 good morning. Are you here? All right. Sorry for the delay. We have started a little bit late but it's all right. We can we can just go ahead with the program. Thank you so much everyone for those present. We would like to now start our program and I would like to introduce our resource person here today and we have some very experienced people here today with us. Those who are working in the real-life scenario cases, police cases, the cybercrime cases. So they are the one who are going to do a presentation so I believe and I hope that we all will learn something because that's a college is one of the most updated college in terms of IT infrastructure and in terms of the IT usage. So we all are now part of this network where this security has become a very important issue. All right. So we have been receiving some phishing emails, we have been a lot of phishing cases that were there even in our college network but I think through this kind of experience workshop we'll be learning how to avoid, how to be secure ourselves with this technology as well. All right. So before I jump into other program, let's introduce our resource person here today. So first we have our Sir Moriman Bah Amer, Joint Director, scientist, D. Nellie Koima. Thank you so much sir. He's experienced, well experienced with all the project implementations in Nellie Koima, the cashless transaction you know. He has been experienced in so many central government related projects. So it's very good to have him sir. Thank you so much for availing your time. And the next we have Mr. Atoshi Lohe or forensic analyst. He's a forensic analyst and be careful of this guy. This guy is also an ethical hacker. All right. So this guy should be the care, you have to be careful of this guy. All right. He's the person who almost deals with all the cyber crime cases in Naglain, not only in Naglain but Assam, Manipur and our several Northeastern Kapulis cases. All right. So thank you so much sir for giving us your time here. And we have one more person, our Sir Taneel Muran, Additional Director. And he's one of the tech guy. Give him anything related to technology. He is the one who will solve it. So he's the Mr. tech guy in the Nelit. And thank you so much sir for everyone, for all of you for coming here and availing your time and giving us this workshop, much needed workshop to each one of us. I would like to, we have a student council. I would like to thank our, just I think after that I won't stand. So I'll just take this privilege. I would like to thank our director, principal, all the HODs who are present here. Thank you so much for attending and giving us this privilege also to conduct this workshop with this Nelit. So thank you so much to the administration as well for the support. And thank you so much the HODs for present here, a student council as well. Thank you so much. And now I give time to our director for our welcome address. Thank you, Tali for the welcome and the introduction. And thank you Nelit for being here today. So it is an absolute pleasure to be conducting this program today in collaboration with Nelit. I think for all of you, you receive a lot of mails from me. But in case you receive a mail where I'm asking money from you, I have not received it. Okay. This is not about your fees or anything like that. But then I have seen quite a number of mails which are allegedly sent by me asking for money. So just straight up, I want you all to know that if I ever need money from you, I will personally call you or I'll ask you in person. Don't believe everything you read in your emails unless you verify that it's from that. That's all college.org. Okay. So I mean, phishing has been going on not just in my name, but in our principal's name. And then I've just come to know after some discussion, even the DC and all these high profile people phishing. And I mean, cybersecurity is probably something that is so important. So we're so grateful that Nelit is conducting this program and they've chosen that so college for this. But at the same time, I would like to also express how in some ways proud I am of our department of computer science and to all the teachers and all your students regarding where we are right now. That so college has come such a long way from when we first introduced computers to the teachers and the office staff. All the way, maybe I think it was before to the year 2000, our office started using computers. Then in 2010, we probably start, we probably gave the first computer and it started with one computer to the teaching staff. Even now I know there are many institutions where teachers don't have computer systems. From one computer, we increased it to four because we didn't have the budget. And all the teachers took turns and were using four computers. That was all the way in 2010. And during this time, we were probably one of the first institutions also to have our own website. Then we were also probably one of the first institutions to get into social media. And this journey actually has been so interesting because I come from a generation that was using cassette players where the cassette players, the songs you're listening, you'll have to press rewind forward. I don't know whether you know what I'm talking about here. I come from a generation where if you say we will meet at four o'clock means you will meet at four o'clock or you will not see them because there were no cell phones. It was all landline. So if you're not meeting at that time you specified, that's it. And maybe if you don't know them, you'll have to mention what clothes you're wearing and everything as well. So that's how we recognize each other, those days. So imagine dating during that time. The whole family will have one phone and the children are probably hogging the phone all the time. So phone calls can be received. So we've come from that generation where it started like that and then I think for all of us, I don't know, one of our Neelit members was my classmate. Also, it just found out. So it's great to connect with that. But for our generation, it was like that. We have seen when social media did not exist to what it is right now. Something called classmates.com. I don't know whether you've heard of High Five. Then from there it went to Orkut. And it was just picking up from Orkut. You had all this MySpace coming up. Then you had other things like then slowly Facebook came up. And it became so popular because there were games and things. Then from that time, that's when we started getting into the social media space. We were already on websites and things like that. And then the other things just exploded from Facebook, Instagram started, became a new thing. I mean, Twitter was there even before that again. But I mean, all these things and then there are just so many things like that that now we're talking about a meet-averse. I mean, it's so exciting to be alive right now, in my opinion, to be seeing this transition in technology and also to be able to see different generations and see how you're adapting to it. The way you guys are handling technology is completely different from the way we do it. But the ease with which you're using your devices and how connected you are and the value with which you give to, say, Instagram likes and popularity online, it's a completely different culture that's coming up. And with all of this, of course, these positive things, there are also so many dangers that are coming, which we're still trying to navigate. So, you know, I think what we're hoping to gain from this program and also what we're hoping to gain from this relationship is something that is just starting. Hopefully, we are in initial discussions and we'll be making an announcement very soon, maybe where the relationship between Neelit and Tetzel College will be strengthened further into a way that will benefit every single student in the college and also improve your skills in IT. And hopefully, you know, from this program, we will be able to expand our horizons and also give you another professional certification and announce larger things in the coming days. So, with that, you know, I'd just like to encourage all of you to listen, but most important, to ask questions and feel free also to bring up actual situations maybe you faced with our experts here right now. And with that, I wish you all the best and thank you so much for coming. I wish I congratulate our computer science department as well for bringing about this program and we hope for a stronger relationship and a strengthened, you know, and a very bright future for everyone sitting here and who will benefit from this. Thank you. Thank you very much. Thank you so much, sir. Now, it's the time we will give to our resource person. So, just advice, if you want, you can take a note. You can take out your mobile phone, take a note, but don't play games, all right? It will be helpful. I will tell you, this will be really helpful for your, whenever you use your mobile phone or your internet. So, you can take notes and after the session, after the session, you can, you can raise a question, we'll have a question answer session. So, if you have any question, like our director mentioned, any related, any cyber related cases you have come across, or maybe you yourself have faced, maybe you can raise a question and you can clear your thoughts even from them. So, now I give the time to our Nelid Quema. Thank you. Thank you, respected chairperson Sir Tali, who has been an ex faculty of our Nelid Quema. Thank you very much once again. And respected director, principal, various HODs and my dear students. It is a very, indeed a very auspicious day, I should say, that we are conducting this cyber security awareness program here at Techo College today. We have been running such programs at different locations in different districts of Nagaland. And I think in the whole of Dimapur or Chumukitima districts, this is the first college that this kind of session is going to be held. So, I'm very happy and also proud. And like our director has said, we are in the process of entering into an MOU where the relationship between Nelid and Techo College will be further strengthened through various development activities, as you say so. Before we start with our session on this cyber security, I would like to highlight some very brief information regarding the Nelid. As you are aware that Nelid is the, the full form of Nelid is national institute of electronics and information technology. It is under the Ministry of Electronics and IT, Government of India. Now in Nagaland, we have three centers. One that is in Kohima, that is the head office. We have one in Chuchuimlang, that is in Mouokchung district. And we have recently in this year, we have set up another extension center at Dimapur. So, these three centers are catering to the needs of different people in these various different districts. Now, regarding the infrastructures, Nelid Kohima, I think it has, it has one of the best infrastructures when we compared it with IT facilities. So, we are also the implementing agency of the Ministry. And under Nelid Kohima, we are implementing various projects. And the Government of Nagaland has declared Nelid Kohima as a center of excellence also. So, these are some of the things, right? And now in, to collaborate with one of the, you know, fastest growing college in Nagaland, that is the Techo College. We are also very excited about it. So, we, I'm sure that this bonding is going to, you know, benefit the students at large. And today morning only, we were having discussion regarding the various courses that our Naga people are undertaking in various colleges. Now, once you graduate from your colleges, many times it happens that you may not be, you know, employable to a particular company, okay? You are not, you know, well-prepared in order to enter the field of employability. This is what we are discussing. So, what you require is you need a different set of skilling. So, different set of skilling is required. Now, for example, there are various emerging technologies that is coming out, like we have cyber security. Now, when we talk of cyber security in whole of Northeast as well as in compared with India also, Nelid Kohima has the best infrastructures when it comes to cyber security. And I think their forensic department is one of the best. Nelid Kohima is, you know, not only solving cases within Nagaland, but even from outside the states, people are bringing the cases in order to solve, you know, different cyber-related crimes. I think Sir Atoshi is here, the ethical hacker guy, okay? He is the guy who is handling all of this. So, he is going to elaborate more during his session also. And we also have this Internet of Things, IoT. I think you must have heard of it. Now, irrespective of whether you are an art student, commerce student or, you know, computer students, you all are using social media, right? Right? It's not that only if you are, you know, undergoing computer classes, you should use computer. It's not like that, right? So, when we talk about IoT also, it is like that only. So, everyone, each and every individual is going to be affected by this IoT. So, we need to be aware of these kind of technologies. And we have artificial intelligence. Now, we have, you know, the driverless car. That is the Tesla car. I think all of you are aware of it. So, these things are happening, okay? And also, I think your colleagues are also having 3D printing also. No. Okay. Actually, I follow your social media handle, okay? So, I think somewhere I saw or I don't know, whether it may be different. So, in Nailik Kohemi is also, okay. The culprit is out there. Anyway, let's continue. I won't take long. So, Nailik Kohemi is also these 3D printing facilities are there. Okay. We have recently purchased one 3D printing machine and more are in the process. Three more we are going to purchase more within this, maybe by next financial year. So, all these trainings, okay, once you know, once you come out of your, you know, college, without these skills, it may be difficult to, you know, survive, especially when you are seeking employment, okay? So, these skillings are very necessary. And today, we are very happy that, you know, these facilities can be conducted in collaboration with your college also. So, I, whether it be IoT, blockchain, okay, or 3D printing also, these such type of, you know, the needed courses can be conducted in your colleges. So, I think with this, I'll just talk for some time. I'll come back later, okay, in the second session also. Thank you very much. And I hope that this session will really benefit you. And also, in the end, I'm going to ask you a lot of questions, okay? I'm going to ask you a lot of questions because why I'm saying this, we have been visiting many districts. We have been to Kefri, we have been to Peren, not only once, twice, okay? We have been to Wokka and other districts also like Mogokchon, okay? Forget about Dimapru and Koema. So, there we have seen that a lot of cyber crimes are taking place, even in the other districts also. So, definitely, you yourself must have faith also. So, I have a lot of questions with me, okay? So, I'm going to ask them. But before that, I'll give a chance to you, for you to ask some questions. So, if there's no question from your side, there's a lot of, you know, AK47 type of questions from our side. So, you just be ready, okay? So, now, I give time to my colleague to start the session. Thank you very much. Yeah, good morning everyone. When we're fixing the laptop, let me just start. That is, today we are here to talk about cyber security and while going through different colleges, different places and interacting with different age group, people of different age group, okay? So, while doing so, what we have seen is, at the end of the day, whatever thing it may be, it becomes the sole responsibility of an individual. At the end of the day, it's that, okay? So, we are conducting this program just to give you an awareness, to tell you that try to stay safe, okay? There are different crimes and then there are different crimes that is happening. And then, if we see then everything we load it to Huixi, to Huixi, so many things comes up. And then after that, when we try to discuss and all, then try to find it out, then individual's responsibility, individual's carelessness, okay? Most of the time it happens. Now, if we think over, then we are so much, okay, today we will be, we are, we are so much dependent on information these days, okay? I still remember when I was a kid visiting the grandparents place during the time, after reaching the village, grandparents and all won't be there at home. So, when we reach the door is all kept open, we enter into the house, we make tea, and then by evening and all, they are aunt and all, or the grandparents and all, they used to come back from the field. Now, it was easy for us to get into our grandparents home, even though if they were not there, okay? They kept the door open and then they went. Nowadays, some of us, we may be staying in a hostel, while we are staying in a hostel, okay, what do we do? We try to lock our door and then go wherever we go. At times, even going to a washroom, we may have to lock the door and go, right? But those days, if we think properly, then their doors were kept open and we could enter, we could make tea or we could cook food for them also. And then, after that, by the time we finish cooking, they will be coming back. These things happened just because for them, they didn't have any fear that, okay, I'll be losing this, I'll be losing that. These days, we have a fear. We have so many things in our room. Maybe our room will be too small, but then that smallest room also we try to lock and then go. Why? Because we have so many things, valuable things are there and then we have so many things kept where we are afraid that our friends and all or some person may come and steal and then go. Similar thing is with this cybersecurity, if we think over, we are so much dependent on internet. We are so much dependent on technology that now we have to stay secured. Our traditional way of committing crime, if we think over, then it was committed in the crime scene. Traditional way of committing crime is crime was committed in the crime scene. Suppose going and looting a bank, a person will go, who knows, he may be, according to our imagination, according to the movies that we see, going and looting a bank, if we think over, then they will be wearing a mask with the eye open and then only this part is open and then they'll be entering and then after that, they'll be asking for cash, right in the cash counter. And then if unlucky enough, they may even pull the trigger. That was the thing. But nowadays, you don't have to worry about that. You can peacefully sit over here, over this particular program itself. You may sit over and then tell that you are attending this particular cyber forensic awareness program. And at the same time, you are looting somebody's bank. You may loot the complete Swiss bank also, who knows, by sitting over here. So it's all about our information. Earlier information point of view, nothing much was worried about. But then these days, this is very important. Last week only, I had a parent's teacher interaction for my daughter. And before that, I got a call from some person and then they were telling me like, okay, am I calling to Mr. Moori? Then I said, okay, yes. And then after your daughter's name is these and then studying in this particular school, in this particular standard. Then I said, okay, yes, that is correct. And they were asking me about conducting some tuition and all. Okay. So straight away, I said no. And then after that, while having that parents, teachers interaction, I just informed the school's authority also kindly don't share our details to anyone. Because these days, information is all what somebody need to ruin someone else. Okay. So giving away personal information is very important. So coming to our, this one, cybersecurity, if we see, cybersecurity is, if we think about then, how do we secure ourselves? Okay. How do we secure ourselves? And then after that, it is dealing with securing your, keeping your daily phones that you are using, right? Securing your computers, right? And then after that, any other gadgets that use network. Okay. So any technical gadgets that you use, anything or anything related to network, all those things. How do we keep ourselves secure? That is the thing that we are going to discuss today. Now, like I said, we are so much dependent on internet these days. Usually the same thing I used to tell that these days, as soon as we get up, okay, instead of saying a word of prayer, thanking God, what do we usually do? Search for the phone. Or that particular person have posted something in the Insta or not, right? Just even in our deep sleep, subconscious mind, that is there now. Now, before you get up, in your subconscious mind, you have something about things that we are doing in the internet, things that we are dependent on internet. Okay. Now, if we say, who knows? You are sitting over here and then acting like you are listening to me, and then you may be chatting with someone else. Right? Some of you, you may be doing that. So we depend so much even on the technology, even for communication. That is, you want to talk, you want to express something. There are many ways that we can communicate these days, not just over the call, but then by different ways we can communicate and then we can use the technology. So in this way, what happened? We are so much dependent. Okay. I'm not saying that being dependent is not good. Okay. But we are totally into this technology that we cannot live without it. This is the thing that is happening. And in fact, it's a, I should say COVID have brought a lot of changes and one good change is that COVID have brought us is use of this technology. Okay. Now, even if we miss some of the classes and all at times, okay, we may even call you for online classes and all. If the teacher wants to complete his or her particular course and then after that he's not able to take the classes and all, okay, with some of the other courses, problems, okay, still what we can do? We can communicate with you through some means of chat, through some means of groups. Then after that, we may call you and then we may organize the class as well. Right? So likewise, when it comes to communication, still we are totally into that. Now, if we talk about the banking sector, everything is online. Everything is online now. Okay. Just before these sessions started, a call came from our this one, Kohimah Municipal Council. Okay. We had some work done by them and then we have to clear the dues and all. So, we were just now over the phone, I was just telling that only, okay, that this will be the means where we will be transferring the money and all to your organization. So, you see, it becomes very easy, right? And then selects somebody's waiting, you won't be able to attend, but then you call over the phone and then say, okay, kindly give that, I'll GP you. Right? I think that is the term that we usually use these days. GP is not the only thing, but then when it comes to banking sector also, everything is online. It has become, it has made our life so easy. When it comes to recharge of your TVs and all also, it's very easy. Your phone, very easy. You don't have to stand, go to the shop, wait for your turn and then after that pay and then do that, this and that. Everything, transactions that we do, it's totally online only. Okay. So, if we think there are again lots of online services and then, in fact, our college is also one, that's our college is also one where they have a lot of services and all. Okay. Our director was even telling like, you have your HR, which is there in the cloud, those softwares and all, you are using lots of softwares and all. So, even your biometric attendance and all, right? What are these? These are all services that we are depending on. Okay. So, there are a lot of services that we use and even if you don't want to use, it has come, it has become mandatory for us also, one way or the other. To be tech savvy, it has automatically, situation has brought us to get into this. Okay. Like, let me just give you another example. While we were small, parents and all used to tell us, you talk, you talk, you go to some auntie's house, uncle's house. Come on, you speak something. That was told to us since we were keeping quiet. Nowadays, if you don't have money, if you don't have money, then you are not able to talk. You have to recharge. Yes or no? So, even for talking, we depend now, right? So, if we see, we are forced to, even if we, whether we want or not, still we are forced to get into this technology world. And then, who knows? In the near future, we may be totally, so this, we may, yeah, totally into technology that who knows? The thing that we're speaking, we may speak in zeros and ones also, who knows? We don't know. Right. Okay. Now, another thing that we see is relationship, right? There are, there are a lot of relationships that comes up through use of technology, right? There are a lot of cases and then, even like there are different cases which has been referred by police also, which is related to relationships and all. Okay. There are so many cases and all. So, there are pros and cons for all these things. And now, when it comes to search, for me, I will tell you, searching has become part of my life. Okay. There's not even a single day where I haven't searched something in Google, where I haven't searched something in YouTube, where I haven't searched something in Spotify or whatever, whatever things that we do. There's not a single day. Your assignment, who knows? You may be searching in the Internet and then you may be writing those assignments and all which is given to you. Right. So, can anybody of you tell me that you haven't searched anything from yesterday up to now? I think many of us would agree to me that you will be searching at least something in the whole day. You will be searching at least something, right? Whatever things that we do. In fact, it's just according to me. Okay. Who knows, instead of Google search, YouTube search may be more. Because again, we are too much into technology that you want to learn how to unscrew this tripod that you see. If you just search in the Google, they'll give you in return step by step. We don't want to read that also. We will be seeing the visual thing and then we will be doing, right? So, likewise, whatever things that you do, we depend on Internet only. We depend on different technologies that we are using. So, based on the use of technology, it has become necessary for everyone of us to stay secure. Because you cannot say that, no, I'm out of this. I cannot be with the technology. You cannot say that. Okay. So, when you talk, you're using some devices. Okay. You're moving around. People will get to know where you're moving around even. Okay. And then, people may even be able to trace you where you are. Okay. Now, the phones that you're using, the gadgets that you're using, if you don't use it properly, then it is going to cause problems to you. It is going to create a lot of problems to you, the things that we use. Let me give an example of one of the cases that is a person was kidnapped and then after that, ransom was asked to the parents and then after that, photo was clicked and then sent to the parents. Okay. Now, that particular photo, the parents received and then that photo was given to the police. Then, after that, unluckily, the person who took the photo, they didn't know that. The person who kidnapped their child, they didn't know about the facility that was there in the camera. Okay. So, they clicked the photo and then they sent. After sending, what happened was that, unluckily, GeoTech was on. Okay. Police and all they saw, they knew the geolocation, straight away went there and then caught all of them. You see, using the devices without knowing the facility that is there. We are so much into using good phones, devices and all. If we don't know the purpose of all those things and all, what we are using, why do we use this? Okay. It is going to land. It is going to bring us into trouble. Okay. So, you see, we have to know what we are using. We have to know what we are doing and at the end of the day, we must stay ourselves secured. We must stay ourselves secured. That is, as I've said in the beginning, our information has become so important to us. If in case the personal information that you are using is being known by someone else, like the example that I've given you, somebody calling me and then telling my name, my daughter's name and then after that, which class she is studying, all those things and all. This is very dangerous. Okay. So, keeping our information private is very important. Knowing the device that you are using is very important. Okay. Let us see the cyber crime red for the last five years. Okay. If we see that in 2017, in India, there were 21,796 cyber crimes that was registered. Okay. And then after that, if we see in 2018, it has increased to 27,248. And if we see in 2019, it has increased to 44,546. And if we see in this one, 20, 50,000 and then 21, it's 52,000. Now, these are the registered cases. Just imagine how many unregistered cases are still there. Crime has been committed. But the thing is that those crimes which has been committed has not been reported due to one or the other reason. Okay. So, this crime rates, if we see, it's increasing day by day. It's increasing day by day. Now, what is cyber crime? Cyber crime is nothing but a crime which has been committed after using the different types of technology, different types of technology, maybe your phone or maybe networks or so. Now, let us see what are the different cyber crimes that are there. Okay. Let us try to see what are the different cyber crimes that are there. First of all, identity theft. Our director was mentioning about asking money, emails being received. So, those are what? A mail might have been sent by someone else using your director's name and then after that sending request for sending money. That means he is stealing the identity of a principal. In one of the colleges, the identity theft that has happened was tomorrow there is an exam. Now, what they have done is they have used the identity of the principal and then came out with the official notice that tomorrow is holiday. It has created a chaos to that particular college. It's one of the colleges up there in Kohima. Okay. And that's a very good college, a big college, not a small one. Okay. So, you see, somebody else trying to take the identity of someone. Okay. That we call it as identity theft. Now, if we try to imagine about identity theft, then there are a lot of things that are happening when it comes to identity theft. Okay. I will just narrate a story about a person who applied for a bank loan. He applied for a bank loan. Then after that, once he applied, he went to the bank and then discussed with the bank manager and then came back. Okay. Now, later on, a call came from the bank telling that, okay, you have applied for this amount of loan. Then he was surprised to hear the amount because the actual loan that he applied was lesser than the amount that was been quoted by the manager. Then after that, what happened? He went to the bank and then after that, later on, came to know that somebody have taken all the records, all the documents that were submitted. And then after that, under that particular same name, okay, the loan was applied. Okay. And then after that, the amount was increased and then the account number was somebody else. Okay. So what happened? The person just took over the documents and then tried to steal the identity of that particular person, the first person who applied for loan. Now, these things happen just because of the documents that we usually neglect. Okay. You may scan your documents and then you go to a cyber cafe, scan your documents. This is my mark sheet. You will be scanning and then you will be keeping it. You will be keeping the documents there in that particular PC. You will not get to this one, delete that. Right. So actually, that happened in a Xerox machine, Xerox Center. Okay. That particular banking thing, it happened there in the Xerox Center, where the documents that was given for Xerox copy, instead of one, one copy, the person he took out extra copy, the person who was sitting in the Xerox counter. He took extra copy and then one for himself and then the other for the customer. Okay. That is how he got hold of all the documents. Okay. So likewise, we have to be very careful. You go to a cyber cafe, you use your friend's computer and all. Okay. We scan it, we share our documents and all. Be careful when you share your own documents. That will be misused by someone else. If they want to take the opportunity, they can do that. Okay. So that is it about this one. Stealing someone else's identity. When it comes to asking of money and all, these days, there are a lot of cases where pastors and all, usually what they do, they also have their social media accounts and then they don't, all the church workers and all, they may not be using much of the social medias and all. So these days, what is happening? Those people, they are keeping track of those people. Then after that, coming up with a fake account similar to that account because those people, they don't use much. Okay. So keeping that in mind, what they're doing, they're trying to come up with a different fake profile and then after that, asking for money, you know, those things are also happening. Okay. So you see, those persons, what are they doing? They're just stealing someone else's identity. It happened in our own institute as well, our own faculty. Okay. His account was also being, fake account was created by someone and then after that, asking for monies and all, those was done for our own staff. Okay. Those things has happened. So we have to be very careful when we share our information, when we share our information. Somebody, maybe dear, somebody is just finding a ways and means to steal your identity. Okay. Now, if we talk about social engineering, okay, this is the easiest way of committing a crime, where you don't need any technical expertise. You don't need any technical things and all. Social engineering is just a way in which you will try to convince someone else. Trusting, trust factor. This is the thing that happens in your social engineering. I couldn't put that screen shot because just a few minutes back only I received that message. I'll just read out that particular message that was received. It is about social engineering. His, I mean, her account was compromised and how it happened. Let me just send, read out the message that was sent to her. It happened here in Dimapol only. Okay. So a person sent him, sent her a message and then let me read out the message. I was trying to log in my Instagram page on my new phone and they asked me to find someone to help me. Help me receive a link. Instagram gave me two friend's suggestions and you are one of them and the other person isn't online. Will you please help me to receive the link? Okay. So that was sent to her and then after that the reply that he gave us, how can I help you? Okay. And then they replied like, okay, the link will be sent to you. Please don't click on the link. Okay. Copy and then give a screenshot of it and send it to me. Okay. So I asked her like, how your account was compromised. Then this is how the compromising of her Instagram account and then Facebook account, it happened. Okay. So the link came. She gave the link to them. They clicked the link and then OTP was asked because as for the message, it was like that other person, he was not able to log in and then Instagram and all the meta, they are sending a link to somebody else so that they will verify and then they will give the login details and all to him. So just trusting that person, he sent the link. But what happened was they could get into her Instagram account by clicking the link and sending the OTP. OTP also came to her phone only. Okay. So she shared the OTP to her and then after that her Instagram was compromised. Okay. Now they had, they know the password, they know everything, so what they could. Next step that they took was the person who compromised her Instagram details, what happened? Her account, that two factor authentication was enabled. Now it was not possible for the actual owner for her to change even the password because the two factor authentication was enabled by them. Okay. So she could not do anything. That means her complete Facebook and Instagram was compromised. She wouldn't be able to do anything because the two factor authentication code is known to them only. They were the one who enabled that. They know the code. They know how to change, they have known how to change the password and all. Right. So at the end of the, she has to surrender all the accounts and then the way that they were doing was, okay, during the Instagram they had the list, list of friends and all. Right. So likewise from their list, again they were trying to take one after the other. Okay. This particular thing, it happened just last week on me. Okay. It happened just last week on me. Lucky for her that her friends and all were working in Facebook and all and with the help of them, they were able to close down that particular account. Okay. Had it been you and me, it will be difficult for us and people will start using our, this one Instagram account, they will be start using our Facebook account and then we don't know what may happen to us. Okay. So that is about the social engineering. In case of social engineering, it is nothing but the trust that you try to gain first of all and then after that, once you gain the trust, what happened is that you will be caught, you will be trapped. Okay. So if we think about this social engineering, fishing is also one. Fishing is also one way where they try to keep or try to extract information from you. Fishing is similar to the way you go and catch fish. Okay. Usually angling. Right. So you put that, okay, go ahead. Bad and then you'll be waiting. Right. The moment the fish comes up, you'll be pulling up. Yes or no. So even in case of fishing, that is phhisig fishing. Okay. So even in case of fishing, what happened is that those person, they wait for you to enter your user credentials. Okay. They wait for you to enter your user credentials. And then after the moment you enter the username and password, then those things will be compromised. Your username password will be known by them and then they'll be using that. The very most common thing about the phishing is many of you, you may be getting SMS. You may be getting different links and all telling you to enter the account details and all. Let me just read out this one. I don't know. Last time I tried to enter and then the app was very simple. Okay. Sorry. I have deleted that. Okay. So during the message, they have given a link to verify your Yono app. I clicked that just to see. Okay. Just to see and then I add a random number and all. I didn't give any of my actual information. But the thing is that they gave a link. They asked me to verify my Yono app, which is the SBA online banking app. Right. So when I clicked the link, that Yono logo was there and then they were asking me about the login ID and then the credentials and all password. So I just entered a random password and then random login ID and then I clicked the submit button. Okay. Then after that a blank screen came up. Nothing was there. Okay. So this is how they are going to extract your details and all. Okay. It is not going to be, you are not going to get into the Yono database, the SBA database, but that username and password that I have entered, they will be using that to get inside the, what is it, our bank details and all. Let me give an example to the same thing. It happened to our own security. Something like this happened. Then after that people started asking for the OTP. He started sharing. Some amount was deducted from the account. Another OTP was sent. Some amount was deducted later on. His whole account was brought down. Okay. So these are the things that happens in social engineering. It is just the trust that you and I built up. Now coming to digital frauds, banking. Okay. Digital banking, you know, in short, what I will see is whatever apps that you are using, try to download from a legitimate place. Okay. Try to download from a proper place where you are downloading the banking apps and all. We are totally dependent on banking. And then with respect to keeping of your password, okay, with respect to keeping of a strong password, try to remember your password, try to keep a very strong password where you can remember easily. Okay. But difficult for others to decipher whatever password that you have kept. And then after that kindly don't write down your password in your mobile phones. Don't write it down in your notebook diaries and all. Okay. Now after this, I think we have done up to here, right? Let us replace this H by hash mark, 0W and replace this A by at the red R Y capital 0U. Now this particular word that you see, okay, this particular thing that you see is nothing but how are you? Right. What I have done, I have just replaced that H with the hash mark, 0 with O, right? A with at the red. So it's very easy for us to remember how are you? Right. That's particular sentence. But then it's difficult for somebody to actually get this particular password. Okay. So whenever you create a password, make sure that it is a combination of small letter and capital letter. Make sure that you're using your special characters. Make sure that you're using numbers. Okay. So combination of all these things will help you to create a very good and strong password. Okay. So when it comes to your banking things and all, make sure that you keep a very strong password and then whatever password that you are using, whatever password that you are using is kept to yourself and never keep the same password for different applications that you're using. You have your Facebook, you have your Gmail, you have your bank accounts, whatever, whatever password that you're using, you keep it differently for all the different apps and all. If you forget, don't worry, you have the option, forget password. Okay. Make use of that efficiently. You have your social medias. During your social media, we have to be very careful. Okay. Like cyber stockings, people are stalking at you many a times. Okay. We have to be careful with that. There are a lot of cases on sympathy fraud, romance frauds and all. So we have to be very careful. And the last thing that I would like to share is about the virus. Okay. Kindly whatever things that you are downloading, whatever applications that you are downloading, you download it from a genuine place. Okay. And don't try to click any links and all that has been provided in your emails or maybe in your WhatsApp or whatever. Okay. Until and unless you don't know that who have sent and then from which you don't know that particular source. Okay. Until and unless you don't know that, you kindly don't click any of the links. And with respect to using of virus and all, antivirus and all, it's not about keeping a very good antivirus, but what matters is your responsibility to update your system, update your antivirus every now and then whenever page has been uploaded, whenever any updates has been provided to you, kindly try to download and then install those things and all. Okay. We have so many things to discuss. So now I give time to Sir Denner to continue on whatever I have discussed then after that followed by Atoshek. Okay. So we will continue our talks and all. This won't be the end. We will continue. And then after that, at the end of day, like as Sir have mentioned, we will be having question hours and all. So how are you feeling now? Not good. Okay. Shall we all stand once? Let's stand once. Okay. Okay. So like 15 more minutes, 10 to 15 more minutes from my side. Okay. Okay. Please sit. Please sit. Thank you. Okay. See, why do we make security mistake? Most people think that, okay, this kind of mistake may not happen to me. Okay. Most people think that, okay, security mistake happens to only those people, okay, who are not very smart or something like that. Okay. Many people think that this will not happen to me. And ultimately what happens is finally one day it comes to you in one shape or another shape. Now here, just a brief demonstration. You all know him, right? Right. So now if Sir Tali comes, okay, walk into this room right now and offers you, okay, I'll stand here for the camera person. Okay. Okay. If Sir Tali comes and offers you a glass of water, okay. And also imagine that this person walks in and offers you a glass of water. Whose glass of water will you take? That is the question. Will you accept? Tell me. Obviously Sir Tali, right. So this is the normal concept or this is the, I should say like this is the traditional way. Okay. This is what we used to do before. Okay. But the question is, where are you checking the water or the person who offered you the water? Okay. So most of the time we are looking at the person who is offering us the water. Now what I want to bring out from here is this water is the data or the information in the internet or in the cyber world. Now for example, a message comes to you from your, maybe from, let's say Sir Tali. Okay. Maybe a message comes to you from Sir Tali asking you for some money. What will you believe? Will you believe this from Sir Tali or will you check the message? Did Sir Tali ever message you before? You should ask yourself. Were you in communication with Sir Tali before through WhatsApp and other messaging platforms? Most probably not. Right. Because we usually don't chat or we usually don't you know share stories with our professors or with our, the principals or our director. Okay. But normally these kind of messages will come from, you know, someone very well known to do. Okay. So here, like I said, the data or the message is the most important thing and you should focus on that, not on the person. Okay. Now for example, like if a message comes from your director asking you to pay your fee to this particular account, what will you do? What will you do? You should look at the message. You should consider the message. Is this the way you have been paying fees before? This is the question you should ask. Is this the way you have been paying your fees? Yes or no? If the answer is no then that means you should doubt the person. Okay. From where the messages come. Okay. Social engineering already explained. Here, one OTP sharing fraud is there. Okay. So what usually happens here is bank people usually will call you saying that your ATM card, okay. Or yeah, your ATM card or your YONO password is about to expire. And in order to do that, you have to share your banking details. Or sometimes it happens that like, okay, we see some, you know, they will ask you, okay, your name is this, this, this. You are now in Tetsuo College, Chumugi Dima. Right. But we see that someone is trying to take your money from your ATM from, let's say, Gohati. Okay. Someone is trying to withdraw money from your ATM, from your ATM card at Gohati. Is this you? We are just trying to verify. Okay. This is how they will call you. So that time you will be either in college or maybe you will be somewhere else or usually it will happen to your parents. Okay. It usually happens to elder people. So that time what will happen here is, you know, there will be a panic strike. Okay. The person who received the call, he will think that, okay, someone is trying to steal my money. Okay. Using this, my ATM, maybe, I don't know how they are trying, but I know that people have lost their money through ATMs and all. Okay. So someone is trying to withdraw money. So then he will ask the person, okay, how am I going to do or what shall I do in order to be safe? Okay. In order to stop that person from withdrawing the money, what should I do? Then the bank manager will say that, okay, you don't worry. In order to do that, I'll try to, you know, block the card through the system. Okay. But in order to do that, I will need your ATM card details as well as your CVV number. CVV number, you all know? Okay. So like that, slowly, slowly. It's just, it's not like someone just calls and asks, okay, come on, give me your ATM card. They won't say like that. They will come up with an excuse and slowly, slowly, they will say, now in order to finalize the blockage of your ATM card, we need one OTP. Now this OTP will come to you. You please share that. Again, this OTP we used to normally share. Okay. That is how you will lose your money. And I think this is the process through which we purchase items from the e-commerce website also, right? From Flipkart, Amazon like that. We purchased like that only. So those people are also doing the same thing. Okay. Just remember, bank people or no one will ever call you asking you for your card details or your account number or anything related with bank. Okay. I used to say that whenever we go to the bank, bank people, bank people hardly talk with us, right? The staff people. Then why should they waste their time calling us? They'll never call us. Okay. Okay. Many people are also interested in purchasing, you know, secondhand mobile phones, right? Or secondhand vehicles like that. So there's something called OLX or e-commerce platform. Okay. Normally they will post as, you know, retired army people or currently working as, you know, as an army officer or something like that in the army. So when they say army, there's an element of trust. Okay. There's an element of trust when they say it's from the army. So what will happen here is they will even show their identity card. Okay. This is my card. I have one vehicle to sell, a bike to sell. Now what happens when we think of army men? Okay. Since they're from army, they won't, they might not have used that vehicle too many times, right? It must be like a brand new. This is also the concept that comes to the mind. Okay. That's why people prefer these army people items. Okay. Now, once they give this ID card, actually that is the time when you should know that it is fake because I have learned that army people, they never share their ID card in the public. Okay. So once they share their ID card, it means it is fake. And also until and unless you go and meet them, okay, never pay the money in advance because these people will be fake. Okay. Actually there's a long story, but I'm trying to cut it short. Okay. Because of time. So got it. So never pay advance money. So identity tape is there. Okay. Fraud using fake social media account. How many of your Insta or FB has been hacked? Anyone whose account has been hacked? Anyone? Anyone? No one. No one is there. I definitely feel that at least 20 to 30 people should be there. Okay. Because this is the trend. Okay. At least 20 to 30 people account must have been hacked from your college. Okay. So how that hacking is happening? Okay. And normally in technical terms, I used to tell that we should not call it hacking. Okay. Because what is hacking? Hacking is when someone you know with your computers, with those programming codes and all, okay, they will try to go bypass the server and from the server, from the database, they take out the password and use it for some criminal activity. That is hacking actually. But what is happening here is you are giving your username and password willingly to the fraud people, fraudsters. You are giving yourself your username and password very easily. How this is happening? Okay. I think Sir Muri has already explained that. Okay. How you are giving your, for example, a message will come saying that, okay, your Instagram account is going to be deactivated or something like that. In order to do that, you please change your account. In order to change your account, you have to enter your previous password. Okay. So when you enter your previous password, it is the present password. Okay. And that is how they take your account. Another thing here is, for example, a similar profile of target social media account. So they will target someone. Okay. They will target someone, someone who has good number of followers. They will target that person and they will try to create a fake, another similar kind of account because I can find your photos everywhere. Right? If I go to your Insta, I can get your picture. Can I download it? Yes or no? Can I download your photos? Can I use it? So I'll just download your photos and I'll just put, I'll just create another new Insta account with your profile picture. And then what I'll do is I'll send friends to all your friends, friend request to all your friends saying that, okay, my previous account has been hacked. This is what I will write. Okay. My previous account has been hacked. Kindly accept this request. This is my latest new account. And we just accept it. We will just accept it even if out of 1000 people, even if 300, 400 will accept, that's good enough for me. But I think around 700 to 800 will accept, except 200 will not accept. Okay. And then after creating the face profile, this one account, after some time, I will target someone. I will target some of your friends, some of your friends, friends, someone who is not very close to you, but is also in touch with you also. And I'll keep on chatting with that person from time to time. And after some time, what I'll do is I will try to, you know, ask money. I will ask money from that person. Okay. See, I'm in deep trouble now. I need some money. Can you kindly lend me 1000 rupees? Okay. Remember, I'm not only chatting with only single friend of yours. I'm chatting with around, out of 700, I'm chatting with around 500 friends of yours. Now from 500 friends of yours, not all are very smart, right? There will be some dumb people also. So those dumb people will give me the money. This is my target. I am expecting around 10 people to at least transfer me some 1000 to 2000 rupees. Okay. I'm just giving an example. This is how the fraudsters are doing. They are not targeting, you know, in terms of crores at one time. Yeah. Just targeting small, small, small amount, depending on the capability. For example, since you are a student, I may ask only 500 also. Now, since I'm asking 500, I think you have the capability to do that, right? Ah, 500 to what? Okay. But please return it in time. You may say that, which you're not going to get it, right? So this is how they do. Even for employees, okay, the same case with the employees also. Employees, I'll ask around 3000, 4000, okay? Because employees, they have their salary now, so they will be able to give me. So out of 1000 people, even if around 10 to 20 people give me the money, then I'm rich by some amount without doing any efforts, without doing much hard working also. Okay. This is how this works. Okay. This is an actual case from the pastor case, okay, from Tulirea, okay. So this is, I hope you can see that. So this is how the conversation starts. Hello, hi, how are you? Like that blah, blah, blah. Okay. And this is what? Which social media is this? Can you recognize? Messenger, right? So Messenger means I can create any Facebook profile, right? Yes or no? And then true Messenger, can I chat with you? Right? So today also, I can create any account, okay, pretending to be one of your college teacher and maybe keep on chatting with you also. So remember, the person is not important. Certainly it's not important. Remember the water is important, the message, the information that is being shared is important here. So what is happening here is in the photo, in the profile picture, we call it profile picture, right? In the profile picture, it's the photo of the pastor with his family, okay? So the other person is thinking that he is chatting with the pastor, but in fact he's not the pastor. It's someone else who has created another account, okay? So like this, like this and then the money was transferred, okay? And after that, see, even it came to Facebook also. See, chatting, chatting through WhatsApp Messenger, what the pastor did was the fake pastor, what the fake pastor or the fraud, I should say, nah, the fraudsters, what he did was he gave another phone number, WhatsApp number, okay? Saying that it is my phone number, you take this and then they started chatting on WhatsApp also. Remember, this doesn't happen within one or two days, okay? They take time, maybe one week, two weeks, three weeks like that. And in the end, okay, they will ask for the money. They will say, okay, see, I just came to Dimapur and then with my wife and my son or daughter and we had an accident, okay? And now I'm in the hospital, I'm not able to receive any calls, okay? And my wife is also in another room in the hospital and I'm here, we urgently need money but here one good Samaritan, okay? This is the story that the fake pastor is saying, okay, one good Samaritan has helped us a lot, okay? And this is his account number, can you kindly transfer 10,000? This time 15,000 was us, can you kindly transfer 15,000? This is how they will ask you the money, okay? And then feeling pity, they will send, okay? Short, long story short. And this is from DC, DC Perenn, okay? This is the, actually when we went to Perenn, this was happening there, okay? So what was happening was just like you are receiving messages from your director, okay? See, I can create a fake profile of your director, can I? Yes or no? Yes, and then I can start sending messages to all of you also, okay? And of course I may not ask money from you, okay? Since you are a student, but there may be something else also, I can target you also, okay? But especially for working people, normally money is being asked, okay? So the director what he will do is he will, I'll make a fake profile of the director, chat with all the employees, okay? And saying that in order to do this or that or saying that, okay, right now I'm in the US, right? We can also say like that. I will come to know that when he leaves for US or when he goes somewhere else, outside this place. And then when he go from here, let's say he goes to Guwahati, very simple short one, okay? He is not going to go for just like that. He is going to go there for some meeting. And even I will know that from what time to what time his meeting will be, because during the meeting he wouldn't be able to receive phone calls, right? Normally he will keep all his phones in silent mode. So during that time I will start my attack. I'll start sending messages to all the faculties, the lectures out here saying that, okay, I have met with an accident. This is this, this is this. Emergency, please send money to these people. Some people out of, you know, 50, 60 hundred, at least two or three people are going to send the money. I know that, okay? But what I want to share today is we should always see the message, the information, okay? Not the person, okay? And until and unless you have a conversation with that person, don't transfer money to anybody, all right? One thing, keep the privacy settings as my friends only for all of you, okay? All right? All right? All right? Okay, see here, I told you that I will be able to create a fake profile of anybody, right? Now in Mogokchung, one of the students created a fake profile of the teacher, okay? And he started acting like the teacher. And what he did was he started going around in the Facebook, giving bad, bad comments here and there, posting, you know, obscene images and videos, okay? So what happened was the teacher's friend started calling the teacher saying, what are you doing, right? Why are you posting such things on the web? Why are you doing this? Then the teacher didn't know that, okay, didn't know that such thing was going on. Then that time only they came to realize that, okay, someone is doing this under my name, okay? But for some moment of time, the teacher's repetition was at home, right? Because many people thought that it was the teacher. But likewise, what we have to do in that kind of situation is you please go to the police station, okay? File in FIR, okay? File in FIR. And then in that Mogokchung case, you know what? No matter how you create the, you know, profile, sorry, the account from where you create, from which mobile phone and from which internet connection you create, the police will come and catch you, okay? These days, I think the police have that much technology, okay? They will come and catch you. So don't even think of, you know, trying to do something like that, okay? So creating a fake account of somebody and, you know, trying to harm that, jealousy is there, right? We will try to harm that person. So don't do that. Because if FIR is, you know, registered, then the police will definitely come and catch you, no matter where you are, okay? So different, different sections of the law is there, okay? So here, I just want to share last one thing. Here, HTTPS, cybercrime.gov.in. For example, if you don't want to go to the police station, okay? You can always file your case here and you can do it anonymously also, okay? You don't have to reveal yourself, okay? All right. And then you can do it here also. So many of the times, what happens here is, okay? In the end, just one more. There are times that boys, okay? Boys, you'll get video calls, okay? So when you open those video calls, normally, porn will be there, okay? So normally, porn will be there. Even for girls also, if you get a video call from unknown numbers and if you open it, porn will be there. Now, what happens during video call is both your face is captured, okay? Because when you are chatting through video calls, even your face is captured, right? So what these people are doing is, actually, this is called sextortion, okay? They will try to blackmail you, saying that, we'll say that you have been involved in these, these, these activities and then we are going to post it and make it viral, okay? And they will try to extort money from you. This case happened at Keffrey, okay? One of the participants showed me those videos also. So in that case, what you have to do is, can you go to the nearest police station, file the complaint or take a screenshot of it, okay? Take a screenshot of it and then file through the cybercrime.gov.in. This is what you can do, okay? Because once you become, you know, once you accept their demand, then the next victim will be just nearby only, okay? You should not consider that because you have not done anything wrong, okay? And the police knows, the law enforcing agency knows that these things are happening. So it's not like that they are not going to believe you, they will believe you because this will not be their first case. So what normally happens is people think that, ah, what if they think something else? What if I'm really involved? What if the police thinks that I'm this type of girl or this type of guy? Nah, this comes to the mind and then we just say, ah, just leave it. We used to live like that. Don't do that because if you approach the police, then the police will be more than willing to help you, okay? So that's all from the site. Thank you very much. Okay, now we will have a small workshop, okay, a demonstration, okay? Sir Atushi is there. So I give time to him now. A lot of things have been said and a lot of things have been heard. In this session, let's take a look at how cyber criminals out there on the internet are looking for a prey that is common people like us to, ah, compromise them, right? We have heard about fishing, we have heard about, ah, that is the importance of we are using a genuine software, right? So, ah, let's have a look at what, ah, that is, ah, there is a possibility, right? Ah, there is a chance, right? We used to say to the people that, ah, you have to download, ah, application programs from an original source, right? Or from the genuine source, right? Because, ah, when you download, ah, those application from third party software or distributor, then there is a chance that those software can be, ah, repacked, right? Repacked, right? Ah, it's easy, right? Because there are tools out there. You can download some APK, right? Put some bag doors into that, put that together, share it to someone else. Someone thinks that that's a, ah, that's a game, right? So, ah, every time, ah, the, that is the victim is playing the game. He is open, or she is, she can open up, ah, a bag door, okay? For an act attacker to spy on, right? So, ah, I have set up this one that is, ah, this is my Windows 7 box, right? I have a Windows 7 box over here. I have a Linux machine over here, okay? Ah, so, ah, let's try to differentiate between this, ah, Linux and Windows, okay? Linux is going to be, ah, attacker machine, right? And then the Windows is going to be a victim machine, okay? So, I have, ah, here a Linux machine set up, ah, listening for any incoming activities, okay? Incoming connection from the internet into my PC, right? Now, in this, ah, Windows, right? That is, ah, the victim system. I have a program called PuTi, right? PuTi is, ah, a very small software which is, ah, used as an SSH client, right? So, if you have an SSH system, ah, system or server enabled into your, ah, a system somewhere using this PuTi, you can connect into that system, right? So, ah, this PuTi have been already repacked, okay? Ah, I, I just repacked this one last night for demonstration purposes, right? So, whenever I run this PuTi, right? This is an interface of a PuTi that is used to connect, ah, the system remotely using SSH, right? What I can do in this client is I can simply type an IP address over here, okay? So, the PuTi program is now running, right? If we come back over here, right? We have here a meterpreter shell, right? Meterpreter shell is, ah, this one, ah, Metasploitation framework, ah, which is used for, ah, exploitation purposes and then bad guys over there, ah, most of them, ah, make use of this, right? So, as soon as we have got here a meterpreter shell, that means we already have a connection into this system, okay? So, if I do something like this, I have so many features in this, ah, meterpreter shell where I can even, ah, record the microphones, right? Record the microphone, record, ah, record, ah, this one. Ah, the webcam, I can even make use of, ah, this, ah, like a setup, a key, ah, a key logger over here, right? Something that, ah, which I want to show is, ah, screen share over here, okay? Ah, it's a screen share. If I can do something, I can share, say something like, ah, all right? So, ah, this is my Linux box. I have got, ah, that is, ah, Windows 7, which is over here, all right? This is my Windows, ah, that is the existing, that is, now my, this is the screen of my Windows 7, right? If I go back to this, my Linux, I have the screen over, same screen over here. Whatever activity, that is, once you have been compromised with, ah, this such kind of, ah, softwares, or application, right? Which have a backdoor in it, right? Ah, you can be monitored, right? I do some activities here, I can see that over here, okay? So, ah, let me try to play one, ah, videos here, if there is any, right? Okay, so I'm playing, ah, these videos in Windows 7, right? If I come over to this, ah, Linux box, that is my Ategra machine, I can see that same videos which is, which, ah, the victim is viewing in my, ah, Ategra box, right? This is how, ah, that is, ah, the danger or the threats that, ah, which, ah, we can get into, into, if we download, ah, applications or softwares from, ah, this one, unverified, ah, sites, okay? Or un-unverified repository. Ah, another thing that which, ah, I want to show over here is, ah, ah, this is called a Stormbreaker. A Stormbreaker is a framework for mobile exploitation, okay? Ah, and this particular is, ah, used for fishing as well, right? Ah, it will send you, ah, and you will send, ah, you out a link and once you click that link, ah, your system will get compromised, right? So, ah, I can craft, ah, the message, right? Make it very interesting, right? If someone sitting next to you have, ah, a brother or sister and is sending you a link, which is crafted in such a way that my brother or sister is contesting this, this, in this event, he needs your like, right? Vote on this one, ah, social media platform to get, ah, ah, that is, ah, the more the vote, that is, ah, the more like he gets or she gets, the more, ah, this one. So, if a friend like you craft that message and send it to you, then obviously, ah, some people, ah, is going to fall for that, right? Because it comes from someone you know, right? So, ah, like, ah, Sir Daniel was, ah, discussing, ah, a bit earlier, it is very easy to create, ah, create a fake account, right? So, ah, okay, so, ah, I have, ah, like, a desire to show you another two demonstration, like, which is something related to phishing and something that is, which is related to backdooring of a mobile application, but as of now, it looks like this, ah, server is down. So, I will limit my session, ah, till, ah, what I, what, that is, ah, till these. So, ah, once again, a reminder to all of you, right? Whenever you use an application, right? Use a genuine source, ah, if I say that, I mean, genuine source, like a, not to be correct, the version you express, that's illegal, right? But if I say that, you are, you don't care about the consequences, right? If I say that, if you do that, you are killing hardworking people, right? You are killing those organizations which are investing millions to create that particular software, that you will not care, but if I say, like, there's a chance that, ah, those, those application can be backdoor, like, ah, the example which I have shown you over here between Windows 7 and then, ah, Linux voice. Then, I, I think that, ah, that will make some sense to you, to you guys, right? So, always be careful, always download, ah, from a genuine source and then use a genuine software, okay? And then also encourage the developers, okay? Ah, to, ah, make, ah, this, ah, cyberspace, a cyberspace, okay? Thank you everyone. A very good afternoon to one and all who's present here. Ah, as we come closer to the awareness program on cyber security, on behalf of BCA department, I would, ah, have the privilege to propose a vote of thanks on this program. First of all, I would like to thank our respected director, that's Kulal Lauren, who has given us a wonderful speech and then, ah, like, honored this function and then giving us a glimpse of knowledge, which is a transition from 90s to 20s in this technology. And next, I extend my heartfelt thanks to our Denil Marin, the additional director, Nelit Kohima, for his wonderful speech. It's my pleasure to thank the resource person, Maury Manba Amer, joint director, scientist D, Nelit Kohima, for enlightening us, ah, with the claims of cyber security. And I would like to thank the speaker, Atoshe Lohe, forensic analyst, Nelit Kohima, who has done the live demo regarding with cyber security and awareness. Last but not the least, I would like to thank the moderator, Thali Nusang, HOD, BCA department, for organizing this awareness program, which is very useful and very, like, the training topic. And I would like to thank all the students who are present here and making this awareness program a grand success. Thank you. Anything related to social media accounts that you come across, maybe your friends, right? Anything that you have come across? He already hacked mine just a little, but network was not good. All right? So, especially now most of the students are computer science students here. Be careful while browsing crack games, especially the guys while downloading the games, right? Be careful. He has already, he scanned the network and he already hacked mine, right? He already did have, without knowledge, he accessed my camera, right? He did it. So, it's possible to hack anyone's account easily, only if you are not aware of it, all right? So, be careful, especially when you guys are downloading softwares or games and the virus from unknown websites, right? So, just be careful with that. If there is no question, then I think we'll wind up our session here. Thank you so much, everyone.