Hacker Anis

2,467 views
2,396 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,467
On SlideShare
0
From Embeds
0
Number of Embeds
37
Actions
Shares
0
Downloads
74
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hacker Anis

  1. 1. HACKER ANIS ALWANEE RAMLEE 4 ASMA SMK SULTANAH ASMA
  2. 2. <ul><li>Topic of discussion : hacking Description of topic Example of use Importance to know about this topics Experience dealing with this topics Suggestion to use it OR Steps to avoid it Reference </li></ul>Contents
  3. 3. <ul><li>Hacker is a term applied often to computer software or computer hardware programmers, designers and administrators, and especially those who are perceived as experts or highly accomplished. </li></ul><ul><li>A hacker is also someone who modifies electronics </li></ul><ul><li>For example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context </li></ul>DEFINITION OF HACKER
  4. 4. <ul><li>In computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one's peers. </li></ul><ul><li>A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. </li></ul>Definition of hacker in computer programming
  5. 5. <ul><li>For some, &quot;hacker&quot; has a negative connotation and refers to a person who &quot;hacks&quot; or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. </li></ul><ul><li>This pejorative form of the noun &quot;hack&quot; is even used among users of the positive sense of &quot;hacker&quot; (some argue that it should not be due to this pejorative meaning, but others argue that some kludges can, for all their ugliness and imperfection, still have &quot;hack value&quot;) </li></ul>
  6. 6. <ul><li>a hacker is a person who specializes in work with the security mechanisms for computer and network systems. </li></ul><ul><li>While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. </li></ul>definition of hacker in computer security
  7. 7. <ul><li>In hacker culture, a hacker is a person who has attained the respect of one's peers </li></ul>Definition of hacker in hacker culture
  8. 8. <ul><li>The hacker community, the set of people who would describe themselves as hackers or described by others as hackers, falls into at least three partially overlapping categories. </li></ul><ul><li>Sometimes alternate terms such as &quot;cracker&quot; are used in an attempt to more exactly distinguish which category of hacker is intended, or when attempting to put a contextual distance between the categories due to the hacker definition controversy . </li></ul>Categories of hacker
  9. 9. <ul><li>Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff. </li></ul>Ways to Minimize Potential for Hacking
  10. 10. <ul><li>Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others' privacy. </li></ul>
  11. 11. <ul><li>The use of filters may be considered in reducing access to unauthorized software serial numbers and hacking-related materials, newsgroups, chatrooms and hacking organizations. </li></ul><ul><li>Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior . </li></ul>
  12. 12. THE END

×