SlideShare a Scribd company logo
The Chinese Search
Engine• Baidu is the dominant Chinese internet search engine company, and it is
the equivalent to Google in the United States.
• Baidu, Inc. was incorporated on 18 January, 2000 and was created by Robin
Li and Eric Xu.
• Baidu.com is the second most popular but a Chinese language search
engine with nearly 10% usage share in searches.
• Baidu is similar to Google and offers similar products and services, but the
focus is China where it controls most of the search market.
• Baidu censors search results and other content in accordance with Chinese
regulations. Hackesh
Hacking Hacking
Hackesh
• What is Hacking
• History of Hacking
• Who is Hacker
• Types of Hackers
• Why do Hackers hack?
• Famous hackers in history
• Types of Hacking
• How to give a password to account
• What should do after hacked
• How to secure our data
• Advantages of Hacking
• Disadvantages of Hacking
• Conclusion Hackesh
• Hacking is usually done to gain unauthorized access
to a computer system or a computer network, either
to harm the systems or to steal sensitive information
available on the computer
• Hacking is usually legal as long as it is being done to find
weaknesses in a computer or network system for testing
purpose.
• This sort of hacking is what we call Ethical Hacking
Hackesh
• In 1988 a "worm program" written by a college
student shut down about 10 percent of computers
connected to the Internet.
• This was the beginning of the era of cyber attacks.
• Today we have about 10,000 incidents of cyber
attacks which are reported and the number grows.
Hackesh
• A Hacker is a person who finds and exploits weakness in
computer systems to gain access
• First -> Cracker
• A hacker is a Person who thinks outside the box
• A hacker is a person who discover unknowns features and
properties in a computer or in a computer network
• A hacker is a person who is highly creative and dedicated to
knowledge
• All hackers are not criminals that depends on their work
Hackesh
Black Hat
Hacker
Gray Hat
Hacker
White Hat
Hacker
Hackesh
• Website Hacking
• Email Hacking
• Network Hacking
• Password Hacking
• Online transactions Hacking
• Computer Hacking
• Mobile Hacking
Hackesh
• Hacking a website means taking unauthorized control over a
web server and its associated software such as databases and
other interfaces.
• Hacking a website is getting the password to add, edit, delete
data stored in that website.
• After the attack done by a hacker, if he has changed the
password of that website software, then it will be tough for
theWebmaster to get it back.
• Hacker will insert harmful programs by inserting malicious
codes into the website. It will also cause to the website server
to be slow.
Hackesh
• Hacking on computer network is often done through
scripts and other network software.
• These specially-designed software programs generally
manipulate data passing through a network connection in
ways designed to obtain more information about how the
target system works
• Worms
• DOS
• RAT
• Trojans Hackesh
• This is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
• Find a valid user ID
• Create a list of possible passwords
• Rank the passwords from high probability to low
• They will type in each password with the help of Crunch tool
• DictionaryAttack
• Brute force Attack
Hackesh
• It includes getting unauthorized access on an Email account
and using it without taking the consent of its owner.
• While there exists many nasty websites on the internet that
mislead people with fake methods and false promises to
obtain passwords, some often present readers with obsolete
methods that can no longer be used.
• key logging
• Phishing
Hackesh
• Ethical hacking involves finding weaknesses in a computer or network system
for testing purpose and finally getting them fixed.
• Ethical Hacking sometimes called as PenetrationTesting is an act of
intruding/penetrating into system or networks to find out threats,
• vulnerabilities in those systems which a malicious attacker may find and exploit
causing loss of data, financial loss or other major damages.
• The purpose of ethical hacking is to improve the security of the network or
systems by fixing the vulnerabilities found during testing.
• Ethical hackers may use the same methods and tools used by the malicious
hackers but with the permission of the authorized person for the purpose of
improving the security and defending the systems from attacks by malicious
users.
• Ethical hackers are expected to report all the vulnerabilities and weakness found
during the process to the management.Hackesh
• This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized
access to a computer system.
• The Practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s
original purpose.
• To be accused of hacking, it must be proven that someone
gained access to the computer, intending to hack It
without permission.
Hackesh
• When you use your credit or debit card to bank online or
make any kind of electronic financial transaction, you are in
a risk that your personal information or money could be
stolen
• Especially now when are doing online shopping almost
daily, this threats almost each one of us.
• Threw PHISHING
• TROJANVirus to steal information key Logger
• SESSION Hijacking threwWi-Fi redirect the path
Hackesh
• Mobile hacking is the practice of manipulating or gaining
unauthorized access to mobile phones, such as by
intercepting telephone calls or accessing voicemail message.
• When the unauthorized access is to the phone user’s
conversation, it is more commonly, it is more commonly
referred to as phone tapping.
• RAT- Remote AdministrativeTool
• Key logging
• Spyware
• Unwanted application
Hackesh
• Venting anger at a company or organization
• Terrorism
• Financial Gain
• For fun
Hackesh
• Can used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
Hackesh
• Criminal can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
Hackesh
• Keep your password protected.
• Write your password should be with combination of
characters, digits, special symbols.
• Do not respond to feck on fishing email.
• when you are doing any online transection always
keep watch on site whether the protocol of site is
https & whether there is a lock symbol .
Hackesh
Hackesh

More Related Content

What's hot

Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
balti13
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingAitezaz Mohsin
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Hacking
HackingHacking
Hacking
Arpit Verma
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
Sushil Ranjan
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
infosavvy
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
Bilal Ahmed
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 

What's hot (20)

Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Hackers
HackersHackers
Hackers
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Hacking 2018

Hacking
HackingHacking
Hacking
j naga sai
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
Sunipa Bera
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdf
KALASHSHAR
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Hacking
HackingHacking
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
ShivaniSingha1
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
mahamnisar6
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
Hritik Jage
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
Shahzad Younas
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 

Similar to Hacking 2018 (20)

Hacking
HackingHacking
Hacking
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Hacking
HackingHacking
Hacking
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdf
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

Hacking 2018

  • 1. The Chinese Search Engine• Baidu is the dominant Chinese internet search engine company, and it is the equivalent to Google in the United States. • Baidu, Inc. was incorporated on 18 January, 2000 and was created by Robin Li and Eric Xu. • Baidu.com is the second most popular but a Chinese language search engine with nearly 10% usage share in searches. • Baidu is similar to Google and offers similar products and services, but the focus is China where it controls most of the search market. • Baidu censors search results and other content in accordance with Chinese regulations. Hackesh
  • 3. • What is Hacking • History of Hacking • Who is Hacker • Types of Hackers • Why do Hackers hack? • Famous hackers in history • Types of Hacking • How to give a password to account • What should do after hacked • How to secure our data • Advantages of Hacking • Disadvantages of Hacking • Conclusion Hackesh
  • 4. • Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer • Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. • This sort of hacking is what we call Ethical Hacking Hackesh
  • 5. • In 1988 a "worm program" written by a college student shut down about 10 percent of computers connected to the Internet. • This was the beginning of the era of cyber attacks. • Today we have about 10,000 incidents of cyber attacks which are reported and the number grows. Hackesh
  • 6. • A Hacker is a person who finds and exploits weakness in computer systems to gain access • First -> Cracker • A hacker is a Person who thinks outside the box • A hacker is a person who discover unknowns features and properties in a computer or in a computer network • A hacker is a person who is highly creative and dedicated to knowledge • All hackers are not criminals that depends on their work Hackesh
  • 8. • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online transactions Hacking • Computer Hacking • Mobile Hacking Hackesh
  • 9. • Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces. • Hacking a website is getting the password to add, edit, delete data stored in that website. • After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for theWebmaster to get it back. • Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow. Hackesh
  • 10. • Hacking on computer network is often done through scripts and other network software. • These specially-designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works • Worms • DOS • RAT • Trojans Hackesh
  • 11. • This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. • Find a valid user ID • Create a list of possible passwords • Rank the passwords from high probability to low • They will type in each password with the help of Crunch tool • DictionaryAttack • Brute force Attack Hackesh
  • 12. • It includes getting unauthorized access on an Email account and using it without taking the consent of its owner. • While there exists many nasty websites on the internet that mislead people with fake methods and false promises to obtain passwords, some often present readers with obsolete methods that can no longer be used. • key logging • Phishing Hackesh
  • 13. • Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. • Ethical Hacking sometimes called as PenetrationTesting is an act of intruding/penetrating into system or networks to find out threats, • vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. • The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. • Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users. • Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.Hackesh
  • 14. • This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system. • The Practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. • To be accused of hacking, it must be proven that someone gained access to the computer, intending to hack It without permission. Hackesh
  • 15. • When you use your credit or debit card to bank online or make any kind of electronic financial transaction, you are in a risk that your personal information or money could be stolen • Especially now when are doing online shopping almost daily, this threats almost each one of us. • Threw PHISHING • TROJANVirus to steal information key Logger • SESSION Hijacking threwWi-Fi redirect the path Hackesh
  • 16. • Mobile hacking is the practice of manipulating or gaining unauthorized access to mobile phones, such as by intercepting telephone calls or accessing voicemail message. • When the unauthorized access is to the phone user’s conversation, it is more commonly, it is more commonly referred to as phone tapping. • RAT- Remote AdministrativeTool • Key logging • Spyware • Unwanted application Hackesh
  • 17. • Venting anger at a company or organization • Terrorism • Financial Gain • For fun Hackesh
  • 18. • Can used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking. Hackesh
  • 19. • Criminal can use it to their advantage. • It can harm someone's privacy • It's Illegal Hackesh
  • 20. • Keep your password protected. • Write your password should be with combination of characters, digits, special symbols. • Do not respond to feck on fishing email. • when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol . Hackesh