SlideShare a Scribd company logo
1 of 12
Presentation Developed By Harshit Upadhyay(Hellhacker119)
About The Presentation..
Hello In This Presentation I Harshit Upadhyay Will Be Telling You The
Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This
Presentation Will Give You An Idea About What Actually And
Fundamentally Hacking Is And Why Most Of The People Consider It As
A Crime. It Will Logically Helps You In Differentiating Between A Hacker
And A Cracker. The Presentation Will Show The Real Concepts Of
Hacking, How To's And Of Course How To Be AWARE OF HACKERS.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
What actually Ethical Hacking is ?
Generally describing hacking is just like describing earth. Hacking as a
matter of fact don’t have any definition.so we can say that it is a
mixture of two terms “Ethical” and “hacking” where “ethical” refers to
good purpose and “hacking” as a computer related term means
breaking or entering Into a remote computer illegally. Now by joining
the following teems we explored that ethical hacking is actually
breaking into another computer system illegally but for good or ethical
reason.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Hacking A Crime Or Not!
• Hmm.This Is The Most Prominent Question Asked By People To A
Hacker, But An Elite Hacker Will Only Give Answer As No.This Is
Because Hacking Itself Is Not A Crime But Thinking Of The People
Make It So.Hacking According To Me Is Not A Crime Its Just Made
Crime By Some Foolish People. However The Hacking Done For Bad
Purpose Is Eventually Known As Cracking. So We Will Later Detail
About Hacking And Cracking But Now It Is Good To Understand That
Hacking Is not A Crime While Cracking Is So.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who Are Hackers And Crackers..
“Hacker”
• Hacker is a person who breaks into another computer
system illegally by penetrating the security of a user and
then using the leaked information for either a good
purpose or for a bad purpose.*
• As I said there is no perfect reason for a hacker to hack a
computer. The reason behind is in the next slide.

“Cracker”

• Cracker are the BAD guys who just to hacking for
the purpose of enjoyment and for enhancing their
knowledge of exploitation. A cracker would do
hacking for the following reasons:
• Taking revenge.
• Streanghthing his hacking abilities.
• Way to become a famous person or hacker or
criminal.
• Enjoying the knowledge which he have.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who is a hacker and an ethical
hacker.
• The Basic Thing That Is Conveyed Is The Slide Is Simply :
Hacker : A Person Doing Hacking For Bad Purpose. Example Includes
All The Acts That Are Performed By A Cracker.
Ethical Hacker : A Person Doing Hacking For Good Purpose. Example
Are:
• For Ensuring The Security Of A System Or A Network.
• For Supporting Public And Government Bodies.
• For Decoding Or Decrypting A Encrypted Message.
• For Helping The Counter Terrorist Organization.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Importance of Ethical Hacking..
Ethical Hacking Is Extremely Important Thing In This Era Of Computers
And Robotics, One Must Know What Is Hacking How To Prevent Or
Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays
A Key Role In :
• Providing Security To The Important People Or Places.
•Protecting Yourself From Becoming A Victim Of Hacking By Either
Hacking Your Email Account On A Social Networking Site Or By Sending
You A Malicious File Or Programe,etc.
•Providing Security To The Common People Who Are Not So Aware Of
This. Example Banks, Offices Etc.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Two Legends Of Hacking..
Almost Every Successful Computer Businessmen Would Be An Hacker
In Their Time. The Best Known Example Them Is About A 13 Year Boy
Of US Who With Is His Other Hacker Friend Used To Relish
Programming And Hacking. They Both Were Extremely Intelligent And
Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s
Computer And Proving Their Superiority.
Today Most Of The People Know Them As Bill Gates And Paul Allen
Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As
Most Of You Must Be Knowing Are Practically Zillionaires.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to be secure of hacking ,,:
• Protect Your Computer.(Antiviruses And Antispyware's)
• Have A Secure Password.(Complicated But Easy To Remember)
• Your Email ID And Its Password Are Your Own Confidential Information.
• If You Are A Victim Of Such A Scenario, Please Contact The Respective
Company Immediately.
• If You Are Ever Asked For Your Password In An Unsolicited Manner Or By
Someone You Do Not Believe To Be Any Representative.
• You Should Change The Security Questions And Answers Wisely.
• I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful
Ad Banners!
Presentation Developed By Harshit Upadhyay(Hellhacker119)
How to do Hacking??
Now This Is Also One Of The Most Frequently Asked Question By The
People To Hacker. Everybody Viewing This Presentation Are Eager To
Know How To Hack. So Before Proceeding Let Me Tell You The Thing
That Hacking Is And Always Will Lead To A Particular Goal.So To Hack
Anything One Must Have A Goal Of What He Is Hacking, Why And Well
Plan Of How He Will Hack.
Now There Are Few Steps That I Am Going To Tell You Which Will Give
You The Basic Idea Of Hacking And After That You All Will Be Able To
Understand Hacking And Stop Asking People How To Hack.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to hack a computer…
• First of all decide what you need to decide what you are actually
going to hack.
• After thinking the goal you must need to plan the attack, language
and what OS you are going to use during hacking.
• You must need to get the information about the system and owner of
the system that you are going to hack.
• Then if it is possible try to apply some brain or in the technical term
Social Engineering.
• Finally after thinking all these attack the victim but note that the
attack is for a positive purpose.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Presentation Developed By Harshit Upadhyay(Hellhacker119)

More Related Content

Similar to Ethical hacking

White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackersBilal Ahmed
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)DeepHaria4
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02Mudit Seth
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Arya
AryaArya
Arya
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Ethical hacking

  • 1. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 2. About The Presentation.. Hello In This Presentation I Harshit Upadhyay Will Be Telling You The Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This Presentation Will Give You An Idea About What Actually And Fundamentally Hacking Is And Why Most Of The People Consider It As A Crime. It Will Logically Helps You In Differentiating Between A Hacker And A Cracker. The Presentation Will Show The Real Concepts Of Hacking, How To's And Of Course How To Be AWARE OF HACKERS. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 3. What actually Ethical Hacking is ? Generally describing hacking is just like describing earth. Hacking as a matter of fact don’t have any definition.so we can say that it is a mixture of two terms “Ethical” and “hacking” where “ethical” refers to good purpose and “hacking” as a computer related term means breaking or entering Into a remote computer illegally. Now by joining the following teems we explored that ethical hacking is actually breaking into another computer system illegally but for good or ethical reason. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 4. Hacking A Crime Or Not! • Hmm.This Is The Most Prominent Question Asked By People To A Hacker, But An Elite Hacker Will Only Give Answer As No.This Is Because Hacking Itself Is Not A Crime But Thinking Of The People Make It So.Hacking According To Me Is Not A Crime Its Just Made Crime By Some Foolish People. However The Hacking Done For Bad Purpose Is Eventually Known As Cracking. So We Will Later Detail About Hacking And Cracking But Now It Is Good To Understand That Hacking Is not A Crime While Cracking Is So. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 5. Who Are Hackers And Crackers.. “Hacker” • Hacker is a person who breaks into another computer system illegally by penetrating the security of a user and then using the leaked information for either a good purpose or for a bad purpose.* • As I said there is no perfect reason for a hacker to hack a computer. The reason behind is in the next slide. “Cracker” • Cracker are the BAD guys who just to hacking for the purpose of enjoyment and for enhancing their knowledge of exploitation. A cracker would do hacking for the following reasons: • Taking revenge. • Streanghthing his hacking abilities. • Way to become a famous person or hacker or criminal. • Enjoying the knowledge which he have. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 6. Who is a hacker and an ethical hacker. • The Basic Thing That Is Conveyed Is The Slide Is Simply : Hacker : A Person Doing Hacking For Bad Purpose. Example Includes All The Acts That Are Performed By A Cracker. Ethical Hacker : A Person Doing Hacking For Good Purpose. Example Are: • For Ensuring The Security Of A System Or A Network. • For Supporting Public And Government Bodies. • For Decoding Or Decrypting A Encrypted Message. • For Helping The Counter Terrorist Organization. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 7. Importance of Ethical Hacking.. Ethical Hacking Is Extremely Important Thing In This Era Of Computers And Robotics, One Must Know What Is Hacking How To Prevent Or Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays A Key Role In : • Providing Security To The Important People Or Places. •Protecting Yourself From Becoming A Victim Of Hacking By Either Hacking Your Email Account On A Social Networking Site Or By Sending You A Malicious File Or Programe,etc. •Providing Security To The Common People Who Are Not So Aware Of This. Example Banks, Offices Etc. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 8. Two Legends Of Hacking.. Almost Every Successful Computer Businessmen Would Be An Hacker In Their Time. The Best Known Example Them Is About A 13 Year Boy Of US Who With Is His Other Hacker Friend Used To Relish Programming And Hacking. They Both Were Extremely Intelligent And Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s Computer And Proving Their Superiority. Today Most Of The People Know Them As Bill Gates And Paul Allen Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As Most Of You Must Be Knowing Are Practically Zillionaires. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 9. Steps to be secure of hacking ,,: • Protect Your Computer.(Antiviruses And Antispyware's) • Have A Secure Password.(Complicated But Easy To Remember) • Your Email ID And Its Password Are Your Own Confidential Information. • If You Are A Victim Of Such A Scenario, Please Contact The Respective Company Immediately. • If You Are Ever Asked For Your Password In An Unsolicited Manner Or By Someone You Do Not Believe To Be Any Representative. • You Should Change The Security Questions And Answers Wisely. • I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful Ad Banners! Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 10. How to do Hacking?? Now This Is Also One Of The Most Frequently Asked Question By The People To Hacker. Everybody Viewing This Presentation Are Eager To Know How To Hack. So Before Proceeding Let Me Tell You The Thing That Hacking Is And Always Will Lead To A Particular Goal.So To Hack Anything One Must Have A Goal Of What He Is Hacking, Why And Well Plan Of How He Will Hack. Now There Are Few Steps That I Am Going To Tell You Which Will Give You The Basic Idea Of Hacking And After That You All Will Be Able To Understand Hacking And Stop Asking People How To Hack. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 11. Steps to hack a computer… • First of all decide what you need to decide what you are actually going to hack. • After thinking the goal you must need to plan the attack, language and what OS you are going to use during hacking. • You must need to get the information about the system and owner of the system that you are going to hack. • Then if it is possible try to apply some brain or in the technical term Social Engineering. • Finally after thinking all these attack the victim but note that the attack is for a positive purpose. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 12. Presentation Developed By Harshit Upadhyay(Hellhacker119)