Your SlideShare is downloading. ×
Hackers and hacking in bangladesh
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Hackers and hacking in bangladesh


Published on

this is my ENG-102(communication English) term paper presentation about the topic "Hackers & Hacking in Bangladesh" ,and I choose a title for it - "Bangladeshi Cyber, An Emblem of Hacking" . …

this is my ENG-102(communication English) term paper presentation about the topic "Hackers & Hacking in Bangladesh" ,and I choose a title for it - "Bangladeshi Cyber, An Emblem of Hacking" .

Published in: Data & Analytics

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. 1 | P a g e Bangladeshi Cyber , An Emblem of Hacking Taibul Islam 2013-3-10-020 ENG 102 Section : 15 Ms. Israt Jahan 12th August , 2014
  • 2. 2 | P a g e Index : 1. Abstract page - 3 2. Introduction page -4 3. Hack and Hacking page - 5 4. Hackers page - 6 5. History of Hacking in Bangladesh page - 7 6. Main or Negative Uses page - 8 7. Positive Uses page - 9 8. Kill or Cure page - 10 9. Conclusion page - 11 10. References page – 12 11. People who gave the interview page – 13 12. Sample Question for solving term paper page - 14 – 16
  • 3. 3 | P a g e Abstract: Hackers and Hacking are two related terms which really means the abuse of some kind of technology . Mainly these kinds of words are related with computer terms . In our country Bangladesh , these terms are now so much well known that people think these are some kind of negative matter . The title of this term paper is giving a overall massage about the hacking sector also . So , this term paper will help one to come at a point which is the real meaning of Hacking and hacking sector in our country Bangladesh.
  • 4. 4 | P a g e Introduction : In our modern Bangladesh where the uses of technology is increasing day by day , the abuses of those technology is also increasing . People are involved in technology for their mutual benefit or profit but some people are also involved in abuses . The honorable government have their law for the using of technology where the abuses rate is increasing and people are now so much aware of that . The affected users always want the law should be obeyed , as hacking create its huge face among the technology users .
  • 5. 5 | P a g e Hack and Hacking: Clearly, “hack” is the word of the moment ; its technological connotations have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to mean fussing with machines . In the nineteen hundred sixty , the term seems to have migrated from the M.I.T. context to computer enthusiasts in general and in time became an essential part of their lexicon . ( source: history-of-hack ) Hacking may be done in many ways . Computer hacking , including some types of activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer subculture and Hacker ( computer security ) , to access computer networks , legally or otherwise . Sometimes it may causes computer crimes . Phone hacking , the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner . Illegal taxicab operation . Pleasure riding , horseback riding for purely recreational purposes . Shin-kicking The act of stealing jokes . Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline- hacking.
  • 6. 6 | P a g e Hackers: Hacker is a term that has been used to mean a variety of different things in computing . Currently , "hacker" is used in two main conflicting ways , 1. as someone who is able to subvert computer security ; if doing so for malicious purposes , the person can also be called a cracker . 2. an adherent of the technology and programming subculture . In computer security , a hacker is someone who focuses on security mechanisms of computer and network systems . While including those who endeavor to strengthen such mechanisms , it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures . That is , the media portrays the 'hacker' as a villain . In the programmer subculture of hackers , a hacker is a person who follows a spirit of playful cleverness and loves programming . It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source . It also has a hacker ethic , based on the idea that writing software and sharing the result on a voluntary basis is a good idea , and that information should be free , but that it's not up to the hacker to make it free by breaking into private computer systems .
  • 7. 7 | P a g e History of Hacking in Bangladesh : Maybe the Hacking first started in 1947 by William Shockley who invented the transistor and demonstrates its use for the first time . The first transistor consisted of a messy collection of wires , insulators and germanium . According to a recent poll on CNN's website , the transistor is believed to be the most important discovery in the past 100 years . The history of hacking in Bangladesh is actually unknown to all , on the other hand this sector is an increasing or raising part in our country at present . Mostly the abuses of internet means the main part of hacking in Bangladesh and it is increasing now a days .
  • 8. 8 | P a g e Main or Negative Uses : Hacking is mainly known for its negative uses . People think the hacking is only for bad or harm someone or some group who or which is related with technology . Actually , the hacking is mainly for that . Hackers through their terms for hacking technologies . From the beginning the Hackers think that they always do the right thing which should be done who are Hacked by them . These kind of Hackers are known as The black hat hackers , who hacked the technology only for some kind of jealousy or for their personal benefit . In our country Bangladesh these kind of Hacking is increasing more and more among the new users of technology , and the people called these kind of term as the Cyber War. They always target mostly Financial data , Intellectual property , personal data , System asses etc .
  • 9. 9 | P a g e Positive Uses: The uses of Hacking can be positive by hackers . These Kind of hack or hackers are often known as the White hat Hackers . These kind of Hacking mainly done only to save Hacked technology or secure the technology from hacking . Most of the Hackers first starts their Hacking life by using this type of Hacking , sometimes they also work as a middle group for hack and hacking terms or technology . People mostly think that these term should be increased only for its positive side . These kind of uses can be increased if people want this kind of uses .
  • 10. 10 | P a g e Kill or Cure : There are a law to stop the Hacking , and it says that if a person intentionally causes loss or damage to any other person or organization by any act which destroys , deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means , would be considered to have engaged in hacking. So for the cyber crime this law can be applied in everywhere . And the main thing is awareness of the users and people .
  • 11. 11 | P a g e Conclusion : It is clear to everyone that there are mainly two kind of hackers , White hat and Red hat hackers. There have another hackers who try to call them as Gray or Brown hat hackers . Hackers identity can be defined in many ways but these should be stopped or in some case these should be cured not only from Bangladesh but also from the whole world . So , the reader of this term paper , I think , a real technology user and always uses his / her technology only for using not for abusing .
  • 12. 12 | P a g e References : a) Hacking b) Hacker c) Hacking Term d) History of hacking ## These following terms are collecting from – 1) Wikipedia 2) Wikimedia 3) Google ## The terms of Hacking sectors of Bangladesh from - A)
  • 13. 13 | P a g e People who gave the interview : 1. Md. Ismail Hossain , CSE department , IUB 2. Rafaetul Kabir Adeab , CSE department , IUB 3. Code – A , EWU ( Hacker ) 4. Sabbir Ahmed , CSE department, AIUB 5. Md. Tanvir Hossain Tuhin , CSE department , AIUB 6. Al Masum Fahim , CSE department , AUST There are another two people who didn’t like to give their identity . These people are giving their valuable time and ideas to complete this term paper.
  • 14. 14 | P a g e Bangladeshi Cyber , A Emblem of Hacking Interviews for the term paper of ENG – 102 Questionnaires (If you are a “Hacker” your name and detail must be hidden) Student name : University name : Department : 1. What do you mean by Hack or Hacking ? a) It is full of logic b) It is nothing but hell c) It should be stopped d) It should be done in an increasing rate 2. Are you a Hacker ? (This answer will be hidden) a) No b) Yes c) Want to be d) Don’t want to be 3. What kind of Hacking should be done ? a) White Hat b) Red Hat c) None of them d) Both of them
  • 15. 15 | P a g e 4. Is it so much helpful ? a) Yes b) No c) Can be d) Must be 5. Hacking increases ideas – Do you agree with that ? a) Yes b) Obviously c) Only for sometime d) No 6. Hackers are so much genius – Is it true ? a) Yes b) Not always c) No d) May be 7. Will Hacking make our country developed ? a) Yes b) No c) Can be d) Must be 8. How many technologies you Hacked ? (This answer will be hidden) a) Less than 100 b) More than 100 c) Didn’t do d) Can’t count
  • 16. 16 | P a g e 9. How many technologies that you use is Hacked ? (This answer will be hidden) a) Mostly all b) Not any c) Half of them d) I Hacked others 10. Your idea or philosophy about Hacking in Bangladesh ------------------------- ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ Your signature : Date :