1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
CHMag Logo

Covering act Social Media & Section 66A of Indian Cyber Law in ClubHack Magazine

35th December 2012 issue of ClubHack Magazine is just released by magazine team. This issue featuring article on social media & Indian Cyber Law in Legal Gyan section written by Pavan Duggal (Advocate, Supreme Court of India).

 
 
Clubhack Magazine December 2012
Clubhack Magazine December 2012
PRLog - Dec. 16, 2012 - 35th December 2012 issue of ClubHack Magazine is just released by magazine team. This issue featuring article on social media & Indian Cyber Law in Legal Gyan section written by Pavan Duggal (Advocate, Supreme Court of India). Apart from the legal gyan, tech gyan covering 'Rotten to the core…A Roundup on Rootkits', tool gyan covering 'Hijacking Bluetooth Headset' which is successive part of last tools gyan articles & in moms guide you will learn to identify Web Application Vulnerabilities using OWASP ZAP.

Legal Gyan: Social Media & Indian Cyber Law (Pavan Duggal)
In India, there has been a lot of controversy over the last few months over Section 66A of the Indian Cyberlaw being the amended Indian Information Technology Act, 2000 on different occasions. This article aims to explain in common man's language what is Section 66A of the amended Indian Information Technology Act, 2000 all about. This article covers the past cases happened which have fetched the section 66A Indian cyber law, what kind of information you share on social media which can trouble you & lessons you can learn.

Tech Gyan: Rotten to the core…A Roundup on Rootkits (Stefano “Korolev” Maccaglia & Andrea “Felyx_da_Cat” Minghiglioni)
This article takes round up RootKits which is a program that can be installed and hidden on a computer without the knowledge of its user. It can be included in a larger software package, or installed by successfully exploit vulnerabilities or by convincing the victim to execute it by a phishing email.

Tool Gyan: Hijacking Bluetooth Headset (Swaroop D. Yermalkar)
In this article author explains how to hijack bluetooth headset. Demonstration in this article is based on previous tool gyan articles “Bluetooth Reconnaissance – Watching over Invisible and Cloning Bluetooth Device”.

Moms Guide: Identify Web Application Vulnerabilities using OWASP ZAP (Raghu Nath)
After reading this article you will learn to  Identify Web Application Vulnerabilities using OWASP tool ZAP. OWASP Zed Attack Proxy provides an easy to use integrated penetration testing tool for  testing web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Read articles on ClubHack Magazine website:http://www.chmag.in/issue/dec2012

Photo:
http://www.prlog.org/12044008/1

--- End ---

Click to Share

Contact Email:
***@chmag.in
Source:ClubHack
City/Town:Pune - Maharashtra - India
Industry:Computers, Internet
Tags:section 66a, indian cyber law, clubhack magazine, rootkits, hacking bluetooth
Shortcut:prlog.org/12044008
Disclaimer:   Issuers of the press releases are solely responsible for the content of their press releases. PRLog can't be held liable for the content posted by others.   Report Abuse

Latest Press Releases By “

More...

Trending News...



  1. SiteMap
  2. Privacy Policy
  3. Terms of Service
  4. Copyright Notice
  5. About
  6. Advertise
Like PRLog?
9K2K1K
Click to Share