• Browse the Internet Anonymously

    .fullpost{display:inline;} Image Surfing on the net is not as secure as the average internet user may think. Your identity and what you are doing can be monitored easily. This is especially true for those with Wireless networks, those who browse the internet from their work computer and...
  • Malware Infection on Websites

                                                    Malware is a type of software that attempts to steal your personal information or use your computer to do things that you do...
  • Mobile Application Testing

    Technology is evolving faster by the day. Today, we see mobiles are no longer mobiles, they are small computers. The smartphones run powerful applications, providing everything to users at their fingertips. Users can use their mobiles for:Logging in to banks in order to transfer funds Purchasing...

Tuesday, March 22, 2011

It is the most common type of Cyber crime being committed across the world. Hacking has been defined in section 66 of The Information Technology Act, 2000 as follows "whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility...