SlideShare a Scribd company logo
1 of 16
WELCOME TO
Submitted by: -
Fozail Ahmad
Nabeela Shahid
HACKING
CONTENTS
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
HISTORY OF HACKING
 Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by
enraged authorities. Here's a peek at how busy hackers have been in
the past 35 years.
Early 1960s
 University facilities with huge mainframe computers, likeMIT's artificial
intelligence lab, become staging grounds for hackers. At first, "hacker"
was a positive term for a person with a mastery of computers who could
push programs beyond what they were designed to do.
Early 1970s
o Two members of California's Homebrew Computer Club begin making
"blue boxes," devices used to hack into the phone system. The
members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak
Toebark" (Steve Wozniak), later go on to found Apple computer.
Early 1980s
 Author William Gibson coins the term "cyberspace" in a science fiction
novel called Neuromancer.
 In one of the first arrests of hackers, the FBI busts the Milwaukee-based
414s (named after the local area code) after members are accused of 60
computer break-insranging from Memorial Sloan-Kettering Cancer Center
to Los Alamos National Laboratory.
Late 1980s
 First National Bank of Chicago is the victim of a $70-million computer heist.
 An Indiana hacker known as "Fry Guy" -- so named for hacking
McDonald's -- is raided by law enforcement. A similar sweep occurs in
Atlanta for Legion of Doomhackers known by the handles "Prophet,"
"Leftist" and "Urvile.“
Early 1990s
 A 17-month search ends in the capture of hacker Kevin Lee
Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Late 1990s
 Popular Internet search engine Yahoo! is hit by hackers claiming a "logic
bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless
Kevin Mitnick is released from prison. "There is no virus," Yahoo!
spokeswoman Diane Hunt said.
1998
 Hackers claim to have broken into a Pentagon network and stolen software
for a military satellite system. They threaten to sell the software to
terrorists.
2000
 The "I Love You" virus debuts on the Internet in May, appearing first in the
Philippines, then spreading across the globe in a matter of hours. It causes
an estimated $10 billion of damage globally in lost files and computer
downtime before a solution is found.
o 1.Hacking refers to the activities which are done to intrude some one
else’s personal information so as to use it for malicious, unwanted
purposes.
o 2. Hacking is a term which refers to the activities aimed at exploiting
security flaws to obtain personal information for gaining access to
secured networks.
What is hacking
Who is a hacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
LinusTorvaldsMark Abene Robert Morris
WHY DO HACKERS HACK ?
o Just for fun.
o Show off.
o Hack other systems secretly.
o Notify many people their thought.
o Steal important information.
o Destroy enemy’s computer network during the war.
Types of Hacking
o Website Hacking
o Network Hacking
o Ethical Hacking
o Email Hacking
o Password Hacking
o Online Banking Hacking
o Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc…
over the network.
Ethical Hacking
Ethical hacking is where a person hacks to
find weaknesses in a system and then usually
patches them.
Email Hacking
Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process
of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online
banking hacking.
Computer Hacking
Computer Hacking is when files on your computer
are viewed, created, or edited without your
authorization.
What should do after hacked?
o Shutdown the system
Or turn off the system
o Separate the system from network
o Restore the system with the backup
Or reinstall all programs
o Connect the system to the network
o It can be good to call the police
How to give a password to account.
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
Advantages of hacking
Can be used to recover lost information where the computer
password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
Keep your password protected. Write your password should be
with combination of characters, digits, special symbols. Do not
respond to feck on fishing email. when you are doing any online
transection always keep watch on site whether the protocol of site
is https & whether there is a lock symbol .
THANKS TO ALL
RGI - FAMILY
VIHAN
CO-ORDINATOR
ASSOCIATE MEMBER
FOR GIVING ME A CHANCE TO
PARTICIPATE.
Hacking

More Related Content

What's hot (20)

Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 

Similar to Hacking (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Hacking

  • 2. Submitted by: - Fozail Ahmad Nabeela Shahid HACKING
  • 3. CONTENTS  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 4. HISTORY OF HACKING  Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s  University facilities with huge mainframe computers, likeMIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s o Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple computer.
  • 5. Early 1980s  Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.  In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-insranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory. Late 1980s  First National Bank of Chicago is the victim of a $70-million computer heist.  An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doomhackers known by the handles "Prophet," "Leftist" and "Urvile.“ Early 1990s  A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
  • 6. Late 1990s  Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said. 1998  Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. 2000  The "I Love You" virus debuts on the Internet in May, appearing first in the Philippines, then spreading across the globe in a matter of hours. It causes an estimated $10 billion of damage globally in lost files and computer downtime before a solution is found.
  • 7. o 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. o 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks. What is hacking Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. FAMOUS HACKERS IN HISTORY Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvaldsMark Abene Robert Morris
  • 9. WHY DO HACKERS HACK ? o Just for fun. o Show off. o Hack other systems secretly. o Notify many people their thought. o Steal important information. o Destroy enemy’s computer network during the war. Types of Hacking o Website Hacking o Network Hacking o Ethical Hacking o Email Hacking o Password Hacking o Online Banking Hacking o Computer Hacking
  • 10. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 11. Email Hacking Email hacking is illicit access to an email account or email correspondence. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 12. Computer Hacking Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. What should do after hacked? o Shutdown the system Or turn off the system o Separate the system from network o Restore the system with the backup Or reinstall all programs o Connect the system to the network o It can be good to call the police
  • 13. How to give a password to account. Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password. Advantages of hacking Can be used to recover lost information where the computer password has been lost. Teaches you that no technology is 100% secure. To test how good security is on your own network. They call it white hat computer hacking.
  • 14. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  • 15. THANKS TO ALL RGI - FAMILY VIHAN CO-ORDINATOR ASSOCIATE MEMBER FOR GIVING ME A CHANCE TO PARTICIPATE.