Hacking
Upcoming SlideShare
Loading in...5
×
 

Hacking

on

  • 904 views

 

Statistics

Views

Total Views
904
Slideshare-icon Views on SlideShare
902
Embed Views
2

Actions

Likes
0
Downloads
7
Comments
0

2 Embeds 2

http://www.slideshare.net 1
http://localhost 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hacking Hacking Presentation Transcript

    • Hackers By Nicolas Loh
    • Introduction
      • A Hacker is a person who breaks into computers or computer networks either for profit or for personal accomplishment.
    • How do they get caught
      • Logs
      • Code that they run on the system
      • “ Honeypot” program
      • Keyloggers in LAN cafes
      • Trackers
    • Protection against hackers
      • Harden your systems (also called "lock-down" or "security tightening")
      • Patch all your systems
      • Install a firewall on the system, or at least on the network
      • Use Anti – Virus Software
      • Use encrypted connections
    • News on Hacking
      • Early 1990s Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
    • News on Hacking
      • November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. T
    • Detecting Hackers
      • Lights showing hard drive activity being busier than what your own activities call for
      • Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix
      • Obvious tampering - destroyed files, missing files, etc.
      • Your firewall keeps receives multiple packets from a single web address and notifies you.
    • The End