SlideShare a Scribd company logo
HACKING ! Present By : Afi ezairy bin zainudin
what is hacker??? * Hacker  is a term applied often to  computer software  or  computer hardware   programmers * Hacker  is also someone who modifies electronics
Categories of hacker ! * Hacker: Highly skilled programmer * Hacker: Computer and network security expert * Hacker: Hardware modifier
Hacker: Highly skilled programmer * This mainly positive usage of  hacker  refers to one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly.
Hacker:  Computer and  network security expert * Hacker  is one who specializes in working with computers and  network  systems  Confidentiality, Integrity, and Access .
Hacker:  Hardware modifier * Hacker is someone who modifies electronics, for  example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance.
Ways  to Minimize  Potential for Hacking! in school * Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.  * Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.
Hacking Tools  and Denial of Service Basics  1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans  6. Viruses
Hacking Tools  and Denial of Service Basics  1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans  6. Viruses
Hacking software!
conclusion Hacktivism is against the law and we should not practic the hacktivism

More Related Content

PPTX
What is network security and Types
PPTX
NETWORK SECURITY AND VIRUSES
PPT
Network Security Chapter 7
PDF
Network Security Presentation
PPTX
Protection from hacking attacks
PPTX
23 network security threats pkg
PPTX
Cyber safety
What is network security and Types
NETWORK SECURITY AND VIRUSES
Network Security Chapter 7
Network Security Presentation
Protection from hacking attacks
23 network security threats pkg
Cyber safety

What's hot (20)

PPTX
Computer network
PPT
Internet Security
PDF
Network security chapter 1,2
PDF
Computer Security
PPTX
Cyber Crime
PPTX
Computer security
PDF
Ch 3: Network and Computer Attacks
PPTX
Cyber security
PPT
SYSTEM SECURITY - Chapter 1 introduction
PPTX
cyber security
PPT
1 security goals
PPTX
Ethical hacking presentation
PPTX
PPT
Tutorial 9 - Security on the Internet
 
DOCX
Markbrakent war
PPTX
Network security threats and solutions
PPTX
IT Security for Small Business
PPTX
Cyber security
PPTX
Viruses, worms, and trojan horses
PPTX
Hackers
Computer network
Internet Security
Network security chapter 1,2
Computer Security
Cyber Crime
Computer security
Ch 3: Network and Computer Attacks
Cyber security
SYSTEM SECURITY - Chapter 1 introduction
cyber security
1 security goals
Ethical hacking presentation
Tutorial 9 - Security on the Internet
 
Markbrakent war
Network security threats and solutions
IT Security for Small Business
Cyber security
Viruses, worms, and trojan horses
Hackers

Viewers also liked (20)

PDF
Full Buku sakti belajar hacker
PDF
CARA BOBOL ROUTER WIFI ID
PDF
Buku Sakti Hacker
PDF
OPSEC for hackers (bahasa indonesia)
PPTX
Menampilkan SSID yang tersembunyi
PDF
10 Langkah Awal Menjadi Seorang Ahli Komputer
PDF
On Cyber
PPTX
Cara menampilkan hidden ssid
DOCX
12 jenis kerusakan laptop dan cara memperbaikinya
PPTX
Cara mengetahui ssid yang hiddden fadril
PPTX
Cara mengkoneksikan wireless ke hidden ssid di windows
PDF
Buku bahasa pemrograman lengkap
PPT
An Underground education
PDF
Hack Harvard 2012: Open Source is Big Business
PDF
Hack & Fix, Hands on ColdFusion Security Training
PDF
Buku sakti cyber security (bestpoin)
PDF
Cara memasukan file dari slideshare ke blog
PDF
Perintah dasarlinux norestriction
PDF
Mengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntu
DOCX
Cara share printer dalam network pada windows 7
Full Buku sakti belajar hacker
CARA BOBOL ROUTER WIFI ID
Buku Sakti Hacker
OPSEC for hackers (bahasa indonesia)
Menampilkan SSID yang tersembunyi
10 Langkah Awal Menjadi Seorang Ahli Komputer
On Cyber
Cara menampilkan hidden ssid
12 jenis kerusakan laptop dan cara memperbaikinya
Cara mengetahui ssid yang hiddden fadril
Cara mengkoneksikan wireless ke hidden ssid di windows
Buku bahasa pemrograman lengkap
An Underground education
Hack Harvard 2012: Open Source is Big Business
Hack & Fix, Hands on ColdFusion Security Training
Buku sakti cyber security (bestpoin)
Cara memasukan file dari slideshare ke blog
Perintah dasarlinux norestriction
Mengembalikan data yang terhapus atau rusak pada hardisk menggunakan ubuntu
Cara share printer dalam network pada windows 7

Similar to Hacker (20)

PPTX
Ehical Hacking: Unit no. 1 Information and Network Security
PPTX
Cyber Crime And Security
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Ethical Hacking justvamshi .pptx
PPT
Introduction to ethical hacking
PPTX
Cyber crime
PPTX
Computer Security risks Shelly
PDF
Ethical hacking
PPTX
Computer , Internet and physical security.
PDF
Types-of-Cyber-Attacks-E-book.pdf
PPT
Types of attack -Part3 (Malware Part -2)
PPTX
Hacking intro
PDF
Introduction of hacking and cracking
PPTX
Cyber Crime
PPT
Types of attack -Part2
PDF
Network Security_4th Module_Dr. Shivashankar
PPTX
Cyber Security Fundamentals
PDF
Introduction to Ethical Hacking pdf file
PPT
Complete notes security
Ehical Hacking: Unit no. 1 Information and Network Security
Cyber Crime And Security
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Ethical Hacking justvamshi .pptx
Introduction to ethical hacking
Cyber crime
Computer Security risks Shelly
Ethical hacking
Computer , Internet and physical security.
Types-of-Cyber-Attacks-E-book.pdf
Types of attack -Part3 (Malware Part -2)
Hacking intro
Introduction of hacking and cracking
Cyber Crime
Types of attack -Part2
Network Security_4th Module_Dr. Shivashankar
Cyber Security Fundamentals
Introduction to Ethical Hacking pdf file
Complete notes security

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx

Hacker

  • 1. HACKING ! Present By : Afi ezairy bin zainudin
  • 2. what is hacker??? * Hacker is a term applied often to computer software or computer hardware programmers * Hacker is also someone who modifies electronics
  • 3. Categories of hacker ! * Hacker: Highly skilled programmer * Hacker: Computer and network security expert * Hacker: Hardware modifier
  • 4. Hacker: Highly skilled programmer * This mainly positive usage of hacker refers to one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly.
  • 5. Hacker: Computer and network security expert * Hacker is one who specializes in working with computers and network systems Confidentiality, Integrity, and Access .
  • 6. Hacker: Hardware modifier * Hacker is someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance.
  • 7. Ways to Minimize Potential for Hacking! in school * Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff. * Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.
  • 8. Hacking Tools and Denial of Service Basics 1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans 6. Viruses
  • 9. Hacking Tools and Denial of Service Basics 1. Denial of service attacks (DoS) 2. Distributed denial of service attacks 3. Ping of death attacks: The Ping of Death is a large ICMP (Internet Control Message Protocol) 4. Email bombing 5. Trojans 6. Viruses
  • 11. conclusion Hacktivism is against the law and we should not practic the hacktivism