Top Banner
WELCOME TO
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hacking

WELCOME TO

Page 2: Hacking

Submitted by: -Fozail Ahmad Nabeela Shahid

HACKING

Page 3: Hacking

CONTENTS

History of Hacking What is Hacking? Who is Hacker? Famous hackers in history Why do Hackers hack? Types of Hacking How to give a password to account What should do after hacked How to secure our data Advantages of Hacking Disadvantages of Hacking Conclusion References

Page 4: Hacking

HISTORY OF HACKING Hacking has been around for more than a century. In the 1870s, several

teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.

Early 1960s University facilities with huge mainframe computers, likeMIT's artificial

intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970so Two members of California's Homebrew Computer

Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple computer.

Page 5: Hacking

Early 1980s Author William Gibson coins the term "cyberspace" in a science

fiction novel called Neuromancer. In one of the first arrests of hackers, the FBI busts the Milwaukee-

based 414s (named after the local area code) after members are accused of 60 computer break-insranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.

Late 1980s First National Bank of Chicago is the victim of a $70-

million computer heist. An Indiana hacker known as "Fry Guy" -- so named for hacking

McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doomhackers known by the handles "Prophet," "Leftist" and "Urvile.“

Early 1990s A 17-month search ends in the capture of hacker Kevin Lee

Poulsen ("Dark Dante"), who is indicted for stealing military documents.

Page 6: Hacking

Late 1990s Popular Internet search engine Yahoo! is hit by hackers claiming a "logic

bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.

1998 Hackers claim to have broken into a Pentagon network and stolen software

for a military satellite system. They threaten to sell the software to terrorists.

2000 The "I Love You" virus debuts on the Internet in May, appearing first in the

Philippines, then spreading across the globe in a matter of hours. It causes an estimated $10 billion of damage globally in lost files and computer downtime before a solution is found.

Page 7: Hacking

o 1.Hacking refers to the activities which are done to intrude some one else’s personal information so as to use it for malicious, unwanted purposes.

o 2. Hacking is a term which refers to the activities aimed at exploiting security flaws to obtain personal information for gaining access to secured networks.

What is hacking

Who is a hacker?

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.

Page 8: Hacking

FAMOUS HACKERS IN HISTORY

Ian Murphy Kevin Mitnick Johan Helsinguis

LinusTorvaldsMark Abene Robert Morris

Page 9: Hacking

WHY DO HACKERS HACK ?o Just for fun.o Show off.o Hack other systems secretly.o Notify many people their thought.o Steal important information.o Destroy enemy’s computer network during the war.

Types of Hacking

o Website Hackingo Network Hackingo Ethical Hacking o Email Hacking o Password Hackingo Online Banking Hackingo Computer Hacking

Page 10: Hacking

Website Hacking

Hacking a website means taking control from the website owner to a person who hacks the website.

Network Hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.

Ethical Hacking

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.

Page 11: Hacking

Email Hacking

Email hacking is illicit access to an email account or email correspondence.

Password Hacking

Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Online Banking Hacking

Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.

Page 12: Hacking

Computer Hacking

Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.

What should do after hacked?

o Shutdown the system Or turn off the system

o Separate the system from network

o Restore the system with the backupOr reinstall all programs

o Connect the system to the network

o It can be good to call the police

Page 13: Hacking

How to give a password to account.

Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols tocreate a unique password.

Advantages of hacking

Can be used to recover lost information where the computer password has been lost.Teaches you that no technology is 100% secure.To test how good security is on your own network. They call it white hat computer hacking.

Page 14: Hacking

Disadvantages of Hacking

Criminals can use it to their advantage.It can harm someone's privacyIt's Illegal

Conclusion

Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .

Page 15: Hacking

THANKS TO ALL RGI - FAMILY

VIHANCO-ORDINATOR

ASSOCIATE MEMBERFOR GIVING ME A CHANCE TO

PARTICIPATE.

Page 16: Hacking