Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

E.technology

416 views

Published on

oau << semenar

Published in: Technology
  • Be the first to comment

  • Be the first to like this

E.technology

  1. 1. Viruses @ Hackers Behaviors
  2. 2. [email_address]
  3. 3. [email_address] Virus first emerged in the early seventies and there are other arguments and because of this ambiguous
  4. 4. Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
  5. 5. The incubation period The incubation period is the period between the entry of the virus into the body (and infection)
  6. 6. <ul><li>Similar work in the computer viruses work in the human body as we say Previously </li></ul>Bio Vrs Elct Vrs
  7. 7. Seaprition in body Seaprition in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk Loss
  8. 8. [email_address] Why called by ( ) virus Spread Damage
  9. 9. Taybe of viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
  10. 10. Mechanism of Work File
  11. 11. How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
  12. 12. Money , fame ,  comfort ,   goals   ilegal , beautiful   goals [email_address] We don’t understand Why programer ( hackers ) making Viruses
  13. 13. Hacker ,,, hacking The one man un authorized to enter the OS on your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available to the person (hacker) to remove or add Files or programs as he can control his place in the OS based the issuance of orders such as ordering the printing or imaging Or storage .. [email_address]
  14. 14. Hackers in Sudan The history of electronic Web site in Sudan major breakthroughs to different sites ,,,,,, Government @Private site .. She was a major incident broke the site of the (NCI) national center for information (Joker), which he broke several government positions in the same proportion to ban the National Authority for Communications of several sites including Rapideshare / 4shared / YouTube
  15. 15. Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
  16. 16. World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
  17. 17. Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
  18. 18. Big.War.from Pcz: nets Gold.Gnr.to hac 1980 to 1989 1990 to 1994 [email_address]
  19. 19. Open Port Client/Server Patch X  Penetration [email_address]
  20. 20. some story at hacker Kaven metenk ,,, Digital Equipment Co. ,,, 20000 card NewYork City Magazin ,,, catch by FBI [email_address]
  21. 21. Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro NOVA [email_address]
  22. 22. In Conclusion, we can say that the world of viruses and hackers is a world full of wonders, but Login it require scourage and determination [email_address]
  23. 23. Thank you for listening [email_address]

×