SlideShare uma empresa Scribd logo
1 de 13
TOPIC : HACKER Prepared by :  Nor Izyani Bt. Ahmad Zaki
[object Object],[object Object],[object Object],CONTENTS
[object Object],DEFINITION OF HACKER
[object Object],DEFINITION OF HACKER
[object Object],DEFINITION OF HACKER
After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s.  Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement. DEFINITION OF HACKER
EXAMPLE OF HACKER ,[object Object],[object Object]
Adrian Lamo is best known for hacking into the New York Times. He is sometimes call the “homeless hacker” because he spent parts of his travels squatting in abandoned buildings and travelling to Internet cafes, libraries and universities.Adrian Lamo pleads guilty on January 9, 2004. JKW  EXAMPLE OF HACKER
Kevin Poulsen has not only used his “hacking skills”  to win cars but also to get the names of undercover businesses operated by the FBI. Also, at the age of seventeen, he used his TRS-80 to hack the US department of defense’s Arpanet.  Finally Poulsen was arrested after hacking  Microsoft. KLW  EXAMPLE OF HACKER
[object Object],EXAMPLE OF HACKER
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EXAMPLE OF HACKER
[object Object],WAYS TO AVOID HACKERS
[object Object]

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hacking
HackingHacking
Hacking
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
185
185185
185
 

Destaque

Top 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesTop 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesDave McClure
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T Omari89
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3safa
 
Blog Google Attention 200512
Blog Google Attention 200512Blog Google Attention 200512
Blog Google Attention 200512osamuh
 
Off the beaten track...
Off the beaten track...Off the beaten track...
Off the beaten track...Silversprite
 
Pazinterior Ri
Pazinterior RiPazinterior Ri
Pazinterior Rimarcelino4
 
Retriever Example
Retriever Example Retriever Example
Retriever Example marrowmonkey
 
Petr Aciudadrosa[1]
Petr Aciudadrosa[1]Petr Aciudadrosa[1]
Petr Aciudadrosa[1]marcelino4
 
Cevpresentaciontrigliceridos
CevpresentaciontrigliceridosCevpresentaciontrigliceridos
Cevpresentaciontrigliceridosrosaclara18
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A Nnasya
 
F O T O S H E R M O S A S
F O T O S H E R M O S A SF O T O S H E R M O S A S
F O T O S H E R M O S A Srosaclara18
 
Sinceridad matrimonial
Sinceridad matrimonialSinceridad matrimonial
Sinceridad matrimonialchamato
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T Omari89
 

Destaque (20)

Avmx714
Avmx714Avmx714
Avmx714
 
CL presentation
CL presentationCL presentation
CL presentation
 
Hayninos
HayninosHayninos
Hayninos
 
Top 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesTop 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical Revolutionaries
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T O
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Blog Google Attention 200512
Blog Google Attention 200512Blog Google Attention 200512
Blog Google Attention 200512
 
Off the beaten track...
Off the beaten track...Off the beaten track...
Off the beaten track...
 
Pazinterior Ri
Pazinterior RiPazinterior Ri
Pazinterior Ri
 
Retriever Example
Retriever Example Retriever Example
Retriever Example
 
Divertimento
DivertimentoDivertimento
Divertimento
 
Petr Aciudadrosa[1]
Petr Aciudadrosa[1]Petr Aciudadrosa[1]
Petr Aciudadrosa[1]
 
Cevpresentaciontrigliceridos
CevpresentaciontrigliceridosCevpresentaciontrigliceridos
Cevpresentaciontrigliceridos
 
Budita
BuditaBudita
Budita
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Dominoe
DominoeDominoe
Dominoe
 
F O T O S H E R M O S A S
F O T O S H E R M O S A SF O T O S H E R M O S A S
F O T O S H E R M O S A S
 
Sinceridad matrimonial
Sinceridad matrimonialSinceridad matrimonial
Sinceridad matrimonial
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T O
 

Semelhante a Hackers Izyani

Semelhante a Hackers Izyani (20)

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Hackers Izyani

  • 1. TOPIC : HACKER Prepared by : Nor Izyani Bt. Ahmad Zaki
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement. DEFINITION OF HACKER
  • 7.
  • 8. Adrian Lamo is best known for hacking into the New York Times. He is sometimes call the “homeless hacker” because he spent parts of his travels squatting in abandoned buildings and travelling to Internet cafes, libraries and universities.Adrian Lamo pleads guilty on January 9, 2004. JKW EXAMPLE OF HACKER
  • 9. Kevin Poulsen has not only used his “hacking skills” to win cars but also to get the names of undercover businesses operated by the FBI. Also, at the age of seventeen, he used his TRS-80 to hack the US department of defense’s Arpanet. Finally Poulsen was arrested after hacking Microsoft. KLW EXAMPLE OF HACKER
  • 10.
  • 11.
  • 12.
  • 13.