SlideShare una empresa de Scribd logo
1 de 16
Hacker !
Made by : Perfect idea
Hacker
 Programmer who have special skills in the field of
computer and information security.
Hacking
 Hacking means that a set of clever programmers who
challenge the different systems and try to storm it , and not
necessarily to commit a crime , but their success in
penetration is considered a success for their abilities and
skills. However, the law considered outsiders who enter the
default place should not be in it. And to do this optional
process in which the programmer tested his abilities without
knowing his real name or declare himself. But some of them
are exploited by criminal who clear information and others
are commercially exploited for the purposes of spying and to
steal some money.
 Many companies like Microsoft need to protect their
systems so they found the best method to protect their
system is to hire hacker with high salaries their mission
is attempt to penetrate their different systems and find
the points of weakness..
The classification of hackers morally
White hat hacker
Black hat hacker
Grey hat hacker
Trojan horse
 Hacker have many attack techniques but the most
common technique is by using Trojan horses and this
technique mostly used when hacker need to storm a
personal computer .
If you will download a program but this program has virus
the virus will open a hidden secret hole through your
computer firewall when the virus reached to your computer
the virus will delete any information or it will harm the host
computer system there is a rate 50% if you will scan your
computer by using antivirus when you have many viruses in
your computer you will find Trojan horse virus at your
computer .
Sony attacked by North Korea
 Few months ago, hacker sneaked to the computer network of
Sony Pictures Entertainment ,the attackers stole a large
number of secret documents, which is currently being loaded
(in the first place by journalists) from file-sharing networks
It is believed widely hacker to
be supported by the
government of North Korea,
which is angry at Sony to
produce the interview, a film
which describe the
assassination of North Korean
leader Kim Jong-un. the threat
of terrorism against the movie
theaters offer caused Sony to
cancel the planned release of
her Christmas Day holiday
On Monday, November 24th
Sony discovered that their
own company's network
has been hacked. The
attackers took terabytes of
data, delete the original
copies of Sony computers,
leaving the threat to release
the information messages if
Sony did not respond to the
demands of the attackers.
Lizard squad
 Lizard squad is a black hat hacking group
They attacked facebook before
but facebook denied it was
hacked and said that the
access issues earlier were "not
the result of a third party
attack". so Lizard Squad stated
that it was responsible for the
site, and Instagram going
down
Lizard Squad also claimed to be behind a series hacks of
Microsoft and Sony gaming networks over Christmas as
well. lizard squad made their own channel in Sony and
Microsoft servers
A hacker claiming to be from Lizard Squad - a 22-year-old
calling himself Member Two - said the group had hacked
the sites "because we can".
He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you not
think they should be able to prevent such an attack?
he told BBC:
The name Lizard Squad
is generally used as a
signature on a site that
the group has taken
responsibility for hacking
and they left their
signature after hacking
the websites or software

Más contenido relacionado

La actualidad más candente

What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
lmadison10
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 
Web defacement
Web defacementWeb defacement
Web defacement
student
 

La actualidad más candente (20)

Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Hacking
HackingHacking
Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
C 7
C 7C 7
C 7
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 

Destacado (13)

From Hacker to Programmer (w/ Webpack, Babel and React)
From Hacker to Programmer (w/ Webpack, Babel and React)From Hacker to Programmer (w/ Webpack, Babel and React)
From Hacker to Programmer (w/ Webpack, Babel and React)
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers y Crackers
Hackers y CrackersHackers y Crackers
Hackers y Crackers
 
Presentacion hackers
Presentacion hackersPresentacion hackers
Presentacion hackers
 
Hacking For Innovation Delhi
Hacking For Innovation DelhiHacking For Innovation Delhi
Hacking For Innovation Delhi
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Similar a Hacker !

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Similar a Hacker ! (20)

Presentation
PresentationPresentation
Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
File000145
File000145File000145
File000145
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Security threats
Security threatsSecurity threats
Security threats
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Hacking
HackingHacking
Hacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Hacker !

  • 1. Hacker ! Made by : Perfect idea
  • 2. Hacker  Programmer who have special skills in the field of computer and information security.
  • 3. Hacking  Hacking means that a set of clever programmers who challenge the different systems and try to storm it , and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills. However, the law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 4.  Many companies like Microsoft need to protect their systems so they found the best method to protect their system is to hire hacker with high salaries their mission is attempt to penetrate their different systems and find the points of weakness..
  • 5. The classification of hackers morally White hat hacker Black hat hacker Grey hat hacker
  • 6. Trojan horse  Hacker have many attack techniques but the most common technique is by using Trojan horses and this technique mostly used when hacker need to storm a personal computer .
  • 7. If you will download a program but this program has virus the virus will open a hidden secret hole through your computer firewall when the virus reached to your computer the virus will delete any information or it will harm the host computer system there is a rate 50% if you will scan your computer by using antivirus when you have many viruses in your computer you will find Trojan horse virus at your computer .
  • 8. Sony attacked by North Korea  Few months ago, hacker sneaked to the computer network of Sony Pictures Entertainment ,the attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks
  • 9. It is believed widely hacker to be supported by the government of North Korea, which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim Jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday
  • 10. On Monday, November 24th Sony discovered that their own company's network has been hacked. The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the attackers.
  • 11. Lizard squad  Lizard squad is a black hat hacking group
  • 12. They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack". so Lizard Squad stated that it was responsible for the site, and Instagram going down
  • 13. Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well. lizard squad made their own channel in Sony and Microsoft servers
  • 14. A hacker claiming to be from Lizard Squad - a 22-year-old calling himself Member Two - said the group had hacked the sites "because we can". He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack? he told BBC:
  • 15.
  • 16. The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software