SlideShare a Scribd company logo
- YASH PISE
- AIML
Hacking And
Virus spreading
What is hacking?
● Hacking refers to activities that seek to compromise digital devices, such as
computers, smartphones, tablets, and even entire networks. And while hacking
might not always be for malicious purposes, nowadays most references to
hacking, and hackers, characterize it/them as unlawful activity by
cybercriminals—motivated by financial gain, protest, information gathering
(spying), and even just for the “fun” of the challenge..
Types of HACKER…!
a) .Social Engineers
b) Biohacker
c) Crackers
d) Phreakers
e) Growth Hacker
1.Social Engineers – These hackers don’t rely on gizmos or years of programming knowledge to
break into computer systems, yet they do it all the time. These whiz kids use social skills, good
theatrics, and a little bit of detective work to obtain passwords, credit card information, and other
devastating intel. Often targeting businesses, they can be a serious threat to be reckoned with, and
can even blackmail people with their findings.
2.Biohackers – Biohackers are very rare to come across, but they do exist. These are individuals
who work to bend the rules of normal biology and create new gizmos that work to improve the
body. A group of biohackers recently made the news when they created a night vision injection for
humans to use.
3.Crackers – Not to be misconstrued for the derogative term, crackers actually work to break the
keycodes that keep parts of programs unusable or uninstallable. By cracking the software code, the
users who download the software no longer have to pay in order to use the software. Cracked
software, also known as warez, is released under the idea that software should be free or open
sourced. Unfortunately, this is a nightmare for businesses that release software.
1.Phreakers– While this term may sound like something you’d hear in a rap or EDM song,
phreakers are actually hackers who specialize in phones. In the 80’s, phreakers were the
ones who could do a DIY wiretap or get free calls on payphones. In modern ages,
phreakers are the people who create spyware for smartphones, intercept cellphone
signals on baby monitors, or do other similar acts. This form of hacking has intersected
with regular computer hacking now.
2.Growth Hackers – This is beginning to become a common name for people who may
use (or abuse) certain aspects of the internet in order to grow businesses or get a higher
SEO rank. If you choose to enlist the help of a growth hacker, make sure they’re white hat.
KNOWN TYPES HACKER
Ethical hacker
basically work for
good activities
WHITE HAT
These are both gray as
well as black
GREY HAT
Illegal hacker
promotes to bad
activities
BLACK HAT
These are script
hackers kids
SCRIPT
Kiddies
What are things that a hacker can do to me?
Sell your information to
other parties who will use it
for illicit or illegal purposes
Hijack your
usernames
and
passwords
Daily making
purches from your
account
Steal your money and
open credit card and
bank accounts in your
name
PHISHING on
social media
ETHICAL FUN MONEY
ILLEGAL DAILY
VIRUSES
. A computer virus is a
computer program that can
copy itself andinfect a
computer without permission
or knowledge of the user
What is virus..?
A virus is a small piece of
software that piggybacks on
real programs. For example,
a virus might attach itself to
a program such as a
spreadsheet program. Each
time the spreadsheet
program runs, the virus
runs, too, and it has the
chance to reproduce (by
attaching to other programs)
Types of viruses..!
An e-mail virus
travels as an
attachment to e-
mail messages
worm is a small
piece of software
that uses computer
networks and
security holes to
replicate itself.
A Trojan horse is
simply a computer
program. The
program claims to do
one thing
Small packets of
virus on internet
when allowed to
our PC
Mail
virus
worms
Trojan Network
virus
||| VIRUS AFFECT TO PC |||
MAIL VIRUS
35%
TROJAN HORSE
65%
WORMS
75%
VIRUS SPREADING
A virus can only spread from one computer to another when its host is taken to the uninfected
computer, for instance by a user sending it over a network or the Internet, or by carrying it on a
removable medium such as a floppy disk, CD, or USB drive
How to Prevent Computer Viruses: 9 Tips to Keep Your PC Safe
•Use Strong Passwords. Let's start with the basics—your passwords. ...
•Keep Everything up to Date. ...
•Use Antivirus Software. ...
•Use a Firewall. ...
•Install a Popup Blocker. ...
•Beware of Email Phishing Scams. ...
•Educate Your Family & Staff. ...
•Know the Signs of Infection.
Top 5 Sources of Computer Virus Attack
Email - Attachments
Downloadable Program
Booting From CD
The most potent and vulnerable threat of computer users is virus
attacks. Virus attacks hampers important work involved with data
and documents. It is imperative for every computer user to be
aware about the software and programs that can help to protect
the personal computers from attacks. One must take every
possible measure in order to keep the computer systems free
from virus attacks. The top sources of virus attacks are
highlighted below:
Internet
Cracked Software
Best antivirus software YOU MUST HAVE
Top Hackers in the World
Hacked (NORAD)
American defence
US Military Defence,
NASA
Biggest bank hacker
10 billion dollars
Hacking Google and
overvelming fax
machines
4th
3rd 2nd
1st
3Valdmir.
4.Gary McKinnon
1.Kevin Mintik
2.Anonymous
Hacking And Virus.pptx

More Related Content

Similar to Hacking And Virus.pptx

Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
Trend Micro
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
RajviNikeetaRathore
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
Daniel Agudo Garcia
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
Sysvoot Antivirus
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Computer virus
Computer virusComputer virus
Computer virus
vazhichal12
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 

Similar to Hacking And Virus.pptx (20)

Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer virus
Computer virusComputer virus
Computer virus
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 

Hacking And Virus.pptx

  • 1. - YASH PISE - AIML Hacking And Virus spreading
  • 2. What is hacking? ● Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge..
  • 3. Types of HACKER…! a) .Social Engineers b) Biohacker c) Crackers d) Phreakers e) Growth Hacker
  • 4. 1.Social Engineers – These hackers don’t rely on gizmos or years of programming knowledge to break into computer systems, yet they do it all the time. These whiz kids use social skills, good theatrics, and a little bit of detective work to obtain passwords, credit card information, and other devastating intel. Often targeting businesses, they can be a serious threat to be reckoned with, and can even blackmail people with their findings. 2.Biohackers – Biohackers are very rare to come across, but they do exist. These are individuals who work to bend the rules of normal biology and create new gizmos that work to improve the body. A group of biohackers recently made the news when they created a night vision injection for humans to use. 3.Crackers – Not to be misconstrued for the derogative term, crackers actually work to break the keycodes that keep parts of programs unusable or uninstallable. By cracking the software code, the users who download the software no longer have to pay in order to use the software. Cracked software, also known as warez, is released under the idea that software should be free or open sourced. Unfortunately, this is a nightmare for businesses that release software.
  • 5. 1.Phreakers– While this term may sound like something you’d hear in a rap or EDM song, phreakers are actually hackers who specialize in phones. In the 80’s, phreakers were the ones who could do a DIY wiretap or get free calls on payphones. In modern ages, phreakers are the people who create spyware for smartphones, intercept cellphone signals on baby monitors, or do other similar acts. This form of hacking has intersected with regular computer hacking now. 2.Growth Hackers – This is beginning to become a common name for people who may use (or abuse) certain aspects of the internet in order to grow businesses or get a higher SEO rank. If you choose to enlist the help of a growth hacker, make sure they’re white hat.
  • 6. KNOWN TYPES HACKER Ethical hacker basically work for good activities WHITE HAT These are both gray as well as black GREY HAT Illegal hacker promotes to bad activities BLACK HAT These are script hackers kids SCRIPT Kiddies
  • 7. What are things that a hacker can do to me? Sell your information to other parties who will use it for illicit or illegal purposes Hijack your usernames and passwords Daily making purches from your account Steal your money and open credit card and bank accounts in your name PHISHING on social media ETHICAL FUN MONEY ILLEGAL DAILY
  • 8. VIRUSES . A computer virus is a computer program that can copy itself andinfect a computer without permission or knowledge of the user What is virus..? A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs)
  • 9. Types of viruses..! An e-mail virus travels as an attachment to e- mail messages worm is a small piece of software that uses computer networks and security holes to replicate itself. A Trojan horse is simply a computer program. The program claims to do one thing Small packets of virus on internet when allowed to our PC Mail virus worms Trojan Network virus
  • 10. ||| VIRUS AFFECT TO PC ||| MAIL VIRUS 35% TROJAN HORSE 65% WORMS 75%
  • 11. VIRUS SPREADING A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive How to Prevent Computer Viruses: 9 Tips to Keep Your PC Safe •Use Strong Passwords. Let's start with the basics—your passwords. ... •Keep Everything up to Date. ... •Use Antivirus Software. ... •Use a Firewall. ... •Install a Popup Blocker. ... •Beware of Email Phishing Scams. ... •Educate Your Family & Staff. ... •Know the Signs of Infection.
  • 12. Top 5 Sources of Computer Virus Attack Email - Attachments Downloadable Program Booting From CD The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks. The top sources of virus attacks are highlighted below: Internet Cracked Software
  • 13. Best antivirus software YOU MUST HAVE
  • 14. Top Hackers in the World Hacked (NORAD) American defence US Military Defence, NASA Biggest bank hacker 10 billion dollars Hacking Google and overvelming fax machines 4th 3rd 2nd 1st 3Valdmir. 4.Gary McKinnon 1.Kevin Mintik 2.Anonymous