SlideShare una empresa de Scribd logo
1 de 13
TOPIC : HACKER Prepared by :  Nor Izyani Bt. Ahmad Zaki
[object Object],[object Object],[object Object],CONTENTS
[object Object],DEFINITION OF HACKER
[object Object],DEFINITION OF HACKER
[object Object],DEFINITION OF HACKER
After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s.  Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement. DEFINITION OF HACKER
EXAMPLE OF HACKER ,[object Object],[object Object]
Adrian Lamo is best known for hacking into the New York Times. He is sometimes call the “homeless hacker” because he spent parts of his travels squatting in abandoned buildings and travelling to Internet cafes, libraries and universities.Adrian Lamo pleads guilty on January 9, 2004. JKW  EXAMPLE OF HACKER
Kevin Poulsen has not only used his “hacking skills”  to win cars but also to get the names of undercover businesses operated by the FBI. Also, at the age of seventeen, he used his TRS-80 to hack the US department of defense’s Arpanet.  Finally Poulsen was arrested after hacking  Microsoft. KLW  EXAMPLE OF HACKER
[object Object],EXAMPLE OF HACKER
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EXAMPLE OF HACKER
[object Object],WAYS TO AVOID HACKERS
[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hacking
HackingHacking
Hacking
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
185
185185
185
 

Destacado

Top 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesTop 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesDave McClure
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T Omari89
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3safa
 
Blog Google Attention 200512
Blog Google Attention 200512Blog Google Attention 200512
Blog Google Attention 200512osamuh
 
Off the beaten track...
Off the beaten track...Off the beaten track...
Off the beaten track...Silversprite
 
Pazinterior Ri
Pazinterior RiPazinterior Ri
Pazinterior Rimarcelino4
 
Retriever Example
Retriever Example Retriever Example
Retriever Example marrowmonkey
 
Petr Aciudadrosa[1]
Petr Aciudadrosa[1]Petr Aciudadrosa[1]
Petr Aciudadrosa[1]marcelino4
 
Cevpresentaciontrigliceridos
CevpresentaciontrigliceridosCevpresentaciontrigliceridos
Cevpresentaciontrigliceridosrosaclara18
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A Nnasya
 
F O T O S H E R M O S A S
F O T O S H E R M O S A SF O T O S H E R M O S A S
F O T O S H E R M O S A Srosaclara18
 
Sinceridad matrimonial
Sinceridad matrimonialSinceridad matrimonial
Sinceridad matrimonialchamato
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T Omari89
 

Destacado (20)

Avmx714
Avmx714Avmx714
Avmx714
 
CL presentation
CL presentationCL presentation
CL presentation
 
Hayninos
HayninosHayninos
Hayninos
 
Top 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical RevolutionariesTop 10 Rules for Vertical Revolutionaries
Top 10 Rules for Vertical Revolutionaries
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T O
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Blog Google Attention 200512
Blog Google Attention 200512Blog Google Attention 200512
Blog Google Attention 200512
 
Off the beaten track...
Off the beaten track...Off the beaten track...
Off the beaten track...
 
Pazinterior Ri
Pazinterior RiPazinterior Ri
Pazinterior Ri
 
Retriever Example
Retriever Example Retriever Example
Retriever Example
 
Divertimento
DivertimentoDivertimento
Divertimento
 
Petr Aciudadrosa[1]
Petr Aciudadrosa[1]Petr Aciudadrosa[1]
Petr Aciudadrosa[1]
 
Cevpresentaciontrigliceridos
CevpresentaciontrigliceridosCevpresentaciontrigliceridos
Cevpresentaciontrigliceridos
 
Budita
BuditaBudita
Budita
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Dominoe
DominoeDominoe
Dominoe
 
F O T O S H E R M O S A S
F O T O S H E R M O S A SF O T O S H E R M O S A S
F O T O S H E R M O S A S
 
Sinceridad matrimonial
Sinceridad matrimonialSinceridad matrimonial
Sinceridad matrimonial
 
E R N E S T O SÁ B A T O
E R N E S T O  SÁ B A T OE R N E S T O  SÁ B A T O
E R N E S T O SÁ B A T O
 

Similar a Hackers Izyani

Similar a Hackers Izyani (20)

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Hackers Izyani

  • 1. TOPIC : HACKER Prepared by : Nor Izyani Bt. Ahmad Zaki
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. After 1980 the subculture coalesced with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the free software movement and the open source movement. DEFINITION OF HACKER
  • 7.
  • 8. Adrian Lamo is best known for hacking into the New York Times. He is sometimes call the “homeless hacker” because he spent parts of his travels squatting in abandoned buildings and travelling to Internet cafes, libraries and universities.Adrian Lamo pleads guilty on January 9, 2004. JKW EXAMPLE OF HACKER
  • 9. Kevin Poulsen has not only used his “hacking skills” to win cars but also to get the names of undercover businesses operated by the FBI. Also, at the age of seventeen, he used his TRS-80 to hack the US department of defense’s Arpanet. Finally Poulsen was arrested after hacking Microsoft. KLW EXAMPLE OF HACKER
  • 10.
  • 11.
  • 12.
  • 13.