Skip to main content

The Fascinating World Of Joseph K

I spent almost five and half hours with Joseph K negotiating the virtual world. It was fascinating to watch at him work nay play. In the end it was a full bladder and an empty stomach that made me say bye at 4.30 in the afternoon. He had lost track of time.

If you have seen MacGyver –the television series in the late eighties then you will know what the hell I am talking about. MacGyver could do anything with the things around him -even create bombs out of deodorant cans, vaseline and other household stuff.

MacGyver was a non-violent action-adventure hero. Armed with only a Swiss Army Knife, a roll of Duct tape, and whatever materials happen to be lying around, the ex DXS agent was the field operative for the Phoenix Foundation, MacGyver applied common sense and basic principles of science to imaginatively outwit his adversaries.

And there I was watching Joseph K do something pretty much like what MacGyver would have done.

Joseph K casually demonstrated how a small electronic USB enabled Digital Camera can be altered by modifying its flash memory to have a full fledged bootable operating system. With that he could directly access files on the hard disk bypassing system logins and permissions. Yea, he could do the same with a mobile phone or an MP 3 system. It was a cool thing to do.

He took me straight into a secret society- where guys with code names – published how security systems could be hacked. They got their thrill this way. They were harmless though-cause they did it for fame in the virtual world.
There is a whole society and a subterranean society in the virtual world: A world with its own language and culture: A world filled with hackers and crackers: A world with no boundaries or geographical contours.

And Joseph Kodiyil is into Information Security Management and Cyber Crime Investigations. He’s got one hellava comfortable chair at home –where he spends most of his waking hours navigating the neural networks of the virtual world- visiting virtual crime scenes, researching exploits and safeguarding the numerous servers that come under his purview.

It all began…..
In the early eighties, as a twelve- year- old kid, Kodiyil was rewriting programs for his computer games so that he could become invincible- so that he would never lose a game. (That was long before cheatcodes were freely available on the Internet.) He later dropped out of an electronics engineering course to research vulnerabilities and got a job with an Internet Hosting company at Bangalore. He began to record and document exploits used to breach the security system of his servers. He would often capture the data packets used for the attacks and file cases at the Cubbon Park Police station but with no IT Act in place then, the cases were dropped. When the Information Technology Act came into place in 2000, the IG at the Corps of Detectives, Bangalore Police asked Joe to train the first batch of officers to the new Cyber Crime Police station. He is now a Technical Consultant and Cyber Crime Investigator under the IT Act 2000 for the Karnataka Police.

``There is a information war going on the virtual world and crackers are up to date with the present day vulnerabilities. If you are unaware about the vulnerabilities in your system, then there is a hacker out there who may be scanning your systems for exploits to either enter your system to get the information or to use your system to hack other systems. Your system can be used for e-mail spoofing, identity theft, etc. And you have to constantly up date patches and check your IT resources for known vulnerabilities. No system is absolutely secure and there may exist a vulnerability in your system. The best way to check for these vulnerabilities is by penetration testing and vulnerability analysis.”

And he also supports the cyber crime cell of the Kochi City Police to track down people who misuse computers for forgery, defamation, black-mail fraud. For Joseph K this is just another game. A game that he loves playing.

A few Dos and Donts for Corporates and Individuals

1. Make your passwords strong and frequently change them. Don't use a dictionary word or a combination of dictionary words as a password. There are programs to break such passwords in a short period of time.

2. Remove unused or unneeded devices like modems, floppy drives USB ports, CD drive etc in a Corporate environment.

3 Have a good firewall.

4 Keep systems updated and Patched.

5 Routinely audit systems and networks (Know your vulnerabilities)

6 Have proper Policies and Follow Secure Practices.

7 Do Not Download applications or accept software, CDROMS etc. from an untrusted source.

8 Educate users in Information Security Knowledge.

9 Encrypt all Wi-Fi Communications otherwise you are susceptible to War Driving. The open wireless networks are extremely vulnerable and a hacker within Wi-Fi range can easily get into your network. Many Wi-Fi users today use open wireless networks without knowing the risks involved

10 Have backups of critical data and systems.

11 Use a good Anti Virus software. Update virus signatures regularly

(First published by The New Indian Express. Changes have been made)


Popular posts from this blog

Free Masons: All about them

Free masonry- the 'spiritual society' of sacred brotherhood with its origins in antiquity has always been shrouded in mystery. Their initiation rites, rituals, symbolisms, secret signs and code of conduct have further enhanced the aura of mysteriousness. Is Free Masonry a remnant of an ancient religion that worshipped the Sun or is it just an exclusive, elitist boy's club that indulges in secret charity missions?
In 1961 the Grand Lodge of India, which is an off -shoot of the Grand Lodges of Scotland, England and Ireland was constituted. The Grand Master of the Grand Lodge of India Mr.Arun Chintopanth was recently here in Kochi to preside over the meeting of the Regional Grand Lodge of Southern India. In an exclusive interview with the Grand Master sought to demystify the Masonic Lodge. Arun Chintopanth in full regalia. Dont miss the apron. What is Free Masonry? It is not a service organisation. It is not a religious group. It is not a mutual benefit society but it is a combi…

Book Review: An Autobiography Of A Sex Worker by Nalini Jameela

I am 51 years old. And I would like to continue to be a sex worker.” This is how the candid and defiant opening statement in Nalini Jameela’s autobiography in Malayalam, Oru Lymgika-thozhilaliyude Atmakadha, goes. It at once throws a challenge at society’s double standards — harsh on prostitutes and soft on the clients. Nalini Jameela, who is the coordinator of the Kerala Sex Workers’ Forum, reveals her sordid story with no trace of compunction.
Nalini was a 24-year-old widow when she entered the profession to feed her two children. At that time she did not think about the repercussions of her act. She writes, “I was earning Rs 4.50 at a tile factory near Trissur. My mother-in-law served me with an ultimatum to either give her five rupees a day to look after my children or leave the house. I recounted my woes to a friend, who introduced me to Rosechechi. Rosechechi promised me Rs 50 if I spent time with a man. The first thought that came to my mind was that my children would be looked…

The Suryanelli Girl: Her Story

Suryanelli: The place of no sun. 
  Roofs weighed down by rock bags to keep the wind from blowing them away
Off the Kerala state highway that connect the small, brash towns giddy with foreign remittances, sits an unassuming, modest home that goes by the name: Lovedale. A septuagenarian couple, a retired postmaster and a retired nurse, live here with their younger daughter and, a ghoulish past that continues to taunt every waking moment of their lives. The 33-year-old daughter smiles shyly revealing an innocence frozen in time. 17 years ago, the daughter, then a 16-year-old girl, had left home wearing a skirt and a blouse to go to school and returned sexually violated and terribly traumatized: her transformation from a carefree school girl to a bloated individual was violently shocking. The girl had been kept captive, fed sedatives and alcohol, traded for sex and raped by 42 men in a span of 40 days in the months of January and February 1996. The family’s tryst with rapists, the police, …