Tags » Ethical Hacking

Debian Linux as a gateway & iptables firewall.

Debian Linux as a Gateway/Router

In this demonstration I am going to take a regular Debian Linux installation and turn it into a gateway making a virtual machine server and a client communicate through the gateway. 1,791 more words

Computers

Offences and Penalties under IT ACT 2000

1. Section 65
Offence: Tampering with Data
Penalty: – Three Years Punishment or Two Lakh rupees charge or both 2. Section 66E 440 more words

Indian Cyber law

India IT ACT 2000

The Information Technology Act, 2000 was passed as the Act No. 21 of 2000, got approval
on 9th June and was made effective from 17th October 2000. 640 more words

Introduction to Cyber Law Crime

Crime is Historical. It is from past which involves illegal Activities such as theft, fraud,
forgery etc. Abuse of computers has given birth to new Crime as Cybercrimes. 183 more words

IT ACT 2008

Known as ITAA, 2008 was passed by the parliament on December 23, 2008 in 26 minutes.
It focuses mainly on Section 67, Section 69, Section 69A and Section 69B. 421 more words

Ethical Hacking for beginners

My first book on Ethical Hacking is now available in Lanpub and Amazon.


here are the Contents:

Prologue
Introduction
What is Ethical Hacking?
How You Can Use Many Tools?
3,719 more words

Kali Linux

Potential Security Threats To Your Computer Systems

A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify security threats is the first step in protecting computer systems. 627 more words

Ethical Hacking