Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision by the European Union’s council of ministers in Brussels. The move will allow MI5 officers, French, German and other EU forces to ask British officers to hack into someone’s computer in your home, hotel or your business without any warrant. Authorities could break into PCs and install key loggers, malware or some sort of spyware to trap all the communications.

An amendment to the Computer Misuse Act 1990 made ethical hacking legal and is possible since 1994, but such intrusive surveillance was closely regulated under the Regulation of Investigatory Powers Act.

Opposition MPs and civil liberties groups have raised concerns over the move.

Explore More

Subnetting an IP address

IP subnetting is a fundamental subject that’s critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. Over the years, I’ve watched

Best Server Security Configuration

Best Server Security Configuration. Summary 1) Upgrade Apache/PHP, MySQL, OpenSSH, OpenSSL, cP/WHM etc2) cP/WHM Configuration3) SSH Access4) Mod_Security5) Firewall6) DDoS Protection7) Rootkit8) PHP Configuration9) Other10)The End Author: QKrun1x 1) Upgrade

What are the countermeasures against database attacks?

The following are the countermeasures against database attacks: * Input Sanitization: The Database Administrator must sanitize any input received from a user. The data submitted should be checked for data