SlideShare une entreprise Scribd logo
1  sur  23
Viruses @ Hackers Behaviors
[email_address]
[email_address] Virus first emerged in the early seventies and  there are other arguments and because of this ambiguous
Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
The incubation period The incubation period is the period between the entry of the virus into the body  (and infection)
[object Object],Bio Vrs  Elct Vrs
Seaprition  in body Seaprition  in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk  Loss
[email_address] Why called by (  ) virus  Spread Damage
Taybe of   viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
Mechanism of Work File
How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
Money ,  fame ,  comfort ,    goals    ilegal , beautiful   goals   [email_address] We don’t understand  Why programer ( hackers )  making  Viruses
Hacker ,,, hacking The one man un authorized to enter the OS on   your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available   to the person  (hacker) to  remove or add Files or programs as he can control his place in the OS   based the issuance of orders such as ordering the printing   or imaging Or storage .. [email_address]
Hackers in Sudan The history of electronic Web site  in Sudan  major breakthroughs to different sites ,,,,,, Government @Private site ..  She was a major incident broke the site of the (NCI)  national center for information (Joker), which he broke several government positions in the same proportion to ban the  National Authority for Communications of several sites including Rapideshare / 4shared  / YouTube
Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical  development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
Big.War.from  Pcz: nets Gold.Gnr.to hac  1980 to 1989 1990 to 1994  [email_address]
Open Port Client/Server Patch X  Penetration  [email_address]
some story at hacker Kaven metenk ,,,  Digital Equipment Co.  ,,, 20000  card  NewYork City Magazin  ,,, catch by FBI   [email_address]
Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro   NOVA [email_address]
In Conclusion, we can say that the world  of viruses and hackers is a world full of wonders,  but Login it require  scourage and determination  [email_address]
Thank you for listening [email_address]

Contenu connexe

Tendances

Tendances (19)

Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Phishing
PhishingPhishing
Phishing
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
C 7
C 7C 7
C 7
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Viruses
VirusesViruses
Viruses
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashi
 
Presentation1
Presentation1Presentation1
Presentation1
 

En vedette

Dima+anya wedding
Dima+anya weddingDima+anya wedding
Dima+anya weddingbike-travel
 
3つの地図で売れる自分
3つの地図で売れる自分3つの地図で売れる自分
3つの地図で売れる自分tar8847
 
Google Analytics for Developers
Google Analytics for DevelopersGoogle Analytics for Developers
Google Analytics for DevelopersRubén Martínez
 

En vedette (6)

Dima+anya wedding
Dima+anya weddingDima+anya wedding
Dima+anya wedding
 
3つの地図で売れる自分
3つの地図で売れる自分3つの地図で売れる自分
3つの地図で売れる自分
 
SEO for Developers
SEO for DevelopersSEO for Developers
SEO for Developers
 
Big Data is Here and Now
Big Data is Here and NowBig Data is Here and Now
Big Data is Here and Now
 
Google Analytics for Developers
Google Analytics for DevelopersGoogle Analytics for Developers
Google Analytics for Developers
 
Advanced on-page SEO 2013
Advanced on-page SEO 2013Advanced on-page SEO 2013
Advanced on-page SEO 2013
 

Similaire à E.technology

Similaire à E.technology (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Trends in Web Attacks
Trends in Web AttacksTrends in Web Attacks
Trends in Web Attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & law
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

E.technology

  • 1. Viruses @ Hackers Behaviors
  • 3. [email_address] Virus first emerged in the early seventies and there are other arguments and because of this ambiguous
  • 4. Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
  • 5. The incubation period The incubation period is the period between the entry of the virus into the body (and infection)
  • 6.
  • 7. Seaprition in body Seaprition in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk Loss
  • 8. [email_address] Why called by ( ) virus Spread Damage
  • 9. Taybe of viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
  • 11. How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
  • 12. Money , fame ,  comfort ,   goals   ilegal , beautiful   goals [email_address] We don’t understand Why programer ( hackers ) making Viruses
  • 13. Hacker ,,, hacking The one man un authorized to enter the OS on your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available to the person (hacker) to remove or add Files or programs as he can control his place in the OS based the issuance of orders such as ordering the printing or imaging Or storage .. [email_address]
  • 14. Hackers in Sudan The history of electronic Web site in Sudan major breakthroughs to different sites ,,,,,, Government @Private site .. She was a major incident broke the site of the (NCI) national center for information (Joker), which he broke several government positions in the same proportion to ban the National Authority for Communications of several sites including Rapideshare / 4shared / YouTube
  • 15. Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
  • 16. World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
  • 17. Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
  • 18. Big.War.from Pcz: nets Gold.Gnr.to hac 1980 to 1989 1990 to 1994 [email_address]
  • 19. Open Port Client/Server Patch X  Penetration [email_address]
  • 20. some story at hacker Kaven metenk ,,, Digital Equipment Co. ,,, 20000 card NewYork City Magazin ,,, catch by FBI [email_address]
  • 21. Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro NOVA [email_address]
  • 22. In Conclusion, we can say that the world of viruses and hackers is a world full of wonders, but Login it require scourage and determination [email_address]
  • 23. Thank you for listening [email_address]