SlideShare a Scribd company logo
1 of 12
Presentation Developed By Harshit Upadhyay(Hellhacker119)
About The Presentation..
Hello In This Presentation I Harshit Upadhyay Will Be Telling You The
Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This
Presentation Will Give You An Idea About What Actually And
Fundamentally Hacking Is And Why Most Of The People Consider It As
A Crime. It Will Logically Helps You In Differentiating Between A Hacker
And A Cracker. The Presentation Will Show The Real Concepts Of
Hacking, How To's And Of Course How To Be AWARE OF HACKERS.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
What actually Ethical Hacking is ?
Generally describing hacking is just like describing earth. Hacking as a
matter of fact don’t have any definition.so we can say that it is a
mixture of two terms “Ethical” and “hacking” where “ethical” refers to
good purpose and “hacking” as a computer related term means
breaking or entering Into a remote computer illegally. Now by joining
the following teems we explored that ethical hacking is actually
breaking into another computer system illegally but for good or ethical
reason.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Hacking A Crime Or Not!
• Hmm.This Is The Most Prominent Question Asked By People To A
Hacker, But An Elite Hacker Will Only Give Answer As No.This Is
Because Hacking Itself Is Not A Crime But Thinking Of The People
Make It So.Hacking According To Me Is Not A Crime Its Just Made
Crime By Some Foolish People. However The Hacking Done For Bad
Purpose Is Eventually Known As Cracking. So We Will Later Detail
About Hacking And Cracking But Now It Is Good To Understand That
Hacking Is not A Crime While Cracking Is So.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who Are Hackers And Crackers..
“Hacker”
• Hacker is a person who breaks into another computer
system illegally by penetrating the security of a user and
then using the leaked information for either a good
purpose or for a bad purpose.*
• As I said there is no perfect reason for a hacker to hack a
computer. The reason behind is in the next slide.

“Cracker”

• Cracker are the BAD guys who just to hacking for
the purpose of enjoyment and for enhancing their
knowledge of exploitation. A cracker would do
hacking for the following reasons:
• Taking revenge.
• Streanghthing his hacking abilities.
• Way to become a famous person or hacker or
criminal.
• Enjoying the knowledge which he have.

Presentation Developed By Harshit Upadhyay(Hellhacker119)
Who is a hacker and an ethical
hacker.
• The Basic Thing That Is Conveyed Is The Slide Is Simply :
Hacker : A Person Doing Hacking For Bad Purpose. Example Includes
All The Acts That Are Performed By A Cracker.
Ethical Hacker : A Person Doing Hacking For Good Purpose. Example
Are:
• For Ensuring The Security Of A System Or A Network.
• For Supporting Public And Government Bodies.
• For Decoding Or Decrypting A Encrypted Message.
• For Helping The Counter Terrorist Organization.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Importance of Ethical Hacking..
Ethical Hacking Is Extremely Important Thing In This Era Of Computers
And Robotics, One Must Know What Is Hacking How To Prevent Or
Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays
A Key Role In :
• Providing Security To The Important People Or Places.
•Protecting Yourself From Becoming A Victim Of Hacking By Either
Hacking Your Email Account On A Social Networking Site Or By Sending
You A Malicious File Or Programe,etc.
•Providing Security To The Common People Who Are Not So Aware Of
This. Example Banks, Offices Etc.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Two Legends Of Hacking..
Almost Every Successful Computer Businessmen Would Be An Hacker
In Their Time. The Best Known Example Them Is About A 13 Year Boy
Of US Who With Is His Other Hacker Friend Used To Relish
Programming And Hacking. They Both Were Extremely Intelligent And
Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s
Computer And Proving Their Superiority.
Today Most Of The People Know Them As Bill Gates And Paul Allen
Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As
Most Of You Must Be Knowing Are Practically Zillionaires.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to be secure of hacking ,,:
• Protect Your Computer.(Antiviruses And Antispyware's)
• Have A Secure Password.(Complicated But Easy To Remember)
• Your Email ID And Its Password Are Your Own Confidential Information.
• If You Are A Victim Of Such A Scenario, Please Contact The Respective
Company Immediately.
• If You Are Ever Asked For Your Password In An Unsolicited Manner Or By
Someone You Do Not Believe To Be Any Representative.
• You Should Change The Security Questions And Answers Wisely.
• I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful
Ad Banners!
Presentation Developed By Harshit Upadhyay(Hellhacker119)
How to do Hacking??
Now This Is Also One Of The Most Frequently Asked Question By The
People To Hacker. Everybody Viewing This Presentation Are Eager To
Know How To Hack. So Before Proceeding Let Me Tell You The Thing
That Hacking Is And Always Will Lead To A Particular Goal.So To Hack
Anything One Must Have A Goal Of What He Is Hacking, Why And Well
Plan Of How He Will Hack.
Now There Are Few Steps That I Am Going To Tell You Which Will Give
You The Basic Idea Of Hacking And After That You All Will Be Able To
Understand Hacking And Stop Asking People How To Hack.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Steps to hack a computer…
• First of all decide what you need to decide what you are actually
going to hack.
• After thinking the goal you must need to plan the attack, language
and what OS you are going to use during hacking.
• You must need to get the information about the system and owner of
the system that you are going to hack.
• Then if it is possible try to apply some brain or in the technical term
Social Engineering.
• Finally after thinking all these attack the victim but note that the
attack is for a positive purpose.
Presentation Developed By Harshit Upadhyay(Hellhacker119)
Presentation Developed By Harshit Upadhyay(Hellhacker119)

More Related Content

Similar to Ethical hacking

White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackersBilal Ahmed
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)DeepHaria4
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02Mudit Seth
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 

Similar to Ethical hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Ethical Hacking (basics)
Ethical Hacking (basics)Ethical Hacking (basics)
Ethical Hacking (basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp021861229635078720084665000 131012131913-phpapp02
1861229635078720084665000 131012131913-phpapp02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Arya
AryaArya
Arya
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Ethical hacking

  • 1. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 2. About The Presentation.. Hello In This Presentation I Harshit Upadhyay Will Be Telling You The Basics Of Ethical Hacking And Who Is A Hacker Anyhow. This Presentation Will Give You An Idea About What Actually And Fundamentally Hacking Is And Why Most Of The People Consider It As A Crime. It Will Logically Helps You In Differentiating Between A Hacker And A Cracker. The Presentation Will Show The Real Concepts Of Hacking, How To's And Of Course How To Be AWARE OF HACKERS. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 3. What actually Ethical Hacking is ? Generally describing hacking is just like describing earth. Hacking as a matter of fact don’t have any definition.so we can say that it is a mixture of two terms “Ethical” and “hacking” where “ethical” refers to good purpose and “hacking” as a computer related term means breaking or entering Into a remote computer illegally. Now by joining the following teems we explored that ethical hacking is actually breaking into another computer system illegally but for good or ethical reason. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 4. Hacking A Crime Or Not! • Hmm.This Is The Most Prominent Question Asked By People To A Hacker, But An Elite Hacker Will Only Give Answer As No.This Is Because Hacking Itself Is Not A Crime But Thinking Of The People Make It So.Hacking According To Me Is Not A Crime Its Just Made Crime By Some Foolish People. However The Hacking Done For Bad Purpose Is Eventually Known As Cracking. So We Will Later Detail About Hacking And Cracking But Now It Is Good To Understand That Hacking Is not A Crime While Cracking Is So. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 5. Who Are Hackers And Crackers.. “Hacker” • Hacker is a person who breaks into another computer system illegally by penetrating the security of a user and then using the leaked information for either a good purpose or for a bad purpose.* • As I said there is no perfect reason for a hacker to hack a computer. The reason behind is in the next slide. “Cracker” • Cracker are the BAD guys who just to hacking for the purpose of enjoyment and for enhancing their knowledge of exploitation. A cracker would do hacking for the following reasons: • Taking revenge. • Streanghthing his hacking abilities. • Way to become a famous person or hacker or criminal. • Enjoying the knowledge which he have. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 6. Who is a hacker and an ethical hacker. • The Basic Thing That Is Conveyed Is The Slide Is Simply : Hacker : A Person Doing Hacking For Bad Purpose. Example Includes All The Acts That Are Performed By A Cracker. Ethical Hacker : A Person Doing Hacking For Good Purpose. Example Are: • For Ensuring The Security Of A System Or A Network. • For Supporting Public And Government Bodies. • For Decoding Or Decrypting A Encrypted Message. • For Helping The Counter Terrorist Organization. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 7. Importance of Ethical Hacking.. Ethical Hacking Is Extremely Important Thing In This Era Of Computers And Robotics, One Must Know What Is Hacking How To Prevent Or Overcome It If One Is Victim. In The Current Time Ethical Hacking Plays A Key Role In : • Providing Security To The Important People Or Places. •Protecting Yourself From Becoming A Victim Of Hacking By Either Hacking Your Email Account On A Social Networking Site Or By Sending You A Malicious File Or Programe,etc. •Providing Security To The Common People Who Are Not So Aware Of This. Example Banks, Offices Etc. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 8. Two Legends Of Hacking.. Almost Every Successful Computer Businessmen Would Be An Hacker In Their Time. The Best Known Example Them Is About A 13 Year Boy Of US Who With Is His Other Hacker Friend Used To Relish Programming And Hacking. They Both Were Extremely Intelligent And Had Perfect Skills. They Always Enjoyed Breaking Into Each Other’s Computer And Proving Their Superiority. Today Most Of The People Know Them As Bill Gates And Paul Allen Founder And Co-founder Of The Microsoft Corp, Usa.Both Of Them As Most Of You Must Be Knowing Are Practically Zillionaires. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 9. Steps to be secure of hacking ,,: • Protect Your Computer.(Antiviruses And Antispyware's) • Have A Secure Password.(Complicated But Easy To Remember) • Your Email ID And Its Password Are Your Own Confidential Information. • If You Are A Victim Of Such A Scenario, Please Contact The Respective Company Immediately. • If You Are Ever Asked For Your Password In An Unsolicited Manner Or By Someone You Do Not Believe To Be Any Representative. • You Should Change The Security Questions And Answers Wisely. • I Strongly Recommend You All To Never Click On A Spammy Link And Doubtful Ad Banners! Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 10. How to do Hacking?? Now This Is Also One Of The Most Frequently Asked Question By The People To Hacker. Everybody Viewing This Presentation Are Eager To Know How To Hack. So Before Proceeding Let Me Tell You The Thing That Hacking Is And Always Will Lead To A Particular Goal.So To Hack Anything One Must Have A Goal Of What He Is Hacking, Why And Well Plan Of How He Will Hack. Now There Are Few Steps That I Am Going To Tell You Which Will Give You The Basic Idea Of Hacking And After That You All Will Be Able To Understand Hacking And Stop Asking People How To Hack. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 11. Steps to hack a computer… • First of all decide what you need to decide what you are actually going to hack. • After thinking the goal you must need to plan the attack, language and what OS you are going to use during hacking. • You must need to get the information about the system and owner of the system that you are going to hack. • Then if it is possible try to apply some brain or in the technical term Social Engineering. • Finally after thinking all these attack the victim but note that the attack is for a positive purpose. Presentation Developed By Harshit Upadhyay(Hellhacker119)
  • 12. Presentation Developed By Harshit Upadhyay(Hellhacker119)