- Offences:
Cyber offences are the unlawful acts which are carried in a very sophisticated manner in which either the computer is the tool or target or both. Cyber crime usually includes: - (a) Unauthorized access of the computers
- (b) Data diddling
- (c) Virus/worms attack
- (d) Theft of computer system
- (e) Hacking
- (f) Denial of attacks
- (g) Logic bombs
- (h) Trojan attacks
- (i) Internet time theft
- (j) Web jacking
- (k) Email bombing
- (l) Salami attacks
- (m) Physically damaging computer system.
- The offences included in the IT Act 2000 are as follows:
- 1. Tampering with the computer source documents.
- 2. Hacking with computer system.
- 3. Publishing of information which is obscene in electronic form.
- 4. Power of Controller to give directions
- 5. Directions of Controller to a subscriber to extend facilities to decrypt information
- 6. Protected system
- 7. Penalty for misrepresentation
- 8. Penalty for breach of confidentiality and privacy
- 9. Penalty for publishing Digital Signature Certificate false in certain particulars
- 10. Publication for fraudulent purpose
- 11. Act to apply for offence or contravention committed outside India
12. Confiscation
13. Penalties or confiscation not to interfere with other punishments.
14. Power to investigate offences.
Section 65. Tampering with computer source documents:
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer Programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the being time in force, shall be punishable with imprisonment up to three year, or with fine which may extend up to two lakh rupees, or with both.
- Method. 2 By Using Target’s Phone
For iPhone, go to Settings – General – About – WI-Fi Address.
For Windows phone, find this in Settings – About – More info – MAC address.
For BlackBerry, go to Options – Device – Device and Status info – WLAN MAC.
For WPA/WPA2 encrypted networks if uses the tool ARPSpoof (optional).”
This one method is the perfect in many other cases. Actually, it covers other activities also, like GPS tracking, password of lock screen, we can say about this app that it is the perfect app for monitoring others phone.There are many spy software for WhatsApp and other monitoring activities in the market.
- Open your computer and navigate to WhatsApp Web
- Now scan the QR and login
1. uninstall whatsapp if you already have your account on it.
2. install whatsapp on your phone BUT give in the contact number of the target phone.
3. Get the message from the target phone, or hope the user of this phone clicks the link that comes along with the authorization code. (I have seen that whatsapp won't let you type the code manually, it's either auto-detected or you press the link with the text message).
4. From this moment on, you read the new messages that the target receives.
Why?
if curiosity, I already answered you. If you want to spy on someone, just listen to this:
1. If you need to know something about someone by not letting them know, you are not supposed to know.
2. If you were supposed to know, ask your doubts to the person in the question.
3. If you were supposed to know and you were lied to, you no longer are supposed to know.