Hi Logan
I will try my best for today.
Kind regards
Ash
Sent from my iPhone
> On Aug 24, 2015, at 7:55 AM, Loganaden Velvindron <loganaden_at_gmail.com> wrote:
>
>
>
>> On Sun, Aug 23, 2015 at 5:35 PM, I Govind <igovind21_at_yahoo.co.uk> wrote:
>> Hi SM
>>
>> Thank you for your email.
>>
>> I will review and get back to you in due course.
>>
>> kind regards
>> Ash
>
> Dear Ash,
>
> I would be grateful, if you could get back to me, concerning the previous mail I sent, as I'm concerned regarding that clause.
>
> I work in the security field, and I often have to deal with viruses and the likes that I study in order to develop counter-measures.
>
> (My example in the previous shows how I studied a published vulnerability, and developed a small program that can be used with nmap to identify vulnerable devices on my network. I'm not the only person doing that in Mauritius, as several IT professionals do security auditing of their servers that way).
>
>
>>
>> On Sunday, 23 August 2015, 1:30, S Moonesamy <sm+mu_at_elandsys.com> wrote:
>>
>>
>> Hi Ashweenee,
>>
>> I did a review of the paper on changes to Book III of Criminal Code (
>> http://www.elandsys.com/~sm/changes-book-iii-criminal-code-cybercrime-review.html
>> ). I would like to have your feedback about that.
>>
>> Regards,
>> S. Moonesamy
>
Received on Tue Aug 25 2015 - 02:29:24 PST