diff --git a/README.md b/README.md index 7acead4..707e1fc 100644 --- a/README.md +++ b/README.md @@ -1,36 +1 @@ -# Gmail-Generator-Python - -## Created By: Altify -# ⛔ NOT WORKING ⛔ ( as of 8/23/22 ) - Fixing -## My Newest Tool: [Creator](https://github.com/Altify-Development/Fake-Person-Generator) - -### Join discord - [Discord Link](https://joindiscord.netlify.app) - -Use: Python and emulated firefox users and proxies to create Google Mail (@gmail.com) accounts and writes it down the account information to a file - -Developer's Request: If you download, clone, or fork this repository or any of its contents, please star the repo, follow me, and please just don't repost it saying you created the tool. Every star matters, a little can go a long way, thanks! - -###### PS: Please visit my main project for over 200 useful hacking/bypassing tools - [Altify Developing Main](https://github.com/Altify-Developing/Altify-Developing-Main) -###### Coded In [Python](https://www.python.org/) -###### FOR EDUCATIONAL USE ONLY -
The federal Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, is the primary statutory mechanism for prosecuting cybercrime, including hacking, and also covers some related extortionate crimes such as in the context of ransomware. The CFAA provides for both criminal and civil penalties (which in the criminal context can range from 10 to 20 years imprisonment for some aggravated offences, with the penalties for non-aggravated offences otherwise listed below), and specifically prohibits: (1) unauthorised access (or exceeding authorised access) to a computer and obtaining national security information (imprisonment up to 10 years); (2) unauthorised access (or exceeding authorised access) to a computer that is used in interstate or foreign commerce and obtaining information (imprisonment up to one year); (3) unauthorised access to a non-public computer used by the United States government (imprisonment up to one year); (4) knowingly accessing a protected computer without authorisation with the intent to defraud (imprisonment up to five years); (5) damaging a computer either intentionally or recklessly (imprisonment up to five years); (6) trafficking in passwords (imprisonment up to one year); (7) transmitting threats of extortion, specifically threats to damage a protected computer and threats to obtain information or compromise the confidentiality of information (imprisonment up to one year); and (8) cyber-extortion related to demands of money or property (imprisonment up to five years). In Van Buren v. U.S., 140 S. Ct. 2667 (2020), the Supreme Court substantially limited the ability of the CFAA to penalise insider threats.
-