Unlike most computer crime / misuse
areas which are clear cut in terms of
actions and legalities , computer
hacking is more difficult to define.
There is no exact definition of hacking.
Hacking means finding out weaknesses
in an established system and exploiting
them. Computer hacking always
involves some degree of infringement
on the privacy of others or damage to
computer-based property such as
files, web pages or software
WHO IS A HACKER?
On hearing the word “HACKER” most of
the peoples are scared. Most of them
think of hacker as a computer vandals.
But hackers are not computer criminals.
Traditionally, hackers were computer
geeks who know almost everything about
computers both hardware and software
and are widely respected for there
People who break into
someone’s system are called
People who code and release
viruses are not necessarily
hackers, they are
TYPES OF HACKERS
• BLACK HAT HACKERS
• WHITE HAT HACKERS
• GRAY HAT HACKERS
THREE TOP SIGNS SHOWING THAT
A PERSON IS NOT A REAL HACKER
He uses weird handles like
avenger, skull, kewl etc.
He boasts about how much he knows, a
sure sign of a person who lacks real
He flames newbie's of people who ask
questions, instead of helping them learn.
We can categorize Cyber crimes in two
The Computer as a Target :-using a
computer to attack other computers e.g.
Hacking, Virus/Worm attacks, DOS attack
The computer as a weapon :-using a
computer to commit real world crimes.
e.g. Cyber Terrorism, IPR
violations, Credit card frauds, EFT
frauds, Pornography etc.
IT ACT 2000
• In May 2000, both the houses of the
Indian Parliament passed the
Information Technology Bill. The Bill
received the assent of the President in
August 2000 and came to be known as the
Information Technology Act, 2000. Cyber
laws are contained in the IT Act, 2000.
• This Act aims to provide the legal
infrastructure for e-commerce in India.
And the cyber laws have a major impact
for e-businesses and the new economy in
India. So, it is important to understand
what are the various perspectives of the IT
Act, 2000 and what it offers.
WHAT CAN BE HACKED?
• Simple step just open the computer
then look for a round lithium
round battery it will probably look
like a silver coin. Remove the
battery and after 30 seconds or so
put it back. Some computers may
also require you to reset the
jumper, so look for a 3-pin jumper
and reset it. If you move the jumper
to pins two and three and leave it
there for over five seconds, it will
reset the CMOS.
CAREER IN ETHICAL
• In the past few years the demand
of ethical hackers is increased in
the industry. Undoubtly it is a
highly paid job.
• You can become a “CERTIFIED
ETHICAL HACKER”(CEH) or a
Some terms related to Hacking
• INTERNET WORMS
Worms are often used to
infect large no. of broadband connected
computers with remote control software.It
works differently then a virus.It won’t attach
to different programs but it will produce
precise copies of itself
A rootkit is often a collection of
programs which are hidden deep into your
computer system. They enable administrator
level access to a computer or network. For
installing a rootkit first of all a programmer
has to gain user level access in a system
A zombie computer or a “DRONE”
is a computer that has been secretly
compromised by hacking tools which allow
third party to control the computer and its
Used to be a junk or bulk email sent by
the spammer to various recipients aimed at
advertising, scamming and sending viruses.