SlideShare a Scribd company logo
1 of 32
Hacking
Contents
History of Hacking
What is Hacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
History of Hacking
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the term “hacker”.
The truth hacker amongst our societies have thirst for the
knowledge .
Boredom is never an object of challenge for the hacker
What is Hacking ?
The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called Hacking.
Who is a hacker?
In the computer security context, a hacker is someone who seeks
and exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue
that someone breaking into computers is better called a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Why do hackers hack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking
Hacking a website means taking control from the website
owner to a person who hacks the website.
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Ethical Hacking
Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
Email Hacking
 Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been stored in or
transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
Computer Hacking
 Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
What should do after hacked?
 Shutdown the system
− Or turn off the system
 Separate the system from network
 Restore the system with the backup
− Or reinstall all programs
Connect the system to the network
 It can be good to call the police
How to give a password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
Ex.
◦ 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||.
◦ I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
oCan be used to recover lost information where the
computer password has been lost.
oTeaches you that no technology is 100% secure.
oTo test how good security is on your own network.
oThey call it white hat computer hacking.
Disadvantages of Hacking
◦Criminals can use it to their advantage.
◦It can harm someone's privacy
◦It's Illegal
Conclusion
Keep your password protected. Write your password should
be with combination of characters, digits, special symbols. Do
not respond to feck on fishing email. When you are doing any
online transection always keep watch on site whether the
protocol of site is https & whether there is a lock symbol .
Thank You

More Related Content

What's hot

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackersinfosavvy
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 

What's hot (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Viewers also liked

Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13nelsonprada123
 
Visaer Presentation for Induction
Visaer Presentation for InductionVisaer Presentation for Induction
Visaer Presentation for InductionRay Oaklands
 
Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27nelsonprada123
 
Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015nelsonprada123
 
Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands
 
Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25nelsonprada123
 
Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03nelsonprada123
 
Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30nelsonprada123
 
Tell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 janTell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 jannelsonprada123
 
Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015nelsonprada123
 
Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6nelsonprada123
 
Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 nelsonprada123
 
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.nelsonprada123
 
Chef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuChef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuJ.Scott Pierce II
 
Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04nelsonprada123
 
Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.nelsonprada123
 
Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24nelsonprada123
 
Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23nelsonprada123
 

Viewers also liked (20)

Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13
 
Visaer Presentation for Induction
Visaer Presentation for InductionVisaer Presentation for Induction
Visaer Presentation for Induction
 
Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27
 
Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015
 
Animal behavior
Animal behavior Animal behavior
Animal behavior
 
Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6
 
Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25
 
Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03
 
Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30
 
Tell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 janTell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 jan
 
Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015
 
Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6
 
T-test
T-testT-test
T-test
 
Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7
 
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
 
Chef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuChef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menu
 
Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04
 
Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.
 
Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24
 
Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23
 

Similar to Hacking

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackersbalti13
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 

Similar to Hacking (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 

More from Nafeesa Naeem

More from Nafeesa Naeem (20)

Business idea of plastic
Business idea of plastic Business idea of plastic
Business idea of plastic
 
Business plan of GFC fan
Business plan of GFC fanBusiness plan of GFC fan
Business plan of GFC fan
 
Business Plan of glow salt
Business Plan of glow saltBusiness Plan of glow salt
Business Plan of glow salt
 
Business plan of gourmet
Business plan of gourmetBusiness plan of gourmet
Business plan of gourmet
 
Amancio ortega gaona
Amancio ortega gaonaAmancio ortega gaona
Amancio ortega gaona
 
acidosis and alkalosis
 acidosis and alkalosis acidosis and alkalosis
acidosis and alkalosis
 
Water purification
Water purificationWater purification
Water purification
 
Water pollution
Water pollutionWater pollution
Water pollution
 
Ozone layer
Ozone layer Ozone layer
Ozone layer
 
Dna as a geneticmaterial
Dna as a geneticmaterial Dna as a geneticmaterial
Dna as a geneticmaterial
 
DNA
DNADNA
DNA
 
atomspheric structure
atomspheric structureatomspheric structure
atomspheric structure
 
Acid rain
Acid rain Acid rain
Acid rain
 
FACTORS AFFECTING ENZYME ACTIVITY
FACTORS AFFECTING ENZYME ACTIVITYFACTORS AFFECTING ENZYME ACTIVITY
FACTORS AFFECTING ENZYME ACTIVITY
 
freezing point
freezing pointfreezing point
freezing point
 
solutions
solutionssolutions
solutions
 
Enzymes
Enzymes Enzymes
Enzymes
 
Industries of pakistan
Industries of pakistanIndustries of pakistan
Industries of pakistan
 
Applications of hno3,h2 so4,naoh
Applications of hno3,h2 so4,naohApplications of hno3,h2 so4,naoh
Applications of hno3,h2 so4,naoh
 
CONSTITUTION 1956,1962
CONSTITUTION 1956,1962CONSTITUTION 1956,1962
CONSTITUTION 1956,1962
 

Recently uploaded

Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 

Hacking

  • 1.
  • 3. Contents History of Hacking What is Hacking? Who is Hacker? Famous hackers in history Why do Hackers hack? Types of Hacking How to give a password to account What should do after hacked How to secure our data Advantages of Hacking Disadvantages of Hacking Conclusion
  • 4. History of Hacking Hacking has been a part of computing for 40 years. The first computer hacker emerged at MIT. Hacking is began in the 1960s at MIT , origin of the term “hacker”. The truth hacker amongst our societies have thirst for the knowledge . Boredom is never an object of challenge for the hacker
  • 5. What is Hacking ? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 6.
  • 7. Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 9. Why do hackers hack ? Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network during the war.
  • 10. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 11.
  • 12. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 13.
  • 14. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 15.
  • 16. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 17.
  • 18. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 19.
  • 20. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 21.
  • 22. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 23.
  • 24. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data Ex. ◦ 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. ◦ I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking oCan be used to recover lost information where the computer password has been lost. oTeaches you that no technology is 100% secure. oTo test how good security is on your own network. oThey call it white hat computer hacking.
  • 30. Disadvantages of Hacking ◦Criminals can use it to their advantage. ◦It can harm someone's privacy ◦It's Illegal
  • 31. Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. When you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .