SlideShare a Scribd company logo
HACKING

PRESENTED BY:- PRADEEP ACHARYA
๏ฝ   The Term Hackers โ€žOriginallyโ€Ÿ Referred to
    Computer Professionals Who Solved Complex
    Computer Problems.

๏ฝ   Today, the term โ€œhackerโ€ has a negative
    meaning. Hacking is computer crime in which
    criminals breaks into a computer system just
    for the challenge of doing so.
๏ฝ   Example:- High school hackers in milwaukee
    computer club broke into computers at the
    sloan-kellering cancer institute and at the los
    almos national laboratory.

๏ฝ   A computer hacker, defined by oxford
    dictionary is, โ€œa computer enthusiast who
    gains unauthorised access to a computer or
    network.
๏ฝ   Leader means some on who forges ahead and
    names the dim future.

๏ฝ   Example:-
๏ฝ   TEM BERNESS-LEE:-He designed first web
    protocol. Wrote the first browser code.

๏ฝ   RICHARD STALLMAN:-The evangelist of open
    source software.
Hackers have certain
achievements
๏‚จ   Made the UNIX operating system what it is
    today.
๏‚จ   Run usenet
๏‚จ   Make the wordwideweb work.
๏‚จ   Recruited by many of the large and known IT
    related companies to test and report flaws in
    their systems or software.
๏‚จ   The above type of people are called as white
    hackers.
TECHNIQUS
๏‚จ   VALNERABILITY SANNER

๏‚จ   PASSWORD CRACKING

๏‚จ   PACKET SNIFFER

๏‚จ   ROOTKIT
SOCIAL ENGINEERING
๏‚— INTIMIDIATION



๏‚— HELPFULLNESS



๏‚— TECHNICAL
Hacking 1

More Related Content

What's hot

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
ย 
computer ethics
computer ethicscomputer ethics
computer ethics
sdrhr
ย 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
ย 
Internet(2)
Internet(2)Internet(2)
Internet(2)preetsmart007
ย 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
shashi kiran
ย 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
Yadiy Zak-One
ย 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
ย 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
Ei-Dyei Diata
ย 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
Amae OlFato
ย 
Peopleware
PeoplewarePeopleware
Peopleware
Allan Salise
ย 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
Synerzip
ย 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
ย 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
ย 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
Rakshit Sharma
ย 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
ย 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
Lexume1
ย 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicspoonam.rwalia
ย 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
ย 

What's hot (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
ย 
computer ethics
computer ethicscomputer ethics
computer ethics
ย 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
ย 
Internet(2)
Internet(2)Internet(2)
Internet(2)
ย 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
ย 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
ย 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
ย 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
ย 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
ย 
Peopleware
PeoplewarePeopleware
Peopleware
ย 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
ย 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
ย 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
ย 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
ย 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
ย 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
ย 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
ย 
Computer ethics
Computer ethics Computer ethics
Computer ethics
ย 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
ย 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
ย 

Viewers also liked

Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonicjames_chen208
ย 
Continuous S&OP - Breaking the Mold - Kinaxis presentation
Continuous S&OP - Breaking the Mold - Kinaxis presentation Continuous S&OP - Breaking the Mold - Kinaxis presentation
Continuous S&OP - Breaking the Mold - Kinaxis presentation
Melissa C
ย 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisalpradeep acharya
ย 
Horizontal merging
Horizontal mergingHorizontal merging
Horizontal mergingpradeep acharya
ย 
Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonicjames_chen208
ย 
Uniq power batteries
Uniq power batteriesUniq power batteries
Uniq power batteriespradeep acharya
ย 
Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonicjames_chen208
ย 
Stock market scam
Stock market scamStock market scam
Stock market scampradeep acharya
ย 
Webcase Presentation Slides: End-to-End- Available to Promise
Webcase Presentation Slides: End-to-End- Available to PromiseWebcase Presentation Slides: End-to-End- Available to Promise
Webcase Presentation Slides: End-to-End- Available to Promise
Melissa C
ย 
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTDSRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTDpradeep acharya
ย 
Business Quiz Round 3
Business Quiz Round 3Business Quiz Round 3
Business Quiz Round 3pradeep acharya
ย 
B.communication ppt
B.communication pptB.communication ppt
B.communication pptpradeep acharya
ย 
BUSINESS QUIZ -Round 1
 BUSINESS QUIZ -Round 1 BUSINESS QUIZ -Round 1
BUSINESS QUIZ -Round 1pradeep acharya
ย 

Viewers also liked (16)

Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonic
ย 
Continuous S&OP - Breaking the Mold - Kinaxis presentation
Continuous S&OP - Breaking the Mold - Kinaxis presentation Continuous S&OP - Breaking the Mold - Kinaxis presentation
Continuous S&OP - Breaking the Mold - Kinaxis presentation
ย 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
ย 
Ing vysya
Ing vysyaIng vysya
Ing vysya
ย 
Horizontal merging
Horizontal mergingHorizontal merging
Horizontal merging
ย 
Abdul kalam
Abdul kalamAbdul kalam
Abdul kalam
ย 
Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonic
ย 
Uniq power batteries
Uniq power batteriesUniq power batteries
Uniq power batteries
ย 
Ae presentation mnemonic
Ae presentation mnemonicAe presentation mnemonic
Ae presentation mnemonic
ย 
Smsindia4blood
Smsindia4bloodSmsindia4blood
Smsindia4blood
ย 
Stock market scam
Stock market scamStock market scam
Stock market scam
ย 
Webcase Presentation Slides: End-to-End- Available to Promise
Webcase Presentation Slides: End-to-End- Available to PromiseWebcase Presentation Slides: End-to-End- Available to Promise
Webcase Presentation Slides: End-to-End- Available to Promise
ย 
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTDSRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
ย 
Business Quiz Round 3
Business Quiz Round 3Business Quiz Round 3
Business Quiz Round 3
ย 
B.communication ppt
B.communication pptB.communication ppt
B.communication ppt
ย 
BUSINESS QUIZ -Round 1
 BUSINESS QUIZ -Round 1 BUSINESS QUIZ -Round 1
BUSINESS QUIZ -Round 1
ย 

Similar to Hacking 1

Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
ย 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860IJERA Editor
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
ย 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
ย 
Hacking
Hacking Hacking
Hacking
SahilGothoskar
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
ย 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
ย 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
ย 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
ย 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
ย 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
Kavin K
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
ย 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
ย 
Ratzan2
Ratzan2Ratzan2
Ratzan2
haneefvf1
ย 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
ย 

Similar to Hacking 1 (20)

Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
ย 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
ย 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
ย 
It
ItIt
It
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
ย 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
ย 
Hacking
Hacking Hacking
Hacking
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
ย 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
ย 
Sit presentation
Sit presentationSit presentation
Sit presentation
ย 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
ย 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
ย 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
ย 
Hacking
HackingHacking
Hacking
ย 
Ratzan2
Ratzan2Ratzan2
Ratzan2
ย 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
ย 

Recently uploaded

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
ย 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
ย 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
ย 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
ย 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
ย 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
ย 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
ย 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
ย 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
ย 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
ย 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
ย 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
ย 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
ย 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 

Recently uploaded (20)

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
ย 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
ย 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ย 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
ย 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
ย 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
ย 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
ย 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
ย 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
ย 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
ย 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
ย 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
ย 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
ย 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 

Hacking 1

  • 2.
  • 3. ๏ฝ The Term Hackers โ€žOriginallyโ€Ÿ Referred to Computer Professionals Who Solved Complex Computer Problems. ๏ฝ Today, the term โ€œhackerโ€ has a negative meaning. Hacking is computer crime in which criminals breaks into a computer system just for the challenge of doing so.
  • 4. ๏ฝ Example:- High school hackers in milwaukee computer club broke into computers at the sloan-kellering cancer institute and at the los almos national laboratory. ๏ฝ A computer hacker, defined by oxford dictionary is, โ€œa computer enthusiast who gains unauthorised access to a computer or network.
  • 5. ๏ฝ Leader means some on who forges ahead and names the dim future. ๏ฝ Example:- ๏ฝ TEM BERNESS-LEE:-He designed first web protocol. Wrote the first browser code. ๏ฝ RICHARD STALLMAN:-The evangelist of open source software.
  • 6. Hackers have certain achievements ๏‚จ Made the UNIX operating system what it is today. ๏‚จ Run usenet ๏‚จ Make the wordwideweb work. ๏‚จ Recruited by many of the large and known IT related companies to test and report flaws in their systems or software. ๏‚จ The above type of people are called as white hackers.
  • 7. TECHNIQUS ๏‚จ VALNERABILITY SANNER ๏‚จ PASSWORD CRACKING ๏‚จ PACKET SNIFFER ๏‚จ ROOTKIT
  • 8.
  • 9. SOCIAL ENGINEERING ๏‚— INTIMIDIATION ๏‚— HELPFULLNESS ๏‚— TECHNICAL