Page 81 - Veritas
P. 81
FEATURE ARTICLES
You wouldn’t really know this until you know your computer system in
and out. Such types of incidents can transmit data from your system to
another person or from another system to your system. When we talk
about data transfer it is not only about information but it could be a set of
instructions. A set of instructions is also known as a software and a soft-
ware can be good and also be bad because a virus is a type of software.
Information technology is a very good day, but as an apple can be eaten
as nutritious food, an apple can be poisoned and used with a wrong in-
tention, in the same manner, information technology can be used in both
ways or the data involved can be used for the right or wrong purposes.
As users of information technology, every individual needs to take care of
what they are doing using this technology, like which site are you visiting,
which applications are you installing, which software are you buying, to
whom are you giving your system for repair or service, to whom you are
giving your mobile phone or computer system to use, what is the type of
transaction that you are doing in your mobile phone, how are you using
your online banking system, etc. All such activities involve the transfer of
data. The data transferred with and from and to your device should not
be misused, should not be tampered with, and should not be stolen. Keep
data safe and keep yourself safe.
Myth - Time of death/Post-mortem interval
(PMI) can only be determined by physical
changes in the body
Fact - Insects can be used to determine the
PMI by studying their life cycle when found
in the body. This is known as forensic
entomology.
66 VERITAS