SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Hacking
Hacking
 Hacking generally refers to act of a
  person abusing computer access,
  breaking into computers, or using
  computers without authorization.
 An intruder or attacker is a person who
  carries out an attack.
   There are in essence two types of hackers, often
    referred to as
         1.White-hat hackers.
         2.Black-hat hackers.
   White hat hackers enjoy learning and working
    with computer systems, and consequently gains
    a deeper understanding of the subject.
   Black-hat hackers often called as ‘Crackers’
    called by White-hat hackers.
   Curiosity.
   Money.
   Spying.
   Prestige Intellectual Challenge.
   Anarchy.
 Steal credit card numbers.
 Steal passwords to other systems.
 To steal programs or files.
 Read others’ mails.
   Files disappear or are modified
    unexpectedly.
   Strange files appear or grow in size
    unexpectedly.
   Programs stop working as expected.
   Your internet connection slows dramatically
    for an extended period.
   The computer starts crashing frequently.
 Gathering information.
   1.port scanning.
    2.packet sniffing.
 Launching attack
    1.Denial of Service(DOS).
    2.Password cracking.
    3.Packet Sequence attacks.
    4.Operating System exploits.
    5.FTP(File Transfer Protocol).
    6.Fore Core Dumping.
 Server-side security.
     It is a very large and complex area.
 Client-side security:-This contains 3 areas
     1.Anti-virus security.
     2.Personal Firewall.
     3.Encryption.
Hacking
Hacking
   Encryption programs basically ‘scramble’
    the original file so that it is unreadable to
    anyone without the correct password to
    de-scramble the file.
   The key to data encryption is to choose
    your passwords carefully, and change your
    passwords frequently.
   The main appeal to me is to ability to
    communicate complex ideas in a fast,
    cheap and creative way.
   A level-headed approach should be taken
    by all internet users to protect their privacy
    and security online.
   When the true meaning of hacking is
    realized people will be able to publicly
    declare themselves as hackers.
Hacking

Mais conteúdo relacionado

Mais procurados (20)

my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 

Semelhante a Hacking

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 

Semelhante a Hacking (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Hacking
HackingHacking
Hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Computer security
Computer securityComputer security
Computer security
 
System Security
System SecuritySystem Security
System Security
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Internet security
Internet securityInternet security
Internet security
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 

Hacking

  • 3.  Hacking generally refers to act of a person abusing computer access, breaking into computers, or using computers without authorization.  An intruder or attacker is a person who carries out an attack.
  • 4. There are in essence two types of hackers, often referred to as 1.White-hat hackers. 2.Black-hat hackers.  White hat hackers enjoy learning and working with computer systems, and consequently gains a deeper understanding of the subject.  Black-hat hackers often called as ‘Crackers’ called by White-hat hackers.
  • 5. Curiosity.  Money.  Spying.  Prestige Intellectual Challenge.  Anarchy.
  • 6.  Steal credit card numbers.  Steal passwords to other systems.  To steal programs or files.  Read others’ mails.
  • 7. Files disappear or are modified unexpectedly.  Strange files appear or grow in size unexpectedly.  Programs stop working as expected.  Your internet connection slows dramatically for an extended period.  The computer starts crashing frequently.
  • 8.  Gathering information. 1.port scanning. 2.packet sniffing.  Launching attack 1.Denial of Service(DOS). 2.Password cracking. 3.Packet Sequence attacks. 4.Operating System exploits. 5.FTP(File Transfer Protocol). 6.Fore Core Dumping.
  • 9.  Server-side security. It is a very large and complex area.  Client-side security:-This contains 3 areas 1.Anti-virus security. 2.Personal Firewall. 3.Encryption.
  • 12. Encryption programs basically ‘scramble’ the original file so that it is unreadable to anyone without the correct password to de-scramble the file.  The key to data encryption is to choose your passwords carefully, and change your passwords frequently.
  • 13. The main appeal to me is to ability to communicate complex ideas in a fast, cheap and creative way.  A level-headed approach should be taken by all internet users to protect their privacy and security online.  When the true meaning of hacking is realized people will be able to publicly declare themselves as hackers.