SlideShare a Scribd company logo
1 of 16
WELCOME TO
Submitted by: -
Fozail Ahmad
Nabeela Shahid
HACKING
CONTENTS
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
HISTORY OF HACKING
 Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by
enraged authorities. Here's a peek at how busy hackers have been in
the past 35 years.
Early 1960s
 University facilities with huge mainframe computers, likeMIT's artificial
intelligence lab, become staging grounds for hackers. At first, "hacker"
was a positive term for a person with a mastery of computers who could
push programs beyond what they were designed to do.
Early 1970s
o Two members of California's Homebrew Computer Club begin making
"blue boxes," devices used to hack into the phone system. The
members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak
Toebark" (Steve Wozniak), later go on to found Apple computer.
Early 1980s
 Author William Gibson coins the term "cyberspace" in a science fiction
novel called Neuromancer.
 In one of the first arrests of hackers, the FBI busts the Milwaukee-based
414s (named after the local area code) after members are accused of 60
computer break-insranging from Memorial Sloan-Kettering Cancer Center
to Los Alamos National Laboratory.
Late 1980s
 First National Bank of Chicago is the victim of a $70-million computer heist.
 An Indiana hacker known as "Fry Guy" -- so named for hacking
McDonald's -- is raided by law enforcement. A similar sweep occurs in
Atlanta for Legion of Doomhackers known by the handles "Prophet,"
"Leftist" and "Urvile.“
Early 1990s
 A 17-month search ends in the capture of hacker Kevin Lee
Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Late 1990s
 Popular Internet search engine Yahoo! is hit by hackers claiming a "logic
bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless
Kevin Mitnick is released from prison. "There is no virus," Yahoo!
spokeswoman Diane Hunt said.
1998
 Hackers claim to have broken into a Pentagon network and stolen software
for a military satellite system. They threaten to sell the software to
terrorists.
2000
 The "I Love You" virus debuts on the Internet in May, appearing first in the
Philippines, then spreading across the globe in a matter of hours. It causes
an estimated $10 billion of damage globally in lost files and computer
downtime before a solution is found.
o 1.Hacking refers to the activities which are done to intrude some one
else’s personal information so as to use it for malicious, unwanted
purposes.
o 2. Hacking is a term which refers to the activities aimed at exploiting
security flaws to obtain personal information for gaining access to
secured networks.
What is hacking
Who is a hacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
LinusTorvaldsMark Abene Robert Morris
WHY DO HACKERS HACK ?
o Just for fun.
o Show off.
o Hack other systems secretly.
o Notify many people their thought.
o Steal important information.
o Destroy enemy’s computer network during the war.
Types of Hacking
o Website Hacking
o Network Hacking
o Ethical Hacking
o Email Hacking
o Password Hacking
o Online Banking Hacking
o Computer Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc…
over the network.
Ethical Hacking
Ethical hacking is where a person hacks to
find weaknesses in a system and then usually
patches them.
Email Hacking
Email hacking is illicit access to an email account or
email correspondence.
Password Hacking
Password Hacking Password cracking is the process
of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online
banking hacking.
Computer Hacking
Computer Hacking is when files on your computer
are viewed, created, or edited without your
authorization.
What should do after hacked?
o Shutdown the system
Or turn off the system
o Separate the system from network
o Restore the system with the backup
Or reinstall all programs
o Connect the system to the network
o It can be good to call the police
How to give a password to account.
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
Advantages of hacking
Can be used to recover lost information where the computer
password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
Keep your password protected. Write your password should be
with combination of characters, digits, special symbols. Do not
respond to feck on fishing email. when you are doing any online
transection always keep watch on site whether the protocol of site
is https & whether there is a lock symbol .
THANKS TO ALL
RGI - FAMILY
VIHAN
CO-ORDINATOR
ASSOCIATE MEMBER
FOR GIVING ME A CHANCE TO
PARTICIPATE.
Hacking

More Related Content

What's hot

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

What's hot (20)

Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 

Similar to Hacking

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 

Similar to Hacking (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Hacking

  • 2. Submitted by: - Fozail Ahmad Nabeela Shahid HACKING
  • 3. CONTENTS  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 4. HISTORY OF HACKING  Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s  University facilities with huge mainframe computers, likeMIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s o Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple computer.
  • 5. Early 1980s  Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.  In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-insranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory. Late 1980s  First National Bank of Chicago is the victim of a $70-million computer heist.  An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doomhackers known by the handles "Prophet," "Leftist" and "Urvile.“ Early 1990s  A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
  • 6. Late 1990s  Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said. 1998  Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. 2000  The "I Love You" virus debuts on the Internet in May, appearing first in the Philippines, then spreading across the globe in a matter of hours. It causes an estimated $10 billion of damage globally in lost files and computer downtime before a solution is found.
  • 7. o 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes. o 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks. What is hacking Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. FAMOUS HACKERS IN HISTORY Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvaldsMark Abene Robert Morris
  • 9. WHY DO HACKERS HACK ? o Just for fun. o Show off. o Hack other systems secretly. o Notify many people their thought. o Steal important information. o Destroy enemy’s computer network during the war. Types of Hacking o Website Hacking o Network Hacking o Ethical Hacking o Email Hacking o Password Hacking o Online Banking Hacking o Computer Hacking
  • 10. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 11. Email Hacking Email hacking is illicit access to an email account or email correspondence. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 12. Computer Hacking Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. What should do after hacked? o Shutdown the system Or turn off the system o Separate the system from network o Restore the system with the backup Or reinstall all programs o Connect the system to the network o It can be good to call the police
  • 13. How to give a password to account. Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password. Advantages of hacking Can be used to recover lost information where the computer password has been lost. Teaches you that no technology is 100% secure. To test how good security is on your own network. They call it white hat computer hacking.
  • 14. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  • 15. THANKS TO ALL RGI - FAMILY VIHAN CO-ORDINATOR ASSOCIATE MEMBER FOR GIVING ME A CHANCE TO PARTICIPATE.