SlideShare uma empresa Scribd logo
1 de 19
Hack
er
&
Crack
Hacker
Hacker
Hacker Security
Professional
Hacker
Hacker White Hat Hacker
Hacker &
Cracker
Cracker
Black Hat Hacker
Hacker
Cracker
-
-
-
UNIX
-
Hacker
Hacker Cracker
3
1. Password Sniffers
Log on
Password)
Hacker Cracker
2. Spoofing
Internet Address)
Root)
Sniffers Back
Door
3. The Hole in the Web
World -Wide-Web
Website
- Network
OS) UNIX OS
UNIX
Interactive time sharing OS
C
UNIX
OS Free ware
product Hacker
Idea
UNIX Version
Version
Hacker
- USENET
Hacker
Newgroup
Newgroup HOST Server
Internet Web browser
USENET
Newgroup Enduser
- www
-
-
Netware
-Share Hacker
-
- Hacker
-Hacker
-
Hacker
Moral
-
-
-
-
-
-
Cracker
cracker Password
-
- Robert Morris
Internet
- Copy Web
- Web
Link Copy
-
Cracker
Copyright)
net
web page
ASCII e-mail
web page
HACKER AND
CRACKER
site
print page
internet
disk
print
an official administration acknowledged world
FAQ
Hacking Novell Netware
Hacking On
Netware hacking
web
password
Antivirus
Antivirus
Flash
Drive
Firewall
-
Firewall
Anti-Spyware
 http://www.clipmass.com/story/28
945
 http://pi.eng.src.ku.ac.th/mod/foru
m/discuss.php?d=240
 http://www.dek-
d.com/board/view.php?id=114927
0
 http://www.lawyerthai.com/articles
/it/035.php
 http://www.yam4teen.com
2551051541317
2551051541318
2551051541319
2551051541326
-

Mais conteúdo relacionado

Mais procurados

Web defacement
Web defacementWeb defacement
Web defacement
student
 

Mais procurados (20)

Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
Hacking Hacking
Hacking
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 

Destaque

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 
Classification and generations of computers
Classification and generations of computersClassification and generations of computers
Classification and generations of computers
Khushbu Sonegara
 

Destaque (20)

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
DDoS dengan LOIC, HOIC dan Slowloris.pl
DDoS dengan LOIC, HOIC dan Slowloris.plDDoS dengan LOIC, HOIC dan Slowloris.pl
DDoS dengan LOIC, HOIC dan Slowloris.pl
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Hacking tutorial.
Hacking tutorial.Hacking tutorial.
Hacking tutorial.
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
UAS TESTING
UAS TESTINGUAS TESTING
UAS TESTING
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking
Hacking Hacking
Hacking
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerPresentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
 
Backtrack os 5
Backtrack os 5Backtrack os 5
Backtrack os 5
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Classification and generations of computers
Classification and generations of computersClassification and generations of computers
Classification and generations of computers
 

Semelhante a Hacker&cracker

อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องอาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
jiranut
 
รายงานอาชญากรรมคอมพิวเตอร์
รายงานอาชญากรรมคอมพิวเตอร์รายงานอาชญากรรมคอมพิวเตอร์
รายงานอาชญากรรมคอมพิวเตอร์
Julanuch Pootprao
 
รายงานตุก
รายงานตุกรายงานตุก
รายงานตุก
Konsiput Promjun
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
Ae Naiong
 
บทที่6 ระบบซอฟแวร์
บทที่6 ระบบซอฟแวร์บทที่6 ระบบซอฟแวร์
บทที่6 ระบบซอฟแวร์
Beauso English
 

Semelhante a Hacker&cracker (20)

อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องอาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?
 
รายงานอาชญากรรมคอมพิวเตอร์
รายงานอาชญากรรมคอมพิวเตอร์รายงานอาชญากรรมคอมพิวเตอร์
รายงานอาชญากรรมคอมพิวเตอร์
 
รายงาน11[1]
รายงาน11[1]รายงาน11[1]
รายงาน11[1]
 
รายงานตุก
รายงานตุกรายงานตุก
รายงานตุก
 
Hacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the ShadowsHacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the Shadows
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
History of some Vulnerabilities and exploit techniques
History of some Vulnerabilities and exploit techniquesHistory of some Vulnerabilities and exploit techniques
History of some Vulnerabilities and exploit techniques
 
Strategies to design FUD malware
Strategies to design FUD malwareStrategies to design FUD malware
Strategies to design FUD malware
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Week 3 -- An Open World
Week 3 --  An  Open  WorldWeek 3 --  An  Open  World
Week 3 -- An Open World
 
HARDENING IN APACHE WEB SERVER
HARDENING IN APACHE WEB SERVERHARDENING IN APACHE WEB SERVER
HARDENING IN APACHE WEB SERVER
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Backtrack
BacktrackBacktrack
Backtrack
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
File000173
File000173File000173
File000173
 
บทที่6 ระบบซอฟแวร์
บทที่6 ระบบซอฟแวร์บทที่6 ระบบซอฟแวร์
บทที่6 ระบบซอฟแวร์
 
Hunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory Forensics
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Hacker&cracker