SlideShare a Scribd company logo
HACKING 
Don’t Learn to Hack – Hack to Learn 
S.K.Ahsan 
1
2
IN THE NAME OF 
THE MOST MERCIFUL THE 
BENEFICENT ! 
3
S.K.Ahsan 
4
 What is Hacking ? 
 Brief History 
 Who is a Hacker ? 
 Types of Hacker 
 What do Hackers do? 
 Hacker’s Techniques & Attacks 
 Anti-Hacking 
 Demo Of Hacking 
S.K.Ahsan 5
What is “ ” ? 
Hacking is not limited to computers. The 
real meaning of hacking is to expand 
the capabilities of any electronic device; 
to use them beyond the original 
intentions of the manufacturer. 
S.K.Ahsan 6
• “ Hacking is the use of one's skills 
(computer, networking, etc.) to try and find 
vulnerabilities in a network infrastructure. ” 
S.K.Ahsan 7
Who is a ??? 
• Some one who bypasses the system’s control by 
taking advantage of security weaknesses left in 
the system by developers ! 
• One who is both knowledgeable and skilled at 
computer programming and have it’s own 
philosophy and code of ethics ! 
8 S.K.Ahsan
A Brief History of 
 In 1960s 
The first comuter hackers emerge at MIT 
AI (Massachusetts Institute of 
Technology) there occurred the first 
hacking incident an victims were electric 
trains. 1960’s 
S.K.Ahsan 9
In 1970s 
– Phreaking : John Draper Hacked the 
AT&T’s long distance Calling for free . 
– Phone hackers break into regional and 
international phone networks to make free 
calls. 
S.K.Ahsan 10
1980’s 
Phone phreaks begin to move into the realm of computer 
hacking, and the first electronic bulletin board systems 
(BBSs) spring up. 
In 1980s 
Bill Landreth(the Cracker) 
Hacked most secure networks. 
(Choas C.Club) Hacked Nuclear secrets in Germany. 
S.K.Ahsan 
>>> Use a Computer, Go to Jail ! ! ! 
11
 In 1990s 
– Two teens Hacked (T online). 
– 21 year old Argentinean was hacked 
NASA, Harvard an Naval war heads 
info. 
S.K.Ahsan 12
 1990’s 
After a prolonged sting investigation, 
S.K.Ahsan 
swoop down on hackers in 14 U.S. cities, conducting 
early-morning raids and arrests. 
The Internet begins to take off as a new browser, Netscape 
Navigator, makes information on the Web more accessible. Hackers 
take to the new venue quickly, moving all their information and 
hacking programs to new hacker Web sites. 
>>> As information and easy-to-use tools become available to 
anyone with Net access, the face of hacking begins to change. 
13
1995-till date 
The hacking group Cult of the Dead Cow releases its Trojan horse 
program, a powerful hacking tool--at Def Con. Once a hacker 
installs the on a machine running Windows 95 
or Windows 98, the program allows unauthorized remote access 
of the machine ! 
Hackers launch attacks against , , 
S.K.Ahsan 
, and ! 
Microsoft becomes the prominent victim of a new type of hack 
that attacks the domain name server. 
14
 2000 
– In one of the biggest denial-of-service attacks , 
hackers launch attacks against eBay, Yahoo!, 
CNN.com., Amazon and others. 
S.K.Ahsan 15
S.K.Ahsan 16
Who is a “ ” ? 
There are at least two common interpretations: 
 A programmer who breaks into computer 
systems in order to steal or change or 
destroy information as a form of cyber-crime. 
 A programmer for whom computing is its 
own reward; may enjoy the challenge of 
breaking into other computers but does no 
harm. 
S.K.Ahsan 17
Types of 
 White Hat Hackers 
Are hackers in the noble sense of the term, 
whose goal is to help improve computer 
systems . 
 Black Hat Hackers 
Are people who break into computer 
systems for malicious purposes, 
commonly called pirates. 
S.K.Ahsan 18
S.K.Ahsan 19
How do 
S.K.Ahsan 
20
What Do Do? 
Threaten People 
Stole illegal or Private material 
Damage System 
Stole Passwords 
Crack Unpaid Softwares 
Modify data / stream 
S.K.Ahsan 21
– Access confidential information 
– Threaten someone from YOUR computer 
– Broadcast your confidential letters or 
materials 
– Store illegal or espionage material 
S.K.Ahsan 
22
– Eavesdrop and replay 
– Imposer: server / client 
– Modify data / stream 
– Denial-of-Service 
S.K.Ahsan 
23
S.K.Ahsan 
24
System hacking 
Network hacking 
Software hacking 
http://wiki.answers.com/Q/What_are_the_types_of_hacking 
S.K.Ahsan 25
• Foot printing 
• Scanning 
• Enumeration 
• Gaining access 
• Covering tracks 
• Creating backdoors 
• Denial of service 
26 S.K.Ahsan
 Objective 
– To learn as much as you can about target 
system, it's remote access capabilities, its 
ports and services, and the aspects of its 
security. 
 Techniques 
– Open source search 
– Whois 
– Web interface to whois 
– ARIN whois 
27 S.K.Ahsan
 Most security breeches 
originate inside the network that 
is under attack. 
 Which include stealing passwords, performing 
industrial private data, or 
committing simple misuse. 
S.K.Ahsan 28
29 S.K.Ahsan
30 S.K.Ahsan
31 S.K.Ahsan
32 S.K.Ahsan
33 S.K.Ahsan
 Objective 
– Bulk target assessment and identification 
of listing services focuses the attention on 
the most promising avenue of entry 
 Techniques 
– Ping sweep 
– TCP/UDP port scan 
– OS Detection 
34 S.K.Ahsan
 Objective 
– More intrusive probing now begins as 
attackers begin identifying valid user 
accounts or poorly protected resource 
shares 
 
Techniques 
– List user accounts 
– List file shares 
– Identify applications 
35 S.K.Ahsan
 Objective 
– Enough data has been gathered at this 
point to make an informed attempt to 
access the target 
 Techniques 
– File share brute forcing 
– Password file grab 
– Buffer overflows 
– Password eavesdropping 
36 S.K.Ahsan
37 S.K.Ahsan
38 S.K.Ahsan
 Objective 
– Once total ownership of the target is 
secured, hiding this from system 
administrators become paramount ,lest 
they quickly end the romp. 
 Techniques 
– Clear logs 
– Hide tools 
39 S.K.Ahsan
 Objective 
– Trap doors will be laid in various parts of 
the system to ensure that privileged access 
is easily regained at the whim if the 
intruder 
 Techniques 
– Create rogue user accounts 
– Schedule batch jobs 
– Infect startup files 
– Plant remote control services 
– Install monitoring mechanisms 
– Replace apps with trojans 
40 S.K.Ahsan
 Rogue access points (APs) are unsecured wireless 
access points that outsiders can easily breech. 
 Rogue APs are most often connected by well 
meaning but ignorant employees. 
S.K.Ahsan 41
 Viruses and worms are 
self-replicating programs 
or code fragments that 
attach themselves to 
other programs (viruses) 
or machines (worms). 
 Viruses and worms attempt to shut down networks by 
flooding them with massive amounts of bogus 
Traffic,usually through e-mail. 
S.K.Ahsan 42
 Hackers can gain access to a 
Network by exploiting back doors, 
administrative shortcuts, configuration 
errors, easily deciphered 
passwords, and unsecured dial-ups. 
S.K.Ahsan 43
 Trojan horses, which are 
Attached to other programs, are 
the leading cause of all break-ins. 
 When a user Downloads and 
activates a Trojan horse, the hacked software kicks off 
a virus, password gobbler, or remote-control SW that 
gives the hacker control of the PC.i.e 
Snipersky,PerfectKeylogger. 
S.K.Ahsan 44
 DoS attacks give hackers a way to bring down a 
network without gaining internal access. 
 DoS attacks work by flooding the access routers with 
bogus traffic. 
 A DDoS is more difficult to block because it uses 
multiple, changing, source IP addresses. 
S.K.Ahsan 45
 Who just like to break stuff. They usually exploit any 
target of opportunity. 
 hobbyists or professionals who break passwords and 
develop Trojan horses or other SW (called warez). 
 They have no real hacker skills, so they buy or 
download warez, which they launch and use 
“COwbOy “Languages. 
S.K.Ahsan 46
The pirates who use the switched telephone network 
(STN) to make free phone calls. 
mainly attack chip card systems (particularly bank 
cards) to understand how they work and to exploit 
their flaws. The term carding refers to chip card 
piracy. 
S.K.Ahsan 47
 refers to the act of intercepting TCP packets. This 
interception can happen through simple 
eavesdropping or something more sinister. 
S.K.Ahsan 48
 The act of sending an illegitimate packet with an 
expected acknowledgment (ACK), which a hacker 
can guess, predict, or obtain by snooping. 
S.K.Ahsan 49
 The method of luring an unsuspecting user into giving 
out their username and password for a secure web 
resource, usually a bank or credit card account. 
 Ebay and PayPal are particularly susceptible to this 
type of attack. 
S.K.Ahsan 50
S.K.Ahsan 51
S.K.Ahsan 52
S.K.Ahsan 53
54 S.K.Ahsan
55 S.K.Ahsan
56 S.K.Ahsan
S.K.Ahsan 57
Hacker’s Techniques & 
Attacks 
S.K.Ahsan 58
S.K.Ahsan 
59
“The opposite 
of hacking". 
If hacking is defined as an attack on a 
computer system then Anti-Hacking is 
the protection of that system. 
S.K.Ahsan 60
S.K.Ahsan 61
S.K.Ahsan 
62
 Don't ignore operating system updates 
 Anti-virus software 
 Activate the firewall in Windows XP 
 Email software preview windows 
 Logging out 
 Audit your computer regularly 
 Regularly remove spyware 
 Password issues 
 Increasing Security Against a Brute Force 
Attack 
S.K.Ahsan 63
 Don't wait to be alerted via mainstream 
media of problems that have been 
discovered 
 It's wise to visit the software vendors' 
site and keep abreast of any critical 
security updates. In the case of 
Microsoft, you'll need to go to the 
Windows Update site. 
S.K.Ahsan 64
 Anti-virus software used *properly*. 
 Ensure that it's regularly updated. 
 Even missing one update could bring 
down your computer . 
 remember to password protect the 
settings on the software so no-one else 
can alter protection levels. 
S.K.Ahsan 65
S.K.Ahsan 66
 Anti-virus software isn't enough,it's also a 
good idea to install firewall software which will 
help prevent unauthorized incoming and 
outgoing communications from your computer 
while connected to the Internet. 
 Port scanning is *very* common and is 
carried out with a view to finding weaknesses 
in your system that can then be exploited. 
S.K.Ahsan 67
S.K.Ahsan 68
 3rd party solutions for filtering email of spam 
and viruses as their inboxes become 
inundated with junk. 
 Email filtering can be very effective in 
dramatically reducing security risks before the 
mail even has a chance to be collected by 
your email software. 
S.K.Ahsan 69
 Ensure that you log out of online services 
properly. Failure to do so can allow others 
who use your computer to gain access to 
those services. 
S.K.Ahsan 70
 If your computer is used by others, carry 
out regular audits of the software on it. 
 It's safest to make it a policy not to allow 
any software to be installed without your 
permission. 
 Spybot again is a very effective tool for 
detecting and removing software that may 
be a security risk. 
S.K.Ahsan 71
 If you and your familiar do a lot of surfing and 
downloading of shareware software, then it's 
likely you'll also accumulate your fair share of 
spyware. 
 Some software companies use spyware that 
is incorporated into their software products to 
gather data about customers, which is often 
sold to other companies. 
S.K.Ahsan 72
S.K.Ahsan 73
 If you must store usernames and passwords 
on your system, ensure they are contained in 
a document that is password protected. 
 Don't let Windows "remember" passwords for 
you. Passwords should always be more than 
8 characters long and contain a mixture of 
numbers and letters. Learn more about 
password security issues. 
S.K.Ahsan 74
 Increasing the length of the PIN 
 Allowing the PIN to contain characters other 
than numbers, such as * or # 
 Imposing a 30 second delay between failed 
authentication attempts 
 Locking the account after 5 failed 
authentication attempts 
S.K.Ahsan 75
S.K.Ahsan 76
S.K.Ahsan 
77
S.K.Ahsan 
78

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
SHAHID ANSARI
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
Sina Manavi
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
Kudzai Rerayi
 
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Mobile security
Mobile securityMobile security
Mobile security
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 

Viewers also liked

7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
jobandesther
 
La historia secreta del mossad
La historia secreta del mossadLa historia secreta del mossad
La historia secreta del mossad
Gran Fratervidad Tao Gnostica Espiritual Org
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
Dragnoz -
 
Hacking
HackingHacking
Hacking
j naga sai
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
Mossad
MossadMossad
Social media privacy
Social media privacySocial media privacy
Social media privacy
Mulligan Management Group, LLC
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
Victoria Herring
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
JOSE LUIS
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
Gohsuke Takama
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
Paul Gillingwater, MBA
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
krishnadeepika01
 
Blue brain
Blue brainBlue brain
Blue brain
Leelakh Sachdeva
 
before upload
before uploadbefore upload
before upload
alind tiwari
 

Viewers also liked (20)

7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
 
La historia secreta del mossad
La historia secreta del mossadLa historia secreta del mossad
La historia secreta del mossad
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
 
Hacking
HackingHacking
Hacking
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Mossad
MossadMossad
Mossad
 
Social media privacy
Social media privacySocial media privacy
Social media privacy
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue brain
Blue brainBlue brain
Blue brain
 
before upload
before uploadbefore upload
before upload
 

Similar to Hacking and Anti Hacking

Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Bharat Sabne
 
Hacking
Hacking Hacking
Hacking
SahilGothoskar
 
HACKING
HACKINGHACKING
my new HACKING
my new HACKINGmy new HACKING
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
dharmesh ram
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
pradeep acharya
 
Hacking
HackingHacking
Hacking
Amit Pandey
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 

Similar to Hacking and Anti Hacking (20)

Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
hacking basics
hacking basicshacking basics
hacking basics
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking
HackingHacking
Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 

More from International Islamic University

Hash tables
Hash tablesHash tables
Binary Search Tree
Binary Search TreeBinary Search Tree
Graph 1
Graph 1Graph 1
Graph 2
Graph 2Graph 2
Graph 3
Graph 3Graph 3
Greedy algorithm
Greedy algorithmGreedy algorithm
Dynamic programming
Dynamic programmingDynamic programming
Quick sort
Quick sortQuick sort
Merge sort
Merge sortMerge sort
Linear timesorting
Linear timesortingLinear timesorting
Facial Expression Recognitino
Facial Expression RecognitinoFacial Expression Recognitino
Facial Expression Recognitino
International Islamic University
 
Lecture#4
Lecture#4Lecture#4
Lecture#3
Lecture#3 Lecture#3
Lecture#2
Lecture#2 Lecture#2
Case study
Case studyCase study
Arrays
ArraysArrays
Pcb
PcbPcb
Data transmission
Data transmissionData transmission
Basic organization of computer
Basic organization of computerBasic organization of computer
Basic organization of computer
International Islamic University
 
Sorting techniques
Sorting techniquesSorting techniques

More from International Islamic University (20)

Hash tables
Hash tablesHash tables
Hash tables
 
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
 
Graph 1
Graph 1Graph 1
Graph 1
 
Graph 2
Graph 2Graph 2
Graph 2
 
Graph 3
Graph 3Graph 3
Graph 3
 
Greedy algorithm
Greedy algorithmGreedy algorithm
Greedy algorithm
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Quick sort
Quick sortQuick sort
Quick sort
 
Merge sort
Merge sortMerge sort
Merge sort
 
Linear timesorting
Linear timesortingLinear timesorting
Linear timesorting
 
Facial Expression Recognitino
Facial Expression RecognitinoFacial Expression Recognitino
Facial Expression Recognitino
 
Lecture#4
Lecture#4Lecture#4
Lecture#4
 
Lecture#3
Lecture#3 Lecture#3
Lecture#3
 
Lecture#2
Lecture#2 Lecture#2
Lecture#2
 
Case study
Case studyCase study
Case study
 
Arrays
ArraysArrays
Arrays
 
Pcb
PcbPcb
Pcb
 
Data transmission
Data transmissionData transmission
Data transmission
 
Basic organization of computer
Basic organization of computerBasic organization of computer
Basic organization of computer
 
Sorting techniques
Sorting techniquesSorting techniques
Sorting techniques
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Hacking and Anti Hacking

  • 1. HACKING Don’t Learn to Hack – Hack to Learn S.K.Ahsan 1
  • 2. 2
  • 3. IN THE NAME OF THE MOST MERCIFUL THE BENEFICENT ! 3
  • 5.  What is Hacking ?  Brief History  Who is a Hacker ?  Types of Hacker  What do Hackers do?  Hacker’s Techniques & Attacks  Anti-Hacking  Demo Of Hacking S.K.Ahsan 5
  • 6. What is “ ” ? Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. S.K.Ahsan 6
  • 7. • “ Hacking is the use of one's skills (computer, networking, etc.) to try and find vulnerabilities in a network infrastructure. ” S.K.Ahsan 7
  • 8. Who is a ??? • Some one who bypasses the system’s control by taking advantage of security weaknesses left in the system by developers ! • One who is both knowledgeable and skilled at computer programming and have it’s own philosophy and code of ethics ! 8 S.K.Ahsan
  • 9. A Brief History of  In 1960s The first comuter hackers emerge at MIT AI (Massachusetts Institute of Technology) there occurred the first hacking incident an victims were electric trains. 1960’s S.K.Ahsan 9
  • 10. In 1970s – Phreaking : John Draper Hacked the AT&T’s long distance Calling for free . – Phone hackers break into regional and international phone networks to make free calls. S.K.Ahsan 10
  • 11. 1980’s Phone phreaks begin to move into the realm of computer hacking, and the first electronic bulletin board systems (BBSs) spring up. In 1980s Bill Landreth(the Cracker) Hacked most secure networks. (Choas C.Club) Hacked Nuclear secrets in Germany. S.K.Ahsan >>> Use a Computer, Go to Jail ! ! ! 11
  • 12.  In 1990s – Two teens Hacked (T online). – 21 year old Argentinean was hacked NASA, Harvard an Naval war heads info. S.K.Ahsan 12
  • 13.  1990’s After a prolonged sting investigation, S.K.Ahsan swoop down on hackers in 14 U.S. cities, conducting early-morning raids and arrests. The Internet begins to take off as a new browser, Netscape Navigator, makes information on the Web more accessible. Hackers take to the new venue quickly, moving all their information and hacking programs to new hacker Web sites. >>> As information and easy-to-use tools become available to anyone with Net access, the face of hacking begins to change. 13
  • 14. 1995-till date The hacking group Cult of the Dead Cow releases its Trojan horse program, a powerful hacking tool--at Def Con. Once a hacker installs the on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine ! Hackers launch attacks against , , S.K.Ahsan , and ! Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server. 14
  • 15.  2000 – In one of the biggest denial-of-service attacks , hackers launch attacks against eBay, Yahoo!, CNN.com., Amazon and others. S.K.Ahsan 15
  • 17. Who is a “ ” ? There are at least two common interpretations:  A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-crime.  A programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm. S.K.Ahsan 17
  • 18. Types of  White Hat Hackers Are hackers in the noble sense of the term, whose goal is to help improve computer systems .  Black Hat Hackers Are people who break into computer systems for malicious purposes, commonly called pirates. S.K.Ahsan 18
  • 21. What Do Do? Threaten People Stole illegal or Private material Damage System Stole Passwords Crack Unpaid Softwares Modify data / stream S.K.Ahsan 21
  • 22. – Access confidential information – Threaten someone from YOUR computer – Broadcast your confidential letters or materials – Store illegal or espionage material S.K.Ahsan 22
  • 23. – Eavesdrop and replay – Imposer: server / client – Modify data / stream – Denial-of-Service S.K.Ahsan 23
  • 25. System hacking Network hacking Software hacking http://wiki.answers.com/Q/What_are_the_types_of_hacking S.K.Ahsan 25
  • 26. • Foot printing • Scanning • Enumeration • Gaining access • Covering tracks • Creating backdoors • Denial of service 26 S.K.Ahsan
  • 27.  Objective – To learn as much as you can about target system, it's remote access capabilities, its ports and services, and the aspects of its security.  Techniques – Open source search – Whois – Web interface to whois – ARIN whois 27 S.K.Ahsan
  • 28.  Most security breeches originate inside the network that is under attack.  Which include stealing passwords, performing industrial private data, or committing simple misuse. S.K.Ahsan 28
  • 34.  Objective – Bulk target assessment and identification of listing services focuses the attention on the most promising avenue of entry  Techniques – Ping sweep – TCP/UDP port scan – OS Detection 34 S.K.Ahsan
  • 35.  Objective – More intrusive probing now begins as attackers begin identifying valid user accounts or poorly protected resource shares  Techniques – List user accounts – List file shares – Identify applications 35 S.K.Ahsan
  • 36.  Objective – Enough data has been gathered at this point to make an informed attempt to access the target  Techniques – File share brute forcing – Password file grab – Buffer overflows – Password eavesdropping 36 S.K.Ahsan
  • 39.  Objective – Once total ownership of the target is secured, hiding this from system administrators become paramount ,lest they quickly end the romp.  Techniques – Clear logs – Hide tools 39 S.K.Ahsan
  • 40.  Objective – Trap doors will be laid in various parts of the system to ensure that privileged access is easily regained at the whim if the intruder  Techniques – Create rogue user accounts – Schedule batch jobs – Infect startup files – Plant remote control services – Install monitoring mechanisms – Replace apps with trojans 40 S.K.Ahsan
  • 41.  Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech.  Rogue APs are most often connected by well meaning but ignorant employees. S.K.Ahsan 41
  • 42.  Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms).  Viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus Traffic,usually through e-mail. S.K.Ahsan 42
  • 43.  Hackers can gain access to a Network by exploiting back doors, administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. S.K.Ahsan 43
  • 44.  Trojan horses, which are Attached to other programs, are the leading cause of all break-ins.  When a user Downloads and activates a Trojan horse, the hacked software kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.i.e Snipersky,PerfectKeylogger. S.K.Ahsan 44
  • 45.  DoS attacks give hackers a way to bring down a network without gaining internal access.  DoS attacks work by flooding the access routers with bogus traffic.  A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. S.K.Ahsan 45
  • 46.  Who just like to break stuff. They usually exploit any target of opportunity.  hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez).  They have no real hacker skills, so they buy or download warez, which they launch and use “COwbOy “Languages. S.K.Ahsan 46
  • 47. The pirates who use the switched telephone network (STN) to make free phone calls. mainly attack chip card systems (particularly bank cards) to understand how they work and to exploit their flaws. The term carding refers to chip card piracy. S.K.Ahsan 47
  • 48.  refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. S.K.Ahsan 48
  • 49.  The act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping. S.K.Ahsan 49
  • 50.  The method of luring an unsuspecting user into giving out their username and password for a secure web resource, usually a bank or credit card account.  Ebay and PayPal are particularly susceptible to this type of attack. S.K.Ahsan 50
  • 58. Hacker’s Techniques & Attacks S.K.Ahsan 58
  • 60. “The opposite of hacking". If hacking is defined as an attack on a computer system then Anti-Hacking is the protection of that system. S.K.Ahsan 60
  • 63.  Don't ignore operating system updates  Anti-virus software  Activate the firewall in Windows XP  Email software preview windows  Logging out  Audit your computer regularly  Regularly remove spyware  Password issues  Increasing Security Against a Brute Force Attack S.K.Ahsan 63
  • 64.  Don't wait to be alerted via mainstream media of problems that have been discovered  It's wise to visit the software vendors' site and keep abreast of any critical security updates. In the case of Microsoft, you'll need to go to the Windows Update site. S.K.Ahsan 64
  • 65.  Anti-virus software used *properly*.  Ensure that it's regularly updated.  Even missing one update could bring down your computer .  remember to password protect the settings on the software so no-one else can alter protection levels. S.K.Ahsan 65
  • 67.  Anti-virus software isn't enough,it's also a good idea to install firewall software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet.  Port scanning is *very* common and is carried out with a view to finding weaknesses in your system that can then be exploited. S.K.Ahsan 67
  • 69.  3rd party solutions for filtering email of spam and viruses as their inboxes become inundated with junk.  Email filtering can be very effective in dramatically reducing security risks before the mail even has a chance to be collected by your email software. S.K.Ahsan 69
  • 70.  Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services. S.K.Ahsan 70
  • 71.  If your computer is used by others, carry out regular audits of the software on it.  It's safest to make it a policy not to allow any software to be installed without your permission.  Spybot again is a very effective tool for detecting and removing software that may be a security risk. S.K.Ahsan 71
  • 72.  If you and your familiar do a lot of surfing and downloading of shareware software, then it's likely you'll also accumulate your fair share of spyware.  Some software companies use spyware that is incorporated into their software products to gather data about customers, which is often sold to other companies. S.K.Ahsan 72
  • 74.  If you must store usernames and passwords on your system, ensure they are contained in a document that is password protected.  Don't let Windows "remember" passwords for you. Passwords should always be more than 8 characters long and contain a mixture of numbers and letters. Learn more about password security issues. S.K.Ahsan 74
  • 75.  Increasing the length of the PIN  Allowing the PIN to contain characters other than numbers, such as * or #  Imposing a 30 second delay between failed authentication attempts  Locking the account after 5 failed authentication attempts S.K.Ahsan 75