SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
1 | P a g e
Bangladeshi Cyber , An Emblem of Hacking
Taibul Islam
2013-3-10-020
ENG 102
Section : 15
Ms. Israt Jahan
12th
August , 2014
2 | P a g e
Index :
1. Abstract page - 3
2. Introduction page -4
3. Hack and Hacking page - 5
4. Hackers page - 6
5. History of Hacking in Bangladesh page - 7
6. Main or Negative Uses page - 8
7. Positive Uses page - 9
8. Kill or Cure page - 10
9. Conclusion page - 11
10. References page – 12
11. People who gave the interview page – 13
12. Sample Question for solving term paper page - 14 – 16
3 | P a g e
Abstract:
Hackers and Hacking are two related terms which really means the abuse of some
kind of technology . Mainly these kinds of words are related with computer terms . In our
country Bangladesh , these terms are now so much well known that people think these
are some kind of negative matter . The title of this term paper is giving a overall
massage about the hacking sector also . So , this term paper will help one to come at a
point which is the real meaning of Hacking and hacking sector in our country
Bangladesh.
4 | P a g e
Introduction :
In our modern Bangladesh where the uses of technology is increasing day by day
, the abuses of those technology is also increasing . People are involved in technology for
their mutual benefit or profit but some people are also involved in abuses . The
honorable government have their law for the using of technology where the abuses rate
is increasing and people are now so much aware of that . The affected users always want
the law should be obeyed , as hacking create its huge face among the technology users .
5 | P a g e
Hack and Hacking:
Clearly, “hack” is the word of the moment ; its technological connotations
have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to
mean fussing with machines . In the nineteen hundred sixty , the term seems to have
migrated from the M.I.T. context to computer enthusiasts in general and in time became
an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short-
history-of-hack )
Hacking may be done in many ways . Computer hacking , including some types of
activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer
subculture and Hacker ( computer security ) , to access computer networks , legally or
otherwise . Sometimes it may causes computer crimes .
Phone hacking , the practice of intercepting telephone calls or voicemail messages without
the consent of the phone's owner .
Illegal taxicab operation .
Pleasure riding , horseback riding for purely recreational purposes .
Shin-kicking The act of stealing jokes .
Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline-
hacking.
6 | P a g e
Hackers:
Hacker is a term that has been used to mean a variety of different things in
computing .
Currently , "hacker" is used in two main conflicting ways ,
1. as someone who is able to subvert computer security ; if doing so for malicious
purposes , the person can also be called a cracker .
2. an adherent of the technology and programming subculture .
In computer security , a hacker is someone who focuses on security mechanisms of
computer and network systems . While including those who endeavor to strengthen such
mechanisms , it is more often used by the mass media and popular culture to refer to
those who seek access despite these security measures . That is , the media portrays the
'hacker' as a villain .
In the programmer subculture of hackers , a hacker is a person who follows a spirit of
playful cleverness and loves programming . It is found in an originally academic
movement unrelated to computer security and most visibly associated with free software
and open source . It also has a hacker ethic , based on the idea that writing software and
sharing the result on a voluntary basis is a good idea , and that information should be
free , but that it's not up to the hacker to make it free by breaking into private
computer systems .
7 | P a g e
History of Hacking in Bangladesh :
Maybe the Hacking first started in 1947 by William Shockley who invented the
transistor and demonstrates its use for the first time . The first transistor consisted of a
messy collection of wires , insulators and germanium . According to a recent poll
on CNN's website , the transistor is believed to be the most important discovery in the
past 100 years .
The history of hacking in Bangladesh is actually unknown to all , on the other hand this
sector is an increasing or raising part in our country at present . Mostly the abuses of
internet means the main part of hacking in Bangladesh and it is increasing now a days .
8 | P a g e
Main or Negative Uses :
Hacking is mainly known for its negative uses . People think the hacking is only
for bad or harm someone or some group who or which is related with technology .
Actually , the hacking is mainly for that . Hackers through their terms for hacking
technologies . From the beginning the Hackers think that they always do the right thing
which should be done who are Hacked by them . These kind of Hackers are known as
The black hat hackers , who hacked the technology only for some kind of jealousy or for
their personal benefit . In our country Bangladesh these kind of Hacking is increasing
more and more among the new users of technology , and the people called these kind of
term as the Cyber War. They always target mostly Financial data , Intellectual property ,
personal data , System asses etc .
9 | P a g e
Positive Uses:
The uses of Hacking can be positive by hackers . These Kind of hack or hackers
are often known as the White hat Hackers . These kind of Hacking mainly done only to
save Hacked technology or secure the technology from hacking . Most of the Hackers
first starts their Hacking life by using this type of Hacking , sometimes they also work
as a middle group for hack and hacking terms or technology . People mostly think that
these term should be increased only for its positive side . These kind of uses can be
increased if people want this kind of uses .
10 | P a g e
Kill or Cure :
There are a law to stop the Hacking , and it says that if a person intentionally
causes loss or damage to any other person or organization by any act which destroys ,
deletes or alters any information residing in a computer resource or diminishes its value
or utility or affects it by any means , would be considered to have engaged in hacking.
So for the cyber crime this law can be applied in everywhere . And the main thing is
awareness of the users and people .
11 | P a g e
Conclusion :
It is clear to everyone that there are mainly two kind of hackers , White hat and
Red hat hackers. There have another hackers who try to call them as Gray or Brown hat
hackers . Hackers identity can be defined in many ways but these should be stopped or
in some case these should be cured not only from Bangladesh but also from the whole
world . So , the reader of this term paper , I think , a real technology user and always uses
his / her technology only for using not for abusing .
12 | P a g e
References :
a) Hacking
b) Hacker
c) Hacking Term
d) History of hacking
## These following terms are collecting from –
1) Wikipedia
2) Wikimedia
3) Google
## The terms of Hacking sectors of Bangladesh from -
A) TeachtuneBD.com
13 | P a g e
People who gave the interview :
1. Md. Ismail Hossain , CSE department , IUB
2. Rafaetul Kabir Adeab , CSE department , IUB
3. Code – A , EWU ( Hacker )
4. Sabbir Ahmed , CSE department, AIUB
5. Md. Tanvir Hossain Tuhin , CSE department , AIUB
6. Al Masum Fahim , CSE department , AUST
There are another two people who didn’t like to give their identity .
These people are giving their valuable time and ideas to complete this term
paper.
14 | P a g e
Bangladeshi Cyber , A Emblem of Hacking
Interviews for the term paper of ENG – 102
Questionnaires
(If you are a “Hacker” your name and detail must be hidden)
Student name :
University name :
Department :
1. What do you mean by Hack or Hacking ?
a) It is full of logic
b) It is nothing but hell
c) It should be stopped
d) It should be done in an increasing rate
2. Are you a Hacker ? (This answer will be hidden)
a) No
b) Yes
c) Want to be
d) Don’t want to be
3. What kind of Hacking should be done ?
a) White Hat
b) Red Hat
c) None of them
d) Both of them
15 | P a g e
4. Is it so much helpful ?
a) Yes
b) No
c) Can be
d) Must be
5. Hacking increases ideas – Do you agree with that ?
a) Yes
b) Obviously
c) Only for sometime
d) No
6. Hackers are so much genius – Is it true ?
a) Yes
b) Not always
c) No
d) May be
7. Will Hacking make our country developed ?
a) Yes
b) No
c) Can be
d) Must be
8. How many technologies you Hacked ? (This answer will be hidden)
a) Less than 100
b) More than 100
c) Didn’t do
d) Can’t count
16 | P a g e
9. How many technologies that you use is Hacked ? (This answer will be hidden)
a) Mostly all
b) Not any
c) Half of them
d) I Hacked others
10. Your idea or philosophy about Hacking in Bangladesh -------------------------
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Your signature :
Date :

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

Ähnlich wie Hackers and hacking in bangladesh

CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ictAbdul Wahab Raza
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointOmnia Magdy
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint Omnia Magdy
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 

Ähnlich wie Hackers and hacking in bangladesh (20)

CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
ethics final project
ethics final projectethics final project
ethics final project
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
 
hackers
hackershackers
hackers
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Mehr von Taibul Islam Tushar

Mehr von Taibul Islam Tushar (8)

Project on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchangeProject on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchange
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharma
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharma
 
Al - Quran (only Arabic)
Al - Quran (only Arabic)  Al - Quran (only Arabic)
Al - Quran (only Arabic)
 
Self e
Self eSelf e
Self e
 
A company's overview
A company's overviewA company's overview
A company's overview
 
Circular diagram of a nation's income
Circular diagram of a nation's incomeCircular diagram of a nation's income
Circular diagram of a nation's income
 
Haiku, bangla language or myself
Haiku,  bangla language or myselfHaiku,  bangla language or myself
Haiku, bangla language or myself
 

Kürzlich hochgeladen

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 

Kürzlich hochgeladen (20)

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 

Hackers and hacking in bangladesh

  • 1. 1 | P a g e Bangladeshi Cyber , An Emblem of Hacking Taibul Islam 2013-3-10-020 ENG 102 Section : 15 Ms. Israt Jahan 12th August , 2014
  • 2. 2 | P a g e Index : 1. Abstract page - 3 2. Introduction page -4 3. Hack and Hacking page - 5 4. Hackers page - 6 5. History of Hacking in Bangladesh page - 7 6. Main or Negative Uses page - 8 7. Positive Uses page - 9 8. Kill or Cure page - 10 9. Conclusion page - 11 10. References page – 12 11. People who gave the interview page – 13 12. Sample Question for solving term paper page - 14 – 16
  • 3. 3 | P a g e Abstract: Hackers and Hacking are two related terms which really means the abuse of some kind of technology . Mainly these kinds of words are related with computer terms . In our country Bangladesh , these terms are now so much well known that people think these are some kind of negative matter . The title of this term paper is giving a overall massage about the hacking sector also . So , this term paper will help one to come at a point which is the real meaning of Hacking and hacking sector in our country Bangladesh.
  • 4. 4 | P a g e Introduction : In our modern Bangladesh where the uses of technology is increasing day by day , the abuses of those technology is also increasing . People are involved in technology for their mutual benefit or profit but some people are also involved in abuses . The honorable government have their law for the using of technology where the abuses rate is increasing and people are now so much aware of that . The affected users always want the law should be obeyed , as hacking create its huge face among the technology users .
  • 5. 5 | P a g e Hack and Hacking: Clearly, “hack” is the word of the moment ; its technological connotations have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to mean fussing with machines . In the nineteen hundred sixty , the term seems to have migrated from the M.I.T. context to computer enthusiasts in general and in time became an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short- history-of-hack ) Hacking may be done in many ways . Computer hacking , including some types of activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer subculture and Hacker ( computer security ) , to access computer networks , legally or otherwise . Sometimes it may causes computer crimes . Phone hacking , the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner . Illegal taxicab operation . Pleasure riding , horseback riding for purely recreational purposes . Shin-kicking The act of stealing jokes . Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline- hacking.
  • 6. 6 | P a g e Hackers: Hacker is a term that has been used to mean a variety of different things in computing . Currently , "hacker" is used in two main conflicting ways , 1. as someone who is able to subvert computer security ; if doing so for malicious purposes , the person can also be called a cracker . 2. an adherent of the technology and programming subculture . In computer security , a hacker is someone who focuses on security mechanisms of computer and network systems . While including those who endeavor to strengthen such mechanisms , it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures . That is , the media portrays the 'hacker' as a villain . In the programmer subculture of hackers , a hacker is a person who follows a spirit of playful cleverness and loves programming . It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source . It also has a hacker ethic , based on the idea that writing software and sharing the result on a voluntary basis is a good idea , and that information should be free , but that it's not up to the hacker to make it free by breaking into private computer systems .
  • 7. 7 | P a g e History of Hacking in Bangladesh : Maybe the Hacking first started in 1947 by William Shockley who invented the transistor and demonstrates its use for the first time . The first transistor consisted of a messy collection of wires , insulators and germanium . According to a recent poll on CNN's website , the transistor is believed to be the most important discovery in the past 100 years . The history of hacking in Bangladesh is actually unknown to all , on the other hand this sector is an increasing or raising part in our country at present . Mostly the abuses of internet means the main part of hacking in Bangladesh and it is increasing now a days .
  • 8. 8 | P a g e Main or Negative Uses : Hacking is mainly known for its negative uses . People think the hacking is only for bad or harm someone or some group who or which is related with technology . Actually , the hacking is mainly for that . Hackers through their terms for hacking technologies . From the beginning the Hackers think that they always do the right thing which should be done who are Hacked by them . These kind of Hackers are known as The black hat hackers , who hacked the technology only for some kind of jealousy or for their personal benefit . In our country Bangladesh these kind of Hacking is increasing more and more among the new users of technology , and the people called these kind of term as the Cyber War. They always target mostly Financial data , Intellectual property , personal data , System asses etc .
  • 9. 9 | P a g e Positive Uses: The uses of Hacking can be positive by hackers . These Kind of hack or hackers are often known as the White hat Hackers . These kind of Hacking mainly done only to save Hacked technology or secure the technology from hacking . Most of the Hackers first starts their Hacking life by using this type of Hacking , sometimes they also work as a middle group for hack and hacking terms or technology . People mostly think that these term should be increased only for its positive side . These kind of uses can be increased if people want this kind of uses .
  • 10. 10 | P a g e Kill or Cure : There are a law to stop the Hacking , and it says that if a person intentionally causes loss or damage to any other person or organization by any act which destroys , deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means , would be considered to have engaged in hacking. So for the cyber crime this law can be applied in everywhere . And the main thing is awareness of the users and people .
  • 11. 11 | P a g e Conclusion : It is clear to everyone that there are mainly two kind of hackers , White hat and Red hat hackers. There have another hackers who try to call them as Gray or Brown hat hackers . Hackers identity can be defined in many ways but these should be stopped or in some case these should be cured not only from Bangladesh but also from the whole world . So , the reader of this term paper , I think , a real technology user and always uses his / her technology only for using not for abusing .
  • 12. 12 | P a g e References : a) Hacking b) Hacker c) Hacking Term d) History of hacking ## These following terms are collecting from – 1) Wikipedia 2) Wikimedia 3) Google ## The terms of Hacking sectors of Bangladesh from - A) TeachtuneBD.com
  • 13. 13 | P a g e People who gave the interview : 1. Md. Ismail Hossain , CSE department , IUB 2. Rafaetul Kabir Adeab , CSE department , IUB 3. Code – A , EWU ( Hacker ) 4. Sabbir Ahmed , CSE department, AIUB 5. Md. Tanvir Hossain Tuhin , CSE department , AIUB 6. Al Masum Fahim , CSE department , AUST There are another two people who didn’t like to give their identity . These people are giving their valuable time and ideas to complete this term paper.
  • 14. 14 | P a g e Bangladeshi Cyber , A Emblem of Hacking Interviews for the term paper of ENG – 102 Questionnaires (If you are a “Hacker” your name and detail must be hidden) Student name : University name : Department : 1. What do you mean by Hack or Hacking ? a) It is full of logic b) It is nothing but hell c) It should be stopped d) It should be done in an increasing rate 2. Are you a Hacker ? (This answer will be hidden) a) No b) Yes c) Want to be d) Don’t want to be 3. What kind of Hacking should be done ? a) White Hat b) Red Hat c) None of them d) Both of them
  • 15. 15 | P a g e 4. Is it so much helpful ? a) Yes b) No c) Can be d) Must be 5. Hacking increases ideas – Do you agree with that ? a) Yes b) Obviously c) Only for sometime d) No 6. Hackers are so much genius – Is it true ? a) Yes b) Not always c) No d) May be 7. Will Hacking make our country developed ? a) Yes b) No c) Can be d) Must be 8. How many technologies you Hacked ? (This answer will be hidden) a) Less than 100 b) More than 100 c) Didn’t do d) Can’t count
  • 16. 16 | P a g e 9. How many technologies that you use is Hacked ? (This answer will be hidden) a) Mostly all b) Not any c) Half of them d) I Hacked others 10. Your idea or philosophy about Hacking in Bangladesh ------------------------- ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ Your signature : Date :