SlideShare uma empresa Scribd logo
1 de 13
By.
Santhosh R
Bsc (Nur) 2nd Yr
HACKING...
Hacking is the gaining of assess (wanted or unwanted)
to a computer and viewing,copying,or creating data
without the intentation of destroying data or malicious
harming the computer.
Computer hacking is down using Several progrems as
used ,such as...
Rootkit,
Trojan,
Keylogger.
HACKERS...
 The person involoved the process is name called as a
hacker.
 A person who gained authorized or unauthorized
access to a computer without the initentation of causing
damage.
Types of
Hackers
1.White Hat
hackers
2.Gray Hat
hackers
3.Black Hat
hackers
1.White Hackers.
The term “white hat” in Internet slang refers to an ethical
computer hacker,or a computer security expert .
2.Grey Hackers.
A grey hat is a computer hacker or computer security
experct who may sometimes violate laws or typical ethical standards,
but does not have the malicious intent typical of a black hat hackers.
3.Black Hackers.
A black hat hacker is a hacker who violates computer
security for personal gain or malice.
Why do Hacker hack..
* Just for fun
* Show off
* Hack other system secretly
*Notify
* Steal many people their throught ,important information
* Destroy the enemys computer network during the war.
Website
hacking
Network
hacking
Ethical
hacking
E-mail
hacking
Password
hacking
Online
banking
hacking
Computer
hackin
Type
s
of
Hacki
ng
1.Website Hacking ;
Website haking means taking control from the website
owner to a person who hackers the website.
2.Network Hacking;
Network hacking is generaly means gathering information
about domain by using tools like Telnet , Ns look , UP , Ping ,
Tracert , Netstat , etc....
over the network
3.Ethical Hacking;
Ethical hacking is where a person hacks to find weakness in
a system and then usually patches them.
4.Email Hacking;
Email hacking is illicit access to an email account or email
correspondence.
5.Password Hacking;
Password hacking, password creaking is the process of
recovering secret passwords from data that as been stored in or
transmitted by a computer system
6.Online Baking Hacking;
Online banking hacking unautherized accessing bank
accounts without knowing the password or without permission of
account holder is know as online banking hacking.
7.Computer Hacking;
Computer hacking is when files on your computer are
viewed,created,or eadited without your authorization.
How to know if your computer is
hacked...
Fake antiviruse warning messages
Unwanted browser toolbar
Redirection to strange websites
Random pop ups
Ransomware message etc..
Ifyourecive anyofthesewarningsgins,youcanbe surethat
yourcomputerhasbeentargetedbyahackers.
How to prevent the hacking...
Scan all type of hard drives before running
oHarddrives,pendrives,external hardisk or mobile devices
should be scanned by a USB scanner to remove any kind of
malware.
Dont keeps easy password
o Like 1234,pet name or your name and date of birth etc.use
complex password.
Never store or share your login information
o Keep memorize your password and user id
Conclusion
 Hacking is a good computering skill that can be used
for good or bad intention
 Ther is a reson to do the hack, and ther are ways to
prevent it.
Hacking (basic)

Mais conteúdo relacionado

Mais procurados

Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 

Mais procurados (19)

Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_inEthical hacking ppt_presentation_way2project_in
Ethical hacking ppt_presentation_way2project_in
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 
ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 
Web security
Web securityWeb security
Web security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking
HackingHacking
Hacking
 

Semelhante a Hacking (basic)

Semelhante a Hacking (basic) (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking
HackingHacking
Hacking
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Hacking (basic)

  • 2. HACKING... Hacking is the gaining of assess (wanted or unwanted) to a computer and viewing,copying,or creating data without the intentation of destroying data or malicious harming the computer. Computer hacking is down using Several progrems as used ,such as... Rootkit, Trojan, Keylogger.
  • 3. HACKERS...  The person involoved the process is name called as a hacker.  A person who gained authorized or unauthorized access to a computer without the initentation of causing damage.
  • 4. Types of Hackers 1.White Hat hackers 2.Gray Hat hackers 3.Black Hat hackers
  • 5. 1.White Hackers. The term “white hat” in Internet slang refers to an ethical computer hacker,or a computer security expert . 2.Grey Hackers. A grey hat is a computer hacker or computer security experct who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hackers. 3.Black Hackers. A black hat hacker is a hacker who violates computer security for personal gain or malice.
  • 6. Why do Hacker hack.. * Just for fun * Show off * Hack other system secretly *Notify * Steal many people their throught ,important information * Destroy the enemys computer network during the war.
  • 8. 1.Website Hacking ; Website haking means taking control from the website owner to a person who hackers the website. 2.Network Hacking; Network hacking is generaly means gathering information about domain by using tools like Telnet , Ns look , UP , Ping , Tracert , Netstat , etc.... over the network 3.Ethical Hacking; Ethical hacking is where a person hacks to find weakness in a system and then usually patches them. 4.Email Hacking; Email hacking is illicit access to an email account or email correspondence.
  • 9. 5.Password Hacking; Password hacking, password creaking is the process of recovering secret passwords from data that as been stored in or transmitted by a computer system 6.Online Baking Hacking; Online banking hacking unautherized accessing bank accounts without knowing the password or without permission of account holder is know as online banking hacking. 7.Computer Hacking; Computer hacking is when files on your computer are viewed,created,or eadited without your authorization.
  • 10. How to know if your computer is hacked... Fake antiviruse warning messages Unwanted browser toolbar Redirection to strange websites Random pop ups Ransomware message etc.. Ifyourecive anyofthesewarningsgins,youcanbe surethat yourcomputerhasbeentargetedbyahackers.
  • 11. How to prevent the hacking... Scan all type of hard drives before running oHarddrives,pendrives,external hardisk or mobile devices should be scanned by a USB scanner to remove any kind of malware. Dont keeps easy password o Like 1234,pet name or your name and date of birth etc.use complex password. Never store or share your login information o Keep memorize your password and user id
  • 12. Conclusion  Hacking is a good computering skill that can be used for good or bad intention  Ther is a reson to do the hack, and ther are ways to prevent it.