Skip to main content

Data Diddling

Have you heard of data diddling? It is a method adopted by computer criminals.Data diddling is the changing of data before or during entry into the computer system or altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. Using this technique the criminal can manipulate the output and it is not so easy to identify. But using cyber forensic tools we can trace out when the data was changed and changed it back to the original form.


Unknown said…
can you give us some example of the data didling attack?
pmukt said…
This comment has been removed by the author.
Unnikrishnan said…
Sorry for the late response. I will give some real examples of data diddling soon.
hema chandel said…
hack whatsapp phishing pageExcellent article! We are linking to this great article on our website. Keep up the good writing.Hacking BlogsHack Instagram
Rahul said…
Is there any preventive control or compensating control to prevent data diddling?

Popular posts from this blog


In computer networks, a proxy server is a server computer system that acts as an intermediary for requests from client computer systems seeking resources from other servers. A client connects to the proxy server, requesting some service available from a different server. The proxy server evaluates the request according to its filtering rules. A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
An open proxy is a proxy server that is accessible by any Internet user. With an open proxy, however, any user on the Internet is able to use this forwarding service.
An open proxy allows a user to conceal his IP address and thereby help preserve his anonymity and maintain his security while browsing the Web or using other Internet services.
It is possible for a computer to run as an open proxy server without the computer's owner knowing this. This can result from misconfiguration of proxy software runn…

Salami Attacks

An attack on a computer network which involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access; for example, a file that holds their bank account details. A typical salami attack would add a small amount to a debit that the account holder would not check, such as a debit that represented a service charge. This small increase in debit (often a few pence or a few cents) would then be credited to the perpetrator's bank account. An unsophisticated banking system, which just checked that debits and credits matched, would be unable to detect this type of fraud. The name ‘salami attack’ comes from the fact that salami is cut into very thin slices. It is also known as salami shaving.