SlideShare a Scribd company logo
Hacking 1
What is hacking?
Who is a hacker?
Types of hackers
Famous hackers in history
Types of hacking
Top 10 countries with most hackers
Advantages of hacking
Disadvantages of hacking
Preventive measures
What you can do after you are hacked
How to give password to an account
Conclusion
Hacking 1
The process of attempting to gain unauthorized access to
computer resources is called hacking.
Hacking 1
 Hacker is someone who seeks or exploits weakness
in a computer system
 The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
Hacking 1
Hacking 1
Hacking 1
 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Hacking a website means taking a control from the
website owner to a person who hacks the website.
Network Hacking generally means gathering
information about domain by using tools like Telnets
look UP,Ping,Tracert,Netstat etc. over the network.
Hacking 1
Ethical Hacking is where a person
Hacks to find weakness in a system and then usually
patches them.
Commercial and social websites rely on the security of
email accounts . Large amount of email exchanges are
occurring daily which contain personal information as
well as company secrets ,this makes email accounts
very valuable and becomes of the main causes for
email hacking.
In computer security, password hacking is the process
of recovering passwords from data that have been
stored in or transmitted by a computer system.
Unauthorized accessing bank accounts without
knowing the password or without permission of
account holder online bank hacking.
Computer hacking is when files on your computer are
viewed , created or edited without your authorization.
Remote desktop connection technique.
Hacking 1
Can be used to recover lost information where the computer
password has been lost.
Teaches us that no technology is 100% secure.
It helps the organization better protects its systems and information.
Ethical hacking provides protection against theft.
DISADVANTAGES OF HACKING
Criminals can use it to their advantage.
It can harm someone’s privacy.
It is illegal.
Hacking leads to financial losses.
PREVENTIVE MEASURES
Install a strong anti-virus.
Always run a anti-virus check before you download a
program or a file from the internet.
Avoid disclosing personal details like phone number,
credit card details to strangers.
What you can do after you are
hacked
Shutdown the system or turn off the system.
Separate the system from network.
Restore the system with the backup or reinstall all the
programs.
Connect the system to the network.
It can be good to call the police or cyber crime
investigators.
HOW TO GIVE PASSWORD TO AN
ACCOUNT
Use unique password to your account.
Choose a combination of letters , numbers or symbols.
Always create a unique and long password for security
of your personal informations and details.
CONCLUSION
Hackers are just people with innovative spirits and an
in-dept knowledge of technology . Hackers are not
necessarily criminals , it totally depends on the way
how you use your innovative idea . There is nothing
wrong with hackers knowledge Therefore do whatever
you like as long as you didn't make other people
suffered and devastated by your own actions.
Hacking 1
Hacking 1

More Related Content

PPTX
Hacking and its types V2
PPTX
Hacking
PPTX
Hacking
PPTX
PPT
TYPES OF HACKING
PPTX
Hacking and its types
RTF
Hacking and its types
PPTX
Hacking & its types
Hacking and its types V2
Hacking
Hacking
TYPES OF HACKING
Hacking and its types
Hacking and its types
Hacking & its types

What's hot (18)

PPTX
PPTX
Computer hacking
PPT
basic knowhow hacking
PPT
Hacking version 2
PPTX
Hacking
PPTX
Computer and Internet hacking
PPTX
Hacking and Anti Hacking
PPSX
Hacking
DOC
Kinds of hackers
PPTX
Hacking
PPTX
ethical hacking
PPTX
Hacking ppt
ODP
Introduction To Hacking
DOCX
Ethical hacking
PPTX
Cybercrime (Computer Hacking)
PPTX
how to prevent system from hacking...by sarika
PPTX
Hacking
PPTX
Ethical hacking presentation
Computer hacking
basic knowhow hacking
Hacking version 2
Hacking
Computer and Internet hacking
Hacking and Anti Hacking
Hacking
Kinds of hackers
Hacking
ethical hacking
Hacking ppt
Introduction To Hacking
Ethical hacking
Cybercrime (Computer Hacking)
how to prevent system from hacking...by sarika
Hacking
Ethical hacking presentation

Viewers also liked (20)

PPT
Basic Introduction to hacking
PDF
Hacking Movable Type
PPT
Hacking
PPTX
What is hacking | Types of Hacking
PPT
Evaporation New Template
PPTX
Internet and personal privacy
PPTX
Evaporation
PPTX
Is hacking good or bad
PPTX
Science - Evaporation
PPTX
AMAZING COMPUTER TRICKS
PPTX
Soil Steady-State Evaporation
PPTX
Group 4 (evaporation)
PDF
CFD-based Evaporation Estimation Approach
PPT
Water evaporation reduction from lakes
PDF
Hacking sites for fun and profit
PPT
Hacking And EthicalHacking By Satish
PDF
Evaporation 4 slides
PPTX
hacking and its types
PPT
Evaporation
PPT
Evaporation Rates
Basic Introduction to hacking
Hacking Movable Type
Hacking
What is hacking | Types of Hacking
Evaporation New Template
Internet and personal privacy
Evaporation
Is hacking good or bad
Science - Evaporation
AMAZING COMPUTER TRICKS
Soil Steady-State Evaporation
Group 4 (evaporation)
CFD-based Evaporation Estimation Approach
Water evaporation reduction from lakes
Hacking sites for fun and profit
Hacking And EthicalHacking By Satish
Evaporation 4 slides
hacking and its types
Evaporation
Evaporation Rates

Similar to Hacking 1 (20)

PPTX
Hacking
PPTX
HACKING
PPTX
Hacking
PPTX
Haking PPT
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPTX
Hacking Presentation v2 By Raffi
PPTX
Hacking & Hackers
PPTX
PDF
Hacking
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking final
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Hacking ppt
PDF
Hackingppt 160730081605
PDF
Hacking
PDF
Hacking
PPTX
Hacking (basic)
DOCX
Unit II .docx
Hacking
HACKING
Hacking
Haking PPT
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking Presentation v2 By Raffi
Hacking & Hackers
Hacking
Hacking
Hacking
Hacking final
ethicalhacking1 final.pdf
Ethical hacking Presentation
Hacking ppt
Hackingppt 160730081605
Hacking
Hacking
Hacking (basic)
Unit II .docx

Recently uploaded (20)

PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PDF
project resource management chapter-09.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Hybrid model detection and classification of lung cancer
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Approach and Philosophy of On baking technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
A Presentation on Touch Screen Technology
A comparative analysis of optical character recognition models for extracting...
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
project resource management chapter-09.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Unlocking AI with Model Context Protocol (MCP)
WOOl fibre morphology and structure.pdf for textiles
Group 1 Presentation -Planning and Decision Making .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Hybrid model detection and classification of lung cancer
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Getting Started with Data Integration: FME Form 101
A novel scalable deep ensemble learning framework for big data classification...
TLE Review Electricity (Electricity).pptx
Approach and Philosophy of On baking technology
Heart disease approach using modified random forest and particle swarm optimi...

Hacking 1

  • 2. What is hacking? Who is a hacker? Types of hackers Famous hackers in history Types of hacking Top 10 countries with most hackers Advantages of hacking Disadvantages of hacking Preventive measures What you can do after you are hacked How to give password to an account Conclusion
  • 4. The process of attempting to gain unauthorized access to computer resources is called hacking.
  • 6.  Hacker is someone who seeks or exploits weakness in a computer system  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 10.  Website Hacking  Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 11. Hacking a website means taking a control from the website owner to a person who hacks the website.
  • 12. Network Hacking generally means gathering information about domain by using tools like Telnets look UP,Ping,Tracert,Netstat etc. over the network.
  • 14. Ethical Hacking is where a person Hacks to find weakness in a system and then usually patches them.
  • 15. Commercial and social websites rely on the security of email accounts . Large amount of email exchanges are occurring daily which contain personal information as well as company secrets ,this makes email accounts very valuable and becomes of the main causes for email hacking.
  • 16. In computer security, password hacking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.
  • 17. Unauthorized accessing bank accounts without knowing the password or without permission of account holder online bank hacking.
  • 18. Computer hacking is when files on your computer are viewed , created or edited without your authorization. Remote desktop connection technique.
  • 20. Can be used to recover lost information where the computer password has been lost. Teaches us that no technology is 100% secure. It helps the organization better protects its systems and information. Ethical hacking provides protection against theft.
  • 21. DISADVANTAGES OF HACKING Criminals can use it to their advantage. It can harm someone’s privacy. It is illegal. Hacking leads to financial losses.
  • 22. PREVENTIVE MEASURES Install a strong anti-virus. Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
  • 23. What you can do after you are hacked Shutdown the system or turn off the system. Separate the system from network. Restore the system with the backup or reinstall all the programs. Connect the system to the network. It can be good to call the police or cyber crime investigators.
  • 24. HOW TO GIVE PASSWORD TO AN ACCOUNT Use unique password to your account. Choose a combination of letters , numbers or symbols. Always create a unique and long password for security of your personal informations and details.
  • 25. CONCLUSION Hackers are just people with innovative spirits and an in-dept knowledge of technology . Hackers are not necessarily criminals , it totally depends on the way how you use your innovative idea . There is nothing wrong with hackers knowledge Therefore do whatever you like as long as you didn't make other people suffered and devastated by your own actions.