COMPUTER HACKING
CONTENT
WHAT IS HACKING?
HACKING HISTORY
• Computer Hacking include stealing information from computer.
• Accessing other personal...
HACKER & CRACKER
• Who is hacker?
• Who is cracker?
• Difference between hacker & cracker?
• Famous hackers
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
TYPES OF HACKING
• Website Hacking
1. Break password protected section
2. Modify a website
• Email Hacking
• Network Hacki...
SECURITY
• Email Security (Disposable Email)
• Firewall & Anti-Virus
• Operating system Update
• Password Length
Security ...
CONCLUSION
• Required (Keyboard Tracer or logger)
ANY QUESTION
Upcoming SlideShare
Loading in...5
×

Hacking

283

Published on

What is hacking?
History of hacking.
Who is hacker and cracker?
Difference between hacker & cracker.
Types of hacking.
Benefits Of Computer Hacking
Security
Conclusion (How to hack your friend account or his/her password?)

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
283
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. COMPUTER HACKING
  2. 2. CONTENT
  3. 3. WHAT IS HACKING? HACKING HISTORY • Computer Hacking include stealing information from computer. • Accessing other personal files. • Remote desktop technique. • First hacker was appeared in 1960s. • In 1970s different kind of hackers appeared like “phone phreakers” . • In 1990s when the use of internet hacking become more advance. • In 2001 hackers attacked ebay, yahoo!, ccn.com e.t.c. Computer Hacking:
  4. 4. HACKER & CRACKER • Who is hacker? • Who is cracker? • Difference between hacker & cracker? • Famous hackers
  5. 5. FAMOUS HACKERS IN HISTORY Ian Murphy Kevin Mitnick Johan Helsinguis Mark AbeneLinus Torvalds Robert Morris
  6. 6. TYPES OF HACKING • Website Hacking 1. Break password protected section 2. Modify a website • Email Hacking • Network Hacking • Password Hacking 1. Individual (Owner itself) 2. Brute force (Hacker technique) • Hardware Hacking
  7. 7. SECURITY • Email Security (Disposable Email) • Firewall & Anti-Virus • Operating system Update • Password Length Security Essentials Windows Defender OS X Gatekeeper
  8. 8. CONCLUSION • Required (Keyboard Tracer or logger)
  9. 9. ANY QUESTION
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×