SlideShare a Scribd company logo
HACKING  by HARSHAN
HACKING  by HARSHAN
THIS
PPT IS
BROUGHT TOO
U BY:
Harshan of class :11 on the
topic of HACKING
HACKING  by HARSHAN
HACKING  by HARSHAN
WHAT IS HACKING ?
The process of attempting to gain or successfully
gaining Unauthorised access to the computer
resources is called As HACKING
HACKING  by HARSHAN
HACKING  by HARSHAN
In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
The term hacker is reclaimed by computer
programmers who argue that someone breaking
into computers is better called a cracker.
Who is a hacker?
HACKING  by HARSHAN
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
WHY DO HACKERS HACK ?
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking
Hacking
 Computer Hacking
TYPES OF HACKING
BUT I HAVE CHOOSED THE
TOPIC:
GAME
HACKING
HACKING  by HARSHAN
VIJAY KUMAR
HARSHAN
NIVAS
KISHORE
LOGESH
HACKING  by HARSHAN
HACKING  by HARSHAN
HACKING  by HARSHAN
FEW SOFTWARES WHICH HELP IN
GAME HACKING ARE:
1. Lucky patcher
2. Aptoide
3. ES file explorer
4. Cheat engine
5. Apk mod files
HACKING  by HARSHAN
Can be used to recover lost information where the computer password has been
lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
 Criminals can use it to their advantage.
 It can harm someone's privacy
 It's Illegal
ADVANTAGES:
DIS ADVANTAGES:
Keep your password protected. Write your
password should be with combination of
characters, digits, special symbols. Do not
respond to feck on fishing email. when you
are doing any online transection always keep
watch on site whether the protocol of site is
https & whether there is a lock symbol .
CONCLUSION:
HACKING  by HARSHAN
HACKING  by HARSHAN

More Related Content

PPTX
Web defacement
PPTX
Hacking
PPTX
Cybersecurity Essentials - Part 1
PPT
Hacking
PPT
Ict H A C K I N G
PPTX
Seminar On Trojan Horse
PPT
Trojan backdoors
Web defacement
Hacking
Cybersecurity Essentials - Part 1
Hacking
Ict H A C K I N G
Seminar On Trojan Horse
Trojan backdoors

Viewers also liked (19)

PDF
SPRSWAduckhuntingstudyprogressreportApril2012
PDF
The Independent Magazine's media kit 2015
PDF
Information literacy @ CPUT
PPTX
Collaboration friday
PPT
Social media
PPT
Cataratas del Niagara en Invierno
DOCX
Articulação de conteúdos 7.º3 2.ºperíodo (1)
PDF
004c - Mobile Day Colombia - What Do Brands Want in a Mobile? - David Reina -...
PDF
Daily Newsletter: 17th June, 2011
PDF
Daily Newsletter: 13th July, 2011
PDF
Uwodzicielska sprzedaż Rafał Graj
PPTX
Some portfolio of my web development projects
PDF
Daily Newsletter - 20 12-2012
PDF
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
PDF
First Line Of Defense
PPTX
Leveraging Social Media Marketing Trends in the Apartment Industry
DOC
Κοβάτση-Το ισοπροστάνιο ως δείκτης οξειδωτικού στρ
PPTX
Wind Turbine Competition 2011
SPRSWAduckhuntingstudyprogressreportApril2012
The Independent Magazine's media kit 2015
Information literacy @ CPUT
Collaboration friday
Social media
Cataratas del Niagara en Invierno
Articulação de conteúdos 7.º3 2.ºperíodo (1)
004c - Mobile Day Colombia - What Do Brands Want in a Mobile? - David Reina -...
Daily Newsletter: 17th June, 2011
Daily Newsletter: 13th July, 2011
Uwodzicielska sprzedaż Rafał Graj
Some portfolio of my web development projects
Daily Newsletter - 20 12-2012
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
First Line Of Defense
Leveraging Social Media Marketing Trends in the Apartment Industry
Κοβάτση-Το ισοπροστάνιο ως δείκτης οξειδωτικού στρ
Wind Turbine Competition 2011

Similar to HACKING by HARSHAN (20)

PPTX
PPTX
Hacking
PPTX
Hacking & its types
PPTX
Hacking
PPTX
Hacking & Hackers
PPTX
Hacking and its types
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking (basic)
PPTX
Hacking and its types V2
PPTX
HACKING
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Hacking final
PPTX
Hacking
PPTX
Hacking
PPT
Hacking
PPTX
Hacking (1)
Hacking
Hacking & its types
Hacking
Hacking & Hackers
Hacking and its types
Hacking
Hacking
Hacking
Hacking (basic)
Hacking and its types V2
HACKING
ethicalhacking1 final.pdf
Ethical hacking Presentation
Hacking final
Hacking
Hacking
Hacking
Hacking (1)

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
PPH.pptx obstetrics and gynecology in nursing
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Microbial disease of the cardiovascular and lymphatic systems
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Renaissance Architecture: A Journey from Faith to Humanism

HACKING by HARSHAN

  • 3. THIS PPT IS BROUGHT TOO U BY: Harshan of class :11 on the topic of HACKING
  • 6. WHAT IS HACKING ? The process of attempting to gain or successfully gaining Unauthorised access to the computer resources is called As HACKING
  • 9. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker. Who is a hacker?
  • 11. Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network during the war. WHY DO HACKERS HACK ?
  • 12. Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking TYPES OF HACKING
  • 13. BUT I HAVE CHOOSED THE TOPIC: GAME HACKING
  • 20. FEW SOFTWARES WHICH HELP IN GAME HACKING ARE: 1. Lucky patcher 2. Aptoide 3. ES file explorer 4. Cheat engine 5. Apk mod files
  • 22. Can be used to recover lost information where the computer password has been lost. Teaches you that no technology is 100% secure. To test how good security is on your own network. They call it white hat computer hacking.  Criminals can use it to their advantage.  It can harm someone's privacy  It's Illegal ADVANTAGES: DIS ADVANTAGES:
  • 23. Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol . CONCLUSION: