SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
By.
Santhosh R
Bsc (Nur) 2nd Yr
HACKING...
Hacking is the gaining of assess (wanted or unwanted)
to a computer and viewing,copying,or creating data
without the intentation of destroying data or malicious
harming the computer.
Computer hacking is down using Several progrems as
used ,such as...
Rootkit,
Trojan,
Keylogger.
HACKERS...
 The person involoved the process is name called as a
hacker.
 A person who gained authorized or unauthorized
access to a computer without the initentation of causing
damage.
Types of
Hackers
1.White Hat
hackers
2.Gray Hat
hackers
3.Black Hat
hackers
1.White Hackers.
The term “white hat” in Internet slang refers to an ethical
computer hacker,or a computer security expert .
2.Grey Hackers.
A grey hat is a computer hacker or computer security
experct who may sometimes violate laws or typical ethical standards,
but does not have the malicious intent typical of a black hat hackers.
3.Black Hackers.
A black hat hacker is a hacker who violates computer
security for personal gain or malice.
Why do Hacker hack..
* Just for fun
* Show off
* Hack other system secretly
*Notify
* Steal many people their throught ,important information
* Destroy the enemys computer network during the war.
Website
hacking
Network
hacking
Ethical
hacking
E-mail
hacking
Password
hacking
Online
banking
hacking
Computer
hackin
Type
s
of
Hacki
ng
1.Website Hacking ;
Website haking means taking control from the website
owner to a person who hackers the website.
2.Network Hacking;
Network hacking is generaly means gathering information
about domain by using tools like Telnet , Ns look , UP , Ping ,
Tracert , Netstat , etc....
over the network
3.Ethical Hacking;
Ethical hacking is where a person hacks to find weakness in
a system and then usually patches them.
4.Email Hacking;
Email hacking is illicit access to an email account or email
correspondence.
5.Password Hacking;
Password hacking, password creaking is the process of
recovering secret passwords from data that as been stored in or
transmitted by a computer system
6.Online Baking Hacking;
Online banking hacking unautherized accessing bank
accounts without knowing the password or without permission of
account holder is know as online banking hacking.
7.Computer Hacking;
Computer hacking is when files on your computer are
viewed,created,or eadited without your authorization.
How to know if your computer is
hacked...
Fake antiviruse warning messages
Unwanted browser toolbar
Redirection to strange websites
Random pop ups
Ransomware message etc..
Ifyourecive anyofthesewarningsgins,youcanbe surethat
yourcomputerhasbeentargetedbyahackers.
How to prevent the hacking...
Scan all type of hard drives before running
oHarddrives,pendrives,external hardisk or mobile devices
should be scanned by a USB scanner to remove any kind of
malware.
Dont keeps easy password
o Like 1234,pet name or your name and date of birth etc.use
complex password.
Never store or share your login information
o Keep memorize your password and user id
Conclusion
 Hacking is a good computering skill that can be used
for good or bad intention
 Ther is a reson to do the hack, and ther are ways to
prevent it.
Hacking (basic)

More Related Content

PPTX
What is Phishing and How can you Avoid it?
PPTX
Types of cyber attacks
PPT
General Awareness On Cyber Security
PPSX
Hacking
PPTX
Cyber crime and security
PPTX
Cyber security Information security
PPTX
Cyber crime & security
PDF
Network Security Presentation
What is Phishing and How can you Avoid it?
Types of cyber attacks
General Awareness On Cyber Security
Hacking
Cyber crime and security
Cyber security Information security
Cyber crime & security
Network Security Presentation

What's hot (20)

PPTX
CyberSecurity
PDF
14 tips to increase cybersecurity awareness
PPTX
Cyber Security PPT.pptx
PPTX
Hyphenet Security Awareness Training
PPTX
Cyber crime
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber Crime
PPTX
Mobile security
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
PPT on Phishing
PDF
Cyber Security
PPT
PPTX
ICT Form 4: Hacking
PPTX
Cyber Crime
PDF
Cyber Security Awareness
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PPTX
Mobile Device Security
PPTX
Cyber security
CyberSecurity
14 tips to increase cybersecurity awareness
Cyber Security PPT.pptx
Hyphenet Security Awareness Training
Cyber crime
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber Crime
Mobile security
Phishing attack, with SSL Encryption and HTTPS Working
PPT on Phishing
Cyber Security
ICT Form 4: Hacking
Cyber Crime
Cyber Security Awareness
Cybersecurity 140713064844-phpapp01 (1)-converted
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Mobile Device Security
Cyber security

Similar to Hacking (basic) (20)

PPTX
Hacking & Hackers
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Hacking Presentation v2 By Raffi
PPTX
HACKING AND ITS TYPES.pptx
PPTX
Hacking
PPT
Introduction to ethical hacking
PPT
Hacking
PPTX
ethical Hacking [007]
PPTX
PPTX
Hacking & Attack vector
PPTX
Hacking
PPTX
PPTX
Hacking
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPTX
Hacking presentation or hacker control the world.pptx
PPTX
PPTX
Hacking Presentation
PPTX
Ethical hacking 2016
Hacking & Hackers
ethicalhacking1 final.pdf
Ethical hacking Presentation
Hacking Presentation v2 By Raffi
HACKING AND ITS TYPES.pptx
Hacking
Introduction to ethical hacking
Hacking
ethical Hacking [007]
Hacking & Attack vector
Hacking
Hacking
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking presentation or hacker control the world.pptx
Hacking Presentation
Ethical hacking 2016

Recently uploaded (20)

PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Lesson notes of climatology university.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
GDM (1) (1).pptx small presentation for students
PDF
RMMM.pdf make it easy to upload and study
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Structure & Organelles in detailed.
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Presentation on HIE in infants and its manifestations
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Cell Types and Its function , kingdom of life
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
A systematic review of self-coping strategies used by university students to ...
Lesson notes of climatology university.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Complications of Minimal Access Surgery at WLH
GDM (1) (1).pptx small presentation for students
RMMM.pdf make it easy to upload and study
Microbial disease of the cardiovascular and lymphatic systems
Cell Structure & Organelles in detailed.
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Presentation on HIE in infants and its manifestations
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Cell Types and Its function , kingdom of life
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers

Hacking (basic)

  • 2. HACKING... Hacking is the gaining of assess (wanted or unwanted) to a computer and viewing,copying,or creating data without the intentation of destroying data or malicious harming the computer. Computer hacking is down using Several progrems as used ,such as... Rootkit, Trojan, Keylogger.
  • 3. HACKERS...  The person involoved the process is name called as a hacker.  A person who gained authorized or unauthorized access to a computer without the initentation of causing damage.
  • 4. Types of Hackers 1.White Hat hackers 2.Gray Hat hackers 3.Black Hat hackers
  • 5. 1.White Hackers. The term “white hat” in Internet slang refers to an ethical computer hacker,or a computer security expert . 2.Grey Hackers. A grey hat is a computer hacker or computer security experct who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hackers. 3.Black Hackers. A black hat hacker is a hacker who violates computer security for personal gain or malice.
  • 6. Why do Hacker hack.. * Just for fun * Show off * Hack other system secretly *Notify * Steal many people their throught ,important information * Destroy the enemys computer network during the war.
  • 8. 1.Website Hacking ; Website haking means taking control from the website owner to a person who hackers the website. 2.Network Hacking; Network hacking is generaly means gathering information about domain by using tools like Telnet , Ns look , UP , Ping , Tracert , Netstat , etc.... over the network 3.Ethical Hacking; Ethical hacking is where a person hacks to find weakness in a system and then usually patches them. 4.Email Hacking; Email hacking is illicit access to an email account or email correspondence.
  • 9. 5.Password Hacking; Password hacking, password creaking is the process of recovering secret passwords from data that as been stored in or transmitted by a computer system 6.Online Baking Hacking; Online banking hacking unautherized accessing bank accounts without knowing the password or without permission of account holder is know as online banking hacking. 7.Computer Hacking; Computer hacking is when files on your computer are viewed,created,or eadited without your authorization.
  • 10. How to know if your computer is hacked... Fake antiviruse warning messages Unwanted browser toolbar Redirection to strange websites Random pop ups Ransomware message etc.. Ifyourecive anyofthesewarningsgins,youcanbe surethat yourcomputerhasbeentargetedbyahackers.
  • 11. How to prevent the hacking... Scan all type of hard drives before running oHarddrives,pendrives,external hardisk or mobile devices should be scanned by a USB scanner to remove any kind of malware. Dont keeps easy password o Like 1234,pet name or your name and date of birth etc.use complex password. Never store or share your login information o Keep memorize your password and user id
  • 12. Conclusion  Hacking is a good computering skill that can be used for good or bad intention  Ther is a reson to do the hack, and ther are ways to prevent it.