SlideShare a Scribd company logo
1 of 16
Computer Hacking by Rudy  Maquiling “Computer hacking is defined as accessing others account without any approval from the owner. This hacking is illegal actually but why there are still people tempt to do it so. Maybe it because they can gain money from it or to destroy ones reputation.” Udieh
What is Computer Hacking?
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.http://www.wisegeek.com/what-is-computer-hacking.htm
Top 10 Hackers
1. Jonathan James:James rose to fame when he became the first underage to sent to prison for cyber-crime, i.e. hacking. By the time he was being sentenced, he was only 16 years old. To him, his online exploits were simply for fun and not anything else. His main targets were blue chip corporate organizations. He managed to install a backdoor virus in the system of a government agency – DTRA. Using the backdoor, he was able to read sensitive e-mail messages and capture usernames and passwords of the agency employees stored in the database. In addition, he managed to hack into NASA computers and did away with application programs valued at $1.7 million. On realizing this, NASA was compelled to switch off its computer systems costing them approximately $41,000 in the process.
2. Adrian Lamo:Adrian Lamo was made famous after managing to break into various corporate organizations’ computer systems, i.e. New York Times and Microsoft Inc. He was nicknamed “homeless hacker” given that he utilized computers in public libraries and cyber cafes to hack into other networks. Lamo’s work mainly consisted of finding flaws in corporate organizations security systems and alerting them of it. Some of the organizations that Lamo managed to hit were Yahoo, Citigroup, Bank of America and Cingular. What made Lamo’s activities illegal is that he was not hired by any of the companies to find and rectify flaws in their systems. After breaking into New York Times local area network, he was able to include himself as part of the network administrators thus giving him access to personal data, i.e. social security numbers.
3. Kevin Mitnnick:Unlike other hackers, Kevin Mitnick is a self-proclaimed hacker with the nickname “hacker poster boy”. His arrest was highly publicized by the police. Whereas, the media managed to make him as one of the most feared hackers, in actual sense his work was lesser compared to the above two. The Department of Justice has labeled him as one of the most wanted cyber criminals. There are two movies which detail his exploits, i.e. Freedom Downtime and Takedown. His hacking activities begun when he started to exploit the Los Angeles bus punch thus enabling him to get free rides in the buses. He got into trouble with the law when he decided to on a hacking spree from coast to coast. However, his main undoing was when he managed to hack into a fellow hacker computer, Tsutomu Shiomura.
4. Kevin Poulsen:Kevin is also referred to as Dark Dante. He rose to fame for hacking into LA radio’s KIIS-FM telephone lines. This act enabled him to acquire a brand new Porsche in addition to other property. He got into trouble with the law when he decided to hack into the FBI database. As he was being pursued, he got deep in mucky waters by hacking into the federal PCs so as to obtain wiretap information. Unlike other hackers, his hacking activities mainly revolved around hacking into telephone networks. Surprisingly, when his picture was eventually released on television show, the telephone lines crashed. Eventually, he was arrested in a supermarket.
5. Robert Tappan Morris:Morris is famed for developing the Morris worm. It is the first worm which was released on the web. As a result of his actions, he became the first individual to be prosecuted under the 1986 Computer Fraud and Abuse Act. The code used in the worm was written by Morris whilst he was still a student at Cornell. His main intention was to get to know the extent of the internet. However, the worm managed to duplicate itself all over the World Wide Web bring a couple of networks to a halt. To date, the number of computers that were affected by the worm is still not known
6. Stephen Wozniak:Steve Wozniak has been famously referred to as the other Steve of Apple Computers. Steve Woznak is best known for helping Apple Computers to better their products by recognizing flaws and fortifying them.
7. Tim Berners-Lee:Whereas, Tim Berners-Lee is accredited for inventing the World Wide Web, while he was still a studying at the Oxford University, Berners-Lee was found to be hacking together with a friend. Due to his actions, he was banned from using the institutions computers
8. Linus Torvalds:Linus Torvals is known as the godfather of Linux Operating System. While he was still a student, Linus exploited the weaknesses of the operating systems in use and decided to come up with his own.
9. Richard Stallman:Richard Stallman began his hacking activities whilst he was still a student at MIT. His desire was mainly driven by the need to remove restrictions on computer use in the institution laboratory. He would mainly break passwords used on computer systems and send word around that computers were free to use.
10. Tsutomu Shiomura:His rise to fame was the most unfortunate. After Kevin Mitnick broke into his computer, he vowed to assist the authorities in bringing him to justice.  (http://top-10-list.org/2011/07/27/top-10-computer-hackers/)
Disadvantages and Advantages of Computer Hacking
The "advantage" so to speak of computer hacking is that you get programs, etc free. However, IMHO, the disadvantage is that since it is illegal (in the United States) if you are caught, then you can end up in prison with some pretty hefty fines. For example, if one hacks Microsoft Vista (as an example) and Microsoft discovers it Microsoft will press charges. I believe the prison term is up to 10 years, while the fine is anywhere from $10K to $100K.  http://www.blurtit.com/q111250.html

More Related Content

What's hot

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
 

What's hot (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Hacking
HackingHacking
Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 

Similar to Computer Hacking by Rudy

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

Similar to Computer Hacking by Rudy (20)

Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Computer Hacking by Rudy

  • 1. Computer Hacking by Rudy Maquiling “Computer hacking is defined as accessing others account without any approval from the owner. This hacking is illegal actually but why there are still people tempt to do it so. Maybe it because they can gain money from it or to destroy ones reputation.” Udieh
  • 2. What is Computer Hacking?
  • 3. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.http://www.wisegeek.com/what-is-computer-hacking.htm
  • 5. 1. Jonathan James:James rose to fame when he became the first underage to sent to prison for cyber-crime, i.e. hacking. By the time he was being sentenced, he was only 16 years old. To him, his online exploits were simply for fun and not anything else. His main targets were blue chip corporate organizations. He managed to install a backdoor virus in the system of a government agency – DTRA. Using the backdoor, he was able to read sensitive e-mail messages and capture usernames and passwords of the agency employees stored in the database. In addition, he managed to hack into NASA computers and did away with application programs valued at $1.7 million. On realizing this, NASA was compelled to switch off its computer systems costing them approximately $41,000 in the process.
  • 6. 2. Adrian Lamo:Adrian Lamo was made famous after managing to break into various corporate organizations’ computer systems, i.e. New York Times and Microsoft Inc. He was nicknamed “homeless hacker” given that he utilized computers in public libraries and cyber cafes to hack into other networks. Lamo’s work mainly consisted of finding flaws in corporate organizations security systems and alerting them of it. Some of the organizations that Lamo managed to hit were Yahoo, Citigroup, Bank of America and Cingular. What made Lamo’s activities illegal is that he was not hired by any of the companies to find and rectify flaws in their systems. After breaking into New York Times local area network, he was able to include himself as part of the network administrators thus giving him access to personal data, i.e. social security numbers.
  • 7. 3. Kevin Mitnnick:Unlike other hackers, Kevin Mitnick is a self-proclaimed hacker with the nickname “hacker poster boy”. His arrest was highly publicized by the police. Whereas, the media managed to make him as one of the most feared hackers, in actual sense his work was lesser compared to the above two. The Department of Justice has labeled him as one of the most wanted cyber criminals. There are two movies which detail his exploits, i.e. Freedom Downtime and Takedown. His hacking activities begun when he started to exploit the Los Angeles bus punch thus enabling him to get free rides in the buses. He got into trouble with the law when he decided to on a hacking spree from coast to coast. However, his main undoing was when he managed to hack into a fellow hacker computer, Tsutomu Shiomura.
  • 8. 4. Kevin Poulsen:Kevin is also referred to as Dark Dante. He rose to fame for hacking into LA radio’s KIIS-FM telephone lines. This act enabled him to acquire a brand new Porsche in addition to other property. He got into trouble with the law when he decided to hack into the FBI database. As he was being pursued, he got deep in mucky waters by hacking into the federal PCs so as to obtain wiretap information. Unlike other hackers, his hacking activities mainly revolved around hacking into telephone networks. Surprisingly, when his picture was eventually released on television show, the telephone lines crashed. Eventually, he was arrested in a supermarket.
  • 9. 5. Robert Tappan Morris:Morris is famed for developing the Morris worm. It is the first worm which was released on the web. As a result of his actions, he became the first individual to be prosecuted under the 1986 Computer Fraud and Abuse Act. The code used in the worm was written by Morris whilst he was still a student at Cornell. His main intention was to get to know the extent of the internet. However, the worm managed to duplicate itself all over the World Wide Web bring a couple of networks to a halt. To date, the number of computers that were affected by the worm is still not known
  • 10. 6. Stephen Wozniak:Steve Wozniak has been famously referred to as the other Steve of Apple Computers. Steve Woznak is best known for helping Apple Computers to better their products by recognizing flaws and fortifying them.
  • 11. 7. Tim Berners-Lee:Whereas, Tim Berners-Lee is accredited for inventing the World Wide Web, while he was still a studying at the Oxford University, Berners-Lee was found to be hacking together with a friend. Due to his actions, he was banned from using the institutions computers
  • 12. 8. Linus Torvalds:Linus Torvals is known as the godfather of Linux Operating System. While he was still a student, Linus exploited the weaknesses of the operating systems in use and decided to come up with his own.
  • 13. 9. Richard Stallman:Richard Stallman began his hacking activities whilst he was still a student at MIT. His desire was mainly driven by the need to remove restrictions on computer use in the institution laboratory. He would mainly break passwords used on computer systems and send word around that computers were free to use.
  • 14. 10. Tsutomu Shiomura:His rise to fame was the most unfortunate. After Kevin Mitnick broke into his computer, he vowed to assist the authorities in bringing him to justice. (http://top-10-list.org/2011/07/27/top-10-computer-hackers/)
  • 15. Disadvantages and Advantages of Computer Hacking
  • 16. The "advantage" so to speak of computer hacking is that you get programs, etc free. However, IMHO, the disadvantage is that since it is illegal (in the United States) if you are caught, then you can end up in prison with some pretty hefty fines. For example, if one hacks Microsoft Vista (as an example) and Microsoft discovers it Microsoft will press charges. I believe the prison term is up to 10 years, while the fine is anywhere from $10K to $100K. http://www.blurtit.com/q111250.html