Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Hacking
1. Presented By
MISS. KUSAL SONAL K.
3RD year computer engineering
Guided By
Mrs.M.Kokate
Government polytechnic pune .
2. 1. INTRODUCTION OF HACKING.
2. WHAT IS HACKING.
3. TYPES OF HACKING.
4. TECHNIQUE OF HACKING.
5. WHAT SHOULD DO AFTER HACKED?
6. ADVANTAGES AND DISADVANTAGES.
7. CONCLUSION.
3. Hacking is the art of exploting computers to
get access to otherwise unauthorized
information.
Now that the world is using IT system to
gather, store and manipulate important
information.
There is also need to make data secure.
4. 1. Hacking is the practice of
modifying the feature of the system,
in order to accomplish a goal outside
of the creators original purpose
2. A hacker is basically someone who
breaks into computer networks
personal computer system for the
challenge of it.
8. 1. Shutdown the system Or turn off the system
2. Separate the system from network
3. Restore the system with the backup Or
reinstall all program.
4. Connect the system to the network.
9. Can be used to recover lost information
where the computer password has been
lost.
11. Here conclude hacker is good as well as bad
It is depend upon the minds of hacker.
There's nothing wrong with the hacker
knowledge itself, despite its potential
applications.