This document provides an overview of hacking, including its history, definitions, types, famous hackers, reasons for hacking, and advice on security and ethics. Hacking emerged in the 1960s at MIT and refers to attempting to gain unauthorized access to computer systems. It describes hackers as those who exploit weaknesses in computers. Different types of hacking are outlined such as website, network, password, and computer hacking. Advice is given around using strong unique passwords, backing up data, and contacting authorities if hacked. Both advantages like security testing and disadvantages like privacy harm are discussed.
Contents
History of Hacking
Whatis Hacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
References
3.
History of Hacking
Hackinghas been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
The truth hacker amongst our societies have thirst for the
knowledge .
Boredom is never an object of challenge for the hacker
4.
What is Hacking?
The
Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
6.
Who is ahacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
7.
Famous Hackers inHistory
Ian Murphy
Kevin Mitnick
Mark Abene
Johan Helsinguis
LinusTorvalds
Robert Morris
8.
Why do hackershack ?
Just
for fun.
Show
off.
Hack
other systems secretly.
Notify
Steal
many people their thought.
important information.
Destroy
enemy’s computer network during the war.
Website Hacking
Hacking
awebsite means taking control from the
website owner to a person who hacks the
website.
13.
Network Hacking
Network Hackingis generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Password Hacking
Password
HackingPassword cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
21.
Online Banking Hacking
Onlinebanking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
What should doafter hacked?
Shutdown the system
− Or turn off the system
Separate the system from network
Restore the system with the backup
− Or reinstall all programs
Connect the system to the network
It can be good to call the police
25.
How to givea password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or
symbols to
create a unique password.
26.
How to secureour data
1 -> i or l
|| -> n
3 -> e
|/| -> m
4 -> a
s -> z
+ -> t
c -> [
9 -> g
f -> ph
0 -> o
ph -> f
$ -> s
x -> ck
| -> i or l
ck -> x
27.
How to secureour data
Ex.
1
+r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I
transferred Rs.100000 to your account, So go ahead as our
plan.
28.
Advantages of hacking
Canbe used to recover lost information where the
computer password has been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
29.
Disadvantages of Hacking
Criminals
It
can use it to their advantage.
can harm someone's privacy
It's
Illegal
30.
Conclusion
Keep your passwordprotected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .