This study presents some methods of operation related to the offense consisting in the unauthorized access to a computer system, which is stipulated in article 360 of New Romanian Criminal Code (Law no. 286/2009). Since the material element of the offense is represented by the unauthorized access to a computer system, there are several methods to achieve this access that can be analyzed, such as password attack, trusted access attack, exploitation of technological
weaknesses, shared library attack, IP attack or TCP hijacking attack.
International Law
Some Considerations Regarding the Application of the EU Competition
European Union Law
The European Union Climate Neutrality and Climate Migrants
Legal theory
Are there any intervening creditors involved in garnishment?
UE Law and Comparative Law
Criminal Participation in the Form of Complicity in the Offenses of Tax
The Legal Regime of Competition in Bulgaria
Articles (Studies, discussions, comments)
Family Relations in the Light of Romanian Funeral Laws
Environmental law
The Culture of Mediation in the Romanian Area. Past, Present,