SlideShare a Scribd company logo
1 of 16
WELCOME TO
Submitted by: -
Fozail Ahmad
Nabeela Shahid
HACKING
CONTENTS
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
HISTORY OF HACKING
 Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by
enraged authorities. Here's a peek at how busy hackers have been in
the past 35 years.
Early 1960s
 University facilities with huge mainframe computers, likeMIT's artificial
intelligence lab, become staging grounds for hackers. At first, "hacker"
was a positive term for a person with a mastery of computers who could
push programs beyond what they were designed to do.
Early 1970s
o Two members of California's Homebrew Computer Club begin making
"blue boxes," devices used to hack into the phone system. The
members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak
Toebark" (Steve Wozniak), later go on to found Apple computer.
Early 1980s
 Author William Gibson coins the term "cyberspace" in a science fiction
novel called Neuromancer.
 In one of the first arrests of hackers, the FBI busts the Milwaukee-based
414s (named after the local area code) after members are accused of 60
computer break-insranging from Memorial Sloan-Kettering Cancer Center
to Los Alamos National Laboratory.
Late 1980s
 First National Bank of Chicago is the victim of a $70-million computer heist.
 An Indiana hacker known as "Fry Guy" -- so named for hacking
McDonald's -- is raided by law enforcement. A similar sweep occurs in
Atlanta for Legion of Doomhackers known by the handles "Prophet,"
"Leftist" and "Urvile.“
Early 1990s
 A 17-month search ends in the capture of hacker Kevin Lee
Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Late 1990s
 Popular Internet search engine Yahoo! is hit by hackers claiming a "logic
bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless
Kevin Mitnick is released from prison. "There is no virus," Yahoo!
spokeswoman Diane Hunt said.
1998
 Hackers claim to have broken into a Pentagon network and stolen software
for a military satellite system. They threaten to sell the software to
terrorists.
2000
 The "I Love You" virus debuts on the Internet in May, appearing first in the
Philippines, then spreading across the globe in a matter of hours. It causes
an estimated $10 billion of damage globally in lost files and computer
downtime before a solution is found.
o 1.Hacking refers to the activities which are done to intrude some one
else’s personal information so as to use it for malicious, unwanted
purposes.
o 2. Hacking is a term which refers to the activities aimed at exploiting
security flaws to obtain personal information for gaining access to
secured networks.
What is hacking
Who is a hacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
LinusTorvaldsMark Abene Robert Morris
WHY DO HACKERS HACK ?
o Just for fun.
o Show off.
o Hack other systems secretly.
o Notify many people their thought.
o Steal important information.
o Destroy enemy’s computer network during the war.
Types of Hacking
o Website Hacking
o Network Hacking
o Ethical Hacking
o Email Hacking
o Password Hacking
o Online Banking Hacking
o Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc…
over the network.
Ethical Hacking
Ethical hacking is where a person hacks to
find weaknesses in a system and then usually
patches them.
Email Hacking
Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process
of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online
banking hacking.
Computer Hacking
Computer Hacking is when files on your computer
are viewed, created, or edited without your
authorization.
What should do after hacked?
o Shutdown the system
Or turn off the system
o Separate the system from network
o Restore the system with the backup
Or reinstall all programs
o Connect the system to the network
o It can be good to call the police
How to give a password to account.
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
Advantages of hacking
Can be used to recover lost information where the computer
password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
Keep your password protected. Write your password should be
with combination of characters, digits, special symbols. Do not
respond to feck on fishing email. when you are doing any online
transection always keep watch on site whether the protocol of site
is https & whether there is a lock symbol .
THANKS TO ALL
RGI - FAMILY
VIHAN
CO-ORDINATOR
ASSOCIATE MEMBER
FOR GIVING ME A CHANCE TO
PARTICIPATE.
Hacking

More Related Content

What's hot

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...Intellipaat
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 

What's hot (20)

HACKING
HACKINGHACKING
HACKING
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking
HackingHacking
Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
HACKING
HACKINGHACKING
HACKING
 
hacking
hackinghacking
hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 

Similar to Hacking (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Hacking

  • 2. Submitted by: - Fozail Ahmad Nabeela Shahid HACKING
  • 3. CONTENTS  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 4. HISTORY OF HACKING  Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s  University facilities with huge mainframe computers, likeMIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s o Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple computer.
  • 5. Early 1980s  Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.  In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-insranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory. Late 1980s  First National Bank of Chicago is the victim of a $70-million computer heist.  An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doomhackers known by the handles "Prophet," "Leftist" and "Urvile.“ Early 1990s  A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
  • 6. Late 1990s  Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said. 1998  Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. 2000  The "I Love You" virus debuts on the Internet in May, appearing first in the Philippines, then spreading across the globe in a matter of hours. It causes an estimated $10 billion of damage globally in lost files and computer downtime before a solution is found.
  • 7. o 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. o 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks. What is hacking Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. FAMOUS HACKERS IN HISTORY Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvaldsMark Abene Robert Morris
  • 9. WHY DO HACKERS HACK ? o Just for fun. o Show off. o Hack other systems secretly. o Notify many people their thought. o Steal important information. o Destroy enemy’s computer network during the war. Types of Hacking o Website Hacking o Network Hacking o Ethical Hacking o Email Hacking o Password Hacking o Online Banking Hacking o Computer Hacking
  • 10. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 11. Email Hacking Email hacking is illicit access to an email account or email correspondence. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 12. Computer Hacking Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. What should do after hacked? o Shutdown the system Or turn off the system o Separate the system from network o Restore the system with the backup Or reinstall all programs o Connect the system to the network o It can be good to call the police
  • 13. How to give a password to account. Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password. Advantages of hacking Can be used to recover lost information where the computer password has been lost. Teaches you that no technology is 100% secure. To test how good security is on your own network. They call it white hat computer hacking.
  • 14. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  • 15. THANKS TO ALL RGI - FAMILY VIHAN CO-ORDINATOR ASSOCIATE MEMBER FOR GIVING ME A CHANCE TO PARTICIPATE.