Donations

BTC: bc1qxv3stg0xha9upurf7h4aqnmg3xjn3h0zk28kpe

ETH: 0x01870296774Fb0A2DbF9b44d2E6a57fb8Ccea070

LTC: LQ44CP6xDDkX5bAiKd3yqmDB4c23U7orrQ

DOGE: DCpu9v1bkTXj8VKUDG97LHdV2qipDPyZsR

ADA: addr1qx4q7348dv2ju5zshee9ru23ssmqhyyjlnxe0xlezjq5we42par2w6c49eg9p0nj28c4rppkpwgf9lxdj7dlj9ypganqtmuu2p

domingo, 28 de maio de 2023

What is cyber crime?

Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online  bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.

TYPES OF CYBERCRIME

The following list presents the common types of cybercrimes-

1-Computer Fraud-Intential deception for personal gain via the use of computer system.

2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.

3-Identity theft-Stealing personal information from somebody and impersonating that person.

4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.

5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.

6-Electronic money laundering-This involves the use of the computer to launder money.

7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.

8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9-Spam:sending unauthorized emails.
These emails usually contain advertisements.


CYBER LAW

Under The Information Technology Act,2000 
CHAPTER XI-OFFENCES-66. Hacking with computer system.

1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

2-whoever commits hacking shell be punished with imprisonment up to three years, or  with fine which may extend up to two lakh rupees,or with both.
More information
  1. Hack Tools For Ubuntu
  2. Usb Pentest Tools
  3. Hack Rom Tools
  4. Hack Tools For Ubuntu
  5. Hack Website Online Tool
  6. Best Pentesting Tools 2018
  7. New Hack Tools
  8. Pentest Tools Bluekeep
  9. Hacker Tools Mac
  10. Hacker Tools Windows
  11. Pentest Tools Apk
  12. Pentest Tools Linux
  13. Pentest Tools Online
  14. Pentest Tools Windows
  15. Android Hack Tools Github
  16. How To Hack
  17. Pentest Tools Framework
  18. Top Pentest Tools
  19. Pentest Tools For Ubuntu
  20. Hack Apps
  21. Underground Hacker Sites
  22. Pentest Tools Linux
  23. Hacker Tools For Ios
  24. Hacker Tools
  25. Pentest Tools For Android
  26. Best Hacking Tools 2020
  27. Hacking Tools Hardware
  28. Nsa Hack Tools Download
  29. Pentest Tools Tcp Port Scanner
  30. Nsa Hack Tools Download
  31. Pentest Tools Linux
  32. Pentest Tools Framework
  33. Hacker Hardware Tools
  34. Pentest Tools Apk
  35. Hackrf Tools
  36. Hacker Security Tools
  37. Nsa Hacker Tools
  38. How To Make Hacking Tools
  39. What Are Hacking Tools
  40. Hacking Tools Github
  41. Hacking Tools For Windows
  42. Pentest Tools For Ubuntu
  43. Pentest Tools Review
  44. Hack Tools For Windows
  45. Pentest Tools Port Scanner
  46. Hacker Techniques Tools And Incident Handling
  47. Pentest Tools Website Vulnerability
  48. Nsa Hacker Tools
  49. Hacker Tools For Windows
  50. Hacking Tools Software
  51. Hack Apps
  52. Hacking Tools For Windows 7
  53. Hacking Tools For Games
  54. Pentest Tools Linux
  55. Pentest Tools Download
  56. Hacking Apps
  57. Hacker Tools For Mac
  58. Pentest Tools Linux
  59. Pentest Tools Nmap
  60. Tools For Hacker
  61. Pentest Tools Open Source
  62. Pentest Tools Subdomain
  63. Hacker Tools 2020
  64. Hacking Tools Software
  65. Usb Pentest Tools
  66. Pentest Tools Find Subdomains
  67. Pentest Tools Nmap
  68. Hacking Tools Hardware
  69. Beginner Hacker Tools
  70. Hacking Tools Usb
  71. Hack Tools For Games
  72. Hack Tools
  73. Tools Used For Hacking
  74. Pentest Tools For Windows
  75. Hack Tool Apk No Root
  76. Underground Hacker Sites
  77. Computer Hacker
  78. Pentest Tools Port Scanner
  79. Hacking Tools Usb
  80. Hacker Tools Linux
  81. Hacks And Tools
  82. Pentest Tools For Mac
  83. Hacking Tools 2020
  84. Hackers Toolbox
  85. Hackrf Tools
  86. Hack Tool Apk
  87. Hackers Toolbox
  88. Android Hack Tools Github
  89. Underground Hacker Sites
  90. Game Hacking
  91. Usb Pentest Tools
  92. Pentest Tools Apk
  93. Github Hacking Tools
  94. Hacker Hardware Tools
  95. How To Hack
  96. Hacker Tools Software
  97. Pentest Tools For Android
  98. Hacking Tools For Games
  99. Hacker Tools Windows
  100. Best Hacking Tools 2020
  101. World No 1 Hacker Software
  102. World No 1 Hacker Software
  103. Hacking Tools For Windows
  104. Hacking Tools Github
  105. Hacking Tools Hardware
  106. Pentest Box Tools Download
  107. Best Hacking Tools 2019
  108. Hack Tools For Pc
  109. Game Hacking
  110. Pentest Tools For Ubuntu
  111. What Are Hacking Tools
  112. Hacking Tools Kit
  113. Hacking Tools Usb
  114. Hack Tools 2019
  115. Hacker Tools Github
  116. Game Hacking
  117. Hacker Tools For Pc
  118. Best Hacking Tools 2019
  119. What Is Hacking Tools
  120. Hacker Search Tools
  121. Hacking Tools And Software
  122. Hacking Tools For Games
  123. Hacking Tools Kit
  124. Hackrf Tools
  125. Pentest Tools Find Subdomains
  126. Hacking Tools Download
  127. Hacking Apps
  128. Hack App
  129. Tools For Hacker
  130. Hak5 Tools
  131. What Are Hacking Tools
  132. Hack Tools
  133. Tools For Hacker
  134. Hack Tools Github
  135. Hacking App
  136. Pentest Tools Apk
  137. Hacking App
  138. How To Install Pentest Tools In Ubuntu
  139. Hacking Tools Hardware
  140. Hack Tools For Windows

0 comentários:

Postar um comentário

Donations

BTC: bc1qxv3stg0xha9upurf7h4aqnmg3xjn3h0zk28kpe

ETH: 0x01870296774Fb0A2DbF9b44d2E6a57fb8Ccea070

LTC: LQ44CP6xDDkX5bAiKd3yqmDB4c23U7orrQ

DOGE: DCpu9v1bkTXj8VKUDG97LHdV2qipDPyZsR

ADA: addr1qx4q7348dv2ju5zshee9ru23ssmqhyyjlnxe0xlezjq5we42par2w6c49eg9p0nj28c4rppkpwgf9lxdj7dlj9ypganqtmuu2p