Blog

Blog

Use of Social Media by LEA

Use of Social Media by LEA

Use of Social Media by LEA Law enforcement agencies, like many other types of organizations, are finding ways to use social media to disseminate information to the public. In fact, police agencies in larger cities are finding that their communities expect them to have an online presence on platforms such as Twitter, Facebook, and YouTube.

Web Jacking

What is Web Jacking ? Illegally seeking control of a website by taking over a domain is known as Web Jacking. It is similar to hijacking. In this kind of attack, the actual website is never touched. Instead, the system (DNS) that resolves website URL to IP address is compromised. The internet works on the

Digital Forgery

What is Digital Forgery ? Creating a fake copy or imitation of a document or an object with the intention to deceive is called forgery. It can involve everything from forging a signature, faking a masterpiece, creating a cheap replica of an expensive original device to faking government documents like a licence, birth certificate etc.

Cyber Pornography

What is Cyber Pornography ? Cyber pornography can be defined as pornographic material designed, published or distributed using cyber space as a medium. In India, viewing digital pornography is not a crime, but creating and distributing such material is. It is legal in most other countries. However, child pornography is illegal in all forms and

War Driving

What is War Driving ? War driving refers to the act of seeking out wi-fi networks by moving around with a computer or smart phone (or any equivalent device) to detect these networks. This in itself is not a crime. However, criminals usually hunt for open wi-fi networks or those with weak passwords that can

Chain of Custody Form

Chain of Custody Form

A chain of custody is chronological documentation for evidence in a particular case.It is the most important document which needs to stand scrutiny of law.Path of a digital evidence from its seizure to end of  case of case is documented. It ensures that the digital artefact was in right hands and was not altered/tmapered on its

Source Code Theft

Source Code Theft

What is source code ? Source code is the blue-print of software. Source code is considered intellectual property. Computer programs or software cannot be created without source code. Source code is something that is generated by the programmer from his own skills and knowledge. Just as a cook is unwilling to share the recipe of

Identity Theft

What is Identity Theft? Impersonating someone without their knowledge by obtaining their personal and/or confidential information is called Identity Theft. What leads to identity theft? A lot of people are tricked into their confidential personal information to criminals by Phishing emails or Social engineering Malware discreetly installed onto your computer without your knowledge may steal

November Issue is Out….

Hi Readers, Thanks for your over whelming support for the inaugural issue of Digital 4n6 Journal.We have come out with the second issue after incorporating all the suggestions given by you. We have given a new look and also changed the size of the Journal and now we can proudly say it is second to