Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Hacking & its types

242.916 visualizaciones

Publicado el

I think you will find useful.

  • There are over 16,000 woodworking plans that comes with step-by-step instructions and detailed photos, Click here to take a look ➤➤ http://tinyurl.com/y3hc8gpw
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Get access to 16,000 woodworking plans, Download 50 FREE Plans... ♣♣♣ http://tinyurl.com/yy9yh8fu
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • I met this wonderful hacker that offers hacking services. Some of their services are: - Get any password from any Email Address. - Get any password from any Face-book, Twitter or Instagram account. - Cell phone hacking (whatsapp, viber, line, wechat,wire wire transfer Western union/money gram etc) - Grades changes (institutes and universities) Blank ATM - Websites hacking, pen-testing. - IP addresses and people tracking. - Hacking courses and classes. their services are the best on the market and 100% secure and discreet guaranteed. Just write them and ask for your desired service: EMAIL ADDRESS: Rodhack003 AT GMAIL DOT COM or text +1 719 629 5609
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • An organization dedicated to hacking services, helping people recover their stolen coins, binary options schemes, stolen bitcoin, litecoin and so on...look onto DarkWeb. They came through for me in great time. visit darkwebsolutions dot co for more on this
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Nice !! Download 100 % Free Ebooks, PPts, Study Notes, Novels, etc @ https://www.ThesisScientist.com
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí

Hacking & its types

  1. 1. Hacking
  2. 2. Contents              History of Hacking What is Hacking? Who is Hacker? Famous hackers in history Why do Hackers hack? Types of Hacking How to give a password to account What should do after hacked How to secure our data Advantages of Hacking Disadvantages of Hacking Conclusion References
  3. 3. History of Hacking  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge .  Boredom is never an object of challenge for the hacker
  4. 4. What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  5. 5. Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  6. 6. Famous Hackers in History Ian Murphy Kevin Mitnick Mark Abene Johan Helsinguis LinusTorvalds Robert Morris
  7. 7. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify  Steal many people their thought. important information.  Destroy enemy’s computer network during the war.
  8. 8. Types of Hacking  Website Hacking  Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  9. 9. Website Hacking  Hacking a website means taking control from the website owner to a person who hacks the website.
  10. 10. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  11. 11. Ethical Hacking  Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  12. 12. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  13. 13. Password Hacking  Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  14. 14. Online Banking Hacking  Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  15. 15. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  16. 16. What should do after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs   Connect the system to the network It can be good to call the police
  17. 17. How to give a password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  18. 18. How to secure our data 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z + -> t c -> [ 9 -> g f -> ph 0 -> o ph -> f $ -> s x -> ck | -> i or l ck -> x
  19. 19. How to secure our data  Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  20. 20. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  21. 21. Disadvantages of Hacking  Criminals  It can use it to their advantage. can harm someone's privacy  It's Illegal
  22. 22. Conclusion  Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .
  23. 23. References  www.wikipedia.org/wiki/Hacker  www.wikipedia.org/wiki/Hacking
  24. 24. Thank You

×