SlideShare una empresa de Scribd logo
1 de 16
HACKING
Unlike most computer crime / misuse
areas which are clear cut in terms of
actions and legalities , computer
hacking is more difficult to define.
There is no exact definition of hacking.
Hacking means finding out weaknesses
in an established system and exploiting
them. Computer hacking always
involves some degree of infringement
on the privacy of others or damage to
computer-based property such as
files, web pages or software
WHO IS A HACKER?
On hearing the word “HACKER” most of
the peoples are scared. Most of them
think of hacker as a computer vandals.
But hackers are not computer criminals.
Traditionally, hackers were computer
geeks who know almost everything about
computers both hardware and software
and are widely respected for there
knowledge.
 People who break into
someone’s system are called
“CRACKERS”.
People who code and release
viruses are not necessarily
hackers, they are
“VIRIiCODERS”.
TYPES OF HACKERS
• BLACK HAT HACKERS
• WHITE HAT HACKERS
• GRAY HAT HACKERS
THREE TOP SIGNS SHOWING THAT
A PERSON IS NOT A REAL HACKER
He uses weird handles like
avenger, skull, kewl etc.
He boasts about how much he knows, a
sure sign of a person who lacks real
knowledge.
He flames newbie's of people who ask
questions, instead of helping them learn.
CYBER CRIME
We can categorize Cyber crimes in two
ways
The Computer as a Target :-using a
computer to attack other computers e.g.
Hacking, Virus/Worm attacks, DOS attack
etc.
The computer as a weapon :-using a
computer to commit real world crimes.
e.g. Cyber Terrorism, IPR
violations, Credit card frauds, EFT
frauds, Pornography etc.
IT ACT 2000
• In May 2000, both the houses of the
Indian Parliament passed the
Information Technology Bill. The Bill
received the assent of the President in
August 2000 and came to be known as the
Information Technology Act, 2000. Cyber
laws are contained in the IT Act, 2000.
• This Act aims to provide the legal
infrastructure for e-commerce in India.
And the cyber laws have a major impact
for e-businesses and the new economy in
India. So, it is important to understand
what are the various perspectives of the IT
Act, 2000 and what it offers.
WHAT CAN BE HACKED?
WINDOWS
MOBILE
NETWORK
WEB
PASSWORDS
HACKING WINDOWS
• Simple step just open the computer
then look for a round lithium
round battery it will probably look
like a silver coin. Remove the
battery and after 30 seconds or so
put it back. Some computers may
also require you to reset the
jumper, so look for a 3-pin jumper
and reset it. If you move the jumper
to pins two and three and leave it
there for over five seconds, it will
reset the CMOS.
CAREER IN ETHICAL
HACKING
• In the past few years the demand
of ethical hackers is increased in
the industry. Undoubtly it is a
highly paid job.
• You can become a “CERTIFIED
ETHICAL HACKER”(CEH) or a
“PENETRATION TESTER”
Some terms related to Hacking
• INTERNET WORMS
Worms are often used to
infect large no. of broadband connected
computers with remote control software.It
works differently then a virus.It won’t attach
to different programs but it will produce
precise copies of itself
• ROOTKITS
A rootkit is often a collection of
programs which are hidden deep into your
computer system. They enable administrator
level access to a computer or network. For
installing a rootkit first of all a programmer
has to gain user level access in a system
• ZOMBIES
A zombie computer or a “DRONE”
is a computer that has been secretly
compromised by hacking tools which allow
third party to control the computer and its
resources remotely.
• SPAM
Used to be a junk or bulk email sent by
the spammer to various recipients aimed at
advertising, scamming and sending viruses.
THANK YOU

Más contenido relacionado

La actualidad más candente

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 

Similar a Ethical hacking ppt

Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityShouaQureshi
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Similar a Ethical hacking ppt (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking
hackinghacking
hacking
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Ethical hacking ppt

  • 1.
  • 2. HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities , computer hacking is more difficult to define. There is no exact definition of hacking. Hacking means finding out weaknesses in an established system and exploiting them. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software
  • 3. WHO IS A HACKER? On hearing the word “HACKER” most of the peoples are scared. Most of them think of hacker as a computer vandals. But hackers are not computer criminals. Traditionally, hackers were computer geeks who know almost everything about computers both hardware and software and are widely respected for there knowledge.
  • 4.  People who break into someone’s system are called “CRACKERS”. People who code and release viruses are not necessarily hackers, they are “VIRIiCODERS”.
  • 5. TYPES OF HACKERS • BLACK HAT HACKERS • WHITE HAT HACKERS • GRAY HAT HACKERS
  • 6. THREE TOP SIGNS SHOWING THAT A PERSON IS NOT A REAL HACKER He uses weird handles like avenger, skull, kewl etc. He boasts about how much he knows, a sure sign of a person who lacks real knowledge. He flames newbie's of people who ask questions, instead of helping them learn.
  • 7. CYBER CRIME We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 8. IT ACT 2000 • In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. • This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.
  • 9. WHAT CAN BE HACKED? WINDOWS MOBILE NETWORK WEB PASSWORDS
  • 10. HACKING WINDOWS • Simple step just open the computer then look for a round lithium round battery it will probably look like a silver coin. Remove the battery and after 30 seconds or so put it back. Some computers may also require you to reset the jumper, so look for a 3-pin jumper and reset it. If you move the jumper to pins two and three and leave it there for over five seconds, it will reset the CMOS.
  • 11. CAREER IN ETHICAL HACKING • In the past few years the demand of ethical hackers is increased in the industry. Undoubtly it is a highly paid job. • You can become a “CERTIFIED ETHICAL HACKER”(CEH) or a “PENETRATION TESTER”
  • 12. Some terms related to Hacking • INTERNET WORMS Worms are often used to infect large no. of broadband connected computers with remote control software.It works differently then a virus.It won’t attach to different programs but it will produce precise copies of itself
  • 13. • ROOTKITS A rootkit is often a collection of programs which are hidden deep into your computer system. They enable administrator level access to a computer or network. For installing a rootkit first of all a programmer has to gain user level access in a system
  • 14. • ZOMBIES A zombie computer or a “DRONE” is a computer that has been secretly compromised by hacking tools which allow third party to control the computer and its resources remotely.
  • 15. • SPAM Used to be a junk or bulk email sent by the spammer to various recipients aimed at advertising, scamming and sending viruses.