SlideShare a Scribd company logo
Hacking
Presented by:- Arpit Verma
Reg. No.:- CRO0422316
Contents
1. What is hacking?
2. Who are hacker?
3. Hacker Categories?
4. Types of Hacker?
5. Skill of hackers?
6. Advantages & Disadvantages?
7. How to save computer from hackers
What is Hacking?
• Hacking is the act of breaking in to a computer
system and is a criminal offence under the
computer misuse
Or
• The really simple definition of hacking: is gaining
an unauthorized access to a computer system
Who is Hacker ?
The person who is consistently engaging in
hacking activities, and has accepted
hacking as a lifestyle and philosophy of
their choice, is called a Hacker
HACKER CATEGORIES
1. Semi-Professional Hacking. Performed part-time and
does not provide an income. They fit the classical
hacker characteristics.. they work and play on the edge
of society, have a gang mentality, strong negative
responses to threats against his/her self-esteem, can
have narcissistic personality disorders.
2. Inter-City Hacking. Inner-city residence (any race,
color, religion, creed, etc,), exhibits anger at social
condition, exhibits no social conscience, jail is not a
deterrent. Hacking gives them a sense of power and
allows them to make their own rules.
HACKER CATEGORIES
3. Euro hacking. More worldly , enlightened then US
hackers and are generally motivated by philosophical or
political concerns. Generally thought of as a way of life
and not a crime, thinks hacking is treating technology
without respect; thinks its great sport to spin up
intelligence communities.
4. Professional Hacking. This encompasses any for profit
activity such as spies, industrial espionage, Narco
terrorist, White Collar criminals, etc.
• White hat
• Black hat
• Grey hat
Type of hacker
White-hat Hackers
• The good guys
who identify the
security
weakness of
the system or
network and
inform the
owner about
them
Black Hat Hackers
A black hat is the villain or
bad guy, who crash into
victim’s security to steal
information and destroy
the victims security
network.
Also known as ‘cracker’.
Grey hat Hackers
• A grey hat, in the
hacking community,
refers to a skilled
hacker who is
somewhere in
between white and
black hat hackers
• Routers: knowledge of routers, routing protocols, and access control
lists
• Microsoft: skills in operation, configuration and management.
• Linux: knowledge of Linux/Unix; security setting, configuration, and
services.
• Firewalls: configurations, and operation of intrusion detection
systems.
• Mainframes
• Network Protocols: TCP/IP; how they function and can be
manipulated.
• Project Management: knowledge of leading, planning, organizing,
and controlling a penetration testing team.
Skill of a hacker
ADVANTAGES OF HACKING
• CAN BE USED TO RECOVER LOST INFORMATION WHERE
THE COMPUTER PASSWORD HAS BEEN LOST.
• TEACHES U THAT NO TECHNOLOGY IS 100% SECURE
•
• TO TEST HOW GOOD SECURITY IS ON YOUR OWN
NETWORK. ;)
• THEY CALL IT WHITE HAT COMPUTER HACKING.
• HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU
ARE ONLINE BUT THE ONLY PROBLEM IS
IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN
HACKING THEN YOU COULD GET CHUCKED OFF THE
GAMING SERVER SO WATCH OUT
How to save computer from hackers
• Protect Your Computer: Avoid Computer
Holes/Vulnerabilities
• Install only trusted software and delete unknown emails .
• If you have any doubt about a piece of software's
function, do not install it.
• Avoid adult web sites, a hacker's paradise.
• Whether in your e-mail or online, do not click on ads. If
the ad is of interest, find the site. Be careful with what
you physically put into your computer. This is especially
true for shared R/W CDs, USB hard disks, or flash
drives. This is an easy path for a virus to follow from
computer to computer.
e.mail i.d.- arpit.akiko@gmail.com
Mob. No.- +91 9540688557
Hacking

More Related Content

Hacking

  • 1. Hacking Presented by:- Arpit Verma Reg. No.:- CRO0422316
  • 2. Contents 1. What is hacking? 2. Who are hacker? 3. Hacker Categories? 4. Types of Hacker? 5. Skill of hackers? 6. Advantages & Disadvantages? 7. How to save computer from hackers
  • 3. What is Hacking? • Hacking is the act of breaking in to a computer system and is a criminal offence under the computer misuse Or • The really simple definition of hacking: is gaining an unauthorized access to a computer system
  • 4. Who is Hacker ? The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker
  • 5. HACKER CATEGORIES 1. Semi-Professional Hacking. Performed part-time and does not provide an income. They fit the classical hacker characteristics.. they work and play on the edge of society, have a gang mentality, strong negative responses to threats against his/her self-esteem, can have narcissistic personality disorders. 2. Inter-City Hacking. Inner-city residence (any race, color, religion, creed, etc,), exhibits anger at social condition, exhibits no social conscience, jail is not a deterrent. Hacking gives them a sense of power and allows them to make their own rules.
  • 6. HACKER CATEGORIES 3. Euro hacking. More worldly , enlightened then US hackers and are generally motivated by philosophical or political concerns. Generally thought of as a way of life and not a crime, thinks hacking is treating technology without respect; thinks its great sport to spin up intelligence communities. 4. Professional Hacking. This encompasses any for profit activity such as spies, industrial espionage, Narco terrorist, White Collar criminals, etc.
  • 7. • White hat • Black hat • Grey hat Type of hacker
  • 8. White-hat Hackers • The good guys who identify the security weakness of the system or network and inform the owner about them
  • 9. Black Hat Hackers A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.
  • 10. Grey hat Hackers • A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 11. • Routers: knowledge of routers, routing protocols, and access control lists • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems. • Mainframes • Network Protocols: TCP/IP; how they function and can be manipulated. • Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team. Skill of a hacker
  • 12. ADVANTAGES OF HACKING • CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST. • TEACHES U THAT NO TECHNOLOGY IS 100% SECURE • • TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK. ;) • THEY CALL IT WHITE HAT COMPUTER HACKING. • HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU ARE ONLINE BUT THE ONLY PROBLEM IS IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN HACKING THEN YOU COULD GET CHUCKED OFF THE GAMING SERVER SO WATCH OUT
  • 13. How to save computer from hackers • Protect Your Computer: Avoid Computer Holes/Vulnerabilities • Install only trusted software and delete unknown emails . • If you have any doubt about a piece of software's function, do not install it. • Avoid adult web sites, a hacker's paradise. • Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.
  • 14. e.mail i.d.- arpit.akiko@gmail.com Mob. No.- +91 9540688557
© 2024 SlideShare from Scribd

玻璃钢生产厂家台州玻璃钢仿铜雕塑定制辽宁玻璃钢彩绘雕塑商场美陈是什么河南酒店玻璃钢花盆阜阳商场美陈新密园林景观校园玻璃钢雕塑银川彩色玻璃钢雕塑价格黑山玻璃钢花盆花器商场美陈特装厂家价格虹口区镜面玻璃钢雕塑优选企业深圳周边商场美陈销售厂家商场新春美陈效果图通过质量认证的玻璃钢花盆户外植物园玻璃钢卡通雕塑厂家张掖大型玻璃钢雕塑定做宿州公园玻璃钢雕塑供应商吉林玻璃钢卡通雕塑猴子深圳从化玻璃钢人物雕塑普洱市玻璃钢雕塑批发玻璃钢雕塑 外贸淮南广场玻璃钢雕塑价格北京小品系列玻璃钢雕塑价格阜阳抽象玻璃钢雕塑供应商广东玻璃钢花盆研究贵州玻璃钢海豚雕塑价格景观玻璃钢雕塑怎么合作玻璃钢雕塑加什么滑石粉好广州玻璃钢彩绘雕塑价格贵州园林玻璃钢雕塑定制永州玻璃钢南瓜屋雕塑香港通过《维护国家安全条例》两大学生合买彩票中奖一人不认账让美丽中国“从细节出发”19岁小伙救下5人后溺亡 多方发声单亲妈妈陷入热恋 14岁儿子报警汪小菲曝离婚始末遭遇山火的松茸之乡雅江山火三名扑火人员牺牲系谣言何赛飞追着代拍打萧美琴窜访捷克 外交部回应卫健委通报少年有偿捐血浆16次猝死手机成瘾是影响睡眠质量重要因素高校汽车撞人致3死16伤 司机系学生315晚会后胖东来又人满为患了小米汽车超级工厂正式揭幕中国拥有亿元资产的家庭达13.3万户周杰伦一审败诉网易男孩8年未见母亲被告知被遗忘许家印被限制高消费饲养员用铁锨驱打大熊猫被辞退男子被猫抓伤后确诊“猫抓病”特朗普无法缴纳4.54亿美元罚金倪萍分享减重40斤方法联合利华开始重组张家界的山上“长”满了韩国人?张立群任西安交通大学校长杨倩无缘巴黎奥运“重生之我在北大当嫡校长”黑马情侣提车了专访95后高颜值猪保姆考生莫言也上北大硕士复试名单了网友洛杉矶偶遇贾玲专家建议不必谈骨泥色变沉迷短剧的人就像掉进了杀猪盘奥巴马现身唐宁街 黑色着装引猜测七年后宇文玥被薅头发捞上岸事业单位女子向同事水杯投不明物质凯特王妃现身!外出购物视频曝光河南驻马店通报西平中学跳楼事件王树国卸任西安交大校长 师生送别恒大被罚41.75亿到底怎么缴男子被流浪猫绊倒 投喂者赔24万房客欠租失踪 房东直发愁西双版纳热带植物园回应蜉蝣大爆发钱人豪晒法院裁定实锤抄袭外国人感慨凌晨的中国很安全胖东来员工每周单休无小长假白宫:哈马斯三号人物被杀测试车高速逃费 小米:已补缴老人退休金被冒领16年 金额超20万

玻璃钢生产厂家 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化