SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
1 | P a g e
Bangladeshi Cyber , An Emblem of Hacking
Taibul Islam
2013-3-10-020
ENG 102
Section : 15
Ms. Israt Jahan
12th
August , 2014
2 | P a g e
Index :
1. Abstract page - 3
2. Introduction page -4
3. Hack and Hacking page - 5
4. Hackers page - 6
5. History of Hacking in Bangladesh page - 7
6. Main or Negative Uses page - 8
7. Positive Uses page - 9
8. Kill or Cure page - 10
9. Conclusion page - 11
10. References page – 12
11. People who gave the interview page – 13
12. Sample Question for solving term paper page - 14 – 16
3 | P a g e
Abstract:
Hackers and Hacking are two related terms which really means the abuse of some
kind of technology . Mainly these kinds of words are related with computer terms . In our
country Bangladesh , these terms are now so much well known that people think these
are some kind of negative matter . The title of this term paper is giving a overall
massage about the hacking sector also . So , this term paper will help one to come at a
point which is the real meaning of Hacking and hacking sector in our country
Bangladesh.
4 | P a g e
Introduction :
In our modern Bangladesh where the uses of technology is increasing day by day
, the abuses of those technology is also increasing . People are involved in technology for
their mutual benefit or profit but some people are also involved in abuses . The
honorable government have their law for the using of technology where the abuses rate
is increasing and people are now so much aware of that . The affected users always want
the law should be obeyed , as hacking create its huge face among the technology users .
5 | P a g e
Hack and Hacking:
Clearly, “hack” is the word of the moment ; its technological connotations
have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to
mean fussing with machines . In the nineteen hundred sixty , the term seems to have
migrated from the M.I.T. context to computer enthusiasts in general and in time became
an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short-
history-of-hack )
Hacking may be done in many ways . Computer hacking , including some types of
activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer
subculture and Hacker ( computer security ) , to access computer networks , legally or
otherwise . Sometimes it may causes computer crimes .
Phone hacking , the practice of intercepting telephone calls or voicemail messages without
the consent of the phone's owner .
Illegal taxicab operation .
Pleasure riding , horseback riding for purely recreational purposes .
Shin-kicking The act of stealing jokes .
Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline-
hacking.
6 | P a g e
Hackers:
Hacker is a term that has been used to mean a variety of different things in
computing .
Currently , "hacker" is used in two main conflicting ways ,
1. as someone who is able to subvert computer security ; if doing so for malicious
purposes , the person can also be called a cracker .
2. an adherent of the technology and programming subculture .
In computer security , a hacker is someone who focuses on security mechanisms of
computer and network systems . While including those who endeavor to strengthen such
mechanisms , it is more often used by the mass media and popular culture to refer to
those who seek access despite these security measures . That is , the media portrays the
'hacker' as a villain .
In the programmer subculture of hackers , a hacker is a person who follows a spirit of
playful cleverness and loves programming . It is found in an originally academic
movement unrelated to computer security and most visibly associated with free software
and open source . It also has a hacker ethic , based on the idea that writing software and
sharing the result on a voluntary basis is a good idea , and that information should be
free , but that it's not up to the hacker to make it free by breaking into private
computer systems .
7 | P a g e
History of Hacking in Bangladesh :
Maybe the Hacking first started in 1947 by William Shockley who invented the
transistor and demonstrates its use for the first time . The first transistor consisted of a
messy collection of wires , insulators and germanium . According to a recent poll
on CNN's website , the transistor is believed to be the most important discovery in the
past 100 years .
The history of hacking in Bangladesh is actually unknown to all , on the other hand this
sector is an increasing or raising part in our country at present . Mostly the abuses of
internet means the main part of hacking in Bangladesh and it is increasing now a days .
8 | P a g e
Main or Negative Uses :
Hacking is mainly known for its negative uses . People think the hacking is only
for bad or harm someone or some group who or which is related with technology .
Actually , the hacking is mainly for that . Hackers through their terms for hacking
technologies . From the beginning the Hackers think that they always do the right thing
which should be done who are Hacked by them . These kind of Hackers are known as
The black hat hackers , who hacked the technology only for some kind of jealousy or for
their personal benefit . In our country Bangladesh these kind of Hacking is increasing
more and more among the new users of technology , and the people called these kind of
term as the Cyber War. They always target mostly Financial data , Intellectual property ,
personal data , System asses etc .
9 | P a g e
Positive Uses:
The uses of Hacking can be positive by hackers . These Kind of hack or hackers
are often known as the White hat Hackers . These kind of Hacking mainly done only to
save Hacked technology or secure the technology from hacking . Most of the Hackers
first starts their Hacking life by using this type of Hacking , sometimes they also work
as a middle group for hack and hacking terms or technology . People mostly think that
these term should be increased only for its positive side . These kind of uses can be
increased if people want this kind of uses .
10 | P a g e
Kill or Cure :
There are a law to stop the Hacking , and it says that if a person intentionally
causes loss or damage to any other person or organization by any act which destroys ,
deletes or alters any information residing in a computer resource or diminishes its value
or utility or affects it by any means , would be considered to have engaged in hacking.
So for the cyber crime this law can be applied in everywhere . And the main thing is
awareness of the users and people .
11 | P a g e
Conclusion :
It is clear to everyone that there are mainly two kind of hackers , White hat and
Red hat hackers. There have another hackers who try to call them as Gray or Brown hat
hackers . Hackers identity can be defined in many ways but these should be stopped or
in some case these should be cured not only from Bangladesh but also from the whole
world . So , the reader of this term paper , I think , a real technology user and always uses
his / her technology only for using not for abusing .
12 | P a g e
References :
a) Hacking
b) Hacker
c) Hacking Term
d) History of hacking
## These following terms are collecting from –
1) Wikipedia
2) Wikimedia
3) Google
## The terms of Hacking sectors of Bangladesh from -
A) TeachtuneBD.com
13 | P a g e
People who gave the interview :
1. Md. Ismail Hossain , CSE department , IUB
2. Rafaetul Kabir Adeab , CSE department , IUB
3. Code – A , EWU ( Hacker )
4. Sabbir Ahmed , CSE department, AIUB
5. Md. Tanvir Hossain Tuhin , CSE department , AIUB
6. Al Masum Fahim , CSE department , AUST
There are another two people who didn’t like to give their identity .
These people are giving their valuable time and ideas to complete this term
paper.
14 | P a g e
Bangladeshi Cyber , A Emblem of Hacking
Interviews for the term paper of ENG – 102
Questionnaires
(If you are a “Hacker” your name and detail must be hidden)
Student name :
University name :
Department :
1. What do you mean by Hack or Hacking ?
a) It is full of logic
b) It is nothing but hell
c) It should be stopped
d) It should be done in an increasing rate
2. Are you a Hacker ? (This answer will be hidden)
a) No
b) Yes
c) Want to be
d) Don’t want to be
3. What kind of Hacking should be done ?
a) White Hat
b) Red Hat
c) None of them
d) Both of them
15 | P a g e
4. Is it so much helpful ?
a) Yes
b) No
c) Can be
d) Must be
5. Hacking increases ideas – Do you agree with that ?
a) Yes
b) Obviously
c) Only for sometime
d) No
6. Hackers are so much genius – Is it true ?
a) Yes
b) Not always
c) No
d) May be
7. Will Hacking make our country developed ?
a) Yes
b) No
c) Can be
d) Must be
8. How many technologies you Hacked ? (This answer will be hidden)
a) Less than 100
b) More than 100
c) Didn’t do
d) Can’t count
16 | P a g e
9. How many technologies that you use is Hacked ? (This answer will be hidden)
a) Mostly all
b) Not any
c) Half of them
d) I Hacked others
10. Your idea or philosophy about Hacking in Bangladesh -------------------------
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Your signature :
Date :

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 

Was ist angesagt? (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

Ähnlich wie Hackers and hacking in bangladesh

CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ictAbdul Wahab Raza
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointOmnia Magdy
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint Omnia Magdy
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 

Ähnlich wie Hackers and hacking in bangladesh (20)

CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
ethics final project
ethics final projectethics final project
ethics final project
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
 
hackers
hackershackers
hackers
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Mehr von Taibul Islam Tushar

Project on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchangeProject on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchangeTaibul Islam Tushar
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharmaTaibul Islam Tushar
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharmaTaibul Islam Tushar
 
Circular diagram of a nation's income
Circular diagram of a nation's incomeCircular diagram of a nation's income
Circular diagram of a nation's incomeTaibul Islam Tushar
 
Haiku, bangla language or myself
Haiku,  bangla language or myselfHaiku,  bangla language or myself
Haiku, bangla language or myselfTaibul Islam Tushar
 

Mehr von Taibul Islam Tushar (8)

Project on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchangeProject on Investors General Behavior in Dhaka Stock exchange
Project on Investors General Behavior in Dhaka Stock exchange
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharma
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharma
 
Al - Quran (only Arabic)
Al - Quran (only Arabic)  Al - Quran (only Arabic)
Al - Quran (only Arabic)
 
Self e
Self eSelf e
Self e
 
A company's overview
A company's overviewA company's overview
A company's overview
 
Circular diagram of a nation's income
Circular diagram of a nation's incomeCircular diagram of a nation's income
Circular diagram of a nation's income
 
Haiku, bangla language or myself
Haiku,  bangla language or myselfHaiku,  bangla language or myself
Haiku, bangla language or myself
 

KĂŒrzlich hochgeladen

ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girl
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girlCall Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girl
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girlkumarajju5765
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptDr. Soumendra Kumar Patra
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 

KĂŒrzlich hochgeladen (20)

ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girl
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girlCall Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girl
Call Girls đŸ«€ Dwarka âžĄïž 9711199171 âžĄïž Delhi đŸ«Š Two shot with one girl
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
꧁❀ Aerocity Call Girls Service Aerocity Delhi ❀꧂ 9999965857 ☎ Hard And Sexy ...
꧁❀ Aerocity Call Girls Service Aerocity Delhi ❀꧂ 9999965857 ☎ Hard And Sexy ...꧁❀ Aerocity Call Girls Service Aerocity Delhi ❀꧂ 9999965857 ☎ Hard And Sexy ...
꧁❀ Aerocity Call Girls Service Aerocity Delhi ❀꧂ 9999965857 ☎ Hard And Sexy ...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 

Hackers and hacking in bangladesh

  • 1. 1 | P a g e Bangladeshi Cyber , An Emblem of Hacking Taibul Islam 2013-3-10-020 ENG 102 Section : 15 Ms. Israt Jahan 12th August , 2014
  • 2. 2 | P a g e Index : 1. Abstract page - 3 2. Introduction page -4 3. Hack and Hacking page - 5 4. Hackers page - 6 5. History of Hacking in Bangladesh page - 7 6. Main or Negative Uses page - 8 7. Positive Uses page - 9 8. Kill or Cure page - 10 9. Conclusion page - 11 10. References page – 12 11. People who gave the interview page – 13 12. Sample Question for solving term paper page - 14 – 16
  • 3. 3 | P a g e Abstract: Hackers and Hacking are two related terms which really means the abuse of some kind of technology . Mainly these kinds of words are related with computer terms . In our country Bangladesh , these terms are now so much well known that people think these are some kind of negative matter . The title of this term paper is giving a overall massage about the hacking sector also . So , this term paper will help one to come at a point which is the real meaning of Hacking and hacking sector in our country Bangladesh.
  • 4. 4 | P a g e Introduction : In our modern Bangladesh where the uses of technology is increasing day by day , the abuses of those technology is also increasing . People are involved in technology for their mutual benefit or profit but some people are also involved in abuses . The honorable government have their law for the using of technology where the abuses rate is increasing and people are now so much aware of that . The affected users always want the law should be obeyed , as hacking create its huge face among the technology users .
  • 5. 5 | P a g e Hack and Hacking: Clearly, “hack” is the word of the moment ; its technological connotations have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to mean fussing with machines . In the nineteen hundred sixty , the term seems to have migrated from the M.I.T. context to computer enthusiasts in general and in time became an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short- history-of-hack ) Hacking may be done in many ways . Computer hacking , including some types of activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer subculture and Hacker ( computer security ) , to access computer networks , legally or otherwise . Sometimes it may causes computer crimes . Phone hacking , the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner . Illegal taxicab operation . Pleasure riding , horseback riding for purely recreational purposes . Shin-kicking The act of stealing jokes . Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline- hacking.
  • 6. 6 | P a g e Hackers: Hacker is a term that has been used to mean a variety of different things in computing . Currently , "hacker" is used in two main conflicting ways , 1. as someone who is able to subvert computer security ; if doing so for malicious purposes , the person can also be called a cracker . 2. an adherent of the technology and programming subculture . In computer security , a hacker is someone who focuses on security mechanisms of computer and network systems . While including those who endeavor to strengthen such mechanisms , it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures . That is , the media portrays the 'hacker' as a villain . In the programmer subculture of hackers , a hacker is a person who follows a spirit of playful cleverness and loves programming . It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source . It also has a hacker ethic , based on the idea that writing software and sharing the result on a voluntary basis is a good idea , and that information should be free , but that it's not up to the hacker to make it free by breaking into private computer systems .
  • 7. 7 | P a g e History of Hacking in Bangladesh : Maybe the Hacking first started in 1947 by William Shockley who invented the transistor and demonstrates its use for the first time . The first transistor consisted of a messy collection of wires , insulators and germanium . According to a recent poll on CNN's website , the transistor is believed to be the most important discovery in the past 100 years . The history of hacking in Bangladesh is actually unknown to all , on the other hand this sector is an increasing or raising part in our country at present . Mostly the abuses of internet means the main part of hacking in Bangladesh and it is increasing now a days .
  • 8. 8 | P a g e Main or Negative Uses : Hacking is mainly known for its negative uses . People think the hacking is only for bad or harm someone or some group who or which is related with technology . Actually , the hacking is mainly for that . Hackers through their terms for hacking technologies . From the beginning the Hackers think that they always do the right thing which should be done who are Hacked by them . These kind of Hackers are known as The black hat hackers , who hacked the technology only for some kind of jealousy or for their personal benefit . In our country Bangladesh these kind of Hacking is increasing more and more among the new users of technology , and the people called these kind of term as the Cyber War. They always target mostly Financial data , Intellectual property , personal data , System asses etc .
  • 9. 9 | P a g e Positive Uses: The uses of Hacking can be positive by hackers . These Kind of hack or hackers are often known as the White hat Hackers . These kind of Hacking mainly done only to save Hacked technology or secure the technology from hacking . Most of the Hackers first starts their Hacking life by using this type of Hacking , sometimes they also work as a middle group for hack and hacking terms or technology . People mostly think that these term should be increased only for its positive side . These kind of uses can be increased if people want this kind of uses .
  • 10. 10 | P a g e Kill or Cure : There are a law to stop the Hacking , and it says that if a person intentionally causes loss or damage to any other person or organization by any act which destroys , deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means , would be considered to have engaged in hacking. So for the cyber crime this law can be applied in everywhere . And the main thing is awareness of the users and people .
  • 11. 11 | P a g e Conclusion : It is clear to everyone that there are mainly two kind of hackers , White hat and Red hat hackers. There have another hackers who try to call them as Gray or Brown hat hackers . Hackers identity can be defined in many ways but these should be stopped or in some case these should be cured not only from Bangladesh but also from the whole world . So , the reader of this term paper , I think , a real technology user and always uses his / her technology only for using not for abusing .
  • 12. 12 | P a g e References : a) Hacking b) Hacker c) Hacking Term d) History of hacking ## These following terms are collecting from – 1) Wikipedia 2) Wikimedia 3) Google ## The terms of Hacking sectors of Bangladesh from - A) TeachtuneBD.com
  • 13. 13 | P a g e People who gave the interview : 1. Md. Ismail Hossain , CSE department , IUB 2. Rafaetul Kabir Adeab , CSE department , IUB 3. Code – A , EWU ( Hacker ) 4. Sabbir Ahmed , CSE department, AIUB 5. Md. Tanvir Hossain Tuhin , CSE department , AIUB 6. Al Masum Fahim , CSE department , AUST There are another two people who didn’t like to give their identity . These people are giving their valuable time and ideas to complete this term paper.
  • 14. 14 | P a g e Bangladeshi Cyber , A Emblem of Hacking Interviews for the term paper of ENG – 102 Questionnaires (If you are a “Hacker” your name and detail must be hidden) Student name : University name : Department : 1. What do you mean by Hack or Hacking ? a) It is full of logic b) It is nothing but hell c) It should be stopped d) It should be done in an increasing rate 2. Are you a Hacker ? (This answer will be hidden) a) No b) Yes c) Want to be d) Don’t want to be 3. What kind of Hacking should be done ? a) White Hat b) Red Hat c) None of them d) Both of them
  • 15. 15 | P a g e 4. Is it so much helpful ? a) Yes b) No c) Can be d) Must be 5. Hacking increases ideas – Do you agree with that ? a) Yes b) Obviously c) Only for sometime d) No 6. Hackers are so much genius – Is it true ? a) Yes b) Not always c) No d) May be 7. Will Hacking make our country developed ? a) Yes b) No c) Can be d) Must be 8. How many technologies you Hacked ? (This answer will be hidden) a) Less than 100 b) More than 100 c) Didn’t do d) Can’t count
  • 16. 16 | P a g e 9. How many technologies that you use is Hacked ? (This answer will be hidden) a) Mostly all b) Not any c) Half of them d) I Hacked others 10. Your idea or philosophy about Hacking in Bangladesh ------------------------- ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ Your signature : Date :