SlideShare a Scribd company logo
1 of 29
Download to read offline
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
.
PROJECT BY HARSH & RAVI
Hackers are the person who unkindly breaks into systems for
personal gain. Technically, these criminals are crackers
PROJECT BY HARSH & RAVI
Black hats – highly skilled,
malicious, destructive “crackers”
White hats – skills used for
defensive security analysts
Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
PROJECT BY HARSH & RAVI
Reset the Password
Use a Key logger
Command prompt (Linux based)
Phishing
PROJECT BY HARSH & RAVI
The easiest way to "hack" into someone's Facebook is through resetting the
password. This could be easier done by people who are friends with the person
they're trying to hack.
Steps:-
 The first step would be to get your friend's Facebook email login.
 Next, enter victim's email then click on Forgotten your password?
 It will ask if you would like to reset the password via the victim's emails. This
doesn't help, so press No longer have access to these?
 It will now ask you a question.
 If you don't figure out the question, you can click on Recover your account with
help from friends. This allows you to choose between three - five friends.
 It will send them passwords.
PROJECT BY HARSH & RAVI
SOFTWARE
BASED
HARDWARE
BASED
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
Phishing is the most widely used
hacking method for hacking Facebook
passwords. The most widely used
technique in phishing is the use of
Fake Login Pages, also known as
spoofed pages. These fake login
pages resemble the original login
pages of sites like Yahoo , Gmail,
MySpace etc.
PROJECT BY HARSH & RAVI
STEP1:- Go to facebook homepage the right it save webpage as
HTML only by name “INDEX”
STEP2:- create a notepad file for entering following code & saveas
“next.php”
STEP3:- create text file & save as “password”
STEP4:- open INDEX file in notepad press ctrl+F search for action,
now change webpage to next.php and save it
STEP5:- go to www.************.com and log in to your account
STEP6:- upload all the 3 file to website in public directory folder
STEP7:- now ask the person to log in to dummy page of facebook
as he log in its password would be mailed to id or saved to
password.txt
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
 Hacking is the most dangerous enemy of the company
because most of the companies work is done through online.
 If companies a/c or website is hacked then its all private data
may be leaked and competitors may take advantages of that
data.
 Our company’s monopoly product is Faluda syrup all over
Gujarat. So, after being hacked the secret ingredients of
Faluda syrup may revealed. PROJECT BY HARSH & RAVI
MAIN THREATS OF THE COMPANY AFTER BEING HACKED
Account details
Company details
payment structures
Secret ingredients of their products
List of suppliers and its details
List of bulk purchase customers and its details etc..
PROJECT BY HARSH & RAVI
Use an email address specifically for your Facebook
and don't put that email address on your profile.
When choosing a security question and answer,
make it difficult.
Don’t log on an unknown/unsecured pc’s
PROJECT BY HARSH & RAVI
Don’t give access of professional a/c to any
employees or any other person
Try to access your professional a/c on your pcs or
laptop only
Upload less personal information on social hubs
Use anti-phishing feature in anti virus (Avast-Anti-
Phishing)
PROJECT BY HARSH & RAVI
Don’t click on unknown pop-ups
Frequently change your password
Use security features in email server and make mobile no. protection
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI

More Related Content

What's hot

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?paula_bolivar
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 

What's hot (20)

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
security procedures
security procedures
security procedures
security procedures
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 

Viewers also liked

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to PhilosophyMozu
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์noeiinoii
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIApratik swarup das
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar imageswilsonrd1987
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberRakhi Tips Provider
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonBernadette Gelsei
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Anatoliy Arkhipov
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Rakhi Tips Provider
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberRakhi Tips Provider
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วnoeiinoii
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationPrimary Care Commissioning (PCC)
 

Viewers also liked (15)

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to Philosophy
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
 
Paradigm created
Paradigm createdParadigm created
Paradigm created
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
 
September 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor NassiefSeptember 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor Nassief
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-November
 
INDOKON BETON INSTAN
INDOKON BETON INSTANINDOKON BETON INSTAN
INDOKON BETON INSTAN
 
Donation waiver authority and procedure
Donation waiver authority and procedureDonation waiver authority and procedure
Donation waiver authority and procedure
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-November
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
 

Similar to FULL MEANING OF HACKING

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202James Ruffer
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseMichal Špaček
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
security procedures
security procedures
security procedures
security procedures puffyarson5604
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 

Similar to FULL MEANING OF HACKING (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
security procedures
security procedures
security procedures
security procedures
 
Hack a Facebook password
Hack a Facebook passwordHack a Facebook password
Hack a Facebook password
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Password Attack
Password Attack Password Attack
Password Attack
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

FULL MEANING OF HACKING

  • 7. Hackers are the person who unkindly breaks into systems for personal gain. Technically, these criminals are crackers PROJECT BY HARSH & RAVI
  • 8. Black hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation. PROJECT BY HARSH & RAVI
  • 9. Reset the Password Use a Key logger Command prompt (Linux based) Phishing PROJECT BY HARSH & RAVI
  • 10. The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack. Steps:-  The first step would be to get your friend's Facebook email login.  Next, enter victim's email then click on Forgotten your password?  It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?  It will now ask you a question.  If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three - five friends.  It will send them passwords. PROJECT BY HARSH & RAVI
  • 13. Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. PROJECT BY HARSH & RAVI
  • 14. STEP1:- Go to facebook homepage the right it save webpage as HTML only by name “INDEX” STEP2:- create a notepad file for entering following code & saveas “next.php” STEP3:- create text file & save as “password” STEP4:- open INDEX file in notepad press ctrl+F search for action, now change webpage to next.php and save it STEP5:- go to www.************.com and log in to your account STEP6:- upload all the 3 file to website in public directory folder STEP7:- now ask the person to log in to dummy page of facebook as he log in its password would be mailed to id or saved to password.txt PROJECT BY HARSH & RAVI
  • 24.  Hacking is the most dangerous enemy of the company because most of the companies work is done through online.  If companies a/c or website is hacked then its all private data may be leaked and competitors may take advantages of that data.  Our company’s monopoly product is Faluda syrup all over Gujarat. So, after being hacked the secret ingredients of Faluda syrup may revealed. PROJECT BY HARSH & RAVI
  • 25. MAIN THREATS OF THE COMPANY AFTER BEING HACKED Account details Company details payment structures Secret ingredients of their products List of suppliers and its details List of bulk purchase customers and its details etc.. PROJECT BY HARSH & RAVI
  • 26. Use an email address specifically for your Facebook and don't put that email address on your profile. When choosing a security question and answer, make it difficult. Don’t log on an unknown/unsecured pc’s PROJECT BY HARSH & RAVI
  • 27. Don’t give access of professional a/c to any employees or any other person Try to access your professional a/c on your pcs or laptop only Upload less personal information on social hubs Use anti-phishing feature in anti virus (Avast-Anti- Phishing) PROJECT BY HARSH & RAVI
  • 28. Don’t click on unknown pop-ups Frequently change your password Use security features in email server and make mobile no. protection PROJECT BY HARSH & RAVI