SlideShare a Scribd company logo
Hackinghacking defined experts for those who dare
SUBMITTED TO SUBMITTED BY
MR. SUBHASH CHANDRA SHARIQUE MASOOD(5CS63)
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Types of hacker
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
 The truth hacker amongst our societies have thirst for the
knowledge .
 Boredom is never an object of challenge for the hacker
What is Hacking ?
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers
who argue that someone breaking into computers is better
called a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Types of Hacker
 Black hat :
Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems
to focus on. Black-hat hackers violate computer security for personal gain (such as
stealing credit card numbers or harvesting personal data for sale to identity thieves) or for
pure maliciousness (such as creating a botnet and using that botnet to perform DDOS
attacks against websites they don’t like.)
 White hat:
hackers are the opposite of the black-hat hackers. They’re the “ethical hackers,” experts in
compromising computer security systems who use their abilities for good, ethical, and
legal purposes rather than bad, unethical, and criminal purposes.
 Grey hat:
Very few things in life are clear black-and-white categories. In reality, there’s often a gray
area. A grey-hat hacker falls somewhere between a black hat and a white hat. A gray hat
doesn’t work for their own personal gain or to cause carnage, but they may technically
commit crimes and do arguably unethical things.
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the
website.
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Ethical Hacking
 Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
Email Hacking
 Email hacking is illicit access to an email account
or email correspondence.
Password Hacking
 Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Online Banking Hacking
 Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
What should do after hacked?
 Shutdown the system
− Or turn off the system
 Separate the system from network
 Restore the system with the backup
− Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
 Ex.
1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
 Can be used to recover lost information where the
computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
 Keep your password protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
Thank You

More Related Content

What's hot

Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
hacking
hackinghacking
hacking
mayank1293
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
missstevenson01
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 

What's hot (20)

Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
hacking
hackinghacking
hacking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 

Similar to Hacking

HACKING
HACKINGHACKING
HACKING
D's Surti
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacking
Hacking Hacking
Hacking
Nafeesa Naeem
 
Hacking
HackingHacking
Hacking
akam bajalan
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
Hacking
HackingHacking
Hacking
Asma Khan
 
HACKING
HACKINGHACKING
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Hacking
HackingHacking
Hacking
NishaPariyar
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Hacking
HackingHacking
Hacking
Ravi Raj
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Hacking
HackingHacking
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
Subhoneel Datta
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
Smit Shah
 

Similar to Hacking (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 

More from Sharique Masood

Git Quick Start
Git Quick StartGit Quick Start
Git Quick Start
Sharique Masood
 
Concord a social networking website
Concord a social networking websiteConcord a social networking website
Concord a social networking website
Sharique Masood
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
Sharique Masood
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Sharique Masood
 
Global warming
Global warmingGlobal warming
Global warming
Sharique Masood
 
Wi max
Wi maxWi max

More from Sharique Masood (7)

Git Quick Start
Git Quick StartGit Quick Start
Git Quick Start
 
Concord a social networking website
Concord a social networking websiteConcord a social networking website
Concord a social networking website
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Global warming
Global warmingGlobal warming
Global warming
 
Wi max
Wi maxWi max
Wi max
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

Hacking

  • 1. Hackinghacking defined experts for those who dare SUBMITTED TO SUBMITTED BY MR. SUBHASH CHANDRA SHARIQUE MASOOD(5CS63)
  • 2. Contents  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Types of hacker  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3. History of Hacking  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge .  Boredom is never an object of challenge for the hacker
  • 4. What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 5.
  • 6. Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 7. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 8. Types of Hacker  Black hat : Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems to focus on. Black-hat hackers violate computer security for personal gain (such as stealing credit card numbers or harvesting personal data for sale to identity thieves) or for pure maliciousness (such as creating a botnet and using that botnet to perform DDOS attacks against websites they don’t like.)  White hat: hackers are the opposite of the black-hat hackers. They’re the “ethical hackers,” experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and criminal purposes.  Grey hat: Very few things in life are clear black-and-white categories. In reality, there’s often a gray area. A grey-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.
  • 9. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 10. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 11.
  • 12. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 13.
  • 14. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 15.
  • 16. Ethical Hacking  Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 17.
  • 18. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 19.
  • 20. Password Hacking  Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 21.
  • 22. Online Banking Hacking  Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 23.
  • 24. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data  Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 30. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal
  • 31. Conclusion  Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .