SlideShare a Scribd company logo
1 of 29
Download to read offline
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
.
PROJECT BY HARSH & RAVI
Hackers are the person who unkindly breaks into systems for
personal gain. Technically, these criminals are crackers
PROJECT BY HARSH & RAVI
Black hats – highly skilled,
malicious, destructive “crackers”
White hats – skills used for
defensive security analysts
Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
PROJECT BY HARSH & RAVI
Reset the Password
Use a Key logger
Command prompt (Linux based)
Phishing
PROJECT BY HARSH & RAVI
The easiest way to "hack" into someone's Facebook is through resetting the
password. This could be easier done by people who are friends with the person
they're trying to hack.
Steps:-
 The first step would be to get your friend's Facebook email login.
 Next, enter victim's email then click on Forgotten your password?
 It will ask if you would like to reset the password via the victim's emails. This
doesn't help, so press No longer have access to these?
 It will now ask you a question.
 If you don't figure out the question, you can click on Recover your account with
help from friends. This allows you to choose between three - five friends.
 It will send them passwords.
PROJECT BY HARSH & RAVI
SOFTWARE
BASED
HARDWARE
BASED
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
Phishing is the most widely used
hacking method for hacking Facebook
passwords. The most widely used
technique in phishing is the use of
Fake Login Pages, also known as
spoofed pages. These fake login
pages resemble the original login
pages of sites like Yahoo , Gmail,
MySpace etc.
PROJECT BY HARSH & RAVI
STEP1:- Go to facebook homepage the right it save webpage as
HTML only by name “INDEX”
STEP2:- create a notepad file for entering following code & saveas
“next.php”
STEP3:- create text file & save as “password”
STEP4:- open INDEX file in notepad press ctrl+F search for action,
now change webpage to next.php and save it
STEP5:- go to www.************.com and log in to your account
STEP6:- upload all the 3 file to website in public directory folder
STEP7:- now ask the person to log in to dummy page of facebook
as he log in its password would be mailed to id or saved to
password.txt
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
 Hacking is the most dangerous enemy of the company
because most of the companies work is done through online.
 If companies a/c or website is hacked then its all private data
may be leaked and competitors may take advantages of that
data.
 Our company’s monopoly product is Faluda syrup all over
Gujarat. So, after being hacked the secret ingredients of
Faluda syrup may revealed. PROJECT BY HARSH & RAVI
MAIN THREATS OF THE COMPANY AFTER BEING HACKED
Account details
Company details
payment structures
Secret ingredients of their products
List of suppliers and its details
List of bulk purchase customers and its details etc..
PROJECT BY HARSH & RAVI
Use an email address specifically for your Facebook
and don't put that email address on your profile.
When choosing a security question and answer,
make it difficult.
Don’t log on an unknown/unsecured pc’s
PROJECT BY HARSH & RAVI
Don’t give access of professional a/c to any
employees or any other person
Try to access your professional a/c on your pcs or
laptop only
Upload less personal information on social hubs
Use anti-phishing feature in anti virus (Avast-Anti-
Phishing)
PROJECT BY HARSH & RAVI
Don’t click on unknown pop-ups
Frequently change your password
Use security features in email server and make mobile no. protection
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI

More Related Content

What's hot

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?paula_bolivar
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 

What's hot (20)

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
security procedures
security procedures
security procedures
security procedures
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 

Viewers also liked

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to PhilosophyMozu
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์noeiinoii
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIApratik swarup das
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar imageswilsonrd1987
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberRakhi Tips Provider
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonBernadette Gelsei
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Anatoliy Arkhipov
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Rakhi Tips Provider
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberRakhi Tips Provider
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วnoeiinoii
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationPrimary Care Commissioning (PCC)
 

Viewers also liked (15)

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to Philosophy
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
 
Paradigm created
Paradigm createdParadigm created
Paradigm created
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
 
September 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor NassiefSeptember 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor Nassief
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-November
 
INDOKON BETON INSTAN
INDOKON BETON INSTANINDOKON BETON INSTAN
INDOKON BETON INSTAN
 
Donation waiver authority and procedure
Donation waiver authority and procedureDonation waiver authority and procedure
Donation waiver authority and procedure
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-November
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
 

Similar to FULL MEANING OF HACKING

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202James Ruffer
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseMichal Špaček
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
security procedures
security procedures
security procedures
security procedures puffyarson5604
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 

Similar to FULL MEANING OF HACKING (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
security procedures
security procedures
security procedures
security procedures
 
Hack a Facebook password
Hack a Facebook passwordHack a Facebook password
Hack a Facebook password
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Password Attack
Password Attack Password Attack
Password Attack
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

FULL MEANING OF HACKING

  • 7. Hackers are the person who unkindly breaks into systems for personal gain. Technically, these criminals are crackers PROJECT BY HARSH & RAVI
  • 8. Black hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation. PROJECT BY HARSH & RAVI
  • 9. Reset the Password Use a Key logger Command prompt (Linux based) Phishing PROJECT BY HARSH & RAVI
  • 10. The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack. Steps:-  The first step would be to get your friend's Facebook email login.  Next, enter victim's email then click on Forgotten your password?  It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?  It will now ask you a question.  If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three - five friends.  It will send them passwords. PROJECT BY HARSH & RAVI
  • 13. Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. PROJECT BY HARSH & RAVI
  • 14. STEP1:- Go to facebook homepage the right it save webpage as HTML only by name “INDEX” STEP2:- create a notepad file for entering following code & saveas “next.php” STEP3:- create text file & save as “password” STEP4:- open INDEX file in notepad press ctrl+F search for action, now change webpage to next.php and save it STEP5:- go to www.************.com and log in to your account STEP6:- upload all the 3 file to website in public directory folder STEP7:- now ask the person to log in to dummy page of facebook as he log in its password would be mailed to id or saved to password.txt PROJECT BY HARSH & RAVI
  • 24.  Hacking is the most dangerous enemy of the company because most of the companies work is done through online.  If companies a/c or website is hacked then its all private data may be leaked and competitors may take advantages of that data.  Our company’s monopoly product is Faluda syrup all over Gujarat. So, after being hacked the secret ingredients of Faluda syrup may revealed. PROJECT BY HARSH & RAVI
  • 25. MAIN THREATS OF THE COMPANY AFTER BEING HACKED Account details Company details payment structures Secret ingredients of their products List of suppliers and its details List of bulk purchase customers and its details etc.. PROJECT BY HARSH & RAVI
  • 26. Use an email address specifically for your Facebook and don't put that email address on your profile. When choosing a security question and answer, make it difficult. Don’t log on an unknown/unsecured pc’s PROJECT BY HARSH & RAVI
  • 27. Don’t give access of professional a/c to any employees or any other person Try to access your professional a/c on your pcs or laptop only Upload less personal information on social hubs Use anti-phishing feature in anti virus (Avast-Anti- Phishing) PROJECT BY HARSH & RAVI
  • 28. Don’t click on unknown pop-ups Frequently change your password Use security features in email server and make mobile no. protection PROJECT BY HARSH & RAVI