SlideShare a Scribd company logo
Hacking
How hacking started Started from hackers, a person who uses computers as objects of study rather than as instruments that facilitate work Usually means a person who focuses on breaking security mechanisms of computer and network systems by the mass media Gary McKinnon, Vladimir Lavin and David Smith are in the top ten list of the world’s most legendary hackers in the hacker’s universe
Types Of Hackers There many types of hackers. One of them is academic hackers An academic hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness The difference between academic and computer security hackers is that the former focus on creating new and improving existing infrastructure Another type of hacker is a hobby hacker, who relates to a hobbyist home computing of the early 80s They focus mainly on commercial computer and video games, software cracking and exceptional computer programming, but also to the modification of computer hardware and other electronic devices
Effects Of Hacking For some, hacking may just be a hobby to see how many computers or networks they can crack. For others, there is malicious intent behind their escapades, like stealing They can steal anything, from client or customer information or other business data, credit card details and social security numbers, for identity fraud or theft and a lot more. Hackers can also send trojan horses, worms and many more types of malicious codes.
Avoid Hackers We must take safety measures to avoid our computer from being hacked One of the many ways is to install a firewall. Firewalls prevent access to our computer from the outside, so that only those that we give permission to can connect to our system from the Internet Another way is to install an antivirus. All our computers should be running the most recent version of an anti-virus program. The program should be set for automatic updates to ensure the latest virus, worm and Trojan definitions.
Thank You .. Prepared by Armand Hamid

More Related Content

PPT
Brief Introduction of Hackers
PPTX
Cyber security
PPTX
Introduction to hacking
PPT
TYPES OF HACKING
PPTX
Cyber security
PPTX
CYBER SECURITY
PPTX
Cyber security
PDF
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Brief Introduction of Hackers
Cyber security
Introduction to hacking
TYPES OF HACKING
Cyber security
CYBER SECURITY
Cyber security
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre

What's hot (18)

DOCX
Cyer security
PPTX
CYBER SECURITY
PPT
PDF
The History of Hacking in 5minutes (for dummie)
PPTX
Ppt on cyber security
PPTX
Cyber security Information security
PPTX
Cyber security
PPTX
cyber security,need,security problem and types of cyber security
PPTX
Cyber attack
PPT
1 security goals
PPTX
Latest Top 10 Types of Cyber Security Threats
PPTX
Cyber security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber security
PPTX
Cyber Security PPT
PPTX
Cyber Security Awareness
PPTX
Computer & internet Security
PPTX
Cyber security
Cyer security
CYBER SECURITY
The History of Hacking in 5minutes (for dummie)
Ppt on cyber security
Cyber security Information security
Cyber security
cyber security,need,security problem and types of cyber security
Cyber attack
1 security goals
Latest Top 10 Types of Cyber Security Threats
Cyber security
Network security (vulnerabilities, threats, and attacks)
Cyber security
Cyber Security PPT
Cyber Security Awareness
Computer & internet Security
Cyber security

Viewers also liked (19)

PDF
Earthline Bus. Card
PDF
LS pipe blast ebrochure 0613 rev 2
PDF
Vudvr16 mp4
PPT
Llinkedin 3 Optimització Perfil
DOC
τι μας ταΐζουν;
PPTX
Blog
PPT
Bichoshoja
DOCX
Essay Vera van Berlo
DOC
ζεστά και κρύα
DOCX
Las redes sociales
PDF
PL 2957_15 dispõe sobre a criação de programa municipal de saúde vocal e audi...
PPTX
Solankippt4 (2)
PDF
AdvoCare How to Pin Silver
PPTX
тина кароль
PDF
Webブラウザで使えるいろんな処理系
DOC
полугодие 10 11
DOC
Curriculo mari[1]
PDF
Tema de exposición 1
DOCX
Social Cost and Benefit Analyses of ITE Project Report
Earthline Bus. Card
LS pipe blast ebrochure 0613 rev 2
Vudvr16 mp4
Llinkedin 3 Optimització Perfil
τι μας ταΐζουν;
Blog
Bichoshoja
Essay Vera van Berlo
ζεστά και κρύα
Las redes sociales
PL 2957_15 dispõe sobre a criação de programa municipal de saúde vocal e audi...
Solankippt4 (2)
AdvoCare How to Pin Silver
тина кароль
Webブラウザで使えるいろんな処理系
полугодие 10 11
Curriculo mari[1]
Tema de exposición 1
Social Cost and Benefit Analyses of ITE Project Report

Similar to Armand Hacking (20)

PPTX
Β. Hucking
PPT
hacking
PPT
Computer hacking
PPT
Hacking
PPTX
Introduction to Ethical Hacking (Basics)
PPT
Ethical hacking
PPTX
Computer Hacking - An Introduction
PPTX
Hacking presentation or hacker control the world.pptx
PPTX
Hacking
PPTX
PDF
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PPT
Hacking And Its Prevention
PPT
Ethical Hacking
PPT
Introduction to hackers
PPTX
Hacking (1)
PPT
Course on Ehtical Hacking - Introduction
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking
Β. Hucking
hacking
Computer hacking
Hacking
Introduction to Ethical Hacking (Basics)
Ethical hacking
Computer Hacking - An Introduction
Hacking presentation or hacker control the world.pptx
Hacking
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking And Its Prevention
Ethical Hacking
Introduction to hackers
Hacking (1)
Course on Ehtical Hacking - Introduction
Hacking
Hacking
Hacking

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Group 1 Presentation -Planning and Decision Making .pptx
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
A comparative analysis of optical character recognition models for extracting...
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Armand Hacking

  • 2. How hacking started Started from hackers, a person who uses computers as objects of study rather than as instruments that facilitate work Usually means a person who focuses on breaking security mechanisms of computer and network systems by the mass media Gary McKinnon, Vladimir Lavin and David Smith are in the top ten list of the world’s most legendary hackers in the hacker’s universe
  • 3. Types Of Hackers There many types of hackers. One of them is academic hackers An academic hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness The difference between academic and computer security hackers is that the former focus on creating new and improving existing infrastructure Another type of hacker is a hobby hacker, who relates to a hobbyist home computing of the early 80s They focus mainly on commercial computer and video games, software cracking and exceptional computer programming, but also to the modification of computer hardware and other electronic devices
  • 4. Effects Of Hacking For some, hacking may just be a hobby to see how many computers or networks they can crack. For others, there is malicious intent behind their escapades, like stealing They can steal anything, from client or customer information or other business data, credit card details and social security numbers, for identity fraud or theft and a lot more. Hackers can also send trojan horses, worms and many more types of malicious codes.
  • 5. Avoid Hackers We must take safety measures to avoid our computer from being hacked One of the many ways is to install a firewall. Firewalls prevent access to our computer from the outside, so that only those that we give permission to can connect to our system from the Internet Another way is to install an antivirus. All our computers should be running the most recent version of an anti-virus program. The program should be set for automatic updates to ensure the latest virus, worm and Trojan definitions.
  • 6. Thank You .. Prepared by Armand Hamid