Skip to main content

Posts

Showing posts from June, 2023

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) (: Cyber Crime Lows :)

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) (: Cyber Crime Lows :) The CitationInformation Technology Act, 2000Enacted byParliament of IndiaEnacted9 June 2000Assented to9 June 2000Signed9 May 2000Commenced17 October 2000Introduced byPramod Mahajan Minister of Communications and Information TechnologyAmended byIT (Amendment) Act 2008 The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000. The bill was finalised by a group of officials headed by the Minister of Information Technology Pramod Mahajan 68Failure/refusal to comply with ordersImprisonment up to 2 years, or/and with fine up to ₹1,00,00069Failure/refusal to decrypt dataImprisonment up to seven years and possible fine.70Securing access or attempting to secure access to a protected systemImprisonment up to ten years, or/and with fine.71MisrepresentationImprisonment up to 2 years, or/and with fine up to ₹1,00,00072Breach of co...

How to Hack insta..Facebook.. hack social media account andbcrypto account

NOTE: This post is only for educational purpose. I and this website do not support any criminal activity. If you are doing any sort of misuse of this information This website is not responsible for that. THIS YouTube Channel ONLY SUPPORT ETHICAL HACKING. Download Zphisher tool full video.zip 👇👇👇👇👇👇👇👇 Click Here  👈👈👈👈 ☝☝☝☝ Download & after decompress file and watch full video HD quality NOTE: This post is only for educational purpose. I and this website do not support any criminal activity. If you are doing any sort of misuse of this information This website is not responsible for that. THIS YouTube Channel ONLY SUPPORT ETHICAL HACKING. What is Termux Zphisher Phishing Tool? Termux ZPhisher is an Advanced Phishing Tool that allows hackers to perform phishing attacks using termux on their Android phones. This tool is almost similar to the Hidden Eye Tool as well as it also has some features of ADV Phishing Tool. This tool has 30 phishing pages incl...

What is 'fortnite game' that used in Ghaziabad for religious conversion?

What is 'fortnite game' that used in Ghaziabad for religious conversion? Last week, a religious conversion case was reported at the Kavi Nagar Police Station in Ghaziabad, Uttar Pradesh. Two people were named as accused: Shahnawaz Khan alias Baddo, a resident of Thane, Maharashtra, and Nanni alias Abdul Rehman, a maulvi at a mosque in the Sanjay Nagar area. Abdul Rehman has been arrested and further investigation is underway. Police Deputy Commissioner Nipun Agarwal stated that during the investigation, evidence was found linking Abdul Rehman to the conversion of a minor Jain boy and two Hindu boys. Police have seized electronic evidence and affidavits related to the case. The incident came to light when the family of a Jain minor filed a complaint at the Kavinagar police station. The boy's father noticed changes in his behaviour, including covertly leaving the house five times a day, saying he was going to the gym. However, the father discovered that the boy wa...

Shut Down Phishing Attacks – Types, Methods, Detection, Prevention Checklist

Shut Down Phishing Attacks – Types, Methods, Detection, Prevention Checklist In today’s interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as trustworthy entities, phishing attacks deceive users and organizations into divulging sensitive information, such as passwords, financial data, and personal details. Phishing attacks, among the most prevalent techniques cyber criminals employ, can be straightforward yet highly effective. Unlike breaching fortified firewalls and other robust defenses, tricking individuals into clicking malicious links or opening infected attachments is comparatively more straightforward. The objectives of phishing attacks vary, ranging from delivering malware to stealing funds and pilfering credentials. However, exercising sufficient vigilance can detect most attempts to extract personal information. In terms of prevention  Perimeter81 effectively Shut Do...