SlideShare uma empresa Scribd logo
1 de 16
HACKING
Unlike most computer crime / misuse
areas which are clear cut in terms of
actions and legalities , computer
hacking is more difficult to define.
There is no exact definition of hacking.
Hacking means finding out weaknesses
in an established system and exploiting
them. Computer hacking always
involves some degree of infringement
on the privacy of others or damage to
computer-based property such as
files, web pages or software
WHO IS A HACKER?
On hearing the word “HACKER” most of
the peoples are scared. Most of them
think of hacker as a computer vandals.
But hackers are not computer criminals.
Traditionally, hackers were computer
geeks who know almost everything about
computers both hardware and software
and are widely respected for there
knowledge.
 People who break into
someone’s system are called
“CRACKERS”.
People who code and release
viruses are not necessarily
hackers, they are
“VIRIiCODERS”.
TYPES OF HACKERS
• BLACK HAT HACKERS
• WHITE HAT HACKERS
• GRAY HAT HACKERS
THREE TOP SIGNS SHOWING THAT
A PERSON IS NOT A REAL HACKER
He uses weird handles like
avenger, skull, kewl etc.
He boasts about how much he knows, a
sure sign of a person who lacks real
knowledge.
He flames newbie's of people who ask
questions, instead of helping them learn.
CYBER CRIME
We can categorize Cyber crimes in two
ways
The Computer as a Target :-using a
computer to attack other computers e.g.
Hacking, Virus/Worm attacks, DOS attack
etc.
The computer as a weapon :-using a
computer to commit real world crimes.
e.g. Cyber Terrorism, IPR
violations, Credit card frauds, EFT
frauds, Pornography etc.
IT ACT 2000
• In May 2000, both the houses of the
Indian Parliament passed the
Information Technology Bill. The Bill
received the assent of the President in
August 2000 and came to be known as the
Information Technology Act, 2000. Cyber
laws are contained in the IT Act, 2000.
• This Act aims to provide the legal
infrastructure for e-commerce in India.
And the cyber laws have a major impact
for e-businesses and the new economy in
India. So, it is important to understand
what are the various perspectives of the IT
Act, 2000 and what it offers.
WHAT CAN BE HACKED?
WINDOWS
MOBILE
NETWORK
WEB
PASSWORDS
HACKING WINDOWS
• Simple step just open the computer
then look for a round lithium
round battery it will probably look
like a silver coin. Remove the
battery and after 30 seconds or so
put it back. Some computers may
also require you to reset the
jumper, so look for a 3-pin jumper
and reset it. If you move the jumper
to pins two and three and leave it
there for over five seconds, it will
reset the CMOS.
CAREER IN ETHICAL
HACKING
• In the past few years the demand
of ethical hackers is increased in
the industry. Undoubtly it is a
highly paid job.
• You can become a “CERTIFIED
ETHICAL HACKER”(CEH) or a
“PENETRATION TESTER”
Some terms related to Hacking
• INTERNET WORMS
Worms are often used to
infect large no. of broadband connected
computers with remote control software.It
works differently then a virus.It won’t attach
to different programs but it will produce
precise copies of itself
• ROOTKITS
A rootkit is often a collection of
programs which are hidden deep into your
computer system. They enable administrator
level access to a computer or network. For
installing a rootkit first of all a programmer
has to gain user level access in a system
• ZOMBIES
A zombie computer or a “DRONE”
is a computer that has been secretly
compromised by hacking tools which allow
third party to control the computer and its
resources remotely.
• SPAM
Used to be a junk or bulk email sent by
the spammer to various recipients aimed at
advertising, scamming and sending viruses.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
HACKING
HACKINGHACKING
HACKING
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Botnets
BotnetsBotnets
Botnets
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
What is malware
What is malwareWhat is malware
What is malware
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 

Semelhante a Ethical hacking ppt

Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityShouaQureshi
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Semelhante a Ethical hacking ppt (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Cyber security
Cyber securityCyber security
Cyber security
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking
hackinghacking
hacking
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

Último

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Ethical hacking ppt

  • 1.
  • 2. HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities , computer hacking is more difficult to define. There is no exact definition of hacking. Hacking means finding out weaknesses in an established system and exploiting them. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software
  • 3. WHO IS A HACKER? On hearing the word “HACKER” most of the peoples are scared. Most of them think of hacker as a computer vandals. But hackers are not computer criminals. Traditionally, hackers were computer geeks who know almost everything about computers both hardware and software and are widely respected for there knowledge.
  • 4.  People who break into someone’s system are called “CRACKERS”. People who code and release viruses are not necessarily hackers, they are “VIRIiCODERS”.
  • 5. TYPES OF HACKERS • BLACK HAT HACKERS • WHITE HAT HACKERS • GRAY HAT HACKERS
  • 6. THREE TOP SIGNS SHOWING THAT A PERSON IS NOT A REAL HACKER He uses weird handles like avenger, skull, kewl etc. He boasts about how much he knows, a sure sign of a person who lacks real knowledge. He flames newbie's of people who ask questions, instead of helping them learn.
  • 7. CYBER CRIME We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 8. IT ACT 2000 • In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. • This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.
  • 9. WHAT CAN BE HACKED? WINDOWS MOBILE NETWORK WEB PASSWORDS
  • 10. HACKING WINDOWS • Simple step just open the computer then look for a round lithium round battery it will probably look like a silver coin. Remove the battery and after 30 seconds or so put it back. Some computers may also require you to reset the jumper, so look for a 3-pin jumper and reset it. If you move the jumper to pins two and three and leave it there for over five seconds, it will reset the CMOS.
  • 11. CAREER IN ETHICAL HACKING • In the past few years the demand of ethical hackers is increased in the industry. Undoubtly it is a highly paid job. • You can become a “CERTIFIED ETHICAL HACKER”(CEH) or a “PENETRATION TESTER”
  • 12. Some terms related to Hacking • INTERNET WORMS Worms are often used to infect large no. of broadband connected computers with remote control software.It works differently then a virus.It won’t attach to different programs but it will produce precise copies of itself
  • 13. • ROOTKITS A rootkit is often a collection of programs which are hidden deep into your computer system. They enable administrator level access to a computer or network. For installing a rootkit first of all a programmer has to gain user level access in a system
  • 14. • ZOMBIES A zombie computer or a “DRONE” is a computer that has been secretly compromised by hacking tools which allow third party to control the computer and its resources remotely.
  • 15. • SPAM Used to be a junk or bulk email sent by the spammer to various recipients aimed at advertising, scamming and sending viruses.