Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hackers Izyani


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Hackers Izyani

  1. 1. TOPIC : HACKER Prepared by : Nor Izyani Bt. Ahmad Zaki
  2. 2. <ul><li>Description of topic </li></ul><ul><li>Example of use </li></ul><ul><li>Suggestion to Use it OR steps to Avoid it </li></ul>CONTENTS
  3. 3. <ul><li>A hacker is a person who illegally breaks into computer and network systems. Apart from this negative meaning, which has been popularized by the mass media, the term is also found in the jargon of at least three major hacker subcultures that are characterized by their distinct historical origin and development and that are centered around different, but partially overlapping, aspects of computers. </li></ul>DEFINITION OF HACKER
  4. 4. <ul><li>Computer hackers are people who gain remote access (typically unauthorized and unapproved) to files stored in another computer, or even to the operating system of the computer. In the 1950 and 1960s, hackers were motivated more by a desire to learn the operating characteristics of a computer than by any malicious intent. Indeed, in those days hackers were often legitimate computer programmers who were seeking ways of routing information more quickly through the then-cumbersome operating system of computers. </li></ul>DEFINITION OF HACKER
  5. 5. <ul><li>According to Eric S. Raymond the academic hacker subculture developed in the 1960s among hackers working on early minicomputers in academic computer science environments. After 1969 it fused with the technical culture of the pioneers of the Internet. One PDP-10 machine at MIT connected to the Internet provided an early hacker meeting point. It was called AI and ran ITS. </li></ul>DEFINITION OF HACKER
  6. 6. After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement. DEFINITION OF HACKER
  7. 7. EXAMPLE OF HACKER <ul><li>Kevin Mitnick was a famous hacker for supposedly hacking into NORAD (the pentagon), though he claims he only looked at minor things such as Nokia and Motorola.GAB </li></ul><ul><li>Italian police arrest 14 suspected hackers who were accused of thousands of computer intrusions, including attacks on the U.S. Army and Navy and Nasa. They were all members of two hacking groups, called Mentor and Reservoir Dogs. KDL </li></ul>
  8. 8. Adrian Lamo is best known for hacking into the New York Times. He is sometimes call the “homeless hacker” because he spent parts of his travels squatting in abandoned buildings and travelling to Internet cafes, libraries and universities.Adrian Lamo pleads guilty on January 9, 2004. JKW EXAMPLE OF HACKER
  9. 9. Kevin Poulsen has not only used his “hacking skills” to win cars but also to get the names of undercover businesses operated by the FBI. Also, at the age of seventeen, he used his TRS-80 to hack the US department of defense’s Arpanet. Finally Poulsen was arrested after hacking Microsoft. KLW EXAMPLE OF HACKER
  10. 10. <ul><li>The hacker used a legitimate user's ID and password to access personal information on the officers contained in the Assignment Management System (AMS), an online program used for assignment preferences and career management, the Air Force said. That data included career information, birth dates and Social Security numbers. </li></ul>EXAMPLE OF HACKER
  11. 11. <ul><li>A hacker attacks city websites. On Web sites for </li></ul><ul><li>the cities of Albany, El Cerrito, and Alemeda </li></ul><ul><li>a message that said &quot;SPY KID OWNS YOUR SYSTEM&quot; </li></ul><ul><li>was displayed on the home page. The hacker, </li></ul><ul><li>who is said to be from Brazil,caused no harm to </li></ul><ul><li>the websites. Infolane, the site that designed </li></ul><ul><li>these pages, was hacked at around 12:30 A.M. and </li></ul><ul><li>fixed about nine hours later. IJS </li></ul>EXAMPLE OF HACKER
  12. 12. <ul><li>1. Don't give out your username/password to anyone else. Even if it's your own net/web/system admin. Chances are he/she already knows it for he/she can just login as admin to the control panel and look at your password. 2. Change your password once in a while. It's better to write them down instead of saving them on a hard disk with insufficient firewall protection. </li></ul>WAYS TO AVOID HACKERS
  13. 13. <ul><li>3. Don't use any word that can be found in dictionary or anything that signifies your birthdate, your street number to make it difficult for the hackers to guess. 4. Disable the &quot;Forgot Password&quot; utility on your site. This utility is very convenient to most end users, so fast that it gives out password so easy to for hackers to play with. 5. Make your password question / password answer (the one used to remind your forgotten password) difficult to guess. Treat it as a password. If anyone can just guess it, chances are hackers will start exploring with your account. </li></ul>