SlideShare uma empresa Scribd logo
1 de 17
HACKERS & HACKTIVISM



•SYED BILAL ALI (5803)
•AHSAN KHAN GHORI (6121)
TOPICS COVERED IN THIS PRESENTATION



•LITTLE BIT ABOUT HACKING

•INTRODUCTION

•HACKERS

•TYPES
•HACKTIVISM
•SOME HACKERS GROUP
•CONCLUSION
HACKING

•Authorized/Unauthorized access of Network & Computer resources

                       OR


•Activity within the computer programmer subculture
HISTORY

1960s
MIT AI Lab
Ken Thompson invented UNIX
Positive Meaning
1970s
Dennis Ritchie invented C

1980s
Cyberspace coined
414s arrested
Two hacker groups formed

1990s
National Crackdown on hackers
Kevin Mitnick arrested
Microsoft’s NT operating system
WORLD MOST FAMOUS HACKERS


                                      Kevin Mitnick
stephen wozniak




Tsutomu Shimomura
                            At the time of his arrest, he was the most-
                            wanted computer criminal in the United
                            States.
TYPES OF HACKERS
FAMOUS NOTORIOUS BLACK HAT HACKER


•Kevin Poulsen

•Gary McKinnon

•Kevin Mitnick

•Jonathan James

•Michael Calce

•Adrian Lamo

George Hotz
HACKTIVISM



Hacktivism is the act of hacking, or breaking
into a computer system, for a politically or
socially motivated purpose. The individual who
performs an act of hacktivism is said to be a
hacktivist.

A hacktivist uses the same tools and
techniques as a hacker, but does so in order to
disrupt services and bring attention to a
political or social cause.
•Anonymous to Hacked
                        Facebook on November 5th.
 Anonymous is an extended group of hackers active on the Internet.

They defend freedom of expression. During the physical manifestations
         of the collective, the members usually wear a mask.



                        The mask symbolizes

                               -the anonymity

        -the activism, it’s the mask of Guy Fawkes who tried to blow up
             the English Parliament in the 16th century because of
              disagreement with the policy of King James the first.
WHY ANONYMOUS??


Anonymous is in the news these days because
the community declares war on facebook.




It seems that this is a fake, however the
actions of the group are large and extend over
the planet.
The Anonymous organization of hackivists has
leveled a new threat against Egypt’s largest
political group, the Muslim Brotherhood,
saying it would take down the group’s online
capacity.

The announcement is titled “Operation
Brotherhood Takedown.” And they said it was
“engaged.”
SOME EXAMPLES


       RECENT ACTIVITY

•Pakistan Tehreek-e-Insaf facebook pages has been hacked. The cyber attack on the
different facebook page associated with Pakistan Tehreek-e-Insaf was made on 3rd
February, 2012 (Friday) at 3:00 PM PST. Thousands of Tehreek-e-Insaf facebook
supporters could not access the fan pages after repeated attempts.


•Mr.Badoo is one of most famous and old hacker of Pakistan in cyber space.He is
arrested by FBI on June, 25, 2012 for hacking into PC of Andy who create any
event of drawing Prophet Muhammad’s(SAW). He hacked Andy account and
remove that event from facebook.
Most Famous and Recent Hacker Groups In
the World.

  •We are Anonymous , We don’t forgive , we don’t forget , Expect us

  •LulzSecurity commonly known as LulzSec,


   •Chaos Computer Club, CCC


   •Legion of Doom

   •Masters of Deception, (The Gang that ruled
   the cyber space )

   •milw0rm (Nuclear Hacker Group)
CONCLUSION


   Q/A
Thank You

 Hope You Like
The Presentation

Mais conteúdo relacionado

Mais procurados

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekarnforceit
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Andrew Schwabe
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Chinese social network
Chinese social networkChinese social network
Chinese social networktianc001
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesMikko Hypponen
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 

Mais procurados (20)

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Anonymous
AnonymousAnonymous
Anonymous
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
The deep web
The deep webThe deep web
The deep web
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Chinese social network
Chinese social networkChinese social network
Chinese social network
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 

Destaque

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivismaligi
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymousLegion
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldMer Joyce
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?Mer Joyce
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivismEva Sánchez
 
23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_baySamson Lam
 
The dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationThe dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationtae-i
 
Digital Activism
Digital ActivismDigital Activism
Digital ActivismMax Garcia
 
The hacking mentality
The hacking mentalityThe hacking mentality
The hacking mentalityTausance Vlad
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedMer Joyce
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentationPatrick Murphy
 

Destaque (20)

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook Hacktivist
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the World
 
Digital activism
Digital activismDigital activism
Digital activism
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay
 
The dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationThe dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentation
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
 
The hacking mentality
The hacking mentalityThe hacking mentality
The hacking mentality
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
hacking
hackinghacking
hacking
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentation
 

Semelhante a Hackers & hacktivism

Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleFelipe Prado
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 

Semelhante a Hackers & hacktivism (20)

Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Lulz security
Lulz securityLulz security
Lulz security
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Hackers & hacktivism

  • 1. HACKERS & HACKTIVISM •SYED BILAL ALI (5803) •AHSAN KHAN GHORI (6121)
  • 2. TOPICS COVERED IN THIS PRESENTATION •LITTLE BIT ABOUT HACKING •INTRODUCTION •HACKERS •TYPES •HACKTIVISM •SOME HACKERS GROUP •CONCLUSION
  • 3. HACKING •Authorized/Unauthorized access of Network & Computer resources OR •Activity within the computer programmer subculture
  • 4. HISTORY 1960s MIT AI Lab Ken Thompson invented UNIX Positive Meaning 1970s Dennis Ritchie invented C 1980s Cyberspace coined 414s arrested Two hacker groups formed 1990s National Crackdown on hackers Kevin Mitnick arrested Microsoft’s NT operating system
  • 5. WORLD MOST FAMOUS HACKERS Kevin Mitnick stephen wozniak Tsutomu Shimomura At the time of his arrest, he was the most- wanted computer criminal in the United States.
  • 7. FAMOUS NOTORIOUS BLACK HAT HACKER •Kevin Poulsen •Gary McKinnon •Kevin Mitnick •Jonathan James •Michael Calce •Adrian Lamo George Hotz
  • 8.
  • 9. HACKTIVISM Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
  • 10.
  • 11. •Anonymous to Hacked Facebook on November 5th. Anonymous is an extended group of hackers active on the Internet. They defend freedom of expression. During the physical manifestations of the collective, the members usually wear a mask. The mask symbolizes -the anonymity -the activism, it’s the mask of Guy Fawkes who tried to blow up the English Parliament in the 16th century because of disagreement with the policy of King James the first.
  • 12. WHY ANONYMOUS?? Anonymous is in the news these days because the community declares war on facebook. It seems that this is a fake, however the actions of the group are large and extend over the planet.
  • 13. The Anonymous organization of hackivists has leveled a new threat against Egypt’s largest political group, the Muslim Brotherhood, saying it would take down the group’s online capacity. The announcement is titled “Operation Brotherhood Takedown.” And they said it was “engaged.”
  • 14. SOME EXAMPLES RECENT ACTIVITY •Pakistan Tehreek-e-Insaf facebook pages has been hacked. The cyber attack on the different facebook page associated with Pakistan Tehreek-e-Insaf was made on 3rd February, 2012 (Friday) at 3:00 PM PST. Thousands of Tehreek-e-Insaf facebook supporters could not access the fan pages after repeated attempts. •Mr.Badoo is one of most famous and old hacker of Pakistan in cyber space.He is arrested by FBI on June, 25, 2012 for hacking into PC of Andy who create any event of drawing Prophet Muhammad’s(SAW). He hacked Andy account and remove that event from facebook.
  • 15. Most Famous and Recent Hacker Groups In the World. •We are Anonymous , We don’t forgive , we don’t forget , Expect us •LulzSecurity commonly known as LulzSec, •Chaos Computer Club, CCC •Legion of Doom •Masters of Deception, (The Gang that ruled the cyber space ) •milw0rm (Nuclear Hacker Group)
  • 16. CONCLUSION Q/A
  • 17. Thank You Hope You Like The Presentation