Hacking
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
 The truth hacker amongst our societies have thirst for the
knowledge .
 Boredom is never an object of challenge for the hacker
What is Hacking ?
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
HACKING
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
HACKING
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the
website.
HACKING
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
HACKING
Ethical Hacking
 Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
HACKING
Email Hacking
 Email hacking is illicit access to an email account
or email correspondence.
HACKING
Password Hacking
 Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
HACKING
Online Banking Hacking
 Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
HACKING
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
HACKING
What should do after hacked?
 Shutdown the system Or turn off the system
 Separate the system from network
 Restore the system with the backup Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
 Ex.
1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
 Can be used to recover lost information where the
computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
 Keep your password protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
HACKING

More Related Content

PPTX
hacking presentation slide
PPTX
Hacking
PPTX
Ethical hacking
PDF
Social engineering
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Haking PPT
PPTX
Hacking
PPT
Phishing
hacking presentation slide
Hacking
Ethical hacking
Social engineering
Presentation of Social Engineering - The Art of Human Hacking
Haking PPT
Hacking
Phishing

What's hot (20)

PPTX
PPSX
Hacking
PPTX
Cyber security
PPTX
Cyber security
PPT
Ethical Hacking Powerpoint
PPTX
Ethical Hacking
PPTX
Phishing attack seminar presentation
PPTX
Social Engineering new.pptx
PPTX
Ethical hacking
PPTX
Different Types of Phishing Attacks
PPTX
Cybercrime and Security
PPT
Ethical hacking a licence to hack
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Social Engineering,social engeineering techniques,social engineering protecti...
PPTX
Ethical Hacking
PPTX
Social engineering: A Human Hacking Framework
PDF
Cyber Security Awareness
PPTX
Cyber crime - What is and types.
PPTX
Social engineering
PPTX
Introduction to cyber security amos
Hacking
Cyber security
Cyber security
Ethical Hacking Powerpoint
Ethical Hacking
Phishing attack seminar presentation
Social Engineering new.pptx
Ethical hacking
Different Types of Phishing Attacks
Cybercrime and Security
Ethical hacking a licence to hack
Inetsecurity.in Ethical Hacking presentation
Social Engineering,social engeineering techniques,social engineering protecti...
Ethical Hacking
Social engineering: A Human Hacking Framework
Cyber Security Awareness
Cyber crime - What is and types.
Social engineering
Introduction to cyber security amos

Similar to HACKING (20)

PPTX
Hacking and its types
PPTX
Hacking & its types
PPTX
Hacking
PPTX
Hacking and its types V2
PDF
Hacking
PPTX
Hacking
PPTX
Hacking and Online Security
PPTX
Hacking 1
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PDF
Hacking
PDF
Hacking
PPTX
Hacking
PPTX
PPTX
Hacking & Attack vector
PPTX
Hacking & Hackers
PPTX
Hacking computer crime
PPTX
Ethical hacking
PPTX
PowerPoint Presentation: Hacking
PPTX
HACKING AND ITS TYPES.pptx
PPTX
Hacking
Hacking and its types
Hacking & its types
Hacking
Hacking and its types V2
Hacking
Hacking
Hacking and Online Security
Hacking 1
Ethical hacking Chapter 1 - Overview.pptx
Hacking
Hacking
Hacking
Hacking & Attack vector
Hacking & Hackers
Hacking computer crime
Ethical hacking
PowerPoint Presentation: Hacking
HACKING AND ITS TYPES.pptx
Hacking

Recently uploaded (20)

PPTX
Unit 1- Introduction to Corporate Etiquettes
PPTX
ANN DL UNIT 1 ANIL 13.10.24.pptxcccccccccc
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PPTX
D1basicstoloopscppforbeginnersgodoit.pptx
PPT
2- CELL INJURY L1 Medical (2) gggggggggg
PPT
ppt-of-extraction-of-metals-12th-1.pptb9
PPTX
Core Characteristics and Abilities of an Effective Teacher_0.pptx
PDF
Sheri Ann Lowe Compliance Strategist Resume
PPTX
CDI 2.pptx special crime investigation with legal medicine
PDF
CollegePresentation.pdf hsjsisjsjsjsssoo
PDF
Basic GMP - Training good manufacturing procedure
PPTX
mathsportfoliomanvi-211121071838 (1).pptx
PPTX
Unit 3 Presentation Etiquette Business and Corporate Etiquette
DOCX
GIZ Capacity Building Requirements for ICT Department.docx
PPTX
STS CHAP 4 human development as reflected
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PDF
Acne presentation and homeopathy treatment
PPTX
Digital Education Presentation for students.
PDF
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf
Unit 1- Introduction to Corporate Etiquettes
ANN DL UNIT 1 ANIL 13.10.24.pptxcccccccccc
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
D1basicstoloopscppforbeginnersgodoit.pptx
2- CELL INJURY L1 Medical (2) gggggggggg
ppt-of-extraction-of-metals-12th-1.pptb9
Core Characteristics and Abilities of an Effective Teacher_0.pptx
Sheri Ann Lowe Compliance Strategist Resume
CDI 2.pptx special crime investigation with legal medicine
CollegePresentation.pdf hsjsisjsjsjsssoo
Basic GMP - Training good manufacturing procedure
mathsportfoliomanvi-211121071838 (1).pptx
Unit 3 Presentation Etiquette Business and Corporate Etiquette
GIZ Capacity Building Requirements for ICT Department.docx
STS CHAP 4 human development as reflected
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
CV of Architect Professor A F M Mohiuddin Akhand.pdf
Acne presentation and homeopathy treatment
Digital Education Presentation for students.
BPT_Beach_Energy_FY25_half_year_results_presentation.pdf

HACKING

  • 2. Contents  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3. History of Hacking  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge .  Boredom is never an object of challenge for the hacker
  • 4. What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 6. Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 7. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 8. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 9. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 11. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 13. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 15. Ethical Hacking  Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 17. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 19. Password Hacking  Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 21. Online Banking Hacking  Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 23. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system Or turn off the system  Separate the system from network  Restore the system with the backup Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data  Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 30. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal
  • 31. Conclusion  Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .