HACKING The things you need to know About hacking..
  Content <ul><li>Description of Hacking </li></ul><ul><li>Technique Usually Used By Hackers </li></ul><ul><li>Steps To Av...
Description of  Hacking <ul><li>There are many definitions of hacking, as well as varying ideas of what a hacker is or doe...
Technique Usually Used By Hackers <ul><li>Fake Login Page </li></ul><ul><li>Key Logger Spy Software </li></ul><ul><li>Key ...
  Fake Login Page <ul><li>A few computer security web pages provide what is known as the from a computer security web page...
Key Logger Spy Software <ul><li>A keylogger is simply a program or a device that records everything you type on the keyboa...
  Key Logger Hardware <ul><li>Computer security shops sell a small device known as the keylogger, this is usually a small ...
Backdoor <ul><li>A backdoor is simply a way back into a system that not only bypasses existing security to regain access, ...
Steps To Avoid From Being Hacked <ul><li>Always have an Anti-Spyware software,Anti-Virus and a Firewall. </li></ul><ul><li...
Why does Hacker Hacks? <ul><li>Job </li></ul><ul><li>Entertainment for them </li></ul><ul><li>The Only Thing they are spec...
  Conclusion <ul><li>Hacking is a way of getting into a system without authorization done by Hackers.Hackers usually got m...
  Resources <ul><li>http://www.bama.ua.edu/~wilso098/project/hacking/whatishacking.html </li></ul><ul><li>http://www.freew...
Upcoming SlideShare
Loading in …5
×

Aiman

4,244 views

Published on

Published in: Technology
1 Comment
1 Like
Statistics
Notes
  • I never knew i would need this powerpoint back lol. ^^
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
4,244
On SlideShare
0
From Embeds
0
Number of Embeds
35
Actions
Shares
0
Downloads
197
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Aiman

  1. 1. HACKING The things you need to know About hacking..
  2. 2. Content <ul><li>Description of Hacking </li></ul><ul><li>Technique Usually Used By Hackers </li></ul><ul><li>Steps To Avoid From Being Hacked </li></ul><ul><li>Why Does Hacker Hacks </li></ul><ul><li>Conclusion </li></ul><ul><li>Resources </li></ul>
  3. 3. Description of Hacking <ul><li>There are many definitions of hacking, as well as varying ideas of what a hacker is or does. Simply stated a hacker is any programming specialist who has the expertise to enter a computer or network without proper authorization. </li></ul><ul><li>In reference to a system’s security, hacking is usually defined as the act of illegally entering a computer system, and making unauthorized changes to the files and data contained within. </li></ul>
  4. 4. Technique Usually Used By Hackers <ul><li>Fake Login Page </li></ul><ul><li>Key Logger Spy Software </li></ul><ul><li>Key Logger Hardware </li></ul><ul><li>Backdoor </li></ul>
  5. 5. Fake Login Page <ul><li>A few computer security web pages provide what is known as the from a computer security web page and installed on the target's computer. </li></ul><ul><li>Once the target accesses his/her email login page E.g. www.myspace.com fake login page. This software is downloaded the fake login page will show that looks exactly like the original email login page, when they type their username/password to login the password is saved permanently in a secret file on the computer. </li></ul><ul><li>All the hacker has to do then is retrieve and view the file to see the target's password. </li></ul>
  6. 6. Key Logger Spy Software <ul><li>A keylogger is simply a program or a device that records everything you type on the keyboard, that includes any passwords that are typed. </li></ul><ul><li>There are a lot of different Spy Softwares available on the internet such as on computer security web pages and software download sites. Spy software main objective is to collect information on the use of your computer. </li></ul><ul><li>The software needs to be installed on the computer to be hacked and after that gives detailed reports and log files on the activity of the users such as what web pages were visited and more importantly everything they have typed. </li></ul><ul><li>Then all that has to be done is to view the keylogger file and identify any text that appears to be the password. </li></ul>
  7. 7. Key Logger Hardware <ul><li>Computer security shops sell a small device known as the keylogger, this is usually a small cylindrical device that acts as a through-port between the keyboard cable's plug and the computer's socket. </li></ul><ul><li>This will record all the keystrokes typed by the keyboard user and all the data is saved on the device itself. Once the device is retrieved any computer can be used to download the keystrokes and evaluate the file to find the password being used. </li></ul><ul><li>Once again you need physical access to the computer being hacked to use this device. </li></ul><ul><li>The advantage is that the device cannot be detected by any software on the computer such as antivirus software and security software. </li></ul>
  8. 8. Backdoor <ul><li>A backdoor is simply a way back into a system that not only bypasses existing security to regain access, but may even defeat any additional security enhancements added onto a system. </li></ul><ul><li>Backdoors can range from the simple to the exotic. Simple backdoors might include creating a new user account just for your intrusion needs, or taking over a little-used account. More complex backdoors may bypass regular access completely and involve trojans, such as a login program that gives you administrative access if you type in a special password. </li></ul><ul><li>Backdoors can be chained together, which is the technique used by most hackers. This involves a combination of techniques. For example, one or more accounts that have basic user access may have had their passwords cracked, and one or more accounts may be created by the hacker. </li></ul><ul><li>Once the system is accessed by the hacker, the hacker may activate some technique or exploit a system misconfiguration that allows greater access. </li></ul>
  9. 9. Steps To Avoid From Being Hacked <ul><li>Always have an Anti-Spyware software,Anti-Virus and a Firewall. </li></ul><ul><li>Only download software or files from a trusted website. </li></ul><ul><li>Learn more about hacking so you know how to counter-measure </li></ul>
  10. 10. Why does Hacker Hacks? <ul><li>Job </li></ul><ul><li>Entertainment for them </li></ul><ul><li>The Only Thing they are specialized to do. </li></ul><ul><li>To get classified information and gains advantage from it. </li></ul>
  11. 11. Conclusion <ul><li>Hacking is a way of getting into a system without authorization done by Hackers.Hackers usually got many complicated ways hacking into a system.The reason why Hackers hack are because the job payments are high,entertainment for them and it is what they specialize in.After all,without Hackers there wil be no Hacking. </li></ul>
  12. 12. Resources <ul><li>http://www.bama.ua.edu/~wilso098/project/hacking/whatishacking.html </li></ul><ul><li>http://www.freewebtown.com/hackmail/How-to-Hack-Yahoo-and-Hotmail.htm </li></ul><ul><li>http://www.nmrc.org/pub/faq/hackfaq/hackfaq-07.html </li></ul>

×