Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

Popular Copywriting Exchange
The copywriting profession is becoming increasingly popular among novice freelancers. Accordingly, the number of sites providing them with a field for activity, that is, exchanges, is growing. Experienced copywriters know…

Continue reading →

The whole truth about the & nb p; Network
In no country in the world is a well-known software maker reconciled with the emergence of domains, including its name or trademarks belonging to it. This was the case with…

Continue reading →

Hacking sites and CC

It’s no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary, have only superficial knowledge. Their tools are utilities written by other people and accompanied by detailed instructions on how to exploit the most common vulnerabilities. However, they both pose a threat to many sites.

Replace the main page of your own, get access to information from the database of the web server, destroy the contents of the site … This is just a small list of what hackers can do. Naturally, all these actions are illegal, and in the case of the capture of the attacker, he will appear before the court. Let us, dear readers, try to find out today what punishment hackers can incur for their activities. And many “script kids” are even surprised when they are charged with something. For some reason, many people believe that the Internet is an environment of lawlessness and permissiveness.
The Criminal Code of the Russian Federation has a special computer chapter.

In general, when it comes to computer crimes, the 28th chapter of the Criminal Code of the Russian Federation immediately comes to mind. It regulates the punishment of all offenses in the field of high technologies. In our case, the hacker, if, of course, he is caught and proved guilty, will be charged with article 272 of the Criminal Code of the Russian Federation, which is called “Illegal access to computer information.” It reads as follows: “Wrongful access to computer-protected information, that is, information on computer media, in an electronic computer, a computer system, or their network, if this act resulted in the destruction, blocking, modification or copying of information, disruption Computer, computer system or their network – shall be punished with a fine in the amount of from two hundred to five hundred minimum wages or in the amount of the salary or other income of the convicted person for a period from two to five months, or by correctional measures work for a period of six months to one year, or imprisonment for up to two years. ” Moreover, the attacker can be punished on it even if he didn’t do anything wrong, but only read the classified information. After all, reading data from the Internet can not do without copying it to the user’s computer. Under the same article, the organizer of DDoS attacks, which in its essence is a violation of the computer (remote server), can be punished.

Many lawyers believe that hackers can incriminate articles not only from the 28th, but also from other heads of the Criminal Code of the Russian Federation

However, many lawyers express the opinion that hackers responsible for hacking websites should be judged not only by the computer head of the Criminal Code, but also by other parts of it. Naturally, to prove the guilt of the defendant in this case is much more difficult. But if it is done after all, then the punishment of the hacker will be seriously increased. Indeed, in all honesty, we must admit that the legislation in force in our country is rather soft on IT criminals. This is especially true given the enormous importance that computers and computer information have acquired lately.

First, let’s look at the simplest example. Suppose a hacker hacked into a website and changed its home page to its own. At the same time, it does not matter much which web project was the victim (government site, corporate web server or home page). After all, they are all equally accessible to all visitors to the global network. Naturally, the degree of guilt and, accordingly, the punishment may depend on the level of attendance of the hacked site. But the “fork” will still be determined by the articles of the Criminal Code, which the hacker violated.

Many hackers can be punished under Article 213 of the Criminal Code of the Russian Federation for hooliganism

For example, a rather characteristic behavior of “scripted children” is the placement on the main page of a project-victim of obscene pictures or foul language. In real life, such actions fall under Article 213 of the Criminal Code of the Russian Federation. It reads as follows: “Hooliganism, that is, a gross violation of public order, expressing obvious disrespect for society, accompanied by the threat of violence, as well as destruction or damage to someone else’s property, is punishable by compulsory work for a period of one hundred and twenty to one hundred and eighty hours, or correctional work a term of six months to one year, or arrest for a term of four to six months, or imprisonment for a term of up to two years. ” If this crime is committed by a group of persons in a preliminary conspiracy (several students created a hacker group), then the punishment will be significantly stricter.

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...

An article on the subject of Internet "Interesting in the network" Your online office of the Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

...