Vaidehi Sachin / Cattechie - Blog Content Plagiarism

Mon Jul 4 19:39:24 CDT 2011

Vaidehi Sachin, aka Cattechie, maintains several blogs where she posts a variety of content including security related articles. Looking at a small sampling of her posts finds a considerable amount of plagiarized material. Some of her blogs:

The Plagiarism

The following table details portions of her blogs that were taken from other sources. This is not a thorough review of all blog posts, rather a sampling to demonstrate the long-term pattern of plagiarism. In some cases, a blog posting may have used a small amount of material (e.g., several sentences or paragraphs), while others may have been copied in full. Information is included to distinguish not only plagiarized material, but also what was done in an attempt to obscure the original source (e.g., removing text or credit). This shows willful infringement of copyright and/or inexcusable plagiarism.

cattechie.blogspot.com


Date Blog Title Original Source
2011-07-03 Vaidehi Sachin aka Cat Techie the writer of Cyber terror, a favorite target of Indian Hackers.. A stunning exposure on Sonia Gandhi's se.
2011-07-02 We the Indian Cyber Army. Anonymous: Operation NATO
2011-06-27 LulzSec - You are missed by your fans 1. How the media went along for the Lulz Boat ride
2. LulzSec Disbands, But Urges Fellow Hackers to Join the "Revolution"
2011-06-21 #OpIndia Favouring Pakistan? 1. Cyber attack hits India's CBI
2. Pak song sites may be used to hack Indian web
3. More than 3,600 Indian websites were hacked
2011-05-19 Security sandbox program: Defense-in-depth or layered vulnerabilities? Security sandbox program: Defense-in-depth or layered vulnerabilities?
2011-05-05 A hacker is an aesthete? 1. What is a Hacker?
2. How To Become A Hacker
2011-04-15 Cell Phone Tracking Disadvantages Disadvantages of Cell Phone Tracking and GPS Location Services
2011-03-06 Forensics in Cloud Computing 1. Cloud Computing And Computer Forensics
2. Digital Forensic Challenges within Cloud Computing
2011-01-06 How To Tackle evil groups on Facebook 1. Disadvantages of Facebook
2. Facebook Disadvantages


cattechiehacker.blogspot.com


Date Blog Title Original Source
2011-01-02 Jeff Moss sold Black Hat to CMP Media Are US social sites up to the task of spreading freedom?
2011-01-02 What is Cyber-terrorism? What is Cyber-Terrorism?
2011-01-02 Hacker between Wikileaks, attempts at censorship and chaos 27C3: Hacker zwischen Wikileaks, Zensurbestrebungen und Chaos
2010-12-27 CALL FOR CYBER SECURITY An Exclusive Interview with The Hacker News group editor Unix Root


cyberterrors.blogspot.com


Date Blog Title Original Source
2010-11-29 Hacktivism Vs Terrorism Hacktivism Vs Terrorism
2010-11-29 Social engineering- an act of manipulation 1. comment to "Social Engineering: manipulating people">
2.
Wikipedia: Social engineering (security)
3. Black Ops Hynosis - The Art of Manipulating People
2010-11-28 Love and Social Engineering 1. Love in the Time of Malware
2. Social engineering: an ongoing love story
2010-11-25 "The world is lucky we're so nice : Milw0rm" 1. Wikipedia: Milw0rm
2. Milw0rm to Shut Down
2010-11-19 Facebook founder's first website sold at auction Facebook founder's first website sold at auction


cattechiebackup.blogspot.com


Date Blog Title Original Source
2010-12-21 Dell techie's relatives use Facebook for information on killer Dell techie's relatives use Facebook for information on killer
2010-12-21 Facebook founder denies starting the site 'to get girls' Facebook founder denies starting the site 'to get girls'
2010-12-21 E-mail gets an instant makeover E-mail gets an instant makeover
2010-12-17 WikiLeaks: Anonymous hierarchy emerges WikiLeaks: Anonymous hierarchy emerges
2010-10-15 Don't Become a Victim to Computer Crime - Principles to Help Keep You and Your Stuff Safe Don't Become a Victim to Computer Crime - Principles to Help Keep You and Your Stuff Safe



main page ATTRITION feedback