hacking. contents (1) various definitions of hacking. who is hacker? (various definitions). what...
TRANSCRIPT
Contents (1)
VARIOUS DEFINITIONS OF HACKING .Who is hacker? (various definitions).
What does he do?.Why does he do?Who is a cracker?Cracker v /s Hacker.
Contents (2)
Hactivism. History of hacking. Who can be a real hacker? Forms & types of hacking. Procedure for hacking a password & in general Threats caused by hacking. Why can’t defend against hackers? How to translate hackers language. What should be done after hacked? Preventive measures for hacking
?
VARIOUS DEFINITIONS
Hacking is a technique to get access on other computers without its permission or we can say that without using the ways which are available and developing the own ways of doing it.
Hacking is a way of breaking the code. Hacking is a code or a program often written to
breach the security of other systems. To gain access to a computer illegally.
hacking is a cyberwar.
Who is hacker? (1)Is who practices hacking.Or a person who enjoys learning the
details of the computer and how to stretch their capabilities-as opposed to the most users of the computers who prefer to only to the minimum amount necessary.
Or a person who has harmful behaviour and wicked intention.
Or has iilegal access to the computers.
Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.
Why do hackers hack?
Just for fun.Show off.Hack other systems secretly.Steal important information.Destroys the enemy or the target
computers network security.
Who is a cracker?
Crackers are bad guys who break into the system.
They do the hack the information but for a different purpose.Crackers and hackers are different.
They do malpractices such as steal money from banks,atms etc.
Cracker v /s Hacker.
HACKERS: Are good guys who
create elegant solutions to problems.
Expose security flaws.
Build secure systems.
CRACKERS: Are malicious and
cause harmful damage.
Make or steal money. Utilize downloaded
exploitations.
HACTIVISM
That is the use of hacking to promote an agenda.
Politically
(ex:defacing a campaign website). religious
(ex:hacking an abortion info website). Military
(adding misinformation to the enemy sites)
History of hacking. 1960-1970: Good hack especially clever program code. 1970-1990 : “breaking in”to computers became very easy
1990-PRESENT: www developed&internet grow exponentially. Information theft/disabling/hijacking began. Hacking can be writing a program for enjoyment. Hacking can also done to perform reverse
engineering of software where source code is lost.
REAL HACKERS OR SKILLS OF A HACKER:-
Who study c/c++ and the assembly languages.
Study computer architecture perfectly.Study operating systems.Study computer networks.
FORMS OF HACKING
It can be hacking a secure information from a computer illegally.
Hacking an email or a password.Hacking a website.Hacking in otherwords can be a way
getting a password which is lost by using a program.
Procedure for hacking a password & in general
1.Download it from required software. 2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer.
3. Hide it after mentioning your email id into this software.
4. Check your email, you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.
In general what a hacker does to escape
Take all safety Measures to hide yourself from target.
There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can.
Few important tricks :- Use Hide Ip Software :- This software will help you to hide
your IP address. Use Firewall :- Firewall secure your computer as well as
restrict any personal information from going outside. Use Proxy servers :- Whenever you want to surf the computer
of your target use proxy servers. Use others username and password: - Try to avoid using your
own user name and password for internet connection. Learn the technique to get other's user name and password.
Why can’t defend against hackers?
There are many unknown security holeHackers need to know only one security
hole to hack the systemAdmin need to know all security holes to
defend the system
Is hacking always bad?
some (usually young) hackers do it for “fun”
No it is not always bad, hacking sometimes may be the cracking the code of the program where the source code is lost.
Its just mingling away with the hardware to make things work .
How to translate the hackers’ language (1)
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
What should be done after hacked?
Shutdown the system– Or turn off the system
Separate the system from networkRestore the system with the backup
– Or reinstall all programs
Connect the system to the network It can be good to call the police
Why hackers succeed?
Problems are often fixed only after exploited.
Many companies hire hackers.its a big business for many consultants and many believe in “security in secrecy” and hackers & crackers enjoy this challenge.
Role of government/forensics
Search, Seizure, and Analysis of Computers: currently, the government can seize any computer ... if there is “sufficient” evidence of criminal use. equipment can be seized indefinitely. computer forensics are needed to analyze seizures: hard drives (deleted files) cracking encryption keys internal “wear and tear” indicating usage patterns requires significant training/research
Preventive measures for hacking
The most popular method of protection against hacking home systems is to have an antivirus soft ware.
Firewalls act as a deterrent to hacking by protecting private networks from public.
Have the system backup.
CONCLUSION
Always hacking need not be breaking in to the computers, it can be used for a good purpose and be a hacker instead of cracker.