HACKING By Nurlyana Adiela Anuar.
>Definitions< <ul><li>Hacker :   any programming specialist who has expertise to enter computer network unauthorized.  </l...
>Have You been Hacked?< <ul><li>Discovering emails in your sent items folder that were not written nor sent by you. </li><...
>What Should You Do?< <ul><li>Shut off all connection to the internet.  It will stop the attacks so that your information ...
>Ethical Hacking< <ul><li>Preventing intruders’ threats in gaining admission into a computer system. </li></ul><ul><li>Avo...
>Conclusion< <ul><li>The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor de...
>Reference< <ul><li>http://www.wsu.edu/~mejia1/WhatHack.html </li></ul><ul><li>http://www.bama.ua.edu/~wilso098/project/so...
THE END
Upcoming SlideShare
Loading in …5
×

Hacking

2,767 views

Published on

Published in: Technology, Design
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,767
On SlideShare
0
From Embeds
0
Number of Embeds
38
Actions
Shares
0
Downloads
116
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. HACKING By Nurlyana Adiela Anuar.
  2. 2. >Definitions< <ul><li>Hacker : any programming specialist who has expertise to enter computer network unauthorized. </li></ul><ul><li>Hacking : act of illegally entering a computer system, and making unauthorized changes to the files and data contain within. </li></ul>
  3. 3. >Have You been Hacked?< <ul><li>Discovering emails in your sent items folder that were not written nor sent by you. </li></ul><ul><li>Finding that files have been moved, or even disappeared. </li></ul><ul><li>Observing that desktop icons or toolbars are blank or missing. </li></ul>
  4. 4. >What Should You Do?< <ul><li>Shut off all connection to the internet. It will stop the attacks so that your information will be protected. </li></ul><ul><li>You should have a firewall installed in your system. Many firewalls (ex. Zonealarm) are able to maintained detail description of attempted intrusions. </li></ul><ul><li>Restore and enhanced a compromised system to avoid any potential problems in your information system. </li></ul>
  5. 5. >Ethical Hacking< <ul><li>Preventing intruders’ threats in gaining admission into a computer system. </li></ul><ul><li>Avoiding damage on a company’s system, nor steal information. </li></ul><ul><li>Keeping information about a client confidential when testing their security system. </li></ul>
  6. 6. >Conclusion< <ul><li>The outcome of hacking cyberspace is neither good nor bad, positive nor negative, constructive nor destructive. It compromises a general strategy by which to explore and manipulate the systems of rationality by which these modes of assessment become possible, function, and make sense. </li></ul>
  7. 7. >Reference< <ul><li>http://www.wsu.edu/~mejia1/WhatHack.html </li></ul><ul><li>http://www.bama.ua.edu/~wilso098/project/sources.html </li></ul>
  8. 8. THE END

×