โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
Upcoming SlideShare
Loading in...5
×
 

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา

on

  • 254 views

 

Statistics

Views

Total Views
254
Slideshare-icon Views on SlideShare
254
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา Presentation Transcript

    • HackingHackking
    • Hacking• Hacker Hacker Hacker Security Professional Hacker Ethical Hacker White Hat Hacker Cracker Black
    • Cracker• cracker Hacker password
    • HackerUNIX
    • Hacker Cracker Internet• Password Sniffers Log on Password) Spooling Internet Address) Root) Sniffers Back Door The Hole in the Web World -Wide-Web (WWW ) Website Site
    • Hacking• Hacker white hat hacker) black hat hacker) Grey hat hacker) Yellow hat hacker) White hat hacker Hacker bug web site bug ethical hacker Hacker bug
    • Hacking• Black hat hacker Hacker hacker hacker web site web site virus script ad Aare spy ware software key logger link software web site link• Grey hat hacker web site web site web site web site• Yellow hat hacker hack
    • HackerCracker
    • Password Sniffers Log on Password) SpoofingInternet Address) Root) Sniffers Back Door
    • The Hole in the WebWorld -Wide-Web Website Site
    • Hacker• Network OS ) UNIX OS UNIX Interactive time sharing OS C UNIX OS Free ware product Hacker Idea UNIX Version Version USENET Hacker Newgroup Newgroup HOST Server Internet Web browser USENET Newgroup Enduser www technic computer Netware
    • Hacking• Hacker Cracker
    • Hacking• Hacker Cracker
    • 1.Robert Tappan Morris• - rtm National Computer Security Center NSA(National Security Agency– No Such Agency Dan Brown SuperUser Belle Lab - worm Cornell worm MorrisWorm) worm replicate - Ph.D Harvard MIT
    • 2. Kevin Mitnick• - Condor crack North American Aerospace Defence Command Punch Card Los Angeles BusSystem• - Digital Equibment Corperation software Nokia Motorolla - hack Tsutomu Shiomura Shiomura FBI Shiomura White hat - hacker
    • 3. Adrian Lamo• - The homeless hacker’ laptop,• - The New York Times The New York Times LexisNexis The New York Times Microsoft ,Yahoo , Bank of America CitiGroup - Hacker
    • 4. Gary McKinnon - Solo• - US Government U.S. Department of Defense, -
    • 5.Raphael Gray - Curador• - e-commerce• - The saint(of e-commerce)
    • 6 .John Draper – Cap’n Crunch• - crack phone phreaking) PC Draper - crack Draper (!?!)– Cap’n Crunch cereal whistle Hz Bluebox
    • 7. Kevin Poulsen – Dark Dante• - FBI - Pacific Bell KIIS-FM LA Porche!!! - Wired News BlackHat
    • 8. Dmitri Galushkevich• - hacker hack internet gridlock”– ATM, Martin Luther King
    • 9. Jonathan James - c0mrade• - BellSouth DTRA Hack Backdoor Nasa Nasa Nasa - James C
    • 10.The Deceptive Duo - Benjamin Stark c]t Robert Lyttle• - FAA(
    • • Hacker
    • • hacker
    • 1.Tsutomu Shimomura• - John Markoff FBI Kevin Mitnick - Osamu Shimomura TakeDown KevinMitnick TakeDown
    • 2.Stephen Wozniak• - Apple Computer - Wozniak Esquire ( Esquire Steve Jobs BlueBox Steve Wozniak BlueBox Henry Kissinger
    • 3.Tim Berners-Lee• - www Lee Convey Mary Berners-Lee Manchester Mark 1 Tim Berners-Lee FreeLance CERN ( Hypertext) TCP DNS www Welcome to info.cern.ch Tim Berners-Lee hacker- hack acess code) Oxford
    • 4.Richard Stallman• - MIT StaffComputer Stallman hack Printer - GNU Copyleft
    • Social Engineering• Dumpster Diving) Phishing•
    • Password Guessing• Password Password Password Password Password Password Password
    • Denial of Service (DOS)• Denial of Service ( Denial of Service Firewall IDS Update Software Distributed Denial of Service (DDOS)[7]
    • Decryption• Key Algorithm Decryption Key Weak Key Key Key bit Key
    • Birthday Attacks•• Random Key Random Key Key
    • Man in the middle Attacks• Active Passive Replay Attack• Digital Signature