Sunday, October 16, 2011

It can be a real scary if someone hacks and takes full control of your E-mail as it may contain private and sensitive information like bank logins, credit card details and other data. If you are one such Internet user whose email account has been compromised, then this Tip will surely help you out. In this Tip, you will find the possible ways and procedures to get back your hacked email account.

FOR GMAIL:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

FOR YAHOO AND HOTMAIL:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

May you never require this Hacking Tip
Almost all websites ask for your email address when you shop online, download a free software etc. But do you know that this has a chance of affecting your email privacy through Spam emails?
Though most websites don’t use spamming as an email marketing strategy, there are a few that use junk emails that don’t care about anti-Spam laws. Here are some tips to maintain your email privacy from such threats.


Before submitting your email address you need to check the reputation of the company. Reputed websites would normally follow the right email practices to ensure your email privacy. Such companies will never want to loose their hard earned reputation by getting blammed for spamming.

See whether the websites provides email privacy statements. You need to go through these statement in detail, and know about the kind of emails that will be sent to you, how often etc. Based on this you can decide on whether you need such emails. You don’t want to give your email address to some fraud company that is thinking about handing over your email address to hundreds of other websites.

Finally, check whether the website really respects your privacy. Often you will find some text like “I agree to receive email” that comes with a check box. You can agree to receive emails by checking the check box. If the check box is already checked, it is just a good indication that the website doesn’t respect your privacy. So watch out!
Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
All most all of us are too much curious to know a method to send anonymous emails , without letting know our real email id to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo, MSN etc? The answer is YES,
it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.

From: Bill Gates <billg@microsoft.com>
The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.
What is a Relay Server?
In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.
So What’s Next?
Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.
I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own Anonymous Email Sender Script
1. Goto X10 Hosting and register a new account.
2. Download my Anonymous Email Sender Script (sendmail.rar).
3. Login to your FreeWebHostingArea Account and click on File Manager.
4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.
6. Now type the following URL
http://yoursite.x10hosting.com/sendmail.php
NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
7. Use the script to send Anonymous Emails. Enjoy!!!
Tell me whether it worked or not. Please pass your comments…
All most all of us are too much curious to know a method to send anonymous emails , without letting know our real email id to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo, MSN etc? The answer is YES,
it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.

From: Bill Gates <billg@microsoft.com>
The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.
What is a Relay Server?
In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.
So What’s Next?
Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.
I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own Anonymous Email Sender Script
1. Goto X10 Hosting and register a new account.
2. Download my Anonymous Email Sender Script (sendmail.rar).
3. Login to your FreeWebHostingArea Account and click on File Manager.
4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.
6. Now type the following URL
http://yoursite.x10hosting.com/sendmail.php
NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
7. Use the script to send Anonymous Emails. Enjoy!!!
Tell me whether it worked or not. Please pass your comments…
WARNING:
ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.

Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger.

A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.
Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.






Insatalling a Hardware Keylogger to Hack the Email Password

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.








Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

Password Hacking Software, Email Hacking Software, Yahoo Password Hacking Software, Hotmail Password Hacking Software…

Don’t get fooled by these words. Learn the Real of of hacking email passwords. Identify which Hacking Softwares work and which doesn’t.
Most of us are very curious about a software that can hack email passwords. In fact most of the searches about hacking contain the keyword email hacking software or password hacking software. But is it really possible to hack an email using a software? Does there exist a software to hack email passwords? In this post I’ll explain every possible information that you need to know about an email hacking software.

EMAIL HACKING SOFTWARE – EXPLAINED

THINGS YOU SHOULD KNOW BEFORE PROCEEDING
Many sites on the internet claim to sell softwares/programs to hack email passwords. I know most of you are aware of this. These sites also boast that their software can hack email passwords with in minutes. Some sites also claim that they can hack any one’s password for money (say $100). Never believe these sites. They are all scam! I can dare challenge anyone who claims to hack an email, using a software program. In fact when I was a newbie in the field of Hacking, I have spent many sleepless nights in search of an Email hacking software. Finally I ended up only with frustration and nothing more than that. I don’t want my readers to commit the same mistake which I did. So, never believe those scam sites and empty your pockets by spending on useless softwares.
SO, HOW CAN I HACK AN EMAIL PASSWORD ?
The story doesn’t end up here. It is still possible to hack an email password and several opportunities to do that are still open for you. In this post I’ll discuss the easiest way to hack an email password. For this you need not be an expert hacker or have any knowledge of hacking. Yes believe me, it’s possible. All you have to do is just use Keyloggers. Here are some of the Frequently Asked Questions about keyloggers.
What is a keylogger ?
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an email account.
A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. Even though keylogger software is not meant for hacking passwords, you can use them to hack email passwords.
Where is the keylogger program available ?
A keylogger program is widely available on the internet. The of the best one is given below

SniperSpy
Sniperspy can be used either on a Local or Remote computer.
I don’t have physical access to the victim’s computer, can I still hack the password ?
Yes, you can still hack the email using a keylogger software. All you have to do is, just use a keylogger software that has Remote Installation feature. SniperSpy support Remote Installation.
You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the program containing, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.
Why Sniperspy is the best ?
These are some of the advantages of SniperSpy over any other software.
1. Sniper Spy is more reliable than any other keylogger since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. SniperSpy offers excellent support.
3. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.


Cyber Law of India

Section 66 of ITA-2000 which defines "Hacking" has been a subject of discussion particularly from the point of view of its distinctiveness to similar Computer Misuse" provisions in other Country legislations.
This article revisits the section with particular reference to hacking (as per section 66) by Employees, Directors and Partners. It also discusses whether one partner of a firm can allege hacking of the partnership computer by the other partner.

Section 66 of Information Technology Act: Hacking with Computer System
Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking.
Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.

Meaning of "Hacking"
The word "Hacking" is one of the most common words used in the field of Cyber Crimes. In fact it is more or less a generic term used to represent Cyber Crimes.

According to the global understanding, "Hacking" refers to "Unauthorized Access to a Computer Network" which may otherwise be called an "Unauthorized Intrusion".

A finer distinction is made when such "Intrusion" is with a criminal intention of causing harm. In such cases the "Unauthorized Intrusion" may be called "Cracking". On the other hand, access undertaken to check the security vulnerability of a system though Unauthorized, is also called "Hacking" and is considered a part of the IT security testing. Such a Hacker has no intention of causing harm. Some times such hackers also act under the knowledge and permission (without access privileges being shared) of the Information Asset owners.

While it is acceptable for the common man to refer to any Cyber Crime as "Hacking", and International community to accept the Wikipedia/dictionary.com definition of "Hacking", it is important for Cyber Law followers to understand that "Hacking" is the name given by law in India to a specific type of offence as defined in Section 66 of ITA-2000. It is therefore in-correct for us to use the term "Hacking" except as the offence under "Section 66 of ITA-2000".

The definition provided in ITA-2000 for the Section 66 offence which is called "Hacking" is unique since it is distinct from definitions used in other International laws for defining an offence of some what similar nature.
The Computer Misuse Act 1990 of UK defines offences under Section 1,2 and 3 as follows:
Unauthorised access to computer material
1.—(1) A person is guilty of an offence if—
    (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;
    (b) the access he intends to secure is unauthorised; and
    (c) he knows at the time when he causes the computer to perform the function that that is the case.

(2) The intent a person has to have to commit an offence under this section need not be directed at—
    (a) any particular program or data;
    (b) a program or data of any particular kind; or
    (c) a program or data held in any particular computer.

(3) A person guilty of an offence under this section shall be liable on summary conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale or to both.

Unauthorised access with intent to commit or facilitate commission of further offences.

2.—(1) A person is guilty of an offence under this section if he commits an offence under section 1 above ("the unauthorised access offence") with intent—
    (a) to commit an offence to which this section applies; or
    (b) to facilitate the commission of such an offence (whether by himself or by any other person);
and the offence he intends to commit or facilitate is referred to below in this section as the further offence.

(2) This section applies to offences—

    (a) for which the sentence is fixed by law; or
    (b) for which a person of twenty-one years of age or over (not previously convicted) may be sentenced to imprisonment for a term of five years (or, in England and Wales, might be so sentenced but for the restrictions imposed by section 33 of the [1980 c. 43.] Magistrates' Courts Act 1980).
(3) It is immaterial for the purposes of this section whether the further offence is to be committed on the same occasion as the unauthorised access offence or on any future occasion.

(4) A person may be guilty of an offence under this section even though the facts are such that the commission of the further offence is impossible.

(5) A person guilty of an offence under this section shall be liable—

    (a) on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both; and
    (b) on conviction on indictment, to imprisonment for a term not exceeding five years or to a fine or to both.

Unauthorised modification of computer material.
    3.—(1) A person is guilty of an offence if—
      (a) he does any act which causes an unauthorised modification of the contents of any computer; and
      (b) at the time when he does the act he has the requisite intent and the requisite knowledge.
    (2) For the purposes of subsection (1)(b) above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing—
      (a) to impair the operation of any computer;
      (b) to prevent or hinder access to any program or data held in any computer; or
      (c) to impair the operation of any such program or the reliability of any such data.
    (3) The intent need not be directed at—
      (a) any particular computer;
      (b) any particular program or data or a program or data of any particular kind; or
      (c) any particular modification or a modification of any particular kind.
    (4) For the purposes of subsection (1)(b) above the requisite knowledge is knowledge that any modification he intends to cause is unauthorised. (5) It is immaterial for the purposes of this section whether an unauthorised modification or any intended effect of it of a kind mentioned in subsection (2) above is, or is intended to be, permanent or merely temporary. (6) For the purposes of the [1971 c. 48.] Criminal Damage Act 1971 a modification of the contents of a computer shall not be regarded as damaging any computer or computer storage medium unless its effect on that computer or computer storage medium impairs its physical condition. (7) A person guilty of an offence under this section shall be liable—
      (a) on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both; and
      (b) on conviction on indictment, to imprisonment for a term not not exceeding five years or to a fine or to both

Under Section 1 above, offence is recognized when a person knowingly manipulates a computer to gain accesses to a computer without authority. The requirement focuses on the intention to gain access to data even if the person does not have any knowledge of what kind of data he is likely to access. Section 2 covers instances where the gaining of access is to commit an act otherwise declared as an offence in any other statute. Section 3 covers instances where there is "unauthorised modification of data" with intent and knowledge.

Similar provisions are provided in the Computer Misuse Act 1994 of Singapore.
It must be remembered that these definitions of Cyber Crime were already available for reference when the Indian ITA-2000 was drafted and were in fact extensively consulted before the draft of the act was finalised.
Hence the drafting of Section 66 with certain differences were deliberate and intentional though some who think everything foreign is always correct may still want the Indian law to be amended to copy the laws prevalent say in UK or Singapore.

While the undersigned has been suggesting the removal of the name of section 66 crime as "Hacking" to avoid this confusion, it is considered that the rest of the section as it stands is very purposeful and needs to be retained.

Indian Definition More Purposeful
What makes Sec 66 more purposeful than other attempts of defining "Computer Misuse" or "Hacking" is that the focus of Section 66 is "Information Residing Inside a Computer" and what happens to it.
It recognizes "Diminishing of Value" and "Injurious Effect" of the Information residing inside a computer. Ofcouse it also mentions the more obvious "Destruction", "Deletion" and "Alteration".

Any Means
It is immaterial as far as Section 66 is concerned, how the injurious effect on the information was brought about. It could have been by causing the computer to behave a particular fashion either by a "virus like" programme or by simply breaking the hard disk. It could even be by bringing a powerful magnetic force near the computer so that the hard disk gets corrupted or causing a wide fluctuation in the voltage to cause the hard disk to malfunction.

Knowledge Without Intention
We may also observe that as regards the "intention", the section states "..with the intent to cause or knowing that he is likely to cause..". From the choice of the words, it is clear that the section is attracted even when there is no "intention" but only "knowledge of likelyhood of a loss ". The reason why the "mens rea" has been ignored is that the "Technology" is a sophisticated tool and any person using the technology has to be responsible and ensure that the world around is not adversely affected by their negligent use. Hence it was proposed that a technologist with knowledge that a certain action is likely to create harm to information will be liable if the damage occurs even when he may contend that he had no such intention. The onus of proving innocence (It was not likely under the circumstances that the disputed action would result in harm) is therefore put on the technology user and not on the community or the Information asset owner.

What is Wrongful Loss?
The section 66 gets attracted whenever there is a "Wrongful loss" to "public or any person".
The word "Wrongful Loss" is not defined in ITA-2000. It is therefore to be interpreted in the given context with reference to the objective of this law.
IPC, (Section 23 ) attempts to define "Wrongful gain" and "Wrongful loss" as follows.
"Wrongful gain"
"Wrongful gain" is gain by unlawful means of property which the person gaining is not legally entitled.
"Wrongful loss"- "Wrongful loss" is the loss by unlawful means of property to which the person losing it is legally entitled.
Gaining wrongfully, losing wrongfully- A person is said to gain wrongfully when such person retains wrongfully, as well as when such person acquires wrongfully. A person is said to lose wrongfully when such person is wrongfully kept out of any property as well as when such person is wrongfully deprived of property.
While the general principle of "Wrongful loss" can be derived from here, it is necessary to remember that the vision of IPC was limited to "Physical Property" and hence the meaning of "Deprivation" here is to "physically being prevented from the enjoyment of the proprty". This goes with the other concepts of "Theft" of movable property or "Tresspass" on an immovable property. In the context of ITA-2000 we need to look at how this provision has to be applied to "Virtual Properties" which even when stolen (ie copied), does not deprive the original owner of the property and even when tresspassed, allows others to simultaneously view and enjoy the same electronic document (eg: a Website document space which is simultaneously occupied by many).
Hence the meaning of "Wrongful loss" for the purpose of Section 66 of ITA-2000 cannot be limited to the available definition under IPC just for the reason that the phrase is similar. Also Section 66 itself provides the direction in which we may think to find a definition for "Wrongful Loss". For example, "Diminution in value or utility" of an "Information Asset" is "Wrongful loss" in the Information world. The value of this definition can be seen from the fact that "When a Confidential Information is viewed by an unauthorized person, i.e, when the confidentiality is compromised, we can say that its value and utility has diminished.. Similarly, due to a "Trojan activity" or a "Denial of Service Attack", the functioning of certain information assets is slowed down, then the utility of the asset has been diminished. Similarly, the word "Affecting it injuriously" can also be interpreted in several dimensions.

The Victim under Section 66
One more subtle point of discussion about the section is about "Who should suffer the wrongful loss" to make the section operable. According to the section it could be "Public or any person". The use of the word "or" in conjunction with the word "person" indicates that it refers to somebody who cannot be treated as "public" in the given context.
This fine distinction provided in the section is very important from the point of view of "Information Security". For example, in a E-Commerce world, information may be injured both in public domain or in private domain. Private domain here means the internal network of a company or a computer resource of an organization. It can also be a single laptop computer. Wrongul loss can occur to one employee of an organization, one Director of a Company or One Partner of a firm. These are the "persons" who come under the category of "Persons other than the public".
If therefore a wrongful loss occurs to a Director or Partner of a business entity due to destruction, deletion, alteration, diminution in value or injurious damage of information residing in a computer, then section 66 is invoked.

Offence by an Authorized person
The next question which we some times come across is that if an authorized employee of a company is involved in causing the damage, can it be excluded from the definition of the offence since it was not an "Unauthorized Activity".
In the UK type definitions, it is possible to envisage situations where the damage to the information has arisen from the actions of an authorized employee which may not amount to an offence. The thin line that needs to be drawn in this case is " A person may be authorized to make some modifications, but the one he is now accused of is a modification which is not authorized". For example, a person may be authorized to maintain a data base of people in which periodical changes in the address has to be noted. He is for the purpose of this operation "Authorized". However he makes the modification but enters a "Wrong Address" for some record. In this connection, he is authorised to make the change in address but not authorised if the change sought to be made is erroneous.

We note that the Indian definition of Sec 66 offence does not lend itself to such convoluted arguments. Here the point to be established is "Has the information been injured? diminished in value?".. Since the answer is in the affirmative when the address is changed erroneously, irrespective of whether there is authority or not the offence is recognized. This is one of the strong points of Sec 66 when it comes to "Data Protection" which is sought to be diluted in the proposed amendments. (Can we say by the lack of attention to details by the expert committee?).

What is discussed above in respect of an employee also holds good in the case of "Partners" of a partnership firm when one partner injures information residing inside the computer causing a wrongful loss to the other person. Just as in the case of a joint account in a Bank, one of the joint account holders can cheat the other joint account holder though both appear to be the owners of the money or when one joint owner of a property can cheat the other joint owner, one partner of a firm can commit "hacking under section 66" against the other partner though both of them jointly own the information. This can typically happen when the partnership business is run jointly while the information system is under the control of one of the partners.
In case there is a situation where the act of "Hacking" by one partner damages the partnership firm also, a question may be raised whether it is not infeasible for some body to "Hack on himself".

This needs to be answered with reference to two possibilities. First is "Can a person commit an offence on himself". If we take the example of "An attempt to commit suicide" as an offence, it is clear that law does recognize commission of crime on oneself. Secondly, if a person injures himself for the purpose of making some body else responsible for the consequences, the act can be considered as an offence and cannot be defended with the argument "How can a person commit an offence on himself?
It is therefore clear that it is possible that one owner of a system (or information) can commit hacking under Section 66 against another joint owner.

Thus, we can observe that Section 66 of ITA-2000 has a far wider dimension than the definition of computer misuse as an offence in the British law. It is therefore prudent to retain it in the present form than to dilute it only to cases of "Unauthorised Actions". Any exceptional cases where a person is wrongly accused of hacking under section 66 can be handled under the provision of protection and exemptions given to people who practice "Due Diligence".


We always wish to close all the open applications at the end of the day. Since Our habbits are of rarely rebooting our desktop, we manually close each application. Depending on the number of open applications this can be a waste of time.

Thus, The people at NTWind Software have a perfect utility for this situation aptly called Close All Windows. Rather than manually closing each application, Only click the Close All Windows button on your taskbar.



In this article, We will show you how to install and configure Close All Windows on your computer for easy access on the taskbar.
To get started head over to NTWind Software and download the latest version of Close All Windows.
After the file is downloaded extract the CloseAll folder to a permanent location on your computer. Since Close All Windows is an application I extracted the folder to C:\Program Files\ where applications are typically installed.










For easy access it is best to pin the application to the taskbar. Drag the Close All Windows application from the CloseAll folder onto the taskbar.











Hey, You are now most efficient. Keep Enjoying.

Saturday, October 15, 2011

Hackzap funny trick

Hai Everybody.............

This simple joy trick on google...............lets Enjoy..........

step:1 goto www.google.co.in
step:2 type google gravity
step:3 click i'm feeling lucky

Then Enjoy the funny..............Let try.......................ok

Tuesday, October 11, 2011

This program will get or read the current system date from the system. It displays Year, Month and Day.

#include
#include

int main(void)

{
struct date d;
getdate(&d);
printf(“The current year is: %dn”, d.da_year);
printf(“The current day is: %dn”, d.da_day);
printf(“The current month is: %dn”, d.da_mon);
return 0;
}