Group Members:
Muhammad Abbas
Hadir janan,
Asmia basher.
Uasma Ahmad.
Fahad Rehan.
Arbaz Cheema.
• History.
• What is hacking.
• Who are hacker.
• Categories of hacking.
• Types of hacking.
• Famous hackers.
• Why they hack.
• How to secure your data.
• Advantages and dis advantages of hacking.
• Conclusion.
• It all began in the 1960s at MIT, origin of the term
“hacker”, where extremely skilled individuals practiced
hardcore programming in FORTRAN and other older
languages.
• And start hacking.
• In simple words to access someone data with put his
permission and view it. Called hacking.
• In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
• The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
• White hat hacking.
• Grey hat hacking.
• Black hat hacking.
• Website Hacking.
• Network hacking.
• Email hacking.
• Password Hacking.
• Online Banking Hacking.
• Computer Hacking.
Hacking
• Hacking a website means taking control from the website
owner to a person who hacks the website.
Hacking
• Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Hacking
• Email hacking is illicit access to an email account or
email correspondence.
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Hacking
• Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online banking
hacking.
Hacking
• Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
• Gary McKinnon
• LulzSec .
• Adrian Lamo
Hacking
• Gary McKinnon must’ve been a curious, restless child,
for to gain information on UFOs, he thought it better to
get a direct access into the channels of NASA. He
infiltrated 97 US military and NASA computers, by
installing virus and deleting a few files.
Hacking
• LulzSec or Lulz Security, a high profile, Black Hat hacker
group, gained credentials for hacking into Sony, News
International, CIA, FBI, Scotland Yard, and several
noteworthy accounts.
Hacking
• Adrian Lamo decided to switch careers when he realized
the potentials of his skills. He became a news when he
hacked into Yahoo!, Microsoft, Google, and The New
York Times.
• Just for fun.
• Show off.
• Hack other system Secretly.
• Steal important Data.
• Destroy Enemy computer during war.
• Shutdown your Computer.
• Separate your computer from network.
• It be batter to call police.
• Use unique passwords for your accounts.
• Choose a combination of letters, numbers, or symbols to
create a unique password.
• Can be used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
• Criminals can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
• Keep your password protected. Write your password
should be with combination of characters, digits, special
symbols. Do not respond to feck on fishing email. when
you are doing any online transection always keep watch
on site whether the protocol of site is https & whether
there is a lock symbol .
Hacking

More Related Content

PDF
Hacking
PPTX
PPTX
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacker culture
PPTX
Hackers & hacktivism
PPTX
Hacking Technology
PPTX
Hacking
Hacking
Ethical hacking-presentation-updated(1by )Rasheed
Hacker culture
Hackers & hacktivism
Hacking Technology
Hacking

What's hot (18)

PPTX
Intro
PPTX
Introduction of Cyber Security
PPTX
Internet and personal privacy
PDF
Hacking-Basics
PDF
Drooger, jack cyber security
PPS
Information security in the starbucks generation
PDF
Jameel Nabbo Cyber Security conference
PPTX
Ethical Hacking
PPTX
Hacking & Attack vector
PPTX
Ethical hacking
PPTX
Social Engineering
PPTX
Recommending information security measures
PPT
Hacking
PPTX
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
PPTX
Hacker risks presentation to ACFE PR Chapter
PPT
PPTX
Hacking-coffee and latte
Intro
Introduction of Cyber Security
Internet and personal privacy
Hacking-Basics
Drooger, jack cyber security
Information security in the starbucks generation
Jameel Nabbo Cyber Security conference
Ethical Hacking
Hacking & Attack vector
Ethical hacking
Social Engineering
Recommending information security measures
Hacking
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker risks presentation to ACFE PR Chapter
Hacking-coffee and latte

Viewers also liked (7)

PDF
PDF
Margaret Kahoilua - Resume
PDF
Yourprezi
PDF
CARO lucknow
PDF
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
PPT
Drugs & crime
PDF
DPNC Insight CARO 2016 vs 2015
Margaret Kahoilua - Resume
Yourprezi
CARO lucknow
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
Drugs & crime
DPNC Insight CARO 2016 vs 2015

Similar to Hacking (20)

PPTX
Hacking
PPTX
HACKING AND ITS TYPES.pptx
PPT
hacking
PPTX
Hacking (cs192 report )
PPTX
PPTX
Hacking and its types
PPTX
Hacking
PPTX
Hacking & its types
PPTX
PPTX
HACKING
PPTX
Hacking
PPTX
Hacking & Hackers
PPTX
Hacking
PPTX
Haking PPT
PDF
Report on Hacking
PPTX
Hacking and its types V2
PPT
Hacking
PPTX
Hacking
PPTX
Hacking and Hackers
Hacking
HACKING AND ITS TYPES.pptx
hacking
Hacking (cs192 report )
Hacking and its types
Hacking
Hacking & its types
HACKING
Hacking
Hacking & Hackers
Hacking
Haking PPT
Report on Hacking
Hacking and its types V2
Hacking
Hacking
Hacking and Hackers

Recently uploaded (20)

PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
advance database management system book.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
B.Sc. DS Unit 2 Software Engineering.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Hazard Identification & Risk Assessment .pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
What if we spent less time fighting change, and more time building what’s rig...
My India Quiz Book_20210205121199924.pdf
Weekly quiz Compilation Jan -July 25.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
advance database management system book.pdf
IGGE1 Understanding the Self1234567891011
Paper A Mock Exam 9_ Attempt review.pdf.
Chinmaya Tiranga quiz Grand Finale.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper

Hacking

  • 1. Group Members: Muhammad Abbas Hadir janan, Asmia basher. Uasma Ahmad. Fahad Rehan. Arbaz Cheema.
  • 2. • History. • What is hacking. • Who are hacker. • Categories of hacking. • Types of hacking. • Famous hackers. • Why they hack. • How to secure your data. • Advantages and dis advantages of hacking. • Conclusion.
  • 3. • It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore programming in FORTRAN and other older languages. • And start hacking.
  • 4. • In simple words to access someone data with put his permission and view it. Called hacking.
  • 5. • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. • The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 6. • White hat hacking. • Grey hat hacking. • Black hat hacking.
  • 7. • Website Hacking. • Network hacking. • Email hacking. • Password Hacking. • Online Banking Hacking. • Computer Hacking.
  • 9. • Hacking a website means taking control from the website owner to a person who hacks the website.
  • 11. • Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 13. • Email hacking is illicit access to an email account or email correspondence.
  • 14. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 16. • Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 18. • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 19. • Gary McKinnon • LulzSec . • Adrian Lamo
  • 21. • Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files.
  • 23. • LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts.
  • 25. • Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times.
  • 26. • Just for fun. • Show off. • Hack other system Secretly. • Steal important Data. • Destroy Enemy computer during war.
  • 27. • Shutdown your Computer. • Separate your computer from network. • It be batter to call police.
  • 28. • Use unique passwords for your accounts. • Choose a combination of letters, numbers, or symbols to create a unique password.
  • 29. • Can be used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking.
  • 30. • Criminals can use it to their advantage. • It can harm someone's privacy • It's Illegal
  • 31. • Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .