SlideShare a Scribd company logo
Differentiation Between Hacker And Cracker
Hacker Cracker
DEFINITION: DEFINITION:
Differentiation BetweenHacker And Cracker
1. A person who
illegally breaks into
other’s computer
system’s known as
hacker. Hacking is a
cybercrime
1.Cracker is a
computer user who
breaks into
computer system
without permission
using hacking tools
for personal gain or
damage and
commits
cybercrimes.
2. Hackers are
computer experts
who try to gain
unauthorized access
to computer system
for stealing and
corrupting
information.
3. Most of the hackers
break into computers
for financial benefits.
They try to get credit
card details or bank
account information
so that they can steal
money.
4. Hackers have in-
depth knowledge on
network
programming and can
create tools and
malicious software for
others to break into
2. Most of the crackers
does not have
professional computer
skill to hack computer
system but they have
knowledge about using
hacking tools
3. Crackers break into
computers and cause
serious damage. They
also break into Web
server and replace the
home page of a website
with a page of their own
design.
4. Cracker doesnot have
indepth knowledge on
network programming.
Example:
A hacker can develop
software in which all
the dictionary file is
loaded that contains
all the dictionary
words. When the
software is run it tries
all the dictionary
wordsone by one as
password to hack a
computer. This
methodworks if the
user is having a simple
password that exists a
dictionary.
Example:
A cracker can install a key
logger on another user’s
computer through
internet. A key-logger is a
software that records
every letter typed on
keyboard. When the user
uses Facebook and enters
the Facebook account
details, it will be recorded
in the cracker’s
computer. Now, he can
easily hack the Facebook
account.

More Related Content

PPT
Hacking
PPTX
Hacking
PPTX
Hacking ppt
RTF
Hacking and its types
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Hacking
PPTX
PPT
Hacking Kishor
Hacking
Hacking
Hacking ppt
Hacking and its types
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking
Hacking Kishor

What's hot (20)

PPT
Ethical hacking
PPTX
Hacking and its types
PPTX
Introduction To Ethical Hacking
PPTX
Introduction to Hacking
PPTX
Computer and Internet hacking
PPTX
Ethical hacking
PPSX
Ethical Hacking
PPTX
National information security education & awareness program
PPTX
Computer hacking
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking & Hackers
PDF
Attack chaining for web exploitation #c0c0n2015
PPTX
PPTX
Is hacking good or bad
PPTX
Preventions of Email Hacking
PPTX
Web defacement
DOC
Kinds of hackers
PPTX
Cybercrime (Computer Hacking)
PPTX
Cyber hacking dev days by aes team
Ethical hacking
Hacking and its types
Introduction To Ethical Hacking
Introduction to Hacking
Computer and Internet hacking
Ethical hacking
Ethical Hacking
National information security education & awareness program
Computer hacking
Hacking
Hacking
Hacking & Hackers
Attack chaining for web exploitation #c0c0n2015
Is hacking good or bad
Preventions of Email Hacking
Web defacement
Kinds of hackers
Cybercrime (Computer Hacking)
Cyber hacking dev days by aes team
Ad

Similar to Assignment 4 (20)

PPT
CO1-Concept of ethical hacking Explained
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
PPTX
Hacking
PPTX
Presentation1
PPTX
Hacking vs cracking
PPT
PDF
Hacker cracker cybercrime-computer security
PPTX
Ethical Hacking - Hackers and crackers
PPT
Cyber Crime
PPT
ethics final project
PPTX
Hackers ESP
PPTX
Security threats
PPTX
Crackers and Type of Crackers Vs Hackers.pptx
DOCX
Application of computer to legal practice (hacking)
PPT
Ethical hacking
PPT
Ethical hacking
PPTX
Arya
PPTX
ethical hacking in the modern times
PPTX
Ethical hacking 2016
CO1-Concept of ethical hacking Explained
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Hacking
Presentation1
Hacking vs cracking
Hacker cracker cybercrime-computer security
Ethical Hacking - Hackers and crackers
Cyber Crime
ethics final project
Hackers ESP
Security threats
Crackers and Type of Crackers Vs Hackers.pptx
Application of computer to legal practice (hacking)
Ethical hacking
Ethical hacking
Arya
ethical hacking in the modern times
Ethical hacking 2016
Ad

Recently uploaded (20)

PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPT
Ethics in Information System - Management Information System
PPTX
artificial intelligence overview of it and more
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Introduction to the IoT system, how the IoT system works
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
Introduction to cybersecurity and digital nettiquette
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
Layers_of_the_Earth_Grade7.pptx class by
The New Creative Director: How AI Tools for Social Media Content Creation Are...
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Ethics in Information System - Management Information System
artificial intelligence overview of it and more
SAP Ariba Sourcing PPT for learning material
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
250152213-Excitation-SystemWERRT (1).ppt
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
artificialintelligenceai1-copy-210604123353.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Introduction to the IoT system, how the IoT system works
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Introduction to cybersecurity and digital nettiquette
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Power Point - Lesson 3_2.pptx grad school presentation

Assignment 4

  • 1. Differentiation Between Hacker And Cracker Hacker Cracker DEFINITION: DEFINITION: Differentiation BetweenHacker And Cracker 1. A person who illegally breaks into other’s computer system’s known as hacker. Hacking is a cybercrime 1.Cracker is a computer user who breaks into computer system without permission using hacking tools for personal gain or damage and commits cybercrimes.
  • 2. 2. Hackers are computer experts who try to gain unauthorized access to computer system for stealing and corrupting information. 3. Most of the hackers break into computers for financial benefits. They try to get credit card details or bank account information so that they can steal money. 4. Hackers have in- depth knowledge on network programming and can create tools and malicious software for others to break into 2. Most of the crackers does not have professional computer skill to hack computer system but they have knowledge about using hacking tools 3. Crackers break into computers and cause serious damage. They also break into Web server and replace the home page of a website with a page of their own design. 4. Cracker doesnot have indepth knowledge on network programming.
  • 3. Example: A hacker can develop software in which all the dictionary file is loaded that contains all the dictionary words. When the software is run it tries all the dictionary wordsone by one as password to hack a computer. This methodworks if the user is having a simple password that exists a dictionary. Example: A cracker can install a key logger on another user’s computer through internet. A key-logger is a software that records every letter typed on keyboard. When the user uses Facebook and enters the Facebook account details, it will be recorded in the cracker’s computer. Now, he can easily hack the Facebook account.