org/clic/ (19, 204, 12, 1- R/X/L) perry4law.co.in/cyber_security/ (19, 37, 2, 1- R/X/L)
  6. 2014-08-17 06:33:48 (UTC): User 120.59.238.98 t • c • dc • l • ef • b • bl; (3) to Open-source intelligence (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=40 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=40 (3, 37, 1, 1- R/X/L)
  7. 2014-08-17 09:07:47 (UTC): User 120.59.100.135 t • c • dc • l • ef • b • bl; (10) to Central Monitoring System (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/?p=71 (R/Xmeta/L)
    Other links: ptlb.in/iips/wp-content/uploads/2014/02/Encryption-Policy-Of-India-Needed.pdf (10, 254, 5, 0- R/X/L) ptlb.in/clpic/?p=261 (10, 254, 5, 0- R/X/L) perry4law.co.in/blog/?p=85 (10, 37, 3, 1- R/X/L) perry4law.co.in/blog/?p=76 (10, 37, 3, 1- R/X/L) perry4law.co.in/blog/?p=71 (10, 37, 3, 1- R/X/L) ptlb.in/clpic/?p=109 (10, 254, 5, 0- R/X/L) perry4law.org/blog/?p=969 (10, 204, 1, 1- R/X/L) ptlb.in/clpic/ (10, 254, 5, 0- R/X/L) www.electroniccourts.in/privacylawsindia/ (10, 92, 1, 1- R/X/L) ptlb.in/clpic/?p=103 (10, 254, 5, 0- R/X/L)
  8. 2014-08-18 05:00:46 (UTC): User 120.59.105.18 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=34 (R/Xmeta/L)
    Other links: ptlb.in/clpic/?p=324 (18, 254, 8, 0- R/X/L) ptlb.in/clpic/?p=321 (18, 254, 8, 0- R/X/L) ptlbindia.blogspot.in/2011/03/intelligence-infrastructure-of-india-is.html (18, 5, 1, 1- R/X/L) perry4law.co.in/cyber_security/?p=34 (18, 37, 3, 1- R/X/L) ptlb.in/blog/?p=247 (18, 254, 8, 0- R/X/L)
  9. 2014-08-18 06:19:45 (UTC): User 120.59.105.18 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: perry4lawblogs.wordpress.com/2014/08/06/banks-in-india-refuse-to-give-direct-access-to-natgrid/ (18, 1, 1, 1- R/X/L) ptlb.in/clpic/?p=273 (18, 254, 8, 0- R/X/L) ptlb.in/clpic/?p=363 (18, 254, 8, 0- R/X/L) perry4law.co.in/cyber_security/?p=55 (18, 37, 3, 1- R/X/L) perry4law.org/blog/wp-content/uploads/2013/11/10-Points-Legal-Framework-For-Law-Enforcement-And-Intelligence-Agencies-In-India.pdf (18, 204, 2, 1- R/X/L) perry4law.org/blog/wp-content/uploads/2013/11/10-Points-Legal-Framework-For-Law-Enforcement-And-Intelligence-Agencies-In-India.pdf (18, 204, 2, 1- R/X/L)
  10. 2014-08-18 06:25:52 (UTC): User 120.59.105.18 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=21 (R/Xmeta/L)
    Other links: www.electroniccourts.in/privacylawsindia/?p=127 (18, 92, 2, 1- R/X/L) ptlb.in/clpic/?p=47 (18, 254, 8, 0- R/X/L) cyberlawsinindia.blogspot.in/2009/11/legal-framework-for-law-enforcement-and.html (18, 3, 1, 1- R/X/L) www.electroniccourts.in/privacylawsindia/ (18, 92, 2, 1- R/X/L) ptlb.in/clpic/ (18, 254, 8, 0- R/X/L) perry4law.co.in/cyber_security/?p=21 (18, 37, 3, 1- R/X/L)
  11. 2014-08-18 23:49:13 (UTC): User
    talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/ (R/Xmeta/L)
    Other links: perry4law.co.in/blog/ (21, 37, 2, 1- R/X/L) cyberlawsinindia.blogspot.in (21, 3, 1, 1- R/X/L) perry4law.org/cyberlawsinindia/ (21, 204, 7, 1- R/X/L
    )
  12. 2014-08-18 23:58:04 (UTC): User
    talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/ (R/Xmeta/L)
    Other links: perry4law.co.in/blog/ (21, 37, 2, 1- R/X/L) perry4law.org/cyberlawsinindia/ (21, 204, 7, 1- R/X/L) ptlb.in/iips/?p=415 (21, 254, 8, 0- R/X/L) ictps.blogspot.in/2011/05/cyber-law-of-india-should-be-repealed.html (21, 3, 2, 1- R/X/L) perry4law.org/cyberlawsinindia/?p=11 (21, 204, 7, 1- R/X/L
    )
  13. 2014-08-19 01:55:34 (UTC): User 120.59.102.236 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: ptlb.in/clpic/?p=273 (18, 254, 8, 0- R/X/L) ptlb.in/clpic/?p=321 (18, 254, 8, 0- R/X/L) ptlb.in/clpic/?p=324 (18, 254, 8, 0- R/X/L) ptlb.in/clpic/?p=363 (18, 254, 8, 0- R/X/L) perry4law.co.in/cyber_security/?p=55 (18, 37, 3, 1- R/X/L) perry4law.org/blog/wp-content/uploads/2013/11/10-Points-Legal-Framework-For-Law-Enforcement-And-Intelligence-Agencies-In-India.pdf (18, 204, 2, 1- R/X/L) perry4law.org/blog/wp-content/uploads/2013/11/10-Points-Legal-Framework-For-Law-Enforcement-And-Intelligence-Agencies-In-India.pdf (18, 204, 2, 1- R/X/L) ptlb.in/clpic/?p=336 (18, 254, 8, 0- R/X/L)
  14. 2014-08-19 01:58:33 (UTC): User 120.59.102.236 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=21 (R/Xmeta/L)
    Other links: www.electroniccourts.in/privacylawsindia/?p=127 (18, 92, 2, 1- R/X/L) ptlb.in/clpic/?p=47 (18, 254, 8, 0- R/X/L) cyberlawsinindia.blogspot.in/2009/11/legal-framework-for-law-enforcement-and.html (18, 3, 1, 1- R/X/L) www.electroniccourts.in/privacylawsindia/ (18, 92, 2, 1- R/X/L) ptlb.in/clpic/ (18, 254, 8, 0- R/X/L) perry4law.co.in/cyber_security/?p=21 (18, 37, 3, 1- R/X/L)
  15. 2014-08-19 02:00:21 (UTC): User 120.59.102.236 t • c • dc • l • ef • b • bl; (18) to NATGRID (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=34 (R/Xmeta/L)
    Other links: ptlbindia.blogspot.in/2011/03/intelligence-infrastructure-of-india-is.html (18, 5, 1, 1- R/X/L) perry4law.co.in/cyber_security/?p=34 (18, 37, 3, 1- R/X/L) ptlb.in/blog/?p=247 (18, 254, 8, 0- R/X/L)
  16. 2014-08-24 08:57:31 (UTC): User 120.56.229.168 t • c • dc • l • ef • b • bl; (2) to National Counter Terrorism Centre (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=34 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=34 (2, 37, 1, 1- R/X/L) ptlb.in/csrdci/?p=43 (2, 254, 1, 0- R/X/L)
  17. 2014-08-25 12:54:21 (UTC): User 120.56.226.172 t • c • dc • l • ef • b • bl; (15) to Privacy software (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/?p=67 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=61 (15, 37, 2, 1- R/X/L) perry4law.co.in/blog/?p=67 (15, 37, 2, 1- R/X/L)
  18. 2014-08-26 07:46:37 (UTC): User 59.177.207.144 t • c • dc • l • ef • b • bl; (17) to Mass surveillance in India (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/?p=71 (R/Xmeta/L)
    Other links: perry4law.co.in/blog/?p=76 (17, 37, 2, 1- R/X/L) perry4law.co.in/blog/?p=71 (17, 37, 2, 1- R/X/L) ptlb.in/clpic/?p=109 (17, 254, 6, 0- R/X/L) ptlb.in/clpic/ (17, 254, 6, 0- R/X/L) www.electroniccourts.in/privacylawsindia/ (17, 92, 5, 1- R/X/L) ptlb.in/clpic/?p=103 (17, 254, 6, 0- R/X/L)
  19. 2014-08-28 01:43:43 (UTC): User 120.59.232.38 t • c • dc • l • ef • b • bl; (3) to Bitcoin (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=42 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=42 (3, 37, 1, 1- R/X/L)
  20. 2014-09-01 06:32:04 (UTC): User 59.177.197.29 t • c • dc • l • ef • b • bl; (4) to List of Indian intelligence agencies (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=55 (4, 37, 1, 1- R/X/L) ptlb.in/clpic/?p=321 (4, 254, 2, 0- R/X/L) ptlb.in/clpic/?p=324 (4, 254, 2, 0- R/X/L)
  21. 2014-09-01 13:07:47 (UTC): User 120.57.232.148 t • c • dc • l • ef • b • bl; (8) to Intelligence Bureau (India) (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: perry4law.org/cecsrdi/?p=925 (8, 204, 3, 1- R/X/L) perry4law.co.in/cyber_security/?p=55 (8, 37, 2, 1- R/X/L) ptlb.in/clpic/?p=321 (8, 254, 3, 0- R/X/L) perry4law.org/blog/wp-content/uploads/2013/11/10-Points-Legal-Framework-For-Law-Enforcement-And-Intelligence-Agencies-In-India.pdf (8, 204, 3, 1- R/X/L) ptlb.in/clpic/?p=123 (8, 254, 3, 0- R/X/L) ptlb.in/clpic/?p=324 (8, 254, 3, 0- R/X/L)
  22. 2014-09-01 13:17:41 (UTC): User 120.57.232.148 t • c • dc • l • ef • b • bl; (8) to Intelligence Bureau (India) (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=21 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=21 (8, 37, 2, 1- R/X/L)
  23. 2014-09-06 03:47:56 (UTC): User 59.177.206.58 t • c • dc • l • ef • b • bl; (7) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L)
    Other links: perry4law.org/cecsrdi/?p=939 (7, 204, 4, 1- R/X/L) perry4law.org/cecsrdi/?p=568 (7, 204, 4, 1- R/X/L) ptlb.in/csrdci/?p=294 (7, 254, 2, 0- R/X/L) perry4law.co.in/cyber_security/ (7, 37, 1, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (7, 254, 2, 0- R/X/L) perry4law.org/blog/?p=53 (7, 204, 4, 1- R/X/L) perry4law.org/clic/ (7, 204, 4, 1- R/X/L)
  24. 2014-09-11 11:18:00 (UTC): User
    talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L)
    Other links: ptlb.in/csrdci/wp-content/uploads/2014/01/Cyber-Warfare-Policy-Of-India.pdf (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2013/12/Cyber-Security-Trends-And-Developments-In-India-2013.pdf (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/Critical-Infrastructure-Protection-In-India-The-Problems-Challenges-And-Solutions.pdf (24, 254, 15, 0- R/X/L) perry4law.org/cecsrdi/?p=1068 (24, 204, 8, 1- R/X/L) ptlb.in/csrdci/?p=268 (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/?p=248 (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/?p=254 (24, 254, 15, 0- R/X/L) perry4law.org/cecsrdi/?p=1083 (24, 204, 8, 1- R/X/L) ptlb.in/csrdci/?p=259 (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/?p=44 (24, 254, 15, 0- R/X/L) perry4law.org/cecsrdi/?p=93 (24, 204, 8, 1- R/X/L) ptlb.in/iips/?p=205 (24, 254, 15, 0- R/X/L) perry4law.org/cecsrdi/?p=163 (24, 204, 8, 1- R/X/L) ptlb.in/iips/?p=17 (24, 254, 15, 0- R/X/L) ptlb.in/iips/?p=67 (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/?p=336 (24, 254, 15, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/Critical-Infrastructure-Protection-In-India-The-Problems-Challenges-And-Solutions.pdf (24, 254, 15, 0- R/X/L) perry4law.org/cecsrdi/?p=568 (24, 204, 8, 1- R/X/L) ptlb.in/csrdci/?p=294 (24, 254, 15, 0- R/X/L) perry4law.co.in/cyber_security/ (24, 37, 1, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (24, 254, 15, 0- R/X/L) perry4law.org/blog/?p=53 (24, 204, 8, 1- R/X/L) perry4law.org/clic/ (24, 204, 8, 1- R/X/L) perry4law.org/cecsrdi/?p=518 (24, 204, 8, 1- R/X/L
    )
  25. 2014-09-12 05:11:29 (UTC): User 120.56.226.221 t • c • dc • l • ef • b • bl; (8) to Tallinn Manual (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L)
    Other links: perry4law.org/cecsrdi/?p=453 (8, 204, 4, 1- R/X/L) www.crime-research.org/articles/1873 (8, 13, 1, 1- R/X/L) perry4law.org/cecsrdi/?p=568 (8, 204, 4, 1- R/X/L) perry4law.org/cecsrdi/?p=453 (8, 204, 4, 1- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/Cyber-Security-Must-Be-An-International-Issue.pdf (8, 254, 2, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (8, 254, 2, 0- R/X/L) perry4law.org/clic/ (8, 204, 4, 1- R/X/L) perry4law.co.in/cyber_security/ (8, 37, 1, 1- R/X/L)
  26. 2014-09-12 13:19:14 (UTC): User 59.177.200.84 t • c • dc • l • ef • b • bl; (7) to MHealth (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/blog/?p=67 (R/Xmeta/L)
    Other links: perry4law.co.in/blog/?p=67 (7, 37, 1, 1- R/X/L) perry4law.org/blog/?p=571 (7, 204, 2, 1- R/X/L) ptlb.in/iips/?p=503 (7, 254, 3, 0- R/X/L) ptlb.in/iips/?p=435 (7, 254, 3, 0- R/X/L) perry4law.org/cyberlawsinindia/?p=43 (7, 204, 2, 1- R/X/L) ptlb.in/clpic/wp-content/uploads/2014/01/Data-Protection-Laws-In-India-And-Privacy-Rights-In-India.pdf (7, 254, 3, 0- R/X/L) www.electroniccourts.in/privacylawsindia/ (7, 92, 1, 1- R/X/L)
  27. 2014-10-06 17:35:48 (UTC): w:ru:User:Mvk608 (t - c; 2207) to w:ru:Военно-кибернетические операции КНР (diff  !top) - Link: perry4law.co.in/blog/?p=46 (R/Xmeta/L)
    Other links: www.investing.com/news/technology-news/chinese-hacked-u.s.-military-contractors,-senate-probe-finds-309836 (2207, 528, X, X- R/X/L) online.wsj.com/article/SB10001424127887324373204578372132763639230.html (2207, -1, X, X- R/X/L) www.guardian.co.uk/world/us-embassy-cables-documents/214462?INTCMP=SRCH (2207, -1, X, X- R/X/L) www.wired.com/threatlevel/2010/01/google-hack-attack (2207, -1, X, X- R/X/L) www.nytimes.com/2010/01/13/world/asia/13beijing.html?_r=1 (2207, -1, X, X- R/X/L) www.pcworld.com/article/174210/report_says_china_ready_for_cyberwar_espionage.html (2207, 2732, X, X- R/X/L) www.informationweek.com/news/government/security/showArticle.jhtml?articleID=221900505 (2207, 983, X, X- R/X/L) perry4law.co.in/blog/?p=46 (2207, 37, X, X- R/X/L) perry4law.org/cecsrdi/?p=1072 (2207, 204, X, X- R/X/L) ptlbindia.blogspot.in/2012/01/huawei-and-zte-in-telecom-security.html (2207, 5, X, X- R/X/L) articles.timesofindia.indiatimes.com/2008-05-05/india/27760718_1_cyber-warfare-government-networks-china (2207, -1, X, X- R/X/L) www.cbc.ca/news/politics/chinese-cyberattack-hits-canada-s-national-research-council-1.2721241 (2207, -1, X, X- R/X/L) www.cbc.ca/politics/story/2011/02/16/pol-weston-hacking.html (2207, -1, X, X- R/X/L) perry4law.org/cecsrdi/?p=856 (2207, 204, X, X- R/X/L) www.abc.net.au/news/2013-05-29/brandis-briefed-by-asio-on-china-hacking-claims/4719886 (2207, -1, X, X- R/X/L) www.abc.net.au/news/2013-05-29/brandis-briefed-by-asio-on-china-hacking-claims/4719886 (2207, -1, X, X- R/X/L)

    User is in a trusted group rollbacker on some wikis
  28. 2014-10-18 08:02:27 (UTC): User 120.59.111.65 t • c • dc • l • ef • b • bl; (18) to Digital India (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=28 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=28 (18, 37, 3, 1- R/X/L) deity.gov.in/sites/upload_files/dit/files/Draft-IoT-Policy%20%281%29.pdf (18, 52, 3, 1- R/X/L)
  29. 2014-10-18 08:53:23 (UTC): User 120.59.111.65 t • c • dc • l • ef • b • bl; (18) to Digital India (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=37 (18, 37, 3, 1- R/X/L) perry4law.co.in/cyber_security/?p=55 (18, 37, 3, 1- R/X/L) ptlb.in/clpic/?p=363 (18, 254, 7, 0- R/X/L)
  30. 2014-10-19 07:56:34 (UTC): User
    Unique Identification Authority of India (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/?p=55 (R/Xmeta/L)
    Other links: perry4law.co.in/cyber_security/?p=37 (6, 37, 2, 1- R/X/L) perry4law.co.in/cyber_security/?p=55 (6, 37, 2, 1- R/X/L) ptlb.in/clpic/?p=363 (6, 254, 3, 0- R/X/L) ptlb.in/clpic/ (6, 254, 3, 0- R/X/L) ptlb.in/clpic/wp-content/uploads/2014/01/Data-Protection-Laws-In-India-And-Privacy-Rights-In-India.pdf (6, 254, 3, 0- R/X/L) www.electroniccourts.in/privacylawsindia/ (6, 92, 1, 1- R/X/L
    )
  31. 2014-11-19 00:27:57 (UTC): User Fimatic t • c • dc • l • ef • b • bl; (875) to Computer security (edit | talk | history | links | watch | logs) (diff  !top) - Link: perry4law.co.in/cyber_security/ (R/Xmeta/L)
    Other links: www.dmoz.org/Computers/Security/Policy/ (875, -1, X, X- R/X/L) www.webopedia.com/TERM/E/endpoint_security.html (875, 236, 1, 0- R/X/L) www.businessdictionary.com/definition/data-integrity.html (875, 291, 1, 0- R/X/L) medical-dictionary.thefreedictionary.com/confidentiality (875, 620, 1, 0- R/X/L) www.dhs.gov/join-dhs-cybersecurity (875, 468, 1, 0- R/X/L) niccs.us-cert.gov/home/students (875, 10, 1, 0- R/X/L) www.cs.gwu.edu/academics/graduate_programs/master/cybersecurity/cybersecurity-jobs (875, 4, 1, 0- R/X/L) www.defenceiq.com/defence-technology/articles/the-cyber-security-industry-and-you/ (875, 12, 1, 0- R/X/L) www.burning-glass.com/research/cybersecurity/ (875, 2, 1, 0- R/X/L) www.getcybersafe.gc.ca/index-eng.aspx (875, 3, 1, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cprtn-prgrm/index-eng.aspx (875, 162, 13, 0- R/X/L) www.marketwired.com/press-release/government-canada-launches-cyber-security-awareness-month-with-new-public-awareness-1706660.htm (875, 728, 2, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/rprt-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-ncdnt-frmwrk/index-eng.aspx#_Toc360619104 (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ctn-pln-cbr-scrt/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (875, 162, 13, 0- R/X/L) www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx (875, 162, 13, 0- R/X/L) www.marketwired.com/press-release/government-of-canada-launches-canadas-cyber-security-strategy-1328661.htm (875, 728, 2, 0- R/X/L) ptlb.in/ecommerce/?p=357 (875, 254, 6, 0- R/X/L) ptlb.in/csrdci/?p=305 (875, 254, 6, 0- R/X/L) perry4law.org/cyberlawsinindia/?p=102 (875, 204, 9, 0- R/X/L) perry4law.org/cecsrdi/?p=544 (875, 204, 9, 0- R/X/L) ptlb.in/clpic/ (875, 254, 6, 0- R/X/L) perry4law.org/cecsrdi/?p=1017 (875, 204, 9, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2013/12/Cyber-Security-Trends-And-Developments-In-India-2013.pdf (875, 254, 6, 0- R/X/L) perry4law.org/cecsrdi/?p=1068 (875, 204, 9, 0- R/X/L) perry4law.org/cecsrdi/?p=1095 (875, 204, 9, 0- R/X/L) blogs.wsj.com/korearealtime/2013/09/23/seoul-puts-a-price-on-cyberdefense/ (875, -1, X, X- R/X/L) news.cnet.com/8301-31921_3-20062277-281.html?part=rss&subj=news&tag=2547-1_3-0-20 (875, 4370, X, X- R/X/L) www.informationweek.com/news/government/security/showArticle.jhtml?articleID=225701368&subSection=News (875, 983, 1, 0- R/X/L) hsgac.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=4ee63497-ca5b-4a4b-9bba-04b7f4cb0123 (875, 56, 1, 0- R/X/L) www.opencongress.org/bill/111-h4962/show (875, 314, 4, 0- R/X/L) www.opencongress.org/bill/111-h4962/text (875, 314, 4, 0- R/X/L) www.eff.org/deeplinks/2009/04/cybersecurity-act (875, 1326, X, X- R/X/L) www.opencongress.org/bill/111-s773/text (875, 314, 4, 0- R/X/L) www.computerworld.com/s/article/9174065/Cybersecurity_bill_passes_first_hurdle (875, 1039, X, X- R/X/L) www.opencongress.org/bill/111-s773/text (875, 314, 4, 0- R/X/L) www.europol.europa.eu/ec3 (875, 171, 1, 0- R/X/L) www.virusbtn.com/news/2013/01_09.xml?rss (875, 80, 1, 0- R/X/L) perry4law.org/cecsrdi/?p=939 (875, 204, 9, 0- R/X/L) perry4law.org/cecsrdi/?p=568 (875, 204, 9, 0- R/X/L) www.youtube.com/watch?v=0TMFRO66Wv4 (875, -1, X, X- R/X/L) www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html (875, -1, X, X- R/X/L) ptlb.in/csrdci/?p=294 (875, 254, 6, 0- R/X/L) perry4law.co.in/cyber_security/ (875, 37, 1, 0- R/X/L) ptlb.in/csrdci/wp-content/uploads/2014/01/International-Cyber-Security-Treaty-Is-Required.pdf (875, 254, 6, 0- R/X/L) perry4law.org/blog/?p=53 (875, 204, 9, 0- R/X/L) perry4law.org/clic/ (875, 204, 9, 0- R/X/L) mashable.com/2013/10/30/nsa-google-yahoo-data-centers/ (875, 3180, X, X- R/X/L) spectrum.ieee.org/telecom/security/can-you-trust-nist (875, 601, 1, 0- R/X/L) www.freesnowden.is/fr/2014/01/27/video-ard-interview-with-edward-snowden/ (875, 35, 1, 0- R/X/L) www.crows.org/images/stories/pdf/IOI/IO%20Journal_Vol2Iss2_0210.pdf (875, 3, 1, 0- R/X/L) www.stripes.com/news/cone-of-silence-surrounds-u-s-cyberwarfare-1.158090 (875, 925, 1, 0- R/X/L) www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe (875, -1, X, X- R/X/L) www.cbsnews.com/8301-501465_162-20017507-501465.html (875, -1, X, X- R/X/L) www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 (875, -1, X, X- R/X/L) www.myfoxtwincities.com/myfox/pages/Home/Detail?contentId=2804836&version=3&locale=EN-US&layoutCode=TSTY&pageId=1.1.1 (875, 104, 1, 0- R/X/L) www.businesswire.com/news/tjx/20070117005971/en (875, 3052, X, X- R/X/L) www.fas.org/irp/gao/aim96084.htm (875, 3641, X, X- R/X/L) www.cybercrimereview.com/2012/10/hacking-back-are-you-authorized.html (875, 8, 1, 0- R/X/L) searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1265116,00.html (875, 67, 1, 0- R/X/L) www.cert.org/books/secure-coding (875, 71, 1, 0- R/X/L) video.foxbusiness.com/v/2804966490001/forget-ids-use-your-phone-as-credentials/?playlist_id=937116503001#sp=show-clips (875, 123, 1, 0- R/X/L) www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html (875, 686, 1, 0- R/X/L) www.pcmag.com/article2/0,2817,2342798,00.asp (875, 1980, X, X- R/X/L) www.scmagazine.com/safenet-protectdrive-84/review/2596/ (875, 83, 1, 0- R/X/L) www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf (875, 646, 1, 0- R/X/L) www.thewindowsclub.com/lock-protect-your-windows-pc-using-a-usb-drive-with-predator (875, 19, 1, 0- R/X/L) www.safenet-inc.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5200-token-based-authentication/ (875, 38, 1, 0- R/X/L) www.e-spincorp.com/espinv3/index.php/solutions/3-solutions/174-sentinel-hasp-hl (875, 1, 1, 0- R/X/L) www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf (875, 103, 1, 0- R/X/L) www.scientificamerican.com/article/the-hacker-in-your-hardware/ (875, -1, X, X- R/X/L) www.techopedia.com/definition/72/security-architecture (875, 140, 1, 0- R/X/L) www.opensecurityarchitecture.org/cms/definitions/it-security-architecture (875, 4, 1, 0- R/X/L) www.reuters.com/article/2010/10/18/us-crime-fraud-idUSTRE69H25820101018 (875, -1, X, X- R/X/L) voices.washingtonpost.com/securityfix/2009/03/obscene_profits_fuel_rogue_ant.html (875, -1, X, X- R/X/L) upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf (875, 100, 1, 0- R/X/L) www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d (875, 4673, X, X- R/X/L)
  • Displayed all 31 additions.