SlideShare a Scribd company logo
Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. Hacking needs total understanding of a computer security system.
A hacker can simply be said to be someone who can breach into a computer system and network because he can exploit and detect the weakness in that security system or network. Hacking really seems to be difficult for people and that's because they have no true understanding of Computer, but the really truth is that anyone can hack.
WAYS TO HACK
There are different ways to hack but the easiest way is to plant a virus in the targeted system, and this cam be done by sending the virus via an emai. The virus will not be seen or noticed by the target.
Now this virus has been designed to send information from the targeted device (Computer or Phone)to the hacker.
BUT WHAT EXACTLY IS A VIRUS?
A Virus is a malicious software that can replicate itself by modifying other computer programs and inserting its own code. There are different kind of Virus and the kind you need to hack is a 'SPYWARE'
A SPYWARE is a software that aims to gather information about a person or organisation vai their device(Computer or Phone) and sends back informations to the user via the internet.
Spywares are just simple written codes that acts like programs on a device( Computer or Phone).
If you ever need any assistance in creating a virus to gain access to someone else's Computer or Phone you can contact Soft Tech Geeks softtechgeeks@gmail.com for help.
We are an organisation based in China we provide tutorials to young computer scientist and also help in hacking.

More Related Content

PPTX
2 2 the dangers of computer crime
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Internet security issues
PPTX
Internet Security in Web 2.0
PPTX
Access Controls Attacks
PPTX
security issues
DOCX
Portfolio 7
PPTX
Access control attacks by Yaakub bin Idris
2 2 the dangers of computer crime
Ethical hacking introduction to ethical hacking
Internet security issues
Internet Security in Web 2.0
Access Controls Attacks
security issues
Portfolio 7
Access control attacks by Yaakub bin Idris

What's hot (20)

PPTX
Hacking
PPTX
Hass and associates cyber security
PPTX
Ethical hacking trojans, worms and spyware
DOCX
What is Malware?
PPTX
Ethical hacking
PDF
What is a Hacker (part 2): How data is stolen
PPT
ISDD Security Precautions
PPT
ISDD - Security Risks
PPTX
Detecting and mitigating cyber threats and attacks1
PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PPTX
Introduction To Ethical Hacking
PPTX
Spyware risk it's time to get smart
PPTX
spyware
PDF
What is threat intelligence ?
PPTX
Top 10 common hacking techniques
PDF
Domain 5 of the CEH: Web Application Hacking
PPTX
Computer securety
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PPTX
BackDoors Seminar
Hacking
Hass and associates cyber security
Ethical hacking trojans, worms and spyware
What is Malware?
Ethical hacking
What is a Hacker (part 2): How data is stolen
ISDD Security Precautions
ISDD - Security Risks
Detecting and mitigating cyber threats and attacks1
How to Keep Yourself secure while browsing internet pre null meet kolkata
Introduction To Ethical Hacking
Spyware risk it's time to get smart
spyware
What is threat intelligence ?
Top 10 common hacking techniques
Domain 5 of the CEH: Web Application Hacking
Computer securety
Domain 4 of CEH V11: Network and Perimeter Hacking
BackDoors Seminar

Similar to UNDERSTANDING HACKING (20)

PPTX
Internetsecuritypowerpoint 130404101055-phpapp02
PPTX
Computer Hacking - An Introduction
PPTX
Basics of hacking
PPT
Computer hacking
PPT
Hacking
PPTX
Internet security powerpoint
PPTX
Internet security powerpoint
PPTX
Ethical Hacking
PPT
Computer crime (1)
PDF
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PPT
4598 cybercrime
PPT
Ethical hacking
PPTX
Dhams hacking
PPTX
hacking basics
PPTX
Introduction to Ethical Hacking (Basics)
PPTX
BCE L-3omputer security Basics.pptx
PPTX
Β. Hucking
PPTX
CYBERSECURITY | Why it is important?
PPTX
Hacking
PPT
Ethical Hacking
Internetsecuritypowerpoint 130404101055-phpapp02
Computer Hacking - An Introduction
Basics of hacking
Computer hacking
Hacking
Internet security powerpoint
Internet security powerpoint
Ethical Hacking
Computer crime (1)
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
4598 cybercrime
Ethical hacking
Dhams hacking
hacking basics
Introduction to Ethical Hacking (Basics)
BCE L-3omputer security Basics.pptx
Β. Hucking
CYBERSECURITY | Why it is important?
Hacking
Ethical Hacking

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
AI in Product Development-omnex systems
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
ai tools demonstartion for schools and inter college
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Nekopoi APK 2025 free lastest update
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
history of c programming in notes for students .pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
VVF-Customer-Presentation2025-Ver1.9.pptx
Understanding Forklifts - TECH EHS Solution
AI in Product Development-omnex systems
How to Migrate SBCGlobal Email to Yahoo Easily
CHAPTER 2 - PM Management and IT Context
ai tools demonstartion for schools and inter college
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PTS Company Brochure 2025 (1).pdf.......
How Creative Agencies Leverage Project Management Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Upgrade and Innovation Strategies for SAP ERP Customers
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How to Choose the Right IT Partner for Your Business in Malaysia
Nekopoi APK 2025 free lastest update
Softaken Excel to vCard Converter Software.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
history of c programming in notes for students .pptx

UNDERSTANDING HACKING

  • 1. Hacking is the unauthorised access to or control over computer network security systems for some illicit purpose. Hacking needs total understanding of a computer security system. A hacker can simply be said to be someone who can breach into a computer system and network because he can exploit and detect the weakness in that security system or network. Hacking really seems to be difficult for people and that's because they have no true understanding of Computer, but the really truth is that anyone can hack. WAYS TO HACK There are different ways to hack but the easiest way is to plant a virus in the targeted system, and this cam be done by sending the virus via an emai. The virus will not be seen or noticed by the target. Now this virus has been designed to send information from the targeted device (Computer or Phone)to the hacker. BUT WHAT EXACTLY IS A VIRUS? A Virus is a malicious software that can replicate itself by modifying other computer programs and inserting its own code. There are different kind of Virus and the kind you need to hack is a 'SPYWARE' A SPYWARE is a software that aims to gather information about a person or organisation vai their device(Computer or Phone) and sends back informations to the user via the internet. Spywares are just simple written codes that acts like programs on a device( Computer or Phone). If you ever need any assistance in creating a virus to gain access to someone else's Computer or Phone you can contact Soft Tech Geeks softtechgeeks@gmail.com for help. We are an organisation based in China we provide tutorials to young computer scientist and also help in hacking.