Covering act Social Media & Section 66A of Indian Cyber Law in ClubHack Magazine

35th December 2012 issue of ClubHack Magazine is just released by magazine team. This issue featuring article on social media & Indian Cyber Law in Legal Gyan section written by Pavan Duggal (Advocate, Supreme Court of India).
By: ClubHack
 
Dec. 16, 2012 - PRLog -- 35th December 2012 issue of ClubHack Magazine is just released by magazine team. This issue featuring article on social media & Indian Cyber Law in Legal Gyan section written by Pavan Duggal (Advocate, Supreme Court of India). Apart from the legal gyan, tech gyan covering 'Rotten to the core…A Roundup on Rootkits', tool gyan covering 'Hijacking Bluetooth Headset' which is successive part of last tools gyan articles & in moms guide you will learn to identify Web Application Vulnerabilities using OWASP ZAP.

Legal Gyan: Social Media & Indian Cyber Law (Pavan Duggal)
In India, there has been a lot of controversy over the last few months over Section 66A of the Indian Cyberlaw being the amended Indian Information Technology Act, 2000 on different occasions. This article aims to explain in common man's language what is Section 66A of the amended Indian Information Technology Act, 2000 all about. This article covers the past cases happened which have fetched the section 66A Indian cyber law, what kind of information you share on social media which can trouble you & lessons you can learn.

Tech Gyan: Rotten to the core…A Roundup on Rootkits (Stefano “Korolev” Maccaglia & Andrea “Felyx_da_Cat” Minghiglioni)
This article takes round up RootKits which is a program that can be installed and hidden on a computer without the knowledge of its user. It can be included in a larger software package, or installed by successfully exploit vulnerabilities or by convincing the victim to execute it by a phishing email.

Tool Gyan: Hijacking Bluetooth Headset (Swaroop D. Yermalkar)
In this article author explains how to hijack bluetooth headset. Demonstration in this article is based on previous tool gyan articles “Bluetooth Reconnaissance – Watching over Invisible and Cloning Bluetooth Device”.

Moms Guide: Identify Web Application Vulnerabilities using OWASP ZAP (Raghu Nath)
After reading this article you will learn to  Identify Web Application Vulnerabilities using OWASP tool ZAP. OWASP Zed Attack Proxy provides an easy to use integrated penetration testing tool for  testing web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Read articles on ClubHack Magazine website:http://www.chmag.in/issue/dec2012
End
Source:ClubHack
Email:***@chmag.in
Tags:Section 66a, Indian Cyber Law, Clubhack Magazine, Rootkits, Hacking Bluetooth
Industry:Computers, Internet
Location:Pune - Maharashtra - India
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse



Like PRLog?
9K2K1K
Click to Share