What is hacking?
● Hacking refers to activities that seek to compromise digital devices, such as
computers, smartphones, tablets, and even entire networks. And while hacking
might not always be for malicious purposes, nowadays most references to
hacking, and hackers, characterize it/them as unlawful activity by
cybercriminals—motivated by financial gain, protest, information gathering
(spying), and even just for the “fun” of the challenge..
Types of HACKER…!
a) .Social Engineers
e) Growth Hacker
1.Social Engineers – These hackers don’t rely on gizmos or years of programming knowledge to
break into computer systems, yet they do it all the time. These whiz kids use social skills, good
theatrics, and a little bit of detective work to obtain passwords, credit card information, and other
devastating intel. Often targeting businesses, they can be a serious threat to be reckoned with, and
can even blackmail people with their findings.
2.Biohackers – Biohackers are very rare to come across, but they do exist. These are individuals
who work to bend the rules of normal biology and create new gizmos that work to improve the
body. A group of biohackers recently made the news when they created a night vision injection for
humans to use.
3.Crackers – Not to be misconstrued for the derogative term, crackers actually work to break the
keycodes that keep parts of programs unusable or uninstallable. By cracking the software code, the
users who download the software no longer have to pay in order to use the software. Cracked
software, also known as warez, is released under the idea that software should be free or open
sourced. Unfortunately, this is a nightmare for businesses that release software.
1.Phreakers– While this term may sound like something you’d hear in a rap or EDM song,
phreakers are actually hackers who specialize in phones. In the 80’s, phreakers were the
ones who could do a DIY wiretap or get free calls on payphones. In modern ages,
phreakers are the people who create spyware for smartphones, intercept cellphone
signals on baby monitors, or do other similar acts. This form of hacking has intersected
with regular computer hacking now.
2.Growth Hackers – This is beginning to become a common name for people who may
use (or abuse) certain aspects of the internet in order to grow businesses or get a higher
SEO rank. If you choose to enlist the help of a growth hacker, make sure they’re white hat.
KNOWN TYPES HACKER
basically work for
These are both gray as
well as black
promotes to bad
These are script
What are things that a hacker can do to me?
Sell your information to
other parties who will use it
for illicit or illegal purposes
purches from your
Steal your money and
open credit card and
bank accounts in your
ETHICAL FUN MONEY
. A computer virus is a
computer program that can
copy itself andinfect a
computer without permission
or knowledge of the user
What is virus..?
A virus is a small piece of
software that piggybacks on
real programs. For example,
a virus might attach itself to
a program such as a
spreadsheet program. Each
time the spreadsheet
program runs, the virus
runs, too, and it has the
chance to reproduce (by
attaching to other programs)
Types of viruses..!
An e-mail virus
travels as an
attachment to e-
worm is a small
piece of software
that uses computer
security holes to
A Trojan horse is
simply a computer
program claims to do
Small packets of
virus on internet
when allowed to
||| VIRUS AFFECT TO PC |||
A virus can only spread from one computer to another when its host is taken to the uninfected
computer, for instance by a user sending it over a network or the Internet, or by carrying it on a
removable medium such as a floppy disk, CD, or USB drive
How to Prevent Computer Viruses: 9 Tips to Keep Your PC Safe
•Use Strong Passwords. Let's start with the basics—your passwords. ...
•Keep Everything up to Date. ...
•Use Antivirus Software. ...
•Use a Firewall. ...
•Install a Popup Blocker. ...
•Beware of Email Phishing Scams. ...
•Educate Your Family & Staff. ...
•Know the Signs of Infection.
Top 5 Sources of Computer Virus Attack
Email - Attachments
Booting From CD
The most potent and vulnerable threat of computer users is virus
attacks. Virus attacks hampers important work involved with data
and documents. It is imperative for every computer user to be
aware about the software and programs that can help to protect
the personal computers from attacks. One must take every
possible measure in order to keep the computer systems free
from virus attacks. The top sources of virus attacks are
Top Hackers in the World
US Military Defence,
Biggest bank hacker
10 billion dollars
Hacking Google and
Parece que tem um bloqueador de anúncios ativo. Ao listar o SlideShare no seu bloqueador de anúncios, está a apoiar a nossa comunidade de criadores de conteúdo.
Atualizámos a nossa política de privacidade.
Atualizámos a nossa política de privacidade de modo a estarmos em conformidade com os regulamentos de privacidade em constante mutação a nível mundial e para lhe fornecer uma visão sobre as formas limitadas de utilização dos seus dados.
Pode ler os detalhes abaixo. Ao aceitar, está a concordar com a política de privacidade atualizada.