SlideShare a Scribd company logo
CONTENTS
What is Hacking?
Who is Hacker?
Hackers & Crackers
History of Hacking
Types of Hacking
Types of Hackers
Ways to prevent hacking
WHAT IS HACKING?
The act of gaining access
without legal authorization
to a computer or computer
network is known as
Hacking.
WHO IS HACKER?
An expert computer
programmer, who breaks
computer and network
security and is involved in
the process of hacking is
known as Hacker.
Crackers:
A cracker is a person with
extensive computer knowledge
whose purpose is to violates
the system integrity or gain
access to software without
paying royalties. Crackers can
easily be identified because
there actions are malicious.
History of Hacking:
 During the 1970’s the hackers
learned the ways to hack the
telephonic system and make
phone calls for free.
 By the 1980’s, hackers started to
migrate to computers.
 During the 1990’s when the use
of internet widespread around the
world, hackers multiplied.
Types of hacking:
• Password Hacking
• Email Hacking
• Website Hacking
• Credit Card Hacking
• Linux Hacking
PASSWORD HACKING:
 A password is a combination of characters
that a user uses for protecting information.
 Once a file is protected by a password,
only those that know it can access it.
 The most common used tool to hack the
password is Social Engineering.
TYPES OF PASSWORD HACKING:
 Email Password Hacking
 Windows Password Hacking
 Bios Password Hacking
Email Hacking:
 There are several methods for
hacking yahoo, msn email accounts.
 One of these methods is Social
Engineering.
 Hacking yahoo messenger or any
other messenger is quite easy if you
know the person’s Email ID.
Website hacking:
There are two main types of website
hacking.
o Break the password protected
sections.
o Can deform or modify a website.
Credit card hacking:
In face to face transactions, the
percentage of credit card fraud is
almost a tenth of percent but in online
transactions its as high as two or three
percent.
Linux hacking:
Linux is an open source and
Windows are closed source. It
means that only Microsoft is
authorized to change any part of
the code of the Windows
operating system. While in Linux,
anyone can change it. That's
why hackers try to hack
machines with Linux.
Types of hackers:
 White Hat Hackers
 Black Hat Hackers
 Grey Hat Hackers
White hat hackers:
 These are considered as
good guys. White Hat
Hackers don’t use their
skills for illegal purposes.
 They usually become
Computer Security Experts
and help to protect people
from Black Hats.
Black hat hackers:
 These are considered as
bad guys. Black Hat
Hackers usually use their
skills maliciously for
personal gain.
 They are the people that
hack banks, steal credit
cards and deface websites.
Grey hat hackers:
A Grey Hat Hacker may surf
the internet and hack into a
computer system for the
only purpose of notifying the
administrator that their
system has been hacked.
Ways to prevent hacking:
 Install a firewall
 Download anti-virus software
 Delete emails from unknown sources
 Change password every month
Do not give out personal information
Hacking

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
Sushil Ranjan
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
HACKING
HACKINGHACKING
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Phishing
PhishingPhishing

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
HACKING
HACKINGHACKING
HACKING
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
HACKING
HACKINGHACKING
HACKING
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Hacking
HackingHacking
Hacking
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Hacking Movable Type
Hacking Movable TypeHacking Movable Type
Hacking Movable Type
Stefano Rodighiero
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of Hacking
GOPCSOFT
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
 
Evaporation
EvaporationEvaporation
Evaporation
Sayeed Hasan
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
sonal bisla
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Templatedloschiavo
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKS
Marc Jones
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State Evaporation
Morteza Sadeghi
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachAli Abbasi
 

Viewers also liked (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Hacking Movable Type
Hacking Movable TypeHacking Movable Type
Hacking Movable Type
 
Hacking
HackingHacking
Hacking
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Evaporation
EvaporationEvaporation
Evaporation
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Template
 
Science - Evaporation
Science - EvaporationScience - Evaporation
Science - Evaporation
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKS
 
Group 4 (evaporation)
Group 4 (evaporation)Group 4 (evaporation)
Group 4 (evaporation)
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State Evaporation
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation Approach
 

Similar to Hacking

Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Hacking
HackingHacking
Hacking
Nadeem Ahmad
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Hacking
HackingHacking
Hacking
Virus
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
AdvAbdulMueedAhmad
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
Klaus Drosch
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
nalini devi
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

Hacking

  • 1.
  • 2.
  • 3. CONTENTS What is Hacking? Who is Hacker? Hackers & Crackers History of Hacking Types of Hacking Types of Hackers Ways to prevent hacking
  • 4. WHAT IS HACKING? The act of gaining access without legal authorization to a computer or computer network is known as Hacking.
  • 5. WHO IS HACKER? An expert computer programmer, who breaks computer and network security and is involved in the process of hacking is known as Hacker.
  • 6.
  • 7.
  • 8.
  • 9. Crackers: A cracker is a person with extensive computer knowledge whose purpose is to violates the system integrity or gain access to software without paying royalties. Crackers can easily be identified because there actions are malicious.
  • 10.
  • 11. History of Hacking:  During the 1970’s the hackers learned the ways to hack the telephonic system and make phone calls for free.  By the 1980’s, hackers started to migrate to computers.  During the 1990’s when the use of internet widespread around the world, hackers multiplied.
  • 12. Types of hacking: • Password Hacking • Email Hacking • Website Hacking • Credit Card Hacking • Linux Hacking
  • 13. PASSWORD HACKING:  A password is a combination of characters that a user uses for protecting information.  Once a file is protected by a password, only those that know it can access it.  The most common used tool to hack the password is Social Engineering. TYPES OF PASSWORD HACKING:  Email Password Hacking  Windows Password Hacking  Bios Password Hacking
  • 14. Email Hacking:  There are several methods for hacking yahoo, msn email accounts.  One of these methods is Social Engineering.  Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
  • 15. Website hacking: There are two main types of website hacking. o Break the password protected sections. o Can deform or modify a website. Credit card hacking: In face to face transactions, the percentage of credit card fraud is almost a tenth of percent but in online transactions its as high as two or three percent.
  • 16. Linux hacking: Linux is an open source and Windows are closed source. It means that only Microsoft is authorized to change any part of the code of the Windows operating system. While in Linux, anyone can change it. That's why hackers try to hack machines with Linux.
  • 17. Types of hackers:  White Hat Hackers  Black Hat Hackers  Grey Hat Hackers
  • 18. White hat hackers:  These are considered as good guys. White Hat Hackers don’t use their skills for illegal purposes.  They usually become Computer Security Experts and help to protect people from Black Hats.
  • 19. Black hat hackers:  These are considered as bad guys. Black Hat Hackers usually use their skills maliciously for personal gain.  They are the people that hack banks, steal credit cards and deface websites.
  • 20. Grey hat hackers: A Grey Hat Hacker may surf the internet and hack into a computer system for the only purpose of notifying the administrator that their system has been hacked.
  • 21. Ways to prevent hacking:  Install a firewall  Download anti-virus software  Delete emails from unknown sources  Change password every month Do not give out personal information

Editor's Notes

  1. What is Hacking? Who is Hacker? Hackers & Crackers Types of Hackers Types of Hacking