SlideShare a Scribd company logo
1 of 29
Download to read offline
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
.
PROJECT BY HARSH & RAVI
Hackers are the person who unkindly breaks into systems for
personal gain. Technically, these criminals are crackers
PROJECT BY HARSH & RAVI
Black hats – highly skilled,
malicious, destructive “crackers”
White hats – skills used for
defensive security analysts
Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
PROJECT BY HARSH & RAVI
Reset the Password
Use a Key logger
Command prompt (Linux based)
Phishing
PROJECT BY HARSH & RAVI
The easiest way to "hack" into someone's Facebook is through resetting the
password. This could be easier done by people who are friends with the person
they're trying to hack.
Steps:-
 The first step would be to get your friend's Facebook email login.
 Next, enter victim's email then click on Forgotten your password?
 It will ask if you would like to reset the password via the victim's emails. This
doesn't help, so press No longer have access to these?
 It will now ask you a question.
 If you don't figure out the question, you can click on Recover your account with
help from friends. This allows you to choose between three - five friends.
 It will send them passwords.
PROJECT BY HARSH & RAVI
SOFTWARE
BASED
HARDWARE
BASED
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
Phishing is the most widely used
hacking method for hacking Facebook
passwords. The most widely used
technique in phishing is the use of
Fake Login Pages, also known as
spoofed pages. These fake login
pages resemble the original login
pages of sites like Yahoo , Gmail,
MySpace etc.
PROJECT BY HARSH & RAVI
STEP1:- Go to facebook homepage the right it save webpage as
HTML only by name “INDEX”
STEP2:- create a notepad file for entering following code & saveas
“next.php”
STEP3:- create text file & save as “password”
STEP4:- open INDEX file in notepad press ctrl+F search for action,
now change webpage to next.php and save it
STEP5:- go to www.************.com and log in to your account
STEP6:- upload all the 3 file to website in public directory folder
STEP7:- now ask the person to log in to dummy page of facebook
as he log in its password would be mailed to id or saved to
password.txt
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
 Hacking is the most dangerous enemy of the company
because most of the companies work is done through online.
 If companies a/c or website is hacked then its all private data
may be leaked and competitors may take advantages of that
data.
 Our company’s monopoly product is Faluda syrup all over
Gujarat. So, after being hacked the secret ingredients of
Faluda syrup may revealed. PROJECT BY HARSH & RAVI
MAIN THREATS OF THE COMPANY AFTER BEING HACKED
Account details
Company details
payment structures
Secret ingredients of their products
List of suppliers and its details
List of bulk purchase customers and its details etc..
PROJECT BY HARSH & RAVI
Use an email address specifically for your Facebook
and don't put that email address on your profile.
When choosing a security question and answer,
make it difficult.
Don’t log on an unknown/unsecured pc’s
PROJECT BY HARSH & RAVI
Don’t give access of professional a/c to any
employees or any other person
Try to access your professional a/c on your pcs or
laptop only
Upload less personal information on social hubs
Use anti-phishing feature in anti virus (Avast-Anti-
Phishing)
PROJECT BY HARSH & RAVI
Don’t click on unknown pop-ups
Frequently change your password
Use security features in email server and make mobile no. protection
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI

More Related Content

What's hot

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?paula_bolivar
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 

What's hot (20)

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
security procedures
security procedures
security procedures
security procedures
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 

Viewers also liked

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to PhilosophyMozu
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์noeiinoii
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIApratik swarup das
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar imageswilsonrd1987
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberRakhi Tips Provider
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonBernadette Gelsei
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Anatoliy Arkhipov
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Rakhi Tips Provider
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberRakhi Tips Provider
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วnoeiinoii
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationPrimary Care Commissioning (PCC)
 

Viewers also liked (15)

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to Philosophy
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
 
Paradigm created
Paradigm createdParadigm created
Paradigm created
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
 
September 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor NassiefSeptember 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor Nassief
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-November
 
INDOKON BETON INSTAN
INDOKON BETON INSTANINDOKON BETON INSTAN
INDOKON BETON INSTAN
 
Donation waiver authority and procedure
Donation waiver authority and procedureDonation waiver authority and procedure
Donation waiver authority and procedure
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-November
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
 

Similar to FULL MEANING OF HACKING

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202James Ruffer
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseMichal Špaček
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
security procedures
security procedures
security procedures
security procedures puffyarson5604
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 

Similar to FULL MEANING OF HACKING (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
security procedures
security procedures
security procedures
security procedures
 
Hack a Facebook password
Hack a Facebook passwordHack a Facebook password
Hack a Facebook password
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Password Attack
Password Attack Password Attack
Password Attack
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

FULL MEANING OF HACKING

  • 7. Hackers are the person who unkindly breaks into systems for personal gain. Technically, these criminals are crackers PROJECT BY HARSH & RAVI
  • 8. Black hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation. PROJECT BY HARSH & RAVI
  • 9. Reset the Password Use a Key logger Command prompt (Linux based) Phishing PROJECT BY HARSH & RAVI
  • 10. The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack. Steps:-  The first step would be to get your friend's Facebook email login.  Next, enter victim's email then click on Forgotten your password?  It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?  It will now ask you a question.  If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three - five friends.  It will send them passwords. PROJECT BY HARSH & RAVI
  • 13. Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. PROJECT BY HARSH & RAVI
  • 14. STEP1:- Go to facebook homepage the right it save webpage as HTML only by name “INDEX” STEP2:- create a notepad file for entering following code & saveas “next.php” STEP3:- create text file & save as “password” STEP4:- open INDEX file in notepad press ctrl+F search for action, now change webpage to next.php and save it STEP5:- go to www.************.com and log in to your account STEP6:- upload all the 3 file to website in public directory folder STEP7:- now ask the person to log in to dummy page of facebook as he log in its password would be mailed to id or saved to password.txt PROJECT BY HARSH & RAVI
  • 24.  Hacking is the most dangerous enemy of the company because most of the companies work is done through online.  If companies a/c or website is hacked then its all private data may be leaked and competitors may take advantages of that data.  Our company’s monopoly product is Faluda syrup all over Gujarat. So, after being hacked the secret ingredients of Faluda syrup may revealed. PROJECT BY HARSH & RAVI
  • 25. MAIN THREATS OF THE COMPANY AFTER BEING HACKED Account details Company details payment structures Secret ingredients of their products List of suppliers and its details List of bulk purchase customers and its details etc.. PROJECT BY HARSH & RAVI
  • 26. Use an email address specifically for your Facebook and don't put that email address on your profile. When choosing a security question and answer, make it difficult. Don’t log on an unknown/unsecured pc’s PROJECT BY HARSH & RAVI
  • 27. Don’t give access of professional a/c to any employees or any other person Try to access your professional a/c on your pcs or laptop only Upload less personal information on social hubs Use anti-phishing feature in anti virus (Avast-Anti- Phishing) PROJECT BY HARSH & RAVI
  • 28. Don’t click on unknown pop-ups Frequently change your password Use security features in email server and make mobile no. protection PROJECT BY HARSH & RAVI