Abstract The phenomenon of the non-optimum zakat (tithe) collection shows the government as the worldly power so that it may be able to utilize the big potency of Moslems in zakat for the sake of development funds collection. The law may be used as a tool or instrument used for social engineering (a tool of social engineering) in the effort of rising people from poverty. Therefore, the Central Government had issued some law and order used to regulate the matters of zakat, such as, Act No. 38 Year 1999 concerning the Management of Zakat, Joint Decision of the Minister of Religion and Minister of Domestic Affairs No. 29 Year 1991 / 47 Year 1991 regulating the Construction of Badan Amil Zakat Infaq and Shadaqah (BAZIS), which is a form of public self-supporting institution operating under the government’s protection.
The strategic model that can be used in rising from poverty through the use of law as a tool can use the model of the work of law of Chambliss-Seidman. This model is the model of rising from poverty with a holistic characteristic. Keywords: Law and The Rising from Poverty Item Type: Article Subjects: Divisions: ID Code: 5380 Deposited By: Mr. Hukum Admin Deposited On: 25 Jan 2010 15:06 Last Modified: 25 Jan 2010 15:06 Repository Staff Only.
![]()
Kali Linux Social Engineering. 1. Kali Linux Social Engineering Effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux Rahul Singh Patel BIRMINGHAM - MUMBAI. Kali Linux Social Engineering Copyright © 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: December 2013 Production Reference: 1171213 Published by Packt Publishing Ltd.
Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78328-327-9 www.packtpub.com Cover Image by Aniket Sawant ([email protected]). Credits Author Rahul Singh Patel Reviewers Pranshu Bajpai Aamir Lakhani Joseph Muniz Rohit Patel Acquisition Editor Joanne Fitzpatrick Commissioning Editors Manasi Pandire Shaon Basu Llewellyn Rozario Technical Editors Sharvari H. Baet Dennis John Copy Editors Roshni Banerjee Brandt D'Mello Project Coordinator Michelle Quadros Proofreaders Maria Gould Paul Hindle Indexer Monica Ajmera Mehta Production Coordinator Conidon Miranda Cover Work Conidon Miranda.
About the Author Rahul Singh Patel is currently working as an independent security consultant in India. Among his many other responsibilities, he performs web application security assessments and penetration testing. Rahul started his journey in the world of computer hacking while still at school. He is very passionate about the subject of penetration testing and security research on chip-based security. Over the years, he has continued his attempts to keep himself up-to-date with the latest technology advancements in IT security. I would like to thank my parents, Shri Mahendra Singh Patel and Smt.
Urmila, for always being supportive. You are the source of energy in my life and my real source of inspiration. I would also like to thank my wife, Komal, for always having faith in me and for her support throughout this project.
And I would like to welcome Gaurish—the newest member of my family. Hare Krishna. About the Reviewers Pranshu Bajpai (MBA, MS) is a computer security professional specializing in systems, network, and web penetration testing. He is in the process of completing his Master's in Information Security at the Indian Institute of Information Technology. Currently, he is also working as a freelance penetration tester on a counter-hacking project with a security firm in Delhi, India, where his responsibilities include vulnerability research, exploit kit deployment, maintaining access, and reporting. He is an active speaker with a passion for information security. As an author, he writes for PenTest, Hackin9, and ClubHack Magazine (among others).
In his free time, he enjoys listening to classic rock while blogging at www.lifeofpentester.blogspot. I'd like to say thanks to the hacking community for Linux, open source applications, and free education online, which taught me more than I ever learned in classrooms. Above all, I'd like to thank my mother, Dr. Rashmi Vajpayee, for always being there and inspiring me to never back down. Aamir Lakhani is a leading cyber security and cyber counter-intelligence architect. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations.
He leads projects that implement security postures for Fortune 500 companies, the US Department of Defense, major healthcare providers, educational institutions, and financial and large media organizations. He has designed offensive counter-defense measures for defense and intelligence agencies and has assisted organizations in defending themselves from active strike-back attacks perpetrated by underground cyber groups. Aamir is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, Advanced Persistent Threat (APT) research, and dark security. Additionally, he has extensive experience in high-performance data centers, complex routing protocols, cloud computing, and virtualization.
Aamir has been either author or contributor to several books, including Web Penetration Testing with Kali Linux and Instant XenMobile MDM from Packt Publishing. He has been featured in Pen Test Magazine and Hacking Magazine on numerous occasions.
He has also appeared on Federal News Radio as an expert on cyber security and is a frequent speaker at security conferences around the world, including RSA, Hacker Halted, and TakeDownCon. Aamir writes for and also operates one of the world's leading security blogs at In their recent list of 46 Federal Technology Experts to Follow on Twitter, FedTech magazine described him as 'a blogger, infosec specialist, superhero, and all round good guy.' I would like to thank my parents, Mahmood and Nasreen Lakhani, for bringing out the best in me and for encouraging me by telling me that the only way to succeed in life is by not being afraid to be out of my comfort zone. I'd like to thank my sisters, Noureen and Zahra Lakhani, for understanding me and for pushing me not to settle for being just good, but to be great. My nieces, Farida and Sofia, I hope you will forgive me for not playing Wii when I was reviewing this book.
Lastly, I would like to thank all my friends and colleagues, especially Tim Adams, Ladi Adefala, Kathi Bomar, Brian Ortbals, Bart Robinson, and Matt Skipton, and a dozen other people for giving me the opportunity to work on the world's most complicated projects and architect and design the world's most complex solutions. Thank you David L. Steward, Chairman of the Board at World Wide Technology, and Jim Kavanaugh, Chief Executive Officer at World Wide Technology, and the rest of the executive team for making it (according to Forbes Magazine and multiple years in a row) one of the best places to work. It has been a privilege and an honor to call WWT my home. Joseph Muniz is a CSE at Cisco Systems and also a security researcher.
He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal networks. Joseph runs TheSecurityBlogger.com, a popular resource for security and product implementation. You can also find him speaking at live events as well as involved with other publications.
He was recently speaker for Social Media Deception at the 2013 ASIS International Conference and speaker for the Eliminate Network Blind Spots with Data Center Security webinar. He is the author of Web Penetration Testing with Kali Linux, Packt Publishing, and has also written an article: Compromising Passwords, PenTest Magazine - Backtrack Compendium, Hakin9 Media Sp. SK, July 2013. Outside of work, Joseph can be found behind turntables scratching classic vinyls or on the soccer pitch hacking away at local club teams. My contribution to this book could not have been done without the support of my charming wife, Ning, and creative inspirations from my daughter, Raylin. I also must credit my passion for learning to my brother, Alex, who raised me along with my loving parents, Irene and Ray.
I would also like to say a big thank you to all of my friends, family, and colleagues who have supported me over the years. Rohit Patel is from Jabalpur, MP, India.
In 2011, he received his bachelor's degree in Information Technology from GRKIST Engineering College. He is a cool techie who is interested in learning new things that leverage his skills and power of knowledge. Currently, he works with Directi, Bangalore, as a Senior Web Hosting Engineer. Rohit is interested in various things, some of which are networking; Linux; programming languages, such as HTML, Shell Scripting, and Perl; Linux Distros, such as BackTrack (Penetration Testing OS), Kali Linux (Advanced Penetration testing OS), and WifiWay (Wireless Penetration Testing OS); Linux OSes, such as Redhat, CentOS, Fedora, Ubuntu, Debian; Windows, such as Windows Server 2003, Windows Server 2008, and Windows Server 2012; and Windows Client OSes, such as Windows XP 2, XP 3, Vista, 7, and 8. He has undergone training for certifications such as CCNA (twice), RHCE Linux, MCSE 2003, and MCITP 2008 Server.
He is a blogger by interest and a penetration tester by choice. His websites include rohitpatelgrkist.in/, rohitpatel.net/, and. www.PacktPub.com Support files, eBooks, discount offers, and more You might want to visit www.PacktPub.com for support files and downloads related to your book. Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.
Com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details. At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks. TM Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
Why subscribe?. Fully searchable across every book published by Packt.
Copy-and-paste, print, and bookmark content. On-demand and accessible via web browsers Free access for Packt account holders If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
![]()
Law as an instrument of social engineering. 1. LAW AS AN INSTRUMENT OF SOCIAL ENGINEERING. WHAT IS LAW Law is a set of rules and regulations. It tells us what to do and what not to do. It also tells us about our fundamental rights and duties. It provides us protection & equality.
Every state or nation has it’s own law. Everyone has to follow the law and who doesn’t follow it, is punished by the law. SOCIAL ENGINEERING Social engineering is a term that describes non technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. Another aspect of social engineering relies on people's inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Why Law Is Needed In Society.
Law is important for a society for it serves as a norm of conduct for men. It was also made for the proper guideline and order upon the behavior for all men and to sustain the equity on the three branches of the government. Law is important because it keeps society running.
law is important because it acts as a guideline as to what is accepted in society. What Would Happen If There Are No Laws. Monarchy. More chaos. No police.
No govt. More crimes. Society would break down.
![]()
Without law it would be survival of the fittest and everyman for himself. Not an ideal lifestyle for most. Without it there would be chaos and conflicts between social groups, society, construction, etc. Laws are everywhere and it is pivotal that we follow them. Then the world would be unsafe and there would be no order in society.
Law can be said to be an instrument for social engineering in different ways, first; as a means of trying to control human behavior with the emphasis of law., secondly; and also to predict the actions of people in the relation to commit crime. LAW is meant for social change through various legislation. Many social evil has been removed like untouchability. Law is one aspect of 'formal social control' which is based upon legal enforcement. Formal social controls are used when 'informal social controls' don't provide social order. Informal social controls consist of interpersonal reactions such as a smile, frown or ridicule which are used in order to reinforce societal norms onto a group or individual. ROSCOE POUND’S THEORY Roscoe pound is regarded as one of the most important American sociological jurists of twentieth century.
Law As A Tool For Social Engineering
He gave the ‘THEORY OF INTERSESTS’ which describes law as social engineering. Pound’s twelve conceptions of What Law Is 2). Law as Social Engineering 3). Theory of Balancing of Interests 4).
Law as Purposive Functional and Need-based. Interests According to Pound there are three kinds of interests:- 1.
Individual Interests 2. Public Interests 3. Social Interests. Twelve conceptions of What Law Is 1. Idea of divinely ordained rule or set of rules for human action. Idea of law as a tradition of the old customs which have proved acceptable to the gods and hence point the way in which a man may walk with safety. The recorded wisdom of the wise men of old who had learned the safe course or the divinely approved course from human conduct.
Philosophical discovered system of principle which express the nature of the things, to which therefore, man ought to conform his conduct. Roman juris consult. As body of ascertainments and declarations of an eternal and immutable moral codes. In democratic version, law is As body of agreements of men in politically organized society as to their relations with each other. It distinct human beings from rest of creations as it considers them moral entities. A body of commands of sovereign authority in a politically organized society as how men should conduct themselves therein, resulting ultimately on whatever basis was held behind the authority.
A system of percepts discovered by human experience whereby the individual human will may realize the most complete freedom possible consistently with the like freedom of will of others. As a system of principles, discovered philosophically and developed by juristic writing and judicial decision. As a body of rules imposed on men in society by dominant class for the time being. Idea of law, as made up of the dictates of economic or social laws with respect to the conduct of men in society, discovered by observations, expressed in percepts, worked out through human experience of what would work and what not in the administration of justice. Law As Social Engineering Law is a body of knowledge and experience with the aid of which a large part of social engineering is carried on. It has rules, principles, conceptions and standards for conduct and for decisions, but it has also doctrines and modes of professional thoughts. He says, “like an engineer’s formulae, laws represent experience, scientific formulations of experience and logical development of formulations; also inventive skill in conceiving new devices and formulating their requirements by means of a developed technique”.
This is his “Theory of Social Engineering”. By ‘social engineering’ Pound means a balance between competing interests in society for the greatest benefit. Law should procure the greatest good of the largest number in society. Positive law should be such that it suits the need of time; it should effect a compromise of conflicting interests. Law is not based on absolute ideas, insofar as it is positive law. It is reflection of a culture of a given community.
It varies with time and with the views of generations. Pound lays down a method which a jurist should follow for ‘social engineering’. The jurist should study the actual social facts of legal institutions and legal doctrines, study the means of making legal rules effective, sociological study in preparation of law-making, study of judicial method, a sociological legal history and the importance of reasonable and just solutions of individual cases. Law as Purposive Functional and Need- Based Pound’s concept of law is of practical importance which inspires judges, legislators and jurists to mould and adjust law to the needs and interests of the community. Since the society is always changing law should be continually adapted and readapted to the needs of individual and society. He therefore stresses the need for cooperation between legislators, administrators and jurists.
They should work in unison towards the realization and effective implementation of law for securing social harmony and social justice to the general public. Summary Society is governed by some laws. Without laws it like a group of wild animals. Laws play important role in it’s maintenance. That’s why we can say that ‘ law is an instrument of social engineering’.
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |