SlideShare uma empresa Scribd logo
1 de 10
Stealing On
The Internet
Is it bad???
My Task
Create a PP Presentation
on the following topics:
•Stealing from internet
•Stealing from a shop
•Is it ever okay to steal?
Robbery
• Robbery is the crime of taking or attempting
to take anything of value by force, threat of
force, or by putting the victim in fear.
According to common law, robbery is
defined as taking the property of another,
with the intent to permanently deprive the
person of that property, by means of force
or fear; that is, it is
a larceny or theft accomplished by
an assault.
Hacking
• A computer hacker is any skilled computer
expert that uses their technical knowledge
to overcome a problem. While "hacker" can
refer to any skilled computer programmer,
the term has become associated in popular
culture with a "security hacker", someone
who, with their technical knowledge,
uses bugs or exploits to break into computer
systems.
Streaming video is
content sent in
compressed form over
the Internet and
displayed by the viewer
in real time.
With streaming video
or streaming media, a
Web user does not have
to wait to download a
file to play it. Instead,
the media is sent in a
continuous stream of
data and is played as it
arrives.
Robbing the
internet
Many sites like GoMovies, FMovies,
MovieBox, 123Movies, 9Anime are illegal
sites.
Always be careful when downloading and
streaming sites.
GoMovies FMovies
9Anime
How To Be A Hacker
Step 0: Read The Hacking Manifesto
It is not an easy task to be a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical
attitude.
Though a lot of people consider that a hacker is a criminal; However in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be
hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.
The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I will not recommend you to get involved into such activities.
Step 1: Learn To Program In C
C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the
years 1969 and 1973 at AT& T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on
your own by assessing the logic.
There are hundreds of Free C Programming PDF & tutorials available on web to learn, however I would recommend you to start with a simple and well written c programming book of your choice and then read this book (C Programming Language
By Brian W. Kernighan and Dennis M. Ritchie) to understand the real power of c language.
This books is not an easy read however its a must read book to get in depth understanding for C Programming.
Step 2: Learn More Than One Programming Language
When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, HTML, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.
Java is one of the most popular programming languages. It has been claimed that its also very secure. Knowing Java security model will empower you to understand how this language achieve security. Learn about the security
loop holes in Java language and related frameworks. Pick and read from many free PDF, tutorials and ebooks available to learn java online.
Perl is a general purpose dynamic programming language, which is high level and can be interpreted. This language borrows some features of C language. On the other hand, JAVA is concurrent, class based and objects oriented programming language. Python is really handy when you
are trying to automate some repetitive tasks.
HTML is the mark up language based on which the web pages are designed, created and displayed. The web browsers read the HTML code to display the web page.
Python is best language for web development and favorite language of a lot of programmer due to its simplicity and quick turn around. A lot of people use Python to do simple and complex automation.
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems.This operating system was developed by some employees of AT&T in Bell Labs.The best way to learn it is to get into an open-source version (e.g. centos)
and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.
If you have not used Unix operating system yet, a few essential linux commands will make your comfortable in getting quickly started.
Unix in a Nutshell by Arnold Robbins is a good way to start. This book will teach you how to use Unix.
The next thing you need to know is the internals of this operating system. I recommend
The Design of the UNIX Operating System by Maurice J. Bach for getting in depth understanding of Unix operating system.
A large number of web servers are hosted on Unix based servers and knowing internals of this operating system is going to be really a big boost in your skills.
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence it is good to learn hacking Microsoft systems, which are closed-source systems.
For more info: https://www.quora.com/How-does-one-become-a-hacker-2
Hacker's Perspective
• “Data breaches take an average of 250-300 days to detect—if
they’re detected at all—but most attackers tell us they can
break in and steal the target data within 24 hours,” said Chris
Pogue, Nuix’s chief information security officer and a co-author
of the Nuix Black Report. “Organizations need to get much
better at detecting and remediating breaches using a
combination of people and technology.”
Best Way To Rob A Shop
• Here is the best way I could think:
• Get a new set of clothes that are the opposite of your taste.
• Get gloves and a mask of some sort.
• Have a gun. Preferably an all-black pistol. Make sure you have a permit for said gun, and you bought it legally.
• Have a bike and car, put the bike behind said building, and park the car out of sight from the building.
• Go there in your full gear, new clothes that you don't like, mask, the gun, and a non-descript backpack.
• Make sure it's a less busy time of day, say minutes till closing.
• Walk in, point your gun at the cashier, and in a nice tone say, “please put all of the money in that register in my backpack here”. People cooperate with a nice person, gun or no
gun (but you still need a gun for this specific task). Oh, and don't forget to demand all their electronics be put on the counter. Shoot their phone.
• If they do not comply, fire a warning shot. Remember, NEVER shoot the person. Then you will be even more a wanted man (or woman, I isn't no judge.)
• Once you have a nice fill of cash, order them to go in the bathroom, or a broom closet. Once they are in, shove a large cart or shelf in front of the door. This gives you an easy
escape.
• Go ahead and take that snack size Dorito bag. You earned it.
• Walk out, hop on your bike, and ride to your car. Put the bike in the car and drive off. Always remember to drive your BEST while getting away. A simple speeding ticket could be
it for you. Dump the clothes in a dumpster or lake after this.
• Then just drive on home, hide your cash in a safe place and don't in any circumstances put the money in a bank within after 3 weeks of your crime. After your three weeks,
deposit your money in pieces, you don't want to deposit $312 right after a local gas station was robbed of that exact amount.
• Happy robbing!
https://www.youtube.com/watch?v=JmCyJtlM
T18
Look at
this video
for more
information

Mais conteúdo relacionado

Mais de Julie Cullen (20)

Conor
ConorConor
Conor
 
Chuks
ChuksChuks
Chuks
 
Carlene
CarleneCarlene
Carlene
 
Alex&Krista
Alex&KristaAlex&Krista
Alex&Krista
 
Adam
AdamAdam
Adam
 
Tia
TiaTia
Tia
 
Sophie
SophieSophie
Sophie
 
Ronan
RonanRonan
Ronan
 
Rhianna
RhiannaRhianna
Rhianna
 
Ramona
RamonaRamona
Ramona
 
Michael
MichaelMichael
Michael
 
Mahrukh
MahrukhMahrukh
Mahrukh
 
Lily
LilyLily
Lily
 
Lee
LeeLee
Lee
 
Leah
LeahLeah
Leah
 
Intrests
IntrestsIntrests
Intrests
 
Leah
LeahLeah
Leah
 
Ronan
RonanRonan
Ronan
 
Trust
TrustTrust
Trust
 
Tia
TiaTia
Tia
 

Último

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Último (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

Trust

  • 2. My Task Create a PP Presentation on the following topics: •Stealing from internet •Stealing from a shop •Is it ever okay to steal?
  • 3. Robbery • Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or by putting the victim in fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person of that property, by means of force or fear; that is, it is a larceny or theft accomplished by an assault.
  • 4. Hacking • A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.
  • 5. Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time. With streaming video or streaming media, a Web user does not have to wait to download a file to play it. Instead, the media is sent in a continuous stream of data and is played as it arrives.
  • 6. Robbing the internet Many sites like GoMovies, FMovies, MovieBox, 123Movies, 9Anime are illegal sites. Always be careful when downloading and streaming sites. GoMovies FMovies 9Anime
  • 7. How To Be A Hacker Step 0: Read The Hacking Manifesto It is not an easy task to be a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude. Though a lot of people consider that a hacker is a criminal; However in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority. The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I will not recommend you to get involved into such activities. Step 1: Learn To Program In C C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT& T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic. There are hundreds of Free C Programming PDF & tutorials available on web to learn, however I would recommend you to start with a simple and well written c programming book of your choice and then read this book (C Programming Language By Brian W. Kernighan and Dennis M. Ritchie) to understand the real power of c language. This books is not an easy read however its a must read book to get in depth understanding for C Programming. Step 2: Learn More Than One Programming Language When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, HTML, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts. Java is one of the most popular programming languages. It has been claimed that its also very secure. Knowing Java security model will empower you to understand how this language achieve security. Learn about the security loop holes in Java language and related frameworks. Pick and read from many free PDF, tutorials and ebooks available to learn java online. Perl is a general purpose dynamic programming language, which is high level and can be interpreted. This language borrows some features of C language. On the other hand, JAVA is concurrent, class based and objects oriented programming language. Python is really handy when you are trying to automate some repetitive tasks. HTML is the mark up language based on which the web pages are designed, created and displayed. The web browsers read the HTML code to display the web page. Python is best language for web development and favorite language of a lot of programmer due to its simplicity and quick turn around. A lot of people use Python to do simple and complex automation. Step 3: Learn UNIX UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems.This operating system was developed by some employees of AT&T in Bell Labs.The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX. If you have not used Unix operating system yet, a few essential linux commands will make your comfortable in getting quickly started. Unix in a Nutshell by Arnold Robbins is a good way to start. This book will teach you how to use Unix. The next thing you need to know is the internals of this operating system. I recommend The Design of the UNIX Operating System by Maurice J. Bach for getting in depth understanding of Unix operating system. A large number of web servers are hosted on Unix based servers and knowing internals of this operating system is going to be really a big boost in your skills. Step 4: Learn More Than One Operating Systems There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence it is good to learn hacking Microsoft systems, which are closed-source systems. For more info: https://www.quora.com/How-does-one-become-a-hacker-2
  • 8. Hacker's Perspective • “Data breaches take an average of 250-300 days to detect—if they’re detected at all—but most attackers tell us they can break in and steal the target data within 24 hours,” said Chris Pogue, Nuix’s chief information security officer and a co-author of the Nuix Black Report. “Organizations need to get much better at detecting and remediating breaches using a combination of people and technology.”
  • 9. Best Way To Rob A Shop • Here is the best way I could think: • Get a new set of clothes that are the opposite of your taste. • Get gloves and a mask of some sort. • Have a gun. Preferably an all-black pistol. Make sure you have a permit for said gun, and you bought it legally. • Have a bike and car, put the bike behind said building, and park the car out of sight from the building. • Go there in your full gear, new clothes that you don't like, mask, the gun, and a non-descript backpack. • Make sure it's a less busy time of day, say minutes till closing. • Walk in, point your gun at the cashier, and in a nice tone say, “please put all of the money in that register in my backpack here”. People cooperate with a nice person, gun or no gun (but you still need a gun for this specific task). Oh, and don't forget to demand all their electronics be put on the counter. Shoot their phone. • If they do not comply, fire a warning shot. Remember, NEVER shoot the person. Then you will be even more a wanted man (or woman, I isn't no judge.) • Once you have a nice fill of cash, order them to go in the bathroom, or a broom closet. Once they are in, shove a large cart or shelf in front of the door. This gives you an easy escape. • Go ahead and take that snack size Dorito bag. You earned it. • Walk out, hop on your bike, and ride to your car. Put the bike in the car and drive off. Always remember to drive your BEST while getting away. A simple speeding ticket could be it for you. Dump the clothes in a dumpster or lake after this. • Then just drive on home, hide your cash in a safe place and don't in any circumstances put the money in a bank within after 3 weeks of your crime. After your three weeks, deposit your money in pieces, you don't want to deposit $312 right after a local gas station was robbed of that exact amount. • Happy robbing!