SlideShare a Scribd company logo
1 of 1
Download to read offline
Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. Hacking needs total understanding of a computer security system.
A hacker can simply be said to be someone who can breach into a computer system and network because he can exploit and detect the weakness in that security system or network. Hacking really seems to be difficult for people and that's because they have no true understanding of Computer, but the really truth is that anyone can hack.
WAYS TO HACK
There are different ways to hack but the easiest way is to plant a virus in the targeted system, and this cam be done by sending the virus via an emai. The virus will not be seen or noticed by the target.
Now this virus has been designed to send information from the targeted device (Computer or Phone)to the hacker.
BUT WHAT EXACTLY IS A VIRUS?
A Virus is a malicious software that can replicate itself by modifying other computer programs and inserting its own code. There are different kind of Virus and the kind you need to hack is a 'SPYWARE'
A SPYWARE is a software that aims to gather information about a person or organisation vai their device(Computer or Phone) and sends back informations to the user via the internet.
Spywares are just simple written codes that acts like programs on a device( Computer or Phone).
If you ever need any assistance in creating a virus to gain access to someone else's Computer or Phone you can contact Soft Tech Geeks softtechgeeks@gmail.com for help.
We are an organisation based in China we provide tutorials to young computer scientist and also help in hacking.

More Related Content

What's hot

Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber securitybrn8brwn
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniquesJhumarieAcdan
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
spyware
spywarespyware
spyware
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Spyware
SpywareSpyware
Spyware
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 

Similar to UNDERSTANDING HACKING

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 
cybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdfcybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdfJaydeepPrajapati33
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxMuhammadKashif584561
 
Internet security
Internet securityInternet security
Internet securityat1211
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular SpywareSysvoot Antivirus
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 

Similar to UNDERSTANDING HACKING (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
cybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdfcybersecurity-181229124152 (1).pdf
cybersecurity-181229124152 (1).pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber security
Cyber security Cyber security
Cyber security
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Internet security
Internet securityInternet security
Internet security
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

UNDERSTANDING HACKING

  • 1. Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. Hacking needs total understanding of a computer security system. A hacker can simply be said to be someone who can breach into a computer system and network because he can exploit and detect the weakness in that security system or network. Hacking really seems to be difficult for people and that's because they have no true understanding of Computer, but the really truth is that anyone can hack. WAYS TO HACK There are different ways to hack but the easiest way is to plant a virus in the targeted system, and this cam be done by sending the virus via an emai. The virus will not be seen or noticed by the target. Now this virus has been designed to send information from the targeted device (Computer or Phone)to the hacker. BUT WHAT EXACTLY IS A VIRUS? A Virus is a malicious software that can replicate itself by modifying other computer programs and inserting its own code. There are different kind of Virus and the kind you need to hack is a 'SPYWARE' A SPYWARE is a software that aims to gather information about a person or organisation vai their device(Computer or Phone) and sends back informations to the user via the internet. Spywares are just simple written codes that acts like programs on a device( Computer or Phone). If you ever need any assistance in creating a virus to gain access to someone else's Computer or Phone you can contact Soft Tech Geeks softtechgeeks@gmail.com for help. We are an organisation based in China we provide tutorials to young computer scientist and also help in hacking.