Legal Gyan: Social Media & Indian Cyber Law (Pavan Duggal)
In India, there has been a lot of controversy over the last few months over Section 66A of the Indian Cyberlaw being the amended Indian Information Technology Act, 2000 on different occasions. This article aims to explain in common man's language what is Section 66A of the amended Indian Information Technology Act, 2000 all about. This article covers the past cases happened which have fetched the section 66A Indian cyber law, what kind of information you share on social media which can trouble you & lessons you can learn.
Tech Gyan: Rotten to the core…A Roundup on Rootkits (Stefano “Korolev” Maccaglia & Andrea “Felyx_da_
This article takes round up RootKits which is a program that can be installed and hidden on a computer without the knowledge of its user. It can be included in a larger software package, or installed by successfully exploit vulnerabilities or by convincing the victim to execute it by a phishing email.
Tool Gyan: Hijacking Bluetooth Headset (Swaroop D. Yermalkar)
In this article author explains how to hijack bluetooth headset. Demonstration in this article is based on previous tool gyan articles “Bluetooth Reconnaissance – Watching over Invisible and Cloning Bluetooth Device”.
Moms Guide: Identify Web Application Vulnerabilities using OWASP ZAP (Raghu Nath)
After reading this article you will learn to Identify Web Application Vulnerabilities using OWASP tool ZAP. OWASP Zed Attack Proxy provides an easy to use integrated penetration testing tool for testing web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Read articles on ClubHack Magazine website:http://www.chmag.in/