SlideShare a Scribd company logo
HACKING By : Syahila Amira binti Ya’acob Class : 4 Science Erat/07
INTRODUCTION Hacker   -  a person who learns about the computer systems in details. The person wrote program referred to as hacks. Hacker may use modem cable to hack the targeted computers. Hacking  –  a source of threat to security in computer. Defined as unauthorized access to the computer system  by a hacker.
HACKING 16 Easy Steps To Hack : Get a real SL/IP account. If you want to hack the internet, you will need to be directly connected to the net, and SL/IP basically does this.  Most of the net runs on UNIX like operating systems. So, you have to do the same. Buy a UNIX type operating system, and several books on UNIX. The easiest (and cheapest) way to go is with one of the multi-cd Linux sets. The best is to get the Slackware release on CD.  Re-partition your hard drive about 340 megs, so you will have room for a Linux partition. Read all the installation instructions for Linux.
Install Linux on your system. Follow the instructions you read in step 5. Install everything, especially the net stuff, the programming stuff, and the docs, etc. Once you have everything installed, reboot and log in.  Read the kernel docs/FAQ/How-To. Now recompile your kernel to make a custom kernel for your system.  Got your new kernel compiled? Install it, and re-run. Re-boot with your custom kernel.  Now that you are running a real OS, read all the docs, etc.  Next play with your nice new OS. Spend a little time exploring and learning the system. After playing with the system for about a year, go on (if you were never on AOL etc, then you probably don't need the full year, maybe only about a month).
Configure your system for SL/IP and accessing the net. When you installed Linux in the first place, you ran the net configuration script, but that didn't set up everything. You have some text files to edit, and you need to set up DIP if you are going to be accessing the net via modem.  Learn to use the basic net tools. Get use to it. Learn to program. Get some books on stuff like C, etc. Play with Perl, C, C++ on your system until you can actually program. Now practice programming for a while until you get at least a little good at it.  Read all the RFCs. These contain information that is vital if you want to hack the net.
Subscribe to a few security related mailing lists and newsgroups.  You should now have enough information to try some simple hacks, so try some simple hacks. If they work, great, you are almost a junior hacker.  Explore the net. Try things. Look for security holes. Read a lot of source code. Write some hacking utilities.
The Hacker Attitude : The world is full of fascinating problems waiting to be solved. No problem should ever have to be solved twice. Boredom and drudgery are evil.   Freedom is good.   Attitude is no substitute for competence.
Status in the Hacker Culture : Write open-source software   Help test and debug open-source software   Publish useful information   Help keep the infrastructure working   Serve the hacker culture itself
The 3 Biggest Hacker : Kevin Mitnick   Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone breaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”
Gary McKinnon   This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.
Vladimir Levin This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.
CONCLUSION Hacking is a crime.  Hacker is one of the security threats. Hackers will be charged if caught.

More Related Content

PPT
Ulfah
PPTX
PPTX
Hacking Vs Cracking in Computer Networks
PPTX
Hacking intro
PPTX
Hacking Presentation
PPTX
Internet security
PPTX
Ethical Hacking
PPTX
Trojan horsies prez
Ulfah
Hacking Vs Cracking in Computer Networks
Hacking intro
Hacking Presentation
Internet security
Ethical Hacking
Trojan horsies prez

What's hot (20)

PPTX
Sit presentation - Hacking
PPTX
Ethical hacking
PPT
091005 Internet Security
PPT
PPTX
PPT
Internet Security
PPTX
Syafiqah slideshare of security measures
PPT
NewIinternet security
PPTX
Internet security
PPTX
Operating Systems: Computer Security
PPTX
Cybersecurity cyberlab1
PPTX
Hacking
PPTX
Operating Systems: Computer Security
PPTX
Internet Security
PPT
PPT
New internet security
PPT
internet security
PPTX
Basic Internet Security
PPTX
Web defacement
PPT
Tutorial 09 - Security on the Internet and the Web
 
Sit presentation - Hacking
Ethical hacking
091005 Internet Security
Internet Security
Syafiqah slideshare of security measures
NewIinternet security
Internet security
Operating Systems: Computer Security
Cybersecurity cyberlab1
Hacking
Operating Systems: Computer Security
Internet Security
New internet security
internet security
Basic Internet Security
Web defacement
Tutorial 09 - Security on the Internet and the Web
 

Viewers also liked (18)

PPTX
Hiphop - PHP
PDF
Are you ready to be hacked?
PDF
HHVM and Hack: A quick introduction
PPTX
Hiphop php
PDF
Life As A Fraudster: Carding 101
PPTX
Hello world program
PPTX
Whats app Sniffer - How To Hack Whatsapp Messages
PDF
C language in hindi (cलेग्वेज इन हिंदी )
PPT
Broiler Production by Dr. Farooq Sarwar
PPTX
Whatsapp project work
PDF
關於履歷表, 我想說的其實是...
PPTX
Indian Army
PPTX
Whatsapp PPT Presentation
PDF
How to become a data scientist in 6 months
PPSX
INTRODUCTION TO C PROGRAMMING
PPTX
whatsapp ppt
KEY
Want to keep your IT career? Never stop learning
PDF
Deep C
Hiphop - PHP
Are you ready to be hacked?
HHVM and Hack: A quick introduction
Hiphop php
Life As A Fraudster: Carding 101
Hello world program
Whats app Sniffer - How To Hack Whatsapp Messages
C language in hindi (cलेग्वेज इन हिंदी )
Broiler Production by Dr. Farooq Sarwar
Whatsapp project work
關於履歷表, 我想說的其實是...
Indian Army
Whatsapp PPT Presentation
How to become a data scientist in 6 months
INTRODUCTION TO C PROGRAMMING
whatsapp ppt
Want to keep your IT career? Never stop learning
Deep C

Similar to Hacking (20)

PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPT
Hacking And Its Prevention
PPT
Hacking 1224807880385377-9
PDF
Hack the book Mini
PDF
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
PPTX
hacking
PPT
Hacking tutorial
PDF
78751355 cryptomorphosis
PDF
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
PPT
PPT
Hackers Izyani
PPT
Power Point Hacker
PPTX
Hacking by Pratyush Gupta
DOCX
Ethical hacking
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
Hacking and Hackers
DOC
Hacking for Dummies 2
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking And Its Prevention
Hacking 1224807880385377-9
Hack the book Mini
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
hacking
Hacking tutorial
78751355 cryptomorphosis
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Hackers Izyani
Power Point Hacker
Hacking by Pratyush Gupta
Ethical hacking
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
Hacking and Hackers
Hacking for Dummies 2

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Hacking

  • 1. HACKING By : Syahila Amira binti Ya’acob Class : 4 Science Erat/07
  • 2. INTRODUCTION Hacker - a person who learns about the computer systems in details. The person wrote program referred to as hacks. Hacker may use modem cable to hack the targeted computers. Hacking – a source of threat to security in computer. Defined as unauthorized access to the computer system by a hacker.
  • 3. HACKING 16 Easy Steps To Hack : Get a real SL/IP account. If you want to hack the internet, you will need to be directly connected to the net, and SL/IP basically does this. Most of the net runs on UNIX like operating systems. So, you have to do the same. Buy a UNIX type operating system, and several books on UNIX. The easiest (and cheapest) way to go is with one of the multi-cd Linux sets. The best is to get the Slackware release on CD. Re-partition your hard drive about 340 megs, so you will have room for a Linux partition. Read all the installation instructions for Linux.
  • 4. Install Linux on your system. Follow the instructions you read in step 5. Install everything, especially the net stuff, the programming stuff, and the docs, etc. Once you have everything installed, reboot and log in. Read the kernel docs/FAQ/How-To. Now recompile your kernel to make a custom kernel for your system. Got your new kernel compiled? Install it, and re-run. Re-boot with your custom kernel. Now that you are running a real OS, read all the docs, etc. Next play with your nice new OS. Spend a little time exploring and learning the system. After playing with the system for about a year, go on (if you were never on AOL etc, then you probably don't need the full year, maybe only about a month).
  • 5. Configure your system for SL/IP and accessing the net. When you installed Linux in the first place, you ran the net configuration script, but that didn't set up everything. You have some text files to edit, and you need to set up DIP if you are going to be accessing the net via modem. Learn to use the basic net tools. Get use to it. Learn to program. Get some books on stuff like C, etc. Play with Perl, C, C++ on your system until you can actually program. Now practice programming for a while until you get at least a little good at it. Read all the RFCs. These contain information that is vital if you want to hack the net.
  • 6. Subscribe to a few security related mailing lists and newsgroups. You should now have enough information to try some simple hacks, so try some simple hacks. If they work, great, you are almost a junior hacker. Explore the net. Try things. Look for security holes. Read a lot of source code. Write some hacking utilities.
  • 7. The Hacker Attitude : The world is full of fascinating problems waiting to be solved. No problem should ever have to be solved twice. Boredom and drudgery are evil. Freedom is good. Attitude is no substitute for competence.
  • 8. Status in the Hacker Culture : Write open-source software Help test and debug open-source software Publish useful information Help keep the infrastructure working Serve the hacker culture itself
  • 9. The 3 Biggest Hacker : Kevin Mitnick Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone breaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”
  • 10. Gary McKinnon This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.
  • 11. Vladimir Levin This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.
  • 12. CONCLUSION Hacking is a crime. Hacker is one of the security threats. Hackers will be charged if caught.