Your SlideShare is downloading. ×
Hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
732
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Hackers By Nicolas Loh
  • 2. Introduction
    • A Hacker is a person who breaks into computers or computer networks either for profit or for personal accomplishment.
  • 3. How do they get caught
    • Logs
    • Code that they run on the system
    • “ Honeypot” program
    • Keyloggers in LAN cafes
    • Trackers
  • 4. Protection against hackers
    • Harden your systems (also called "lock-down" or "security tightening")
    • Patch all your systems
    • Install a firewall on the system, or at least on the network
    • Use Anti – Virus Software
    • Use encrypted connections
  • 5. News on Hacking
    • Early 1990s Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
  • 6. News on Hacking
    • November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. T
  • 7. Detecting Hackers
    • Lights showing hard drive activity being busier than what your own activities call for
    • Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix
    • Obvious tampering - destroyed files, missing files, etc.
    • Your firewall keeps receives multiple packets from a single web address and notifies you.
  • 8. The End

×