A TECHNOLOGICAL THREAT
HACKING
INTRODUCTION
TODAY WE ARE
GOING TO TALK
ABOUT
HACKING
GROUP MEMBERS:
SULAIMAN ABBASI (89)
ZUBAIR AKRAM (124)
ABDUL HAFEEZ (120)
SADAM MALLAH (129)
CONTENTS
• WHAT IS HACKING
• WHO ARE HACKERS
• WHY DO HACKERS HACK
• THE HISTORY OF HACKING
• TYPES OF HACKING
• TYPE OF HACKERS
• WHAT IS CRACKER
• WHAT SHOULD DO AFTER HACKED
WHAT IS HACKING
The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called Hacking
WHO ARE HACKERS
A hacker is someone who seeks and exploits weaknesses in a
computer system or computer network.
WHY DO HACKERS HACK
• Just for fun.
• Show off.
• Hack other systems secretly.
• Steal important information.
• Destroy enemy’s computer network during the war.
THE HISTORY OF HACKING
MIT engineers in 1960s carried out some harmless technical
experiments and fun learning activities. These were so called hacks.
Before the internet, several hackers in US experimented with methods
to modify telephones for making 'FREE' long distance calls over the
phone network illegally.
TYPES OF HACKING
There are many type of hacking some are as follow.
• WEBSITE HACKING
• ETHICAL HACKING
• ONLINE BANKING HACKING
• COMPUTER HACKING
WEBSITE HACKING
Hacking a website means taking control from the website owner to a
person who hacks the website.
ETHICAL HACKING
Ethical hacking is where a person hacks to find weaknesses in a system
and then usually patches them.
ONLINE BANKING HACKING
Online banking Hacking Unauthorized accessing bank accounts without
knowing the password or without permission of account holder is
known as Online banking hacking.
COMPUTER HACKING
Computer Hacking is when files on your computer are viewed, created,
or edited without your authorization.
TYPE OF HACKERS
There are three types of hackers in this world…
I. BLACK HAT
II. GRAY HAT
III. WHITE HAT
BLACK HAT HACKER
 This type of hacker use hacking for evil purpose's.
 Black Hat hacker bellows to an rouge group.
 Which purpose is to use information in there use.
GRAY HAT HACKER
 This type of hacker use hacking for Fun.
 Gray Hat hacker are person how knows some information about
hacking.
WHITE HAT HACKER
This type of hacker use hacking for stop the doors for black hat hackers.
WHAT IS CRACKER ?
• A cracker also is someone who accesses a computer or network
illegally but has the intent of destroying data, stealing information,
or other malicious action. Both hackers and crackers have advanced
computer and network skills.
WHAT SHOULD DO AFTER HACKED?
• Shutdown the system − Or turn off the system
• Separate the system from network
• Restore the system with the backup − Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
ANY
QUESTIONS
OR
SUGGESTIONS
THANKS
FOR
WATCHING BE SAFE
&

Hacking

  • 2.
  • 3.
    INTRODUCTION TODAY WE ARE GOINGTO TALK ABOUT HACKING GROUP MEMBERS: SULAIMAN ABBASI (89) ZUBAIR AKRAM (124) ABDUL HAFEEZ (120) SADAM MALLAH (129)
  • 4.
    CONTENTS • WHAT ISHACKING • WHO ARE HACKERS • WHY DO HACKERS HACK • THE HISTORY OF HACKING • TYPES OF HACKING • TYPE OF HACKERS • WHAT IS CRACKER • WHAT SHOULD DO AFTER HACKED
  • 5.
    WHAT IS HACKING TheProcess of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking
  • 6.
    WHO ARE HACKERS Ahacker is someone who seeks and exploits weaknesses in a computer system or computer network.
  • 7.
    WHY DO HACKERSHACK • Just for fun. • Show off. • Hack other systems secretly. • Steal important information. • Destroy enemy’s computer network during the war.
  • 8.
    THE HISTORY OFHACKING MIT engineers in 1960s carried out some harmless technical experiments and fun learning activities. These were so called hacks. Before the internet, several hackers in US experimented with methods to modify telephones for making 'FREE' long distance calls over the phone network illegally.
  • 9.
    TYPES OF HACKING Thereare many type of hacking some are as follow. • WEBSITE HACKING • ETHICAL HACKING • ONLINE BANKING HACKING • COMPUTER HACKING
  • 10.
    WEBSITE HACKING Hacking awebsite means taking control from the website owner to a person who hacks the website.
  • 11.
    ETHICAL HACKING Ethical hackingis where a person hacks to find weaknesses in a system and then usually patches them.
  • 12.
    ONLINE BANKING HACKING Onlinebanking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 13.
    COMPUTER HACKING Computer Hackingis when files on your computer are viewed, created, or edited without your authorization.
  • 14.
    TYPE OF HACKERS Thereare three types of hackers in this world… I. BLACK HAT II. GRAY HAT III. WHITE HAT
  • 15.
    BLACK HAT HACKER This type of hacker use hacking for evil purpose's.  Black Hat hacker bellows to an rouge group.  Which purpose is to use information in there use.
  • 16.
    GRAY HAT HACKER This type of hacker use hacking for Fun.  Gray Hat hacker are person how knows some information about hacking.
  • 17.
    WHITE HAT HACKER Thistype of hacker use hacking for stop the doors for black hat hackers.
  • 18.
    WHAT IS CRACKER? • A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills.
  • 19.
    WHAT SHOULD DOAFTER HACKED? • Shutdown the system − Or turn off the system • Separate the system from network • Restore the system with the backup − Or reinstall all programs • Connect the system to the network • It can be good to call the police
  • 20.
  • 21.

Editor's Notes

  • #11 In Website hacking we hack there servers for information. The information is used for in there advantage.
  • #12 White hat hacker do ethical hacking, in ethical hacking they find the weaknesses in there application and patch them.
  • #13 In online banking hacker hack account for money.
  • #14 In computer hacking we make computer to make them zombies. Zombies are hacker computer they are used for attacking big websites or databases.