.Cybersquatting is the practice by means of which a person or legal entity books up the trade mark, business name or service mark of another as his own domain name for the purpose of holding on to it and thereafter selling the same domain name to the other person for valuable premium and consideration. Cyber […]
What happen if there is a conflict between an internet domain name and an existing trade mark?
Even if a company owns a registered trademark, someone else may still have the right to the domain name. Sometimes a person (known as a “cyber squatter”) registers a trademark as a domain name hoping to later profit by reselling the domain name back to the trademark owner. If you believe that someone has taken […]
Can we register the Domain name? And where.
Yes, today anyone can register a domain name that is vailable for purchase and doses not infringe any third party’s rights. The domain names were initially registered by Network Solutions only, that had the sole monopoly to register the said TLDs (Top Level Domain Name). This monopoly of Network Solutions continued for many years and […]
What is a domain name?
Since it is not possible to remember each and every numerical value of an IP address, the system of domain names evolved. Domain names are the alphabetic names used to refer to computers on the Internet. A web site address, including a suffix such as .com, .org, .gov or .edu comprises a domain name. The suffix […]
What do you mean by phishing?
Phishing is the criminal and fraudulent act of attempting to acquire sensitive information such as usernames, password and credit card details by masquerading as a trustworthy entity or person in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure […]
What is an IP spoofing?
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and […]
What is an I.P address?
The word I.P stands for Internet Protocol Address. It is a unique number consisting of four parts separated by dots, e.g. 151.164.1.6. Every machine that is on the Internet has a unique IP number, if a machine does not have an IP number; it is not really on the Internet. The IP address is just […]
What are the various types of cyber crimes?
Cyber crimes can be classified into 3 major categories such as a) Crime against government such as cyber terrorism. b) Crime against persons such as cyber pornography, cyber stalking, cyber defamation c) Crime against property such as online gambling, intellectual property infringement, phishing, credit card frauds.
What are the various modes or manners of committing Cybercrime?
There are various modes or methods by which cyber crime can be committed such as Unauthorized access to computer systems or networks / Hacking Theft of information contained in electronic form Email bombing Data diddling Salami attack Denial of Service attack Virus / worm attacks Logic bombs Internet time thefts
What is cyber crime?
Any criminal activity that uses a computer either as instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime. The term “cyber-crime” is not defined under the Information Technology Act, 2000.In simple terms cyber crime would be “unlawful acts wherein the computer is either a tool or a target […]