Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Nächste SlideShare
Hacking
Hacking
Wird geladen in …3
×

Hier ansehen

1 von 32 Anzeige

Weitere Verwandte Inhalte

Anzeige

Aktuellste (20)

Anzeige

Hacking

  1. 1. Group Members: Muhammad Abbas Hadir janan, Asmia basher. Uasma Ahmad. Fahad Rehan. Arbaz Cheema.
  2. 2. • History. • What is hacking. • Who are hacker. • Categories of hacking. • Types of hacking. • Famous hackers. • Why they hack. • How to secure your data. • Advantages and dis advantages of hacking. • Conclusion.
  3. 3. • It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore programming in FORTRAN and other older languages. • And start hacking.
  4. 4. • In simple words to access someone data with put his permission and view it. Called hacking.
  5. 5. • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. • The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  6. 6. • White hat hacking. • Grey hat hacking. • Black hat hacking.
  7. 7. • Website Hacking. • Network hacking. • Email hacking. • Password Hacking. • Online Banking Hacking. • Computer Hacking.
  8. 8. • Hacking a website means taking control from the website owner to a person who hacks the website.
  9. 9. • Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  10. 10. • Email hacking is illicit access to an email account or email correspondence.
  11. 11. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  12. 12. • Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  13. 13. • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  14. 14. • Gary McKinnon • LulzSec . • Adrian Lamo
  15. 15. • Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files.
  16. 16. • LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts.
  17. 17. • Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times.
  18. 18. • Just for fun. • Show off. • Hack other system Secretly. • Steal important Data. • Destroy Enemy computer during war.
  19. 19. • Shutdown your Computer. • Separate your computer from network. • It be batter to call police.
  20. 20. • Use unique passwords for your accounts. • Choose a combination of letters, numbers, or symbols to create a unique password.
  21. 21. • Can be used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking.
  22. 22. • Criminals can use it to their advantage. • It can harm someone's privacy • It's Illegal
  23. 23. • Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .

×