The document discusses different types of hacking including website, email, network, password, online banking, and computer hacking. It describes various hackers like white hat, black hat, and grey hat hackers and provides examples of famous hackers such as Kevin Mitnick and Kevin Poulsen. The document concludes with tips to prevent hacking which include using strong passwords, installing antivirus software, avoiding disclosure of personal details, employing ethical hackers, and other internet safety practices.
Hacking is the process of attempting to gain or successfully gaining unauthorized access to computer resources.
In this presentation types of hacking, types of hackers, process of hacking, advantages of hacking and disvantages are illustrated.
Hacking is the process of attempting to gain or successfully gaining unauthorized access to computer resources.
In this presentation types of hacking, types of hackers, process of hacking, advantages of hacking and disvantages are illustrated.
This PPT help you to present the topic Hacking at collage level and professional level. If you need more please share an email rashed_ec2012@rediffmail.com
You all can infer what would be in the PPT from the title itself. In this PPT it is not told directly how to hack. Just a brief info of hacking and cyber security is given. How can one save himself/herself from becoming a victim of cybercrime? How to hack is given in my next PPT?
Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose .
Topic Included:
1. Intro Of Ethical Hacking*
2.Types Of Hacker*
3.Fake Mail ans Spam Concept*
4.Windows Hacking*
5.Trojan Horse*
6.SAM Security on Windows OS*
This PPT help you to present the topic Hacking at collage level and professional level. If you need more please share an email rashed_ec2012@rediffmail.com
You all can infer what would be in the PPT from the title itself. In this PPT it is not told directly how to hack. Just a brief info of hacking and cyber security is given. How can one save himself/herself from becoming a victim of cybercrime? How to hack is given in my next PPT?
Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose .
Topic Included:
1. Intro Of Ethical Hacking*
2.Types Of Hacker*
3.Fake Mail ans Spam Concept*
4.Windows Hacking*
5.Trojan Horse*
6.SAM Security on Windows OS*
In this presentation, an exact analytical solution to steady state evaporation from porous media is introduced. The solution is presented in terms of a set of infinite series. An advantage of this solution compared to previous derivations is that the infinite series can be very closely approximated using a closed-form solution (i.e.,
excluding integrals or series).
Intro slides for a tutorial on hacking common vulnerabilities and how to prevent those problems in your own code. This is a PHP based tutorial that's hands on, but the slides can help as reference material for a few common hacks
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
Hacking is the process of attempting to gain or successfully gaining , unauthorized access to computer resources.
Hacking refers to an array of activities which are done to intrude someone else’s personal information so as to use it for malicious , unwanted purposes. Cyber Security.
How Criminal Plan offenses, Hackers, Crackers and Phreakers, Brute force hacking, Cracker, Cracking, Phreaking, Outside Attack, Phases involved in planning cybercrime, Passive Attack, Tools used for Passive Attack, Active Attack, Port Scanning, Social Engineering, Classification of Social Engineering, Human Based Social Engineering, Computer Based Social Engineering, Cyberstalking, Types of Stalkers, Cases reported on Cyberstalking, How Stalking works?, Real Life Example, Cybercafe and Cybercrimes , Security tips for cybercafe, Botnet, How a botnet is created and used, Use of Botnet, Points to secure the system, Attack Vector, Cybercrime and Cloud Computing
2. Meaning of Hacking.
Why do people Hack??
Types of Hacking.
Types of Hackers.
Conclusion.
3. The Process of attempting to gain
or successfully
gaining, unauthorized access to
computer resources for the purpose
of help or secure system is called
Hacking.
Hacking is technique in
which, any one can access any
one’s computer without his
permission.
4. To make security stronger ( Ethical Hacking ).
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network.
6. Hacking a website means taking control from the
website owner to a person who hacks the website.
The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.
7. Email hacking is illicit access to an email account or email
correspondence.
Ways of Email Hacking:
Personal Information.
Social Hacking.
Phishing/ Hacking Software.
Trojan Virus etc.
Email may be protected by methods such as a strong
password, encryption of the contents or a digital signature.
An email disclaimer may be used to warn unauthorized
readers but these are thought to be ineffective.
8. Network Hacking is generally means gathering information
about domain by using tools like
Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the
network.
It also include OS Fingerprinting, Port Scanning, Port Surfing
using various Tools.
These are the three most common methods of hacking
a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking
9. Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by
a computer system. A common approach is to repeatedly try
guesses for the password.
Most passwords can be cracked by using following
techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
10. Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
A bank account can be accessed in many ways. When
someone gets access to your account, that person can take all
your funds without your knowledge.
Here are five simple tips that will help Protect Your Online Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks
11. Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
People can gain complete access to your computer
from any where in the world if your computer is
turned on, unprotected, and has an internet
connection. What they do, is up to them.
Remote desktop connection technique.
12.
13. The good guys who identify the security
weakness of the system or network and inform
the owner about them.
14. A black hat is the villain or bad
guy, who crash into victim’s security to
steal information and destroy the victims
security network.
Also known as ‘cracker’.
15. A Grey hat, in the hacking
community, refers to a skilled hacker who is
somewhere in between white and black hat
hackers.
16. 1 -> i or l || -> n
3 -> e |/| -> m
4 -> a s -> z
7 -> t
z -> s
9 -> g
f -> ph
0 -> o
$ -> s ph -> f
| -> i or l x -> ck
ck -> x
17. Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n
I did not hack this page, it was like this
when I hacked in.
23. Social networking sites like
‘FACEBOOK’,’GMAIL’,’YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
24. Links involving private pictures of
celebrities.
Links showing pictures of famous
personalities like Gaddafi’s dead
body or videos of Osama Bin
Laden’s killing.
27. www.jntu.ac.in was hacked on 7 Nov 2010.
www.songs.pk was hacked on 15 July 2011.
Songs.pk
JNTU homepage after it
was hacked
28.
29. Installa strong anti-virus
Always run a anti-virus check before you
download a program or a file from the
internet.
Avoid disclosing personal details like phone
number, credit card details to strangers.
30. Proper ethical hackers should be employed.
Do not expose your passwords to untrusted sites.
Practice using exact web address.
Close your internet while not in use.