SlideShare a Scribd company logo
1 of 32
Hacking
Contents
History of Hacking
What is Hacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
History of Hacking
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the term “hacker”.
The truth hacker amongst our societies have thirst for the
knowledge .
Boredom is never an object of challenge for the hacker
What is Hacking ?
The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called Hacking.
Who is a hacker?
In the computer security context, a hacker is someone who seeks
and exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue
that someone breaking into computers is better called a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Why do hackers hack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking
Hacking a website means taking control from the website
owner to a person who hacks the website.
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Ethical Hacking
Ethical hacking is where a person hacks to find weaknesses in a
system and then usually patches them.
Email Hacking
 Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been stored in or
transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
Computer Hacking
 Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
What should do after hacked?
 Shutdown the system
− Or turn off the system
 Separate the system from network
 Restore the system with the backup
− Or reinstall all programs
Connect the system to the network
 It can be good to call the police
How to give a password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
Ex.
◦ 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||.
◦ I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
oCan be used to recover lost information where the
computer password has been lost.
oTeaches you that no technology is 100% secure.
oTo test how good security is on your own network.
oThey call it white hat computer hacking.
Disadvantages of Hacking
◦Criminals can use it to their advantage.
◦It can harm someone's privacy
◦It's Illegal
Conclusion
Keep your password protected. Write your password should
be with combination of characters, digits, special symbols. Do
not respond to feck on fishing email. When you are doing any
online transection always keep watch on site whether the
protocol of site is https & whether there is a lock symbol .
Thank You

More Related Content

What's hot

Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
Hacking
HackingHacking
HackingVirus
 

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
HackingHacking
Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking
HackingHacking
Hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13nelsonprada123
 
Visaer Presentation for Induction
Visaer Presentation for InductionVisaer Presentation for Induction
Visaer Presentation for InductionRay Oaklands
 
Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27nelsonprada123
 
Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015nelsonprada123
 
Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands
 
Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25nelsonprada123
 
Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03nelsonprada123
 
Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30nelsonprada123
 
Tell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 janTell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 jannelsonprada123
 
Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015nelsonprada123
 
Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6nelsonprada123
 
Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 nelsonprada123
 
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.nelsonprada123
 
Chef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuChef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuJ.Scott Pierce II
 
Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04nelsonprada123
 
Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.nelsonprada123
 
Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24nelsonprada123
 
Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23nelsonprada123
 

Viewers also liked (20)

Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13Tell n sell_may_07_to_may_13
Tell n sell_may_07_to_may_13
 
Visaer Presentation for Induction
Visaer Presentation for InductionVisaer Presentation for Induction
Visaer Presentation for Induction
 
Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27Tell n-sell free-issue_jan21_jan27
Tell n-sell free-issue_jan21_jan27
 
Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015Tell n-sell free issue - aug 20 - aug 26, 2015
Tell n-sell free issue - aug 20 - aug 26, 2015
 
Animal behavior
Animal behavior Animal behavior
Animal behavior
 
Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6Ray Oaklands -Aviation GEN6
Ray Oaklands -Aviation GEN6
 
Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25Tell n-sell nov-19_to_nov_25
Tell n-sell nov-19_to_nov_25
 
Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03Tell n-sell free-issue_jan_28_feb_03
Tell n-sell free-issue_jan_28_feb_03
 
Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30Tell n-sell dec-24_to_dec_30
Tell n-sell dec-24_to_dec_30
 
Tell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 janTell n-sell jan 15 to 21 jan
Tell n-sell jan 15 to 21 jan
 
Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015Tell n sell_free_issue_august_06_to_august_12_2015
Tell n sell_free_issue_august_06_to_august_12_2015
 
Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6Tell n-sell mar-31_to_april_6
Tell n-sell mar-31_to_april_6
 
T-test
T-testT-test
T-test
 
Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7 Free Issue Tell n-sell jan 1 - jan 7
Free Issue Tell n-sell jan 1 - jan 7
 
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
Tell-N-Sell Free Issue Dec 18 - Dec 24, 2014.
 
Chef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menuChef J. Scott Pierce-Master Hors dOeuvres menu
Chef J. Scott Pierce-Master Hors dOeuvres menu
 
Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04Tell n-sell october-29_to_nov_04
Tell n-sell october-29_to_nov_04
 
Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.Tell-n-sell january 28 to 04 february free issue.
Tell-n-sell january 28 to 04 february free issue.
 
Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24Tell n-sell june-18_to_june_24
Tell n-sell june-18_to_june_24
 
Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23Tell n sell free issue_sep17_to_sep23
Tell n sell free issue_sep17_to_sep23
 

Similar to Hacking

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 

Similar to Hacking (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
HACKING
HACKINGHACKING
HACKING
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Hacking
HackingHacking
Hacking
 

More from Nafeesa Naeem

More from Nafeesa Naeem (20)

Business idea of plastic
Business idea of plastic Business idea of plastic
Business idea of plastic
 
Business plan of GFC fan
Business plan of GFC fanBusiness plan of GFC fan
Business plan of GFC fan
 
Business Plan of glow salt
Business Plan of glow saltBusiness Plan of glow salt
Business Plan of glow salt
 
Business plan of gourmet
Business plan of gourmetBusiness plan of gourmet
Business plan of gourmet
 
Amancio ortega gaona
Amancio ortega gaonaAmancio ortega gaona
Amancio ortega gaona
 
acidosis and alkalosis
 acidosis and alkalosis acidosis and alkalosis
acidosis and alkalosis
 
Water purification
Water purificationWater purification
Water purification
 
Water pollution
Water pollutionWater pollution
Water pollution
 
Ozone layer
Ozone layer Ozone layer
Ozone layer
 
Dna as a geneticmaterial
Dna as a geneticmaterial Dna as a geneticmaterial
Dna as a geneticmaterial
 
DNA
DNADNA
DNA
 
atomspheric structure
atomspheric structureatomspheric structure
atomspheric structure
 
Acid rain
Acid rain Acid rain
Acid rain
 
FACTORS AFFECTING ENZYME ACTIVITY
FACTORS AFFECTING ENZYME ACTIVITYFACTORS AFFECTING ENZYME ACTIVITY
FACTORS AFFECTING ENZYME ACTIVITY
 
freezing point
freezing pointfreezing point
freezing point
 
solutions
solutionssolutions
solutions
 
Enzymes
Enzymes Enzymes
Enzymes
 
Industries of pakistan
Industries of pakistanIndustries of pakistan
Industries of pakistan
 
Applications of hno3,h2 so4,naoh
Applications of hno3,h2 so4,naohApplications of hno3,h2 so4,naoh
Applications of hno3,h2 so4,naoh
 
CONSTITUTION 1956,1962
CONSTITUTION 1956,1962CONSTITUTION 1956,1962
CONSTITUTION 1956,1962
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Hacking

  • 1.
  • 3. Contents History of Hacking What is Hacking? Who is Hacker? Famous hackers in history Why do Hackers hack? Types of Hacking How to give a password to account What should do after hacked How to secure our data Advantages of Hacking Disadvantages of Hacking Conclusion
  • 4. History of Hacking Hacking has been a part of computing for 40 years. The first computer hacker emerged at MIT. Hacking is began in the 1960s at MIT , origin of the term “hacker”. The truth hacker amongst our societies have thirst for the knowledge . Boredom is never an object of challenge for the hacker
  • 5. What is Hacking ? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 6.
  • 7. Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 9. Why do hackers hack ? Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network during the war.
  • 10. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 11.
  • 12. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 13.
  • 14. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 15.
  • 16. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 17.
  • 18. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 19.
  • 20. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 21.
  • 22. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 23.
  • 24. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data Ex. ◦ 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. ◦ I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking oCan be used to recover lost information where the computer password has been lost. oTeaches you that no technology is 100% secure. oTo test how good security is on your own network. oThey call it white hat computer hacking.
  • 30. Disadvantages of Hacking ◦Criminals can use it to their advantage. ◦It can harm someone's privacy ◦It's Illegal
  • 31. Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. When you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .