<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ComputerMisuseAct &amp;mdash; Paul Sutton</title>
    <link>https://paper.wf/paulsutton/tag:ComputerMisuseAct</link>
    <description>Paul Sutton - personal blog </description>
    <pubDate>Thu, 07 May 2026 01:32:16 +0000</pubDate>
    <item>
      <title>CyberSecurity part 20</title>
      <link>https://paper.wf/paulsutton/cybersecurity-part-20</link>
      <description>&lt;![CDATA[CyberSecurity part 20&#xA;&#xA;Over the past 20 days,  we have covered a wide range of topics.   Given that we are heading towards discussing cyber security,  then it is time we started to look at the legal framework behind this.&#xA;&#xA;The United Kingdom has a piece of legislation called the Computer Misuse act,  that was introduced in 1990.  There is a video below about this.&#xA;&#xA;What is the Computer Misuse Act&#xA;&#xA;I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux has to be within the law. &#xA;&#xA;Links&#xA;&#xA;login link &#xA;Tuxiversity Forum&#xA;&#xA;Tags&#xA;&#xA;#CyberSecurity,#ComputerMisuseAct]]&gt;</description>
      <content:encoded><![CDATA[<p>CyberSecurity part 20</p>

<p>Over the past 20 days,  we have covered a wide range of topics.   Given that we are heading towards discussing cyber security,  then it is time we started to look at the legal framework behind this.</p>

<p>The United Kingdom has a piece of legislation called the Computer Misuse act,  that was introduced in 1990.  There is a video below about this.</p>
<ul><li><a href="https://www.youtube.com/watch?v=94zJVdOBixs" rel="nofollow">What is the Computer Misuse Act</a></li></ul>

<p>I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux <strong>has to be within the law</strong>.</p>

<p><strong>Links</strong></p>
<ul><li><a href="https://vfsync.org/index.html" rel="nofollow">login link</a></li>
<li><a href="https://forum.tuxiversity.org/" rel="nofollow">Tuxiversity Forum</a></li></ul>

<p><strong>Tags</strong></p>

<p><a href="/paulsutton/tag:CyberSecurity" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">CyberSecurity</span></a>,<a href="/paulsutton/tag:ComputerMisuseAct" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ComputerMisuseAct</span></a></p>
]]></content:encoded>
      <guid>https://paper.wf/paulsutton/cybersecurity-part-20</guid>
      <pubDate>Sat, 21 May 2022 06:30:00 +0000</pubDate>
    </item>
  </channel>
</rss>