Hacking
A Technical Threat
Contents What is Hacking?
 Who is Hacker?
 History of Hacking
 Types of Hacker
 Types of Hacking
 Ethical Hacker
 Hacking Process
 Famous hackers in history
 Why do Hackers hack?
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
Slide No 01
What is Hacking ?
Slide No 02
Who is a hacker?
Slide No 03
History of Hacking
Slide No 04
 White Hat Hacker
 Black Hat Hackerce websites
 Grey Hat Hacker
Types of Hacker
Slide No 05
Website Hacking
Email Hacking
Network Hacking
Online Banking Hacking
Password Hacking
Computer Hacking
Types of Hacking
Slide No 06
Website Hacking
Slide No 07
Email Hacking
Slide No 08
Network Hacking
Slide No 09
Password Hacking
Slide No 10
Online Banking Hacking
Slide No 11
Computer Hacking
Slide No 12
Ethical Hacker
Slide No 13
Footprinting
Scanning
Enumeration
Attack and Gaining
Access
Escalating Privilege,
Covering Tracks
and Creating
Backdoors
Hacking Process
Slide No 14
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Slide No 15
Why do hackers hack ?
Slide No 16
What should do after hacked?
Slide No 17
How to give a password to account
Slide No 18
How to secure our data
Slide No 19
Disadvantages of Hacking
Slide No 20
Advantages of Hacking
Slide No 21
Conclusion
Slide No 22
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
Slide No 23
Thank You

Hacking - A Technical Threat