SlideShare a Scribd company logo
Hackers By Nicolas Loh
Introduction A Hacker is a person who breaks into computers or computer networks either for profit or for personal accomplishment.
How do they get caught Logs Code that they run on the system “ Honeypot” program Keyloggers in LAN cafes Trackers
Protection against hackers Harden your systems (also called "lock-down" or "security tightening") Patch all your systems Install a firewall on the system, or at least on the network Use Anti – Virus Software Use encrypted connections
News on Hacking Early 1990s Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
News on Hacking November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. T
Detecting Hackers Lights showing hard drive activity being busier than what your own activities call for Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Obvious tampering - destroyed files, missing files, etc. Your firewall keeps receives multiple packets from a single web address and notifies you.
The End

More Related Content

PPTX
PPT
Homework0703
PPTX
How to Prevent Identity Theft
PDF
Wireless Keyboard Threats
PPTX
PPIT Lecture 19
PPTX
PPIT Lecture 17
PPTX
Cyber security and crime
PPT
Homework0703
How to Prevent Identity Theft
Wireless Keyboard Threats
PPIT Lecture 19
PPIT Lecture 17
Cyber security and crime

What's hot (20)

PPTX
Cyber crime and secuity
PPTX
Cyber espionage
PPTX
Ethical Hacking
PPTX
PPIT Lecture 18
PPTX
Ethical Hacking
PPT
Ethical hacking presentation
PPTX
Attack presentation
PPTX
ETHICAL HACKING PRESENTATION
PPT
Security Measures
PPTX
Ethical hacking basics
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Ethical Hacking Powerpoint
PDF
IoT Device Security Tips
PDF
Wikileaks release trove of alleged CIA documents.
PPTX
Cyber crime final
PPTX
Presentation on Cyber Security
PPTX
Ethical hacking
DOCX
LiPari_Assignment8
PPTX
The Evolution of Cybercrime
Cyber crime and secuity
Cyber espionage
Ethical Hacking
PPIT Lecture 18
Ethical Hacking
Ethical hacking presentation
Attack presentation
ETHICAL HACKING PRESENTATION
Security Measures
Ethical hacking basics
Ethical hacking
Ethical hacking
Ethical Hacking Powerpoint
IoT Device Security Tips
Wikileaks release trove of alleged CIA documents.
Cyber crime final
Presentation on Cyber Security
Ethical hacking
LiPari_Assignment8
The Evolution of Cybercrime

Viewers also liked (9)

PDF
Openobject bi
PDF
Openobject features
DOCX
Soal teras
PPTX
A deals site
PDF
Openobject contribute
PDF
Openobject technical guide
PDF
Openerp book
PPT
08 f10--market research
PDF
peran riset pemasaran dalam pengambilan
Openobject bi
Openobject features
Soal teras
A deals site
Openobject contribute
Openobject technical guide
Openerp book
08 f10--market research
peran riset pemasaran dalam pengambilan

Similar to Hacking (20)

PPTX
Hacking
PPTX
Hacking its types and the art of exploitation
PDF
Introduction of hacking and cracking
PPT
hacking
PPT
Hacking And Its Prevention
PPTX
Ethical Hacking
PPT
Power Point Hacker
PPT
Hackers Izyani
PPTX
Hacking and Hackers
PPT
Hacking
PPT
Armand Hacking
PPTX
Hacking
PPTX
Hacking
PPTX
Ethical hacking : Beginner to advanced
PPTX
Hacking presentation or hacker control the world.pptx
PDF
Report on Hacking
PPT
Course on Ehtical Hacking - Introduction
ODP
Introduction To Hacking
PPTX
Haking PPT
PPT
Computer hacking
Hacking
Hacking its types and the art of exploitation
Introduction of hacking and cracking
hacking
Hacking And Its Prevention
Ethical Hacking
Power Point Hacker
Hackers Izyani
Hacking and Hackers
Hacking
Armand Hacking
Hacking
Hacking
Ethical hacking : Beginner to advanced
Hacking presentation or hacker control the world.pptx
Report on Hacking
Course on Ehtical Hacking - Introduction
Introduction To Hacking
Haking PPT
Computer hacking

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Modernising the Digital Integration Hub
PDF
project resource management chapter-09.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
Getting started with AI Agents and Multi-Agent Systems
Modernising the Digital Integration Hub
project resource management chapter-09.pdf
A comparative study of natural language inference in Swahili using monolingua...
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles – August ’25 Week III
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
O2C Customer Invoices to Receipt V15A.pptx
cloud_computing_Infrastucture_as_cloud_p
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Enhancing emotion recognition model for a student engagement use case through...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
WOOl fibre morphology and structure.pdf for textiles
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
1. Introduction to Computer Programming.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...

Hacking

  • 2. Introduction A Hacker is a person who breaks into computers or computer networks either for profit or for personal accomplishment.
  • 3. How do they get caught Logs Code that they run on the system “ Honeypot” program Keyloggers in LAN cafes Trackers
  • 4. Protection against hackers Harden your systems (also called "lock-down" or "security tightening") Patch all your systems Install a firewall on the system, or at least on the network Use Anti – Virus Software Use encrypted connections
  • 5. News on Hacking Early 1990s Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
  • 6. News on Hacking November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. T
  • 7. Detecting Hackers Lights showing hard drive activity being busier than what your own activities call for Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Obvious tampering - destroyed files, missing files, etc. Your firewall keeps receives multiple packets from a single web address and notifies you.