haking ppt
TRANSCRIPT
Sushil Kumar ranjan
15CA86
1
ContentsHistory of Hacking
What is Hacking?
Why do Hackers hack?
Types of Hacking
Advantages of Hacking
Disadvantages of Hacking
Conclusion
References
2
History of HackingHacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of theterm “hacker”.
The truth hacker amongst our societies have thirst forthe knowledge .
Boredom is never an object of challenge for thehacker
3
What is Hacking ?The Process of attempting to gain or
successfully gaining, unauthorized accessto computer resources is called Hacking.
4
Why do hackers hack ?Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
6
Types of HackingWebsite Hacking
Network Hacking
Ethical Hacking
Email Hacking
Password Hacking
Online Banking Hacking
Computer Hacking 7
Website Hacking Hacking a website means taking control from the
website owner to a person who hacks the website.
8
Network Hacking
Network Hacking is generally meansgathering information about domain byusing tools like Telnet, Ns look UP, Ping,Tracert, Netstat, etc… over the network.
9
Email Hacking Email hacking is illicit access to an email
account or email correspondence.
11
Password Hacking
Password Hacking Password crackingis the process of recovering secretpasswords from data that has beenstored in or transmitted by a computersystem.
12
Online Banking HackingOnline banking Hacking Unauthorizedaccessing bank accounts without knowingthe password or without permission ofaccount holder is known as Online bankinghacking.
13
Computer Hacking
Computer Hacking is when files on yourcomputer are viewed, created, or editedwithout your authorization.
14
15
Advantages of hacking
Can be used to recover lost information where thecomputer password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
18
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
19
ConclusionKeep your password protected. Write your password
should be with combination of characters, digits, specialsymbols. Do not respond to feck on fishing email. whenyou are doing any online transection always keep watchon site whether the protocol of site is https & whetherthere is a lock symbol .
20
References
www.wikipedia.org/wiki/Hacker
www.makeuseof.com
www.wikipedia.org/wiki/Hacking
21
Thank You
22