High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Hacking
1.
2.
3. CONTENTS
What is Hacking?
Who is Hacker?
Hackers & Crackers
History of Hacking
Types of Hacking
Types of Hackers
Ways to prevent hacking
4. WHAT IS HACKING?
The act of gaining access
without legal authorization
to a computer or computer
network is known as
Hacking.
5. WHO IS HACKER?
An expert computer
programmer, who breaks
computer and network
security and is involved in
the process of hacking is
known as Hacker.
6.
7.
8.
9. Crackers:
A cracker is a person with
extensive computer knowledge
whose purpose is to violates
the system integrity or gain
access to software without
paying royalties. Crackers can
easily be identified because
there actions are malicious.
10.
11. History of Hacking:
During the 1970’s the hackers
learned the ways to hack the
telephonic system and make
phone calls for free.
By the 1980’s, hackers started to
migrate to computers.
During the 1990’s when the use
of internet widespread around the
world, hackers multiplied.
12. Types of hacking:
• Password Hacking
• Email Hacking
• Website Hacking
• Credit Card Hacking
• Linux Hacking
13. PASSWORD HACKING:
A password is a combination of characters
that a user uses for protecting information.
Once a file is protected by a password,
only those that know it can access it.
The most common used tool to hack the
password is Social Engineering.
TYPES OF PASSWORD HACKING:
Email Password Hacking
Windows Password Hacking
Bios Password Hacking
14. Email Hacking:
There are several methods for
hacking yahoo, msn email accounts.
One of these methods is Social
Engineering.
Hacking yahoo messenger or any
other messenger is quite easy if you
know the person’s Email ID.
15. Website hacking:
There are two main types of website
hacking.
o Break the password protected
sections.
o Can deform or modify a website.
Credit card hacking:
In face to face transactions, the
percentage of credit card fraud is
almost a tenth of percent but in online
transactions its as high as two or three
percent.
16. Linux hacking:
Linux is an open source and
Windows are closed source. It
means that only Microsoft is
authorized to change any part of
the code of the Windows
operating system. While in Linux,
anyone can change it. That's
why hackers try to hack
machines with Linux.
17. Types of hackers:
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
18. White hat hackers:
These are considered as
good guys. White Hat
Hackers don’t use their
skills for illegal purposes.
They usually become
Computer Security Experts
and help to protect people
from Black Hats.
19. Black hat hackers:
These are considered as
bad guys. Black Hat
Hackers usually use their
skills maliciously for
personal gain.
They are the people that
hack banks, steal credit
cards and deface websites.
20. Grey hat hackers:
A Grey Hat Hacker may surf
the internet and hack into a
computer system for the
only purpose of notifying the
administrator that their
system has been hacked.
21. Ways to prevent hacking:
Install a firewall
Download anti-virus software
Delete emails from unknown sources
Change password every month
Do not give out personal information
Editor's Notes
What is Hacking?
Who is Hacker?
Hackers & Crackers
Types of Hackers
Types of Hacking