Your SlideShare is downloading. ×
0
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Hacker Anis
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hacker Anis

2,283

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,283
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
73
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HACKER ANIS ALWANEE RAMLEE 4 ASMA SMK SULTANAH ASMA
  • 2. <ul><li>Topic of discussion : hacking Description of topic Example of use Importance to know about this topics Experience dealing with this topics Suggestion to use it OR Steps to avoid it Reference </li></ul>Contents
  • 3. <ul><li>Hacker is a term applied often to computer software or computer hardware programmers, designers and administrators, and especially those who are perceived as experts or highly accomplished. </li></ul><ul><li>A hacker is also someone who modifies electronics </li></ul><ul><li>For example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context </li></ul>DEFINITION OF HACKER
  • 4. <ul><li>In computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one&apos;s peers. </li></ul><ul><li>A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. </li></ul>Definition of hacker in computer programming
  • 5. <ul><li>For some, &amp;quot;hacker&amp;quot; has a negative connotation and refers to a person who &amp;quot;hacks&amp;quot; or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. </li></ul><ul><li>This pejorative form of the noun &amp;quot;hack&amp;quot; is even used among users of the positive sense of &amp;quot;hacker&amp;quot; (some argue that it should not be due to this pejorative meaning, but others argue that some kludges can, for all their ugliness and imperfection, still have &amp;quot;hack value&amp;quot;) </li></ul>
  • 6. <ul><li>a hacker is a person who specializes in work with the security mechanisms for computer and network systems. </li></ul><ul><li>While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. </li></ul>definition of hacker in computer security
  • 7. <ul><li>In hacker culture, a hacker is a person who has attained the respect of one&apos;s peers </li></ul>Definition of hacker in hacker culture
  • 8. <ul><li>The hacker community, the set of people who would describe themselves as hackers or described by others as hackers, falls into at least three partially overlapping categories. </li></ul><ul><li>Sometimes alternate terms such as &amp;quot;cracker&amp;quot; are used in an attempt to more exactly distinguish which category of hacker is intended, or when attempting to put a contextual distance between the categories due to the hacker definition controversy . </li></ul>Categories of hacker
  • 9. <ul><li>Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff. </li></ul>Ways to Minimize Potential for Hacking
  • 10. <ul><li>Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others&apos; privacy. </li></ul>
  • 11. <ul><li>The use of filters may be considered in reducing access to unauthorized software serial numbers and hacking-related materials, newsgroups, chatrooms and hacking organizations. </li></ul><ul><li>Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior . </li></ul>
  • 12. THE END

×