SlideShare une entreprise Scribd logo
1  sur  33
Hacking
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
 The truth hacker amongst our societies have thirst for the
knowledge .
 Boredom is never an object of challenge for the hacker
What is Hacking ?
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the
website.
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Ethical Hacking
 Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
Email Hacking
 Email hacking is illicit access to an email account
or email correspondence.
Password Hacking
 Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Online Banking Hacking
 Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
What should do after hacked?
 Shutdown the system Or turn off the system
 Separate the system from network
 Restore the system with the backup Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
 Ex.
1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
 Can be used to recover lost information where the
computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
 Keep your password protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
HACKING

Contenu connexe

Tendances (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
HACKING
HACKINGHACKING
HACKING
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Similaire à HACKING

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackersbalti13
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: HackingBareetSingh
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes teamABIN VARGHESE
 

Similaire à HACKING (20)

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
Hacking Hacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 

Dernier

Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jonesjonesyde302
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...ZurliaSoop
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfDeepak15CivilEngg
 
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...vershagrag
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysoremeghakumariji156
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...ruksarkahn825
 
b-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardb-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardramyaul734
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsKarishma7720
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarDeepak15CivilEngg
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfReemaKhan31
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Juli Boned
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制yynod
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaonmeghakumariji156
 

Dernier (20)

Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jones
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
 
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...
Dating Call Girls inTiruvallur { 9332606886 } VVIP NISHA Call Girls Near 5 St...
 
b-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardb-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state board
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstings
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak Kumar
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 

HACKING

  • 2. Contents  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3. History of Hacking  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge .  Boredom is never an object of challenge for the hacker
  • 4. What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 5.
  • 6. Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 7. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 8. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 9. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 10.
  • 11. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 12.
  • 13. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 14.
  • 15. Ethical Hacking  Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 16.
  • 17. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 18.
  • 19. Password Hacking  Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 20.
  • 21. Online Banking Hacking  Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 22.
  • 23. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 24.
  • 25. What should do after hacked?  Shutdown the system Or turn off the system  Separate the system from network  Restore the system with the backup Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data  Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 30. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal
  • 31. Conclusion  Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .