Your SlideShare is downloading. ×
0
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hacking

548

Published on

hacking awareness

hacking awareness

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
548
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
65
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.  Hacking generally refers to act of a person abusing computer access, breaking into computers, or using computers without authorization. An intruder or attacker is a person who carries out an attack.
  • 2.  There are in essence two types of hackers, often referred to as 1.White-hat hackers. 2.Black-hat hackers. White hat hackers enjoy learning and working with computer systems, and consequently gains a deeper understanding of the subject. Black-hat hackers often called as ‘Crackers’ called by White-hat hackers.
  • 3.  Curiosity. Money. Spying. Prestige Intellectual Challenge. Anarchy.
  • 4.  Steal credit card numbers. Steal passwords to other systems. To steal programs or files. Read others’ mails.
  • 5.  Files disappear or are modified unexpectedly. Strange files appear or grow in size unexpectedly. Programs stop working as expected. Your internet connection slows dramatically for an extended period. The computer starts crashing frequently.
  • 6.  Gathering information. 1.port scanning. 2.packet sniffing. Launching attack 1.Denial of Service(DOS). 2.Password cracking. 3.Packet Sequence attacks. 4.Operating System exploits. 5.FTP(File Transfer Protocol). 6.Fore Core Dumping.
  • 7.  Server-side security. It is a very large and complex area. Client-side security:-This contains 3 areas 1.Anti-virus security. 2.Personal Firewall. 3.Encryption.
  • 8.  Encryption programs basically ‘scramble’ the original file so that it is unreadable to anyone without the correct password to de-scramble the file. The key to data encryption is to choose your passwords carefully, and change your passwords frequently.
  • 9.  The main appeal to me is to ability to communicate complex ideas in a fast, cheap and creative way. A level-headed approach should be taken by all internet users to protect their privacy and security online. When the true meaning of hacking is realized people will be able to publicly declare themselves as hackers.

×