SlideShare una empresa de Scribd logo
1 de 10
Ahamad Suhail bin Abdul Malick

          4 Kempas

        Lew Quo Ming
        Wong Joon Kit
        Thee Kyle Ler
   Dictionary –
    To cut, notch, slice, chop, or sever (something) with or as with
    heavy, irregular blows (often followed by up or down ): to hack
    meat; to hack down trees.
   Computing Dictionary –
    Hacking is the practice of modifying the features of a system, in order to
    accomplish a goal outside of the creator's original purpose.
   Dictionary –
    A person who hacks, to cut, etc.
   Computing Dictionary –
    The person who is consistently engaging in hacking activities, and has
    accepted hacking as a lifestyle and philosophy of their choice.
   History –
    During the 1990s, the term "hacker" originally denoted a
    skilled programmer proficient in machine code and computer
    operating systems. In particular, these individuals could
    always hack on an unsatisfactory system to solve problems
    and engage in a little software company espionage by
    interpreting a competitor's code.

    Unfortunately, some of these hackers also became experts at
    accessing password-protected computers, files, and networks
    and came to known as "crackers." Of course, an effective and
    dangerous "cracker" must be a good hacker and the terms
    became intertwined. Hacker won out in popular use and in
    the media and today refers to anyone who performs some
    form of computer sabotage.
   Hack                                 Crack
    A hacker is a person who is           A cracker is a hacker who uses
    proficient with computers             their proficiency for personal
    and/or programming to an              gains outside of the law. EX:
    elite level where they know all       stealing data, changing bank
    of the in's and out's of a            accounts, distributing viruses
    system.                               etc.
   Black Hats
    Extra ordinary computing skills but diverted to malicious and
    destructive purpose (also known as crackers)
   White Hats
    Professional Hackers who uses hacking skills for defensive purposes
    also known as security professional (also known as hackers)
   Grey Hats
    Practices both offensive and defensive hacking skills
   I have to use the term hack because everyone understands it that
    way. Like when you say ‘Oh, my facebook account got hacked!’
   The common hacks are E-mail accounts, password steal, taking you
    social networking passwords to gain knowledge (Stockers!! )

Depending on the kind of hack you've been dealt, the treatment may
be as simple as logging in, and changing your settings and password.
Or it may entail agonizingly repeated attempts to lock out a persistent
hacker, potentially killing off your account altogether. But you should
never just give up and ditch the account without trying to deal with it
first.
1. If you are able to log in, log in and change your password. Do a anti-
   virus scan and spyware scan to make sure it’s safe. Then the next time is
   to change your password regularly.
2. If you can’t log in, make sure your PC is current with OS updates and
   anti-virus/malware software. Otherwise, if it has been infected by
   malware that spies on you, it will continue to transmit your info to
   whichever hacker has infiltrated your accounts. If you aren't completely
   sure your PC is clean, then don't do any of the following. Any changes
   you attempt to make could be forwarded on by malware, too.
3. Spammed by your hacked e-mail. (Your scam-savvy friends will recognize
   bogus messages as spam.) But, if there is a personal appeal for money --
   saying you're stuck traveling and need cash, or if malware was attached,
   you should send word to your contact list to delete those messages ASAP.
4. Set up at least two new e-mail addresses. This is to separate your
   accounts from important, to not important. So that if your hacked, not all
   your information is gone.
5. On a secure PC, log into your e-mail and then check whether or not any of
   the settings have been changed by a hacker. Smart hackers may set your
   account to notify them of any changes, so that they can go back in and
   switch things again. Check whether or not a signature has been added,
   and whether your account has been set to forward e-mail to another
   address that isn't yours or to run a filter that automatically forwards e-
   mails or attaches a file. If any of those settings have been altered, delete
   the new settings.
6. Once you have changed the settings, create a new password, and add
   your secondary e-mail account as your alternative address.
Hacking does not mean using your computing
  skills to do bad. Society have forgotten the
   difference between crackers and hackers.

   Learning skills of hacking is only for the
                 greater good.

                    The End
   http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-
    hacking.htm
   http://whatishacking.org/
   http://whatismyipaddress.com/hacking
   http://dictionary.reference.com/browse/hacker?s=t
   http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_crackin
    g
   http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy
   http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-
    politics_b_2512573.html
   http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO
   http://www.cs.berkeley.edu/~bh/hacker.html
   http://www.ehow.com/about_4673738_why-do-people-hack.html
   http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-
    know/
   http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training
   http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/

Más contenido relacionado

La actualidad más candente

hire a hacker
hire a hackerhire a hacker
hire a hackerhackany1
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Alan Quayle
 

La actualidad más candente (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hire a hacker
hire a hackerhire a hacker
hire a hacker
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Hacking
Hacking Hacking
Hacking
 
Cyber security
Cyber security Cyber security
Cyber security
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 

Destacado

'Existence before essence’ economic and social research powerpoint
'Existence before essence’ economic and social research powerpoint'Existence before essence’ economic and social research powerpoint
'Existence before essence’ economic and social research powerpointen-soi pour-soi arts
 
3 slides from efl
3 slides from efl3 slides from efl
3 slides from eflarsalan8989
 
3949610 hospitality-services-in-india
3949610 hospitality-services-in-india3949610 hospitality-services-in-india
3949610 hospitality-services-in-indiasamsoddin
 
Photosynthesis In Higher Plants- The Dark Phase
Photosynthesis In Higher Plants- The Dark PhasePhotosynthesis In Higher Plants- The Dark Phase
Photosynthesis In Higher Plants- The Dark PhaseGokulAnishHB
 
математичний диктант. 3 клас
математичний диктант. 3 класматематичний диктант. 3 клас
математичний диктант. 3 класliliya_navidminno
 

Destacado (13)

Kolontitul
KolontitulKolontitul
Kolontitul
 
Team powerpoint 2
Team powerpoint 2Team powerpoint 2
Team powerpoint 2
 
Inglês 5.
Inglês 5.Inglês 5.
Inglês 5.
 
'Existence before essence’ economic and social research powerpoint
'Existence before essence’ economic and social research powerpoint'Existence before essence’ economic and social research powerpoint
'Existence before essence’ economic and social research powerpoint
 
3 slides from efl
3 slides from efl3 slides from efl
3 slides from efl
 
3949610 hospitality-services-in-india
3949610 hospitality-services-in-india3949610 hospitality-services-in-india
3949610 hospitality-services-in-india
 
Dear my teacher
Dear my teacherDear my teacher
Dear my teacher
 
Modernism
ModernismModernism
Modernism
 
Estatistica
EstatisticaEstatistica
Estatistica
 
Material design
Material designMaterial design
Material design
 
Eurovision song contest
Eurovision song contestEurovision song contest
Eurovision song contest
 
Photosynthesis In Higher Plants- The Dark Phase
Photosynthesis In Higher Plants- The Dark PhasePhotosynthesis In Higher Plants- The Dark Phase
Photosynthesis In Higher Plants- The Dark Phase
 
математичний диктант. 3 клас
математичний диктант. 3 класматематичний диктант. 3 клас
математичний диктант. 3 клас
 

Similar a Understanding the History and Types of Hacking

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxMohammedYusuf609377
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 

Similar a Understanding the History and Types of Hacking (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Hackers
HackersHackers
Hackers
 

Último

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Understanding the History and Types of Hacking

  • 1. Ahamad Suhail bin Abdul Malick 4 Kempas Lew Quo Ming Wong Joon Kit Thee Kyle Ler
  • 2. Dictionary – To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up or down ): to hack meat; to hack down trees.  Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.  Dictionary – A person who hacks, to cut, etc.  Computing Dictionary – The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice.
  • 3. History – During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code. Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage.
  • 4. Hack  Crack A hacker is a person who is A cracker is a hacker who uses proficient with computers their proficiency for personal and/or programming to an gains outside of the law. EX: elite level where they know all stealing data, changing bank of the in's and out's of a accounts, distributing viruses system. etc.
  • 5. Black Hats Extra ordinary computing skills but diverted to malicious and destructive purpose (also known as crackers)  White Hats Professional Hackers who uses hacking skills for defensive purposes also known as security professional (also known as hackers)  Grey Hats Practices both offensive and defensive hacking skills
  • 6. I have to use the term hack because everyone understands it that way. Like when you say ‘Oh, my facebook account got hacked!’  The common hacks are E-mail accounts, password steal, taking you social networking passwords to gain knowledge (Stockers!! ) Depending on the kind of hack you've been dealt, the treatment may be as simple as logging in, and changing your settings and password. Or it may entail agonizingly repeated attempts to lock out a persistent hacker, potentially killing off your account altogether. But you should never just give up and ditch the account without trying to deal with it first.
  • 7. 1. If you are able to log in, log in and change your password. Do a anti- virus scan and spyware scan to make sure it’s safe. Then the next time is to change your password regularly. 2. If you can’t log in, make sure your PC is current with OS updates and anti-virus/malware software. Otherwise, if it has been infected by malware that spies on you, it will continue to transmit your info to whichever hacker has infiltrated your accounts. If you aren't completely sure your PC is clean, then don't do any of the following. Any changes you attempt to make could be forwarded on by malware, too. 3. Spammed by your hacked e-mail. (Your scam-savvy friends will recognize bogus messages as spam.) But, if there is a personal appeal for money -- saying you're stuck traveling and need cash, or if malware was attached, you should send word to your contact list to delete those messages ASAP. 4. Set up at least two new e-mail addresses. This is to separate your accounts from important, to not important. So that if your hacked, not all your information is gone.
  • 8. 5. On a secure PC, log into your e-mail and then check whether or not any of the settings have been changed by a hacker. Smart hackers may set your account to notify them of any changes, so that they can go back in and switch things again. Check whether or not a signature has been added, and whether your account has been set to forward e-mail to another address that isn't yours or to run a filter that automatically forwards e- mails or attaches a file. If any of those settings have been altered, delete the new settings. 6. Once you have changed the settings, create a new password, and add your secondary e-mail account as your alternative address.
  • 9. Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between crackers and hackers. Learning skills of hacking is only for the greater good. The End
  • 10. http://compnetworking.about.com/od/networksecurityprivacy/f/what-is- hacking.htm  http://whatishacking.org/  http://whatismyipaddress.com/hacking  http://dictionary.reference.com/browse/hacker?s=t  http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_crackin g  http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy  http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking- politics_b_2512573.html  http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO  http://www.cs.berkeley.edu/~bh/hacker.html  http://www.ehow.com/about_4673738_why-do-people-hack.html  http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to- know/  http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training  http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/