際際滷

際際滷Share a Scribd company logo
Hacking
Hacking
 Hacking generally refers to act of a
  person abusing computer access,
  breaking into computers, or using
  computers without authorization.
 An intruder or attacker is a person who
  carries out an attack.
   There are in essence two types of hackers, often
    referred to as
         1.White-hat hackers.
         2.Black-hat hackers.
   White hat hackers enjoy learning and working
    with computer systems, and consequently gains
    a deeper understanding of the subject.
   Black-hat hackers often called as Crackers
    called by White-hat hackers.
   Curiosity.
   Money.
   Spying.
   Prestige Intellectual Challenge.
   Anarchy.
 Steal credit card numbers.
 Steal passwords to other systems.
 To steal programs or files.
 Read others mails.
   Files disappear or are modified
    unexpectedly.
   Strange files appear or grow in size
    unexpectedly.
   Programs stop working as expected.
   Your internet connection slows dramatically
    for an extended period.
   The computer starts crashing frequently.
 Gathering information.
   1.port scanning.
    2.packet sniffing.
 Launching attack
    1.Denial of Service(DOS).
    2.Password cracking.
    3.Packet Sequence attacks.
    4.Operating System exploits.
    5.FTP(File Transfer Protocol).
    6.Fore Core Dumping.
 Server-side security.
     It is a very large and complex area.
 Client-side security:-This contains 3 areas
     1.Anti-virus security.
     2.Personal Firewall.
     3.Encryption.
Hacking
Hacking
   Encryption programs basically scramble
    the original file so that it is unreadable to
    anyone without the correct password to
    de-scramble the file.
   The key to data encryption is to choose
    your passwords carefully, and change your
    passwords frequently.
   The main appeal to me is to ability to
    communicate complex ideas in a fast,
    cheap and creative way.
   A level-headed approach should be taken
    by all internet users to protect their privacy
    and security online.
   When the true meaning of hacking is
    realized people will be able to publicly
    declare themselves as hackers.
Hacking

Recommended

Ict H A C K I N G
Ict H A C K I N G
Hafizra Mas
basic knowhow hacking
basic knowhow hacking
Anant Shrivastava
HACKING
HACKING
Shubham Agrawal
Ethical hacking
Ethical hacking
zing12345
Web defacement
Web defacement
student
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
Assignment 4
Assignment 4
noorulaindanish
ICT Form 4: Hacking
ICT Form 4: Hacking
Qhaiyum Shah
my new HACKING
my new HACKING
BABATUNDE OLANREWAJU GEORGE
Hacking
Hacking
Nadeem Ahmad
Hacking and its types
Hacking and its types
Rishab Gupta
Hacking Kishor
Hacking Kishor
kishor sharma
Basic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
N.vinodh
N.vinodh
vinodhkn
Access Controls Attacks
Access Controls Attacks
Hafiza Abas
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
Hacking ppt
Hacking ppt
Rashed Sayyed
Hacking and Anti Hacking
Hacking and Anti Hacking
International Islamic University
Hacking
Hacking
Virus
Ethical Hacking
Ethical Hacking
Adnan Mansha
National information security education & awareness program
National information security education & awareness program
Neel Kamal
Black hat hackers
Black hat hackers
Santosh Kumar
Hacking
Hacking
vkradhika
Hacking
Hacking
Asma Khan
Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
Tausif Patel
Computer hacking
Computer hacking
Arjun Tomar
Ethical hacking
Ethical hacking
arohan6
Ethical Hacking
Ethical Hacking
Syed Irshad Ali
Introduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot

More Related Content

What's hot (20)

my new HACKING
my new HACKING
BABATUNDE OLANREWAJU GEORGE
Hacking
Hacking
Nadeem Ahmad
Hacking and its types
Hacking and its types
Rishab Gupta
Hacking Kishor
Hacking Kishor
kishor sharma
Basic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
N.vinodh
N.vinodh
vinodhkn
Access Controls Attacks
Access Controls Attacks
Hafiza Abas
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
Hacking ppt
Hacking ppt
Rashed Sayyed
Hacking and Anti Hacking
Hacking and Anti Hacking
International Islamic University
Hacking
Hacking
Virus
Ethical Hacking
Ethical Hacking
Adnan Mansha
National information security education & awareness program
National information security education & awareness program
Neel Kamal
Black hat hackers
Black hat hackers
Santosh Kumar
Hacking
Hacking
vkradhika
Hacking
Hacking
Asma Khan
Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
Tausif Patel
Computer hacking
Computer hacking
Arjun Tomar
Ethical hacking
Ethical hacking
arohan6
Hacking and its types
Hacking and its types
Rishab Gupta
Basic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
N.vinodh
N.vinodh
vinodhkn
Access Controls Attacks
Access Controls Attacks
Hafiza Abas
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
Hacking
Hacking
Virus
Ethical Hacking
Ethical Hacking
Adnan Mansha
National information security education & awareness program
National information security education & awareness program
Neel Kamal
Black hat hackers
Black hat hackers
Santosh Kumar
Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
Tausif Patel
Computer hacking
Computer hacking
Arjun Tomar
Ethical hacking
Ethical hacking
arohan6

Similar to Hacking (20)

Ethical Hacking
Ethical Hacking
Syed Irshad Ali
Introduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
Hacking & Attack vector
Hacking & Attack vector
Smit Shah
Hacking & Hackers
Hacking & Hackers
balti13
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
Hacking
Hacking
ANUSHAMOL2
Hacking
Hacking
ANUSHAMOL2
Dhams hacking
Dhams hacking
dharmesh ram
hacking basics
hacking basics
dharmesh ram
Ethical Hacking
Ethical Hacking
Lalit Kumar
Hacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
Internet security powerpoint
Internet security powerpoint
Arifa Ali
Hacking computer crime
Hacking computer crime
ELDO RAJU
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
mahamnisar6
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Internet security powerpoint
Internet security powerpoint
Arifa Ali
All about Hacking
All about Hacking
Madhusudhan G
Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
Hacking Presentation
Hacking Presentation
Animesh Behera
Introduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
Hacking & Attack vector
Hacking & Attack vector
Smit Shah
Hacking & Hackers
Hacking & Hackers
balti13
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
Ethical Hacking
Ethical Hacking
Lalit Kumar
Internet security powerpoint
Internet security powerpoint
Arifa Ali
Hacking computer crime
Hacking computer crime
ELDO RAJU
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
mahamnisar6
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Internet security powerpoint
Internet security powerpoint
Arifa Ali
All about Hacking
All about Hacking
Madhusudhan G
Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
Hacking Presentation
Hacking Presentation
Animesh Behera

Hacking

  • 3. Hacking generally refers to act of a person abusing computer access, breaking into computers, or using computers without authorization. An intruder or attacker is a person who carries out an attack.
  • 4. There are in essence two types of hackers, often referred to as 1.White-hat hackers. 2.Black-hat hackers. White hat hackers enjoy learning and working with computer systems, and consequently gains a deeper understanding of the subject. Black-hat hackers often called as Crackers called by White-hat hackers.
  • 5. Curiosity. Money. Spying. Prestige Intellectual Challenge. Anarchy.
  • 6. Steal credit card numbers. Steal passwords to other systems. To steal programs or files. Read others mails.
  • 7. Files disappear or are modified unexpectedly. Strange files appear or grow in size unexpectedly. Programs stop working as expected. Your internet connection slows dramatically for an extended period. The computer starts crashing frequently.
  • 8. Gathering information. 1.port scanning. 2.packet sniffing. Launching attack 1.Denial of Service(DOS). 2.Password cracking. 3.Packet Sequence attacks. 4.Operating System exploits. 5.FTP(File Transfer Protocol). 6.Fore Core Dumping.
  • 9. Server-side security. It is a very large and complex area. Client-side security:-This contains 3 areas 1.Anti-virus security. 2.Personal Firewall. 3.Encryption.
  • 12. Encryption programs basically scramble the original file so that it is unreadable to anyone without the correct password to de-scramble the file. The key to data encryption is to choose your passwords carefully, and change your passwords frequently.
  • 13. The main appeal to me is to ability to communicate complex ideas in a fast, cheap and creative way. A level-headed approach should be taken by all internet users to protect their privacy and security online. When the true meaning of hacking is realized people will be able to publicly declare themselves as hackers.