Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. HACKING By : Syahila Amira binti Ya’acob Class : 4 Science Erat/07
  2. 2. INTRODUCTION <ul><li>Hacker - a person who learns about the computer systems in details. The person wrote program referred to as hacks. Hacker may use modem cable to hack the targeted computers. </li></ul><ul><li>Hacking – a source of threat to security in computer. Defined as unauthorized access to the computer system by a hacker. </li></ul>
  3. 3. HACKING <ul><li>16 Easy Steps To Hack : </li></ul><ul><ul><li>Get a real SL/IP account. If you want to hack the internet, you will need to be directly connected to the net, and SL/IP basically does this. </li></ul></ul><ul><ul><li>Most of the net runs on UNIX like operating systems. So, you have to do the same. Buy a UNIX type operating system, and several books on UNIX. The easiest (and cheapest) way to go is with one of the multi-cd Linux sets. The best is to get the Slackware release on CD. </li></ul></ul><ul><ul><li>Re-partition your hard drive about 340 megs, so you will have room for a Linux partition. </li></ul></ul><ul><ul><li>Read all the installation instructions for Linux. </li></ul></ul>
  4. 4. <ul><ul><li>Install Linux on your system. Follow the instructions you read in step 5. Install everything, especially the net stuff, the programming stuff, and the docs, etc. Once you have everything installed, reboot and log in. </li></ul></ul><ul><ul><li>Read the kernel docs/FAQ/How-To. Now recompile your kernel to make a custom kernel for your system. </li></ul></ul><ul><ul><li>Got your new kernel compiled? Install it, and re-run. Re-boot with your custom kernel. </li></ul></ul><ul><ul><li>Now that you are running a real OS, read all the docs, etc. </li></ul></ul><ul><ul><li>Next play with your nice new OS. Spend a little time exploring and learning the system. After playing with the system for about a year, go on (if you were never on AOL etc, then you probably don't need the full year, maybe only about a month). </li></ul></ul>
  5. 5. <ul><ul><li>Configure your system for SL/IP and accessing the net. When you installed Linux in the first place, you ran the net configuration script, but that didn't set up everything. You have some text files to edit, and you need to set up DIP if you are going to be accessing the net via modem. </li></ul></ul><ul><ul><li>Learn to use the basic net tools. Get use to it. </li></ul></ul><ul><ul><li>Learn to program. Get some books on stuff like C, etc. Play with Perl, C, C++ on your system until you can actually program. Now practice programming for a while until you get at least a little good at it. </li></ul></ul><ul><ul><li>Read all the RFCs. These contain information that is vital if you want to hack the net. </li></ul></ul>
  6. 6. <ul><ul><li>Subscribe to a few security related mailing lists and newsgroups. </li></ul></ul><ul><ul><li>You should now have enough information to try some simple hacks, so try some simple hacks. If they work, great, you are almost a junior hacker. </li></ul></ul><ul><ul><li>Explore the net. Try things. Look for security holes. Read a lot of source code. Write some hacking utilities. </li></ul></ul>
  7. 7. <ul><li>The Hacker Attitude : </li></ul><ul><ul><li>The world is full of fascinating problems waiting to be solved. </li></ul></ul><ul><ul><li>No problem should ever have to be solved twice. </li></ul></ul><ul><ul><li>Boredom and drudgery are evil. </li></ul></ul><ul><ul><li>Freedom is good. </li></ul></ul><ul><ul><li>Attitude is no substitute for competence. </li></ul></ul>
  8. 8. <ul><li>Status in the Hacker Culture : </li></ul><ul><ul><li>Write open-source software </li></ul></ul><ul><ul><li>Help test and debug open-source software </li></ul></ul><ul><ul><li>Publish useful information </li></ul></ul><ul><ul><li>Help keep the infrastructure working </li></ul></ul><ul><ul><li>Serve the hacker culture itself </li></ul></ul>
  9. 9. <ul><li>The 3 Biggest Hacker : </li></ul><ul><ul><li>Kevin Mitnick </li></ul></ul><ul><ul><ul><li>Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone breaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.” </li></ul></ul></ul>
  10. 10. <ul><ul><li>Gary McKinnon </li></ul></ul><ul><ul><ul><li>This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection. </li></ul></ul></ul>
  11. 11. <ul><ul><li>Vladimir Levin </li></ul></ul><ul><ul><ul><li>This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free. </li></ul></ul></ul>
  12. 12. CONCLUSION <ul><li>Hacking is a crime. </li></ul><ul><li>Hacker is one of the security threats. </li></ul><ul><li>Hackers will be charged if caught. </li></ul>