SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Viruses @ Hackers Behaviors
[email_address]
[email_address] Virus first emerged in the early seventies and  there are other arguments and because of this ambiguous
Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
The incubation period The incubation period is the period between the entry of the virus into the body  (and infection)
[object Object],Bio Vrs  Elct Vrs
Seaprition  in body Seaprition  in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk  Loss
[email_address] Why called by (  ) virus  Spread Damage
Taybe of   viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
Mechanism of Work File
How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
Money ,  fame ,  comfort ,    goals    ilegal , beautiful   goals   [email_address] We don’t understand  Why programer ( hackers )  making  Viruses
Hacker ,,, hacking The one man un authorized to enter the OS on   your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available   to the person  (hacker) to  remove or add Files or programs as he can control his place in the OS   based the issuance of orders such as ordering the printing   or imaging Or storage .. [email_address]
Hackers in Sudan The history of electronic Web site  in Sudan  major breakthroughs to different sites ,,,,,, Government @Private site ..  She was a major incident broke the site of the (NCI)  national center for information (Joker), which he broke several government positions in the same proportion to ban the  National Authority for Communications of several sites including Rapideshare / 4shared  / YouTube
Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical  development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
Big.War.from  Pcz: nets Gold.Gnr.to hac  1980 to 1989 1990 to 1994  [email_address]
Open Port Client/Server Patch X  Penetration  [email_address]
some story at hacker Kaven metenk ,,,  Digital Equipment Co.  ,,, 20000  card  NewYork City Magazin  ,,, catch by FBI   [email_address]
Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro   NOVA [email_address]
In Conclusion, we can say that the world  of viruses and hackers is a world full of wonders,  but Login it require  scourage and determination  [email_address]
Thank you for listening [email_address]

Weitere Àhnliche Inhalte

Was ist angesagt?

Email crime ppt
Email crime pptEmail crime ppt
Email crime pptOnkar1431
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security ITSTEFFI_MEDINA
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaborationalhooti11
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashiIsmaeelMashi
 

Was ist angesagt? (19)

Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Phishing
PhishingPhishing
Phishing
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
C 7
C 7C 7
C 7
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Viruses
VirusesViruses
Viruses
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashi
 
Presentation1
Presentation1Presentation1
Presentation1
 

Andere mochten auch

Dima+anya wedding
Dima+anya weddingDima+anya wedding
Dima+anya weddingbike-travel
 
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆tar8847
 
Google Analytics for Developers
Google Analytics for DevelopersGoogle Analytics for Developers
Google Analytics for DevelopersRubén Martínez
 

Andere mochten auch (6)

Dima+anya wedding
Dima+anya weddingDima+anya wedding
Dima+anya wedding
 
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆
3ă€ăźćœ°ć›łă§ćŁČれるè‡Ș戆
 
SEO for Developers
SEO for DevelopersSEO for Developers
SEO for Developers
 
Big Data is Here and Now
Big Data is Here and NowBig Data is Here and Now
Big Data is Here and Now
 
Google Analytics for Developers
Google Analytics for DevelopersGoogle Analytics for Developers
Google Analytics for Developers
 
Advanced on-page SEO 2013
Advanced on-page SEO 2013Advanced on-page SEO 2013
Advanced on-page SEO 2013
 

Ähnlich wie E.technology

Cyber laws
Cyber lawsCyber laws
Cyber lawsananthu07
 
Trends in Web Attacks
Trends in Web AttacksTrends in Web Attacks
Trends in Web AttacksIWMW
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeSahil Daw
 
Cyber security
Cyber securityCyber security
Cyber securitySamsil Arefin
 
Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & lawbhp6245
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityNeeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data ProtectionDr. Hemant Kumar Singh
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Computer crime
Computer crimeComputer crime
Computer crimeVishesh Dalal
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 

Ähnlich wie E.technology (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Trends in Web Attacks
Trends in Web AttacksTrends in Web Attacks
Trends in Web Attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & law
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 

KĂŒrzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

KĂŒrzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 

E.technology

  • 1. Viruses @ Hackers Behaviors
  • 3. [email_address] Virus first emerged in the early seventies and there are other arguments and because of this ambiguous
  • 4. Change Jobs and characteristics of computer Virus increasing and produces new virus Characterizes the inside files and tries to so difficult to detect
  • 5. The incubation period The incubation period is the period between the entry of the virus into the body (and infection)
  • 6.
  • 7. Seaprition in body Seaprition in PC body viruse [email_address] Elc Vrs Bio Vrs Damage Risk Loss
  • 8. [email_address] Why called by ( ) virus Spread Damage
  • 9. Taybe of viruses Boot Sector Virus File Virus Macro Virus hide Virus Polymorphic virus Multipartite Virus Worm Trojans [email_address]
  • 11. How can we protect ourselves Firewall Use antiVrs Up / Down Load Internet
  • 12. Money , fame ,  comfort ,   goals   ilegal , beautiful   goals [email_address] We don’t understand Why programer ( hackers ) making Viruses
  • 13. Hacker ,,, hacking The one man un authorized to enter the OS on your computer and illegal purposes Together, such as theft or espionage @ sabotage It is available to the person (hacker) to remove or add Files or programs as he can control his place in the OS based the issuance of orders such as ordering the printing or imaging Or storage .. [email_address]
  • 14. Hackers in Sudan The history of electronic Web site in Sudan major breakthroughs to different sites ,,,,,, Government @Private site .. She was a major incident broke the site of the (NCI) national center for information (Joker), which he broke several government positions in the same proportion to ban the National Authority for Communications of several sites including Rapideshare / 4shared / YouTube
  • 15. Hackers in Sudan cont .. **Reason hacker negative in Sudan Because we have not yet reached in the technical development, makes the hacker thought to enter the bank account, etc. .... A few possibilities have the necessary code
  • 16. World hackers How to start making the virus create paths in computers Hacker which broke the Sudanese(NTC)
  • 17. Hacker which broke the Sudanese(NTC) Pirate slim Lie fact The most dangerous Forums(joker)
  • 18. Big.War.from Pcz: nets Gold.Gnr.to hac 1980 to 1989 1990 to 1994 [email_address]
  • 19. Open Port Client/Server Patch X  Penetration [email_address]
  • 20. some story at hacker Kaven metenk ,,, Digital Equipment Co. ,,, 20000 card NewYork City Magazin ,,, catch by FBI [email_address]
  • 21. Prog. Used by hackers Web Cracker 4 Net Buster NetBus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility BEAST CIA122b OptixPro NOVA [email_address]
  • 22. In Conclusion, we can say that the world of viruses and hackers is a world full of wonders, but Login it require scourage and determination [email_address]
  • 23. Thank you for listening [email_address]