Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.
3. CONTENTS
History of Hacking
What is Hacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
References
4. HISTORY OF HACKING
Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by
enraged authorities. Here's a peek at how busy hackers have been in
the past 35 years.
Early 1960s
University facilities with huge mainframe computers, likeMIT's artificial
intelligence lab, become staging grounds for hackers. At first, "hacker"
was a positive term for a person with a mastery of computers who could
push programs beyond what they were designed to do.
Early 1970s
o Two members of California's Homebrew Computer Club begin making
"blue boxes," devices used to hack into the phone system. The
members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak
Toebark" (Steve Wozniak), later go on to found Apple computer.
5. Early 1980s
Author William Gibson coins the term "cyberspace" in a science fiction
novel called Neuromancer.
In one of the first arrests of hackers, the FBI busts the Milwaukee-based
414s (named after the local area code) after members are accused of 60
computer break-insranging from Memorial Sloan-Kettering Cancer Center
to Los Alamos National Laboratory.
Late 1980s
First National Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker known as "Fry Guy" -- so named for hacking
McDonald's -- is raided by law enforcement. A similar sweep occurs in
Atlanta for Legion of Doomhackers known by the handles "Prophet,"
"Leftist" and "Urvile.“
Early 1990s
A 17-month search ends in the capture of hacker Kevin Lee
Poulsen ("Dark Dante"), who is indicted for stealing military documents.
6. Late 1990s
Popular Internet search engine Yahoo! is hit by hackers claiming a "logic
bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless
Kevin Mitnick is released from prison. "There is no virus," Yahoo!
spokeswoman Diane Hunt said.
1998
Hackers claim to have broken into a Pentagon network and stolen software
for a military satellite system. They threaten to sell the software to
terrorists.
2000
The "I Love You" virus debuts on the Internet in May, appearing first in the
Philippines, then spreading across the globe in a matter of hours. It causes
an estimated $10 billion of damage globally in lost files and computer
downtime before a solution is found.
7. o 1.Hacking refers to the activities which are done to intrude some one
else’s personal information so as to use it for malicious, unwanted
purposes.
o 2. Hacking is a term which refers to the activities aimed at exploiting
security flaws to obtain personal information for gaining access to
secured networks.
What is hacking
Who is a hacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
8. FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
LinusTorvaldsMark Abene Robert Morris
9. WHY DO HACKERS HACK ?
o Just for fun.
o Show off.
o Hack other systems secretly.
o Notify many people their thought.
o Steal important information.
o Destroy enemy’s computer network during the war.
Types of Hacking
o Website Hacking
o Network Hacking
o Ethical Hacking
o Email Hacking
o Password Hacking
o Online Banking Hacking
o Computer Hacking
10. Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc…
over the network.
Ethical Hacking
Ethical hacking is where a person hacks to
find weaknesses in a system and then usually
patches them.
11. Email Hacking
Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process
of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online
banking hacking.
12. Computer Hacking
Computer Hacking is when files on your computer
are viewed, created, or edited without your
authorization.
What should do after hacked?
o Shutdown the system
Or turn off the system
o Separate the system from network
o Restore the system with the backup
Or reinstall all programs
o Connect the system to the network
o It can be good to call the police
13. How to give a password to account.
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
Advantages of hacking
Can be used to recover lost information where the computer
password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
14. Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
Keep your password protected. Write your password should be
with combination of characters, digits, special symbols. Do not
respond to feck on fishing email. when you are doing any online
transection always keep watch on site whether the protocol of site
is https & whether there is a lock symbol .
15. THANKS TO ALL
RGI - FAMILY
VIHAN
CO-ORDINATOR
ASSOCIATE MEMBER
FOR GIVING ME A CHANCE TO
PARTICIPATE.