Skip to main content

Posts

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) (: Cyber Crime Lows :)

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) (: Cyber Crime Lows :) The CitationInformation Technology Act, 2000Enacted byParliament of IndiaEnacted9 June 2000Assented to9 June 2000Signed9 May 2000Commenced17 October 2000Introduced byPramod Mahajan Minister of Communications and Information TechnologyAmended byIT (Amendment) Act 2008 The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000. The bill was finalised by a group of officials headed by the Minister of Information Technology Pramod Mahajan 68Failure/refusal to comply with ordersImprisonment up to 2 years, or/and with fine up to ₹1,00,00069Failure/refusal to decrypt dataImprisonment up to seven years and possible fine.70Securing access or attempting to secure access to a protected systemImprisonment up to ten years, or/and with fine.71MisrepresentationImprisonment up to 2 years, or/and with fine up to ₹1,00,00072Breach of co...

How to Hack insta..Facebook.. hack social media account andbcrypto account

NOTE: This post is only for educational purpose. I and this website do not support any criminal activity. If you are doing any sort of misuse of this information This website is not responsible for that. THIS YouTube Channel ONLY SUPPORT ETHICAL HACKING. Download Zphisher tool full video.zip 👇👇👇👇👇👇👇👇 Click Here  👈👈👈👈 ☝☝☝☝ Download & after decompress file and watch full video HD quality NOTE: This post is only for educational purpose. I and this website do not support any criminal activity. If you are doing any sort of misuse of this information This website is not responsible for that. THIS YouTube Channel ONLY SUPPORT ETHICAL HACKING. What is Termux Zphisher Phishing Tool? Termux ZPhisher is an Advanced Phishing Tool that allows hackers to perform phishing attacks using termux on their Android phones. This tool is almost similar to the Hidden Eye Tool as well as it also has some features of ADV Phishing Tool. This tool has 30 phishing pages incl...

What is 'fortnite game' that used in Ghaziabad for religious conversion?

What is 'fortnite game' that used in Ghaziabad for religious conversion? Last week, a religious conversion case was reported at the Kavi Nagar Police Station in Ghaziabad, Uttar Pradesh. Two people were named as accused: Shahnawaz Khan alias Baddo, a resident of Thane, Maharashtra, and Nanni alias Abdul Rehman, a maulvi at a mosque in the Sanjay Nagar area. Abdul Rehman has been arrested and further investigation is underway. Police Deputy Commissioner Nipun Agarwal stated that during the investigation, evidence was found linking Abdul Rehman to the conversion of a minor Jain boy and two Hindu boys. Police have seized electronic evidence and affidavits related to the case. The incident came to light when the family of a Jain minor filed a complaint at the Kavinagar police station. The boy's father noticed changes in his behaviour, including covertly leaving the house five times a day, saying he was going to the gym. However, the father discovered that the boy wa...

Shut Down Phishing Attacks – Types, Methods, Detection, Prevention Checklist

Shut Down Phishing Attacks – Types, Methods, Detection, Prevention Checklist In today’s interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as trustworthy entities, phishing attacks deceive users and organizations into divulging sensitive information, such as passwords, financial data, and personal details. Phishing attacks, among the most prevalent techniques cyber criminals employ, can be straightforward yet highly effective. Unlike breaching fortified firewalls and other robust defenses, tricking individuals into clicking malicious links or opening infected attachments is comparatively more straightforward. The objectives of phishing attacks vary, ranging from delivering malware to stealing funds and pilfering credentials. However, exercising sufficient vigilance can detect most attempts to extract personal information. In terms of prevention  Perimeter81 effectively Shut Do...

Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access

Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access The Iranian threat actor known as MuddyWater is continuing its time-tested tradition of relying on legitimate remote administration tools to commandeer targeted systems.

Google Chrome emergency update fixes first zero-day of 2023

Google has released an emergency Chrome security update to address the first zero-day vulnerability exploited in attacks since the start of the year. "Google is aware that an exploit for CVE-2023-2033 exists in the wild," the search giant said in a  security advisory  published on Friday The new version is rolling out to users in the Stable Desktop channel, and it will reach the entire user base over the coming days or weeks. Chrome users should upgrade to version 112.0.5615.121 as soon as possible, as it addresses the CVE-2023-2033 vulnerability on Windows, Mac, and Linux systems. This update was immediately available when BleepingComputer checked for new updates from the Chrome menu > Help > About Google Chrome. The web browser will also automatically check for new updates and install them without requiring user interaction after a restart. ​​Attack details not yet disclosed The high-severity zero-day vulnerability ( CVE-2023...

For all its sophistication and also sheer complexity blockchain know how has remarkable likely like a variety of decentralized record keeping that might be virtually limitless Continue reading to find out many of the lots of execs and drawbacks of Crypto blockchain engineering First the benefits They consist of improved accuracy due to the fact verification doesn't demand human involvement Cost reductions happen because third party verification is eradicated Also decentralization means that it really is a great deal more challenging for points to become tampered with when utilizing this transparent technological innovation The resulting transactions are effective non public and quite secure

For all its sophistication and also sheer complexity blockchain know how has remarkable likely like a variety of decentralized record keeping that might be virtually limitless Continue reading to find out many of the lots of execs and drawbacks of Crypto blockchain engineering First the benefits They consist of improved accuracy due to the fact verification doesn't demand human involvement Cost reductions happen because third party verification is eradicated Also decentralization means that it really is a great deal more challenging for points to become tampered with when utilizing this transparent technological innovation The resulting transactions are effective non public and quite secure There are downsides on the other hand This know how does have some substantial fees involved thinking about the bitcoin mining which has to just take spot Also the amount of transactions for every next is very very low There is vulnerability to hacking and this sort of know how has h...

Verify details of apps before engaging. These apps are learnt to have been hosted from hostile foreign entities. If you are victim of cybercrime #dail1930 & file a complain on www.cybercrime.gov.in

Verify details of apps before engaging. These apps are learnt to have been hosted from hostile foreign entities. If you are victim of cybercrime #dail1930 & file a complain on www.cybercrime.gov.in #cybercrime #cyberdostfactcheck #instantloanapps #lendingapp #mobileapps #googlepay #googleindia 

Offensive Security Tool: dontgo403

Offensive Security Tool: dontgo403 Description DontGo403 by devploit is a tool designed to help Pentesters and Red Teams identify vulnerabilities in web servers that could be exploited to gain unauthorized access to resources. The tool does this by bypassing HTTP error code 403 responses, which are typically used to indicate that a user is not authorized to access a particular resource or webpage. DontGo403, can send multiple requests to a web server, each with a different User-Agent string, to identify a User-Agent string that is not being blocked by the server. By doing so, they can bypass the 403 error code and potentially gain access to restricted resources.

When you're running out of code space sometimes yah's gots to hack Here are some ideas

When you're running out of code space sometimes yah's gots to hack Here are some ideas getting people talking about weird workarounds Some of that discussion has inspired some hackis ideas of my own Also some things I've run into in the past Here're some ideas y'all's welcome to use Judges This is more just a collection of ideas rather than a project of its own not to be considered a contender just some info others might find useful that're a bit too long winded for throwing in the contest's comments section code written in So If you have a project just exceeding 1024 Bytes some of these ideas may be useful for squeezing a little more outta it Before looking here maybe check this document first Thanks Volt in the comments The following may just be utterly ridiculous I'm no expert here And this list is in no way sorted nor all inclusive and may in fact be missing some really important things like using lookup tables rather than math and using direc...