Questions tagged [hacking]
Non-normative tag for questions relating to the use of information technology, typically in unintended manners.
132
questions
0
votes
1
answer
126
views
What does unauthorised mean in regards to access to web sites? [duplicate]
The Computer Misuse Act 1990 makes it an offence in the UK to try and access programs or data on computers when that access is unauthorised. As I understand it in the US the Computer Fraud and Abuse ...
18
votes
6
answers
6k
views
What consequences could there be for Robert'); DROP TABLE Students;-- when he grows up?
I think it's obvious that Little Bobby Tables's mom has broken the law. Let's assume this is his legal name and does not break any naming laws; it's still probably illegal, because she obviously gave ...
1
vote
1
answer
160
views
Is it illegal to head to public but hidden web pages such as admin.php?
I'm someone who's recently been interested in cybersecurity. I learned that most webpages have a text file called robots.txt (like example.com/robots.txt) that holds webpages that are public but are ...
3
votes
1
answer
105
views
Is a Digital Subscriber Line (DSL) connection a phone call by legal definition?
Is a Digital Subscriber Line (DSL) considered a phone call by legal definition? As such, could I use state laws such as Washington State RCW 9.61, for instance, to pursue civil action against someone ...
-2
votes
2
answers
119
views
Imagine that I am some random person in an ordinary democratic country. Can I hack or spam or scam hostile foreign governments?
Imagine that I am some random person in an ordinary democratic country. Can I hack or spam or scam hostile foreign governments?
E.G. a DDOS attack on the servers of the Russian Rosgvardia or black fax ...
14
votes
2
answers
4k
views
How do laws against computer intrusion handle the modern situation of devices routinely being under the de facto control of non-owners?
Current versions of Microsoft Windows will automatically update themselves.
That's usually great, but they also are designed to update themselves even if the owner of the device wants them to not do ...
1
vote
1
answer
157
views
Legal implications of unsecure bluetooth device
I have recently learned about a high-tech premium bed base that incorporates Bluetooth speakers, plus massage actuators and other features controllable via a smartphone app.
Like many insecure ...
4
votes
2
answers
263
views
Is distributing software that makes modifications to video games legal?
Unlike most game mods (which are, to my knowledge, a distribution of a copy of modified game software), I'm writing a small desktop application which allows users to make their own custom changes (...
2
votes
1
answer
171
views
I have found my email address online in a .txt file. What should be my next step? [closed]
A few days ago someone tried to log into my bank account, the attempt was unsuccessful but it was quite concerning. I’ve spent the past weekend moving my most important accounts to alternate emails ...
-2
votes
2
answers
126
views
Should my hosting service return part of my annual fee if my site was hacked? [closed]
I’m an artist, and I have a website on the artist hosting service, Artspan.com. Unfortunately, recently their hosted websites were hacked and some of us lost all our uploaded images. They have said ...
0
votes
2
answers
90
views
Is it a violation of the Computer Fraud and Abuse Act (CFAA) to use my work computer to browse Facebook?
My employer recently sent out an email stating work computers being used for personal activities such as browsing social media will be considered unauthorized access and that any past, present, or ...
2
votes
1
answer
65
views
What year did Spain outlaw computer virus spreading?
What year did Spain outlaw malware (computer virus), in the public side of their Civil Legal System? I am also interested in what the penalty would be, as having read through their criminal Articles ...
11
votes
3
answers
7k
views
Is it illegal to download passwords in bulk from the dark web to make a password checking tool to help people?
I remember some password managers like Google's would give me a warning about passwords that have been compromised.
My question is this. How is Google or any company able to see that the password I ...
4
votes
2
answers
848
views
Is it against the Computer Misuse Act to bypass a client-side paywall?
A common practice among news websites is to provide articles online, where an initial portion is freely viewable, and the remainder requires an active subscription. However, on numerous occasions, I ...
1
vote
3
answers
337
views
Would it be legal to publish a program to factor large semiprime numbers?
If I somehow figured out a way to factor large semiprime numbers in a reasonable amount of time (don't worry, I haven't; this is hypothetical), would it be legal to publish the code?
This could be ...