A mild flutter was created on 22nd September, 1915 when a German Warship sent a number of explosive shells into Madras City aiming obviously at strategic places. Some shells were aimed at the High Court Buildings that is to say at the light house on ..
MAHESH KAPASI & CO E-Mail:maheshkapasi49@gmail.comChartered Accountants Phone: 2686 8147B-49, Gulmohar Park, ..
MAHESH KAPASI & CO E-Mail:maheshkapasi49@gmail.comChartered Accountants Phone: 2686 8147B-49, Gulmohar Park, ..
Worst Nine Cyber Crimes of 2008.. Prashant Mali (Cyberlawconsulting@gmail.com) Friends 2008 has been a groovy year for cyber criminals where diggers and phreakers hit bones after bones and eluded in the galaxy of cyber space.According to Symantec's M ..
Cyber Crimes Not Yet Solved By PRashant Mali (cyberlawconsulting@gmail.com)Probably you all don’t even know these crimes happened. Still, they are all time mystery and go in history of Cyber Crimes with accolades. February 2008- Supermarket Sec ..
Most of us and the companies approach Banks and Financial Institutions for loans. The reason for the loan may differ from person to person and company to company. All Banks should function in accordance with the guidelines/norms issued by th ..
Rights Of Senior Citizen : Need Of The HourBy despising all that has preceded us,We teach others to despise our selfAgeing is a natural process, which inevitably occurs in human life cycle. It brings with a host of challenges in the life of the elder ..
The advertising industry has a reasonably effective and efficient self-regulation mechanism. By self –regulation it is meant that advertisements should be such that they do not violate the Code of self regulation , laid down by various statutes ..
Camps of Lok Adalat were started initially in Gujarat in March 1982 and now it has been extended throughout the Country. The evolution of this movement was a part of the strategy to relieve heavy burden on the Courts with pending cases. The reason to ..
hacker broke into the email account of a Twitter administrative employee and gained access to the employee’s Google Apps account, where the company shares spreadsheets and documents. The hacker then sent documents about company plans and financ ..