Hacking

868 views
794 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
868
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. Hackers By Nicolas Loh
  2. 2. Introduction <ul><li>A Hacker is a person who breaks into computers or computer networks either for profit or for personal accomplishment. </li></ul>
  3. 3. How do they get caught <ul><li>Logs </li></ul><ul><li>Code that they run on the system </li></ul><ul><li>“ Honeypot” program </li></ul><ul><li>Keyloggers in LAN cafes </li></ul><ul><li>Trackers </li></ul>
  4. 4. Protection against hackers <ul><li>Harden your systems (also called &quot;lock-down&quot; or &quot;security tightening&quot;) </li></ul><ul><li>Patch all your systems </li></ul><ul><li>Install a firewall on the system, or at least on the network </li></ul><ul><li>Use Anti – Virus Software </li></ul><ul><li>Use encrypted connections </li></ul>
  5. 5. News on Hacking <ul><li>Early 1990s Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering. </li></ul>
  6. 6. News on Hacking <ul><li>November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a &quot;fast-track extradition&quot; to the US where he is a wanted man. T </li></ul>
  7. 7. Detecting Hackers <ul><li>Lights showing hard drive activity being busier than what your own activities call for </li></ul><ul><li>Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix </li></ul><ul><li>Obvious tampering - destroyed files, missing files, etc. </li></ul><ul><li>Your firewall keeps receives multiple packets from a single web address and notifies you. </li></ul>
  8. 8. The End

×