• Like
E.technology
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

E.technology

  • 193 views
Published

oau << semenar

oau << semenar

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
193
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
5
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Viruses @ Hackers Behaviors
  • 2. [email_address]
  • 3. [email_address] Virus first emerged in the early seventies and there are other arguments and because of this ambiguous
  • 4. Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
  • 5. The incubation period The incubation period is the period between the entry of the virus into the body (and infection)
  • 6.
    • Similar work in the computer viruses work in the human body as we say Previously
    Bio Vrs Elct Vrs
  • 7. Seaprition in body Seaprition in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk Loss
  • 8. [email_address] Why called by ( ) virus Spread Damage
  • 9. Taybe of viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
  • 10. Mechanism of Work File
  • 11. How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
  • 12. Money , fame ,  comfort ,   goals   ilegal , beautiful   goals [email_address] We don’t understand Why programer ( hackers ) making Viruses
  • 13. Hacker ,,, hacking The one man un authorized to enter the OS on your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available to the person (hacker) to remove or add Files or programs as he can control his place in the OS based the issuance of orders such as ordering the printing or imaging Or storage .. [email_address]
  • 14. Hackers in Sudan The history of electronic Web site in Sudan major breakthroughs to different sites ,,,,,, Government @Private site .. She was a major incident broke the site of the (NCI) national center for information (Joker), which he broke several government positions in the same proportion to ban the National Authority for Communications of several sites including Rapideshare / 4shared / YouTube
  • 15. Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
  • 16. World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
  • 17. Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
  • 18. Big.War.from Pcz: nets Gold.Gnr.to hac 1980 to 1989 1990 to 1994 [email_address]
  • 19. Open Port Client/Server Patch X  Penetration [email_address]
  • 20. some story at hacker Kaven metenk ,,, Digital Equipment Co. ,,, 20000 card NewYork City Magazin ,,, catch by FBI [email_address]
  • 21. Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro NOVA [email_address]
  • 22. In Conclusion, we can say that the world of viruses and hackers is a world full of wonders, but Login it require scourage and determination [email_address]
  • 23. Thank you for listening [email_address]