Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
130 views

Computer Hacking New

This document discusses the history and types of computer hacking. It begins by defining hacking as unauthorized access to computer systems or networks, often to steal or corrupt data. The origins of hacking involved experimenting with electronics in the 1960s, while phone hacking emerged in the 1970s. By the 1980s, hackers began targeting computers as their use grew. The document distinguishes between hackers, who experiment with technology, and crackers, who access systems maliciously. It outlines various types of hacking like password, email, credit card, and site hacking. Methods discussed include social engineering, phishing, and exploiting unsecured networks or databases.

Uploaded by

shelzds
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views

Computer Hacking New

This document discusses the history and types of computer hacking. It begins by defining hacking as unauthorized access to computer systems or networks, often to steal or corrupt data. The origins of hacking involved experimenting with electronics in the 1960s, while phone hacking emerged in the 1970s. By the 1980s, hackers began targeting computers as their use grew. The document distinguishes between hackers, who experiment with technology, and crackers, who access systems maliciously. It outlines various types of hacking like password, email, credit card, and site hacking. Methods discussed include social engineering, phishing, and exploiting unsecured networks or databases.

Uploaded by

shelzds
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

COMPUTER HACKING

Click to edit Master subtitle style


5/24/12

Hacking is unauthorized use of computer and network resources. Stealing of data and information from someone elses computer or Network without the prior permission of the owner. the act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data.

Definitions of hacking
v

5/24/12

History of hacking

5/24/12

The real meaning of hacking is to expand the capabilities of any electronic device. The first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free.

By the 1980's, phreaks started to migrate to computers.

History of hacking (Cont.) 5/24/12

It was the year 1986 that the US government realized the danger that hackers represented to the national security.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied.

Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques.

5/24/12 Hacke r hacker is defined as an expert computer A

programmer , who breaks computer and network security and is involved in the Process of hacking.

Hackers And Crackers

Hackers are totally different from crackers.

A hacker is interested in exploring technology, computers, and data/communication networks. The opposite of a hacker is a cracker, whose interests in technology are for malicious or destructive aims.

Crackers

5/24/12

A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets.

Crackers can easily be identified because their actions are malicious

Types of hacking

5/24/12

So many types of Computer hacking are there


Password hacking Email hacking ( yahoo, g-mail, hotmail.) Site hacking Credit card hacking

Password Hacking
v v

5/24/12

A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. Email password hacking Windows password hacking Bios password hacking

There are many types of password hacking like.


Password Attacks - Types

5/24/12

Dictionary Attack
Hacker tries all words in dictionary to crack password 70% of the people use dictionary words as passwords Try all permutations of the letters & symbols in the alphabet Words from dictionary and their variations used in attack People write passwords in different places People disclose passwords naively to others Hackers slyly watch over peoples shoulders to steal passwords People dump their trash papers in garbage which may contain information to crack passwords

Brute Force Attack


Hybrid Attack Social Engineering Shoulder Surfing

Dumpster Diving

Email hacking

5/24/12

There are several methods for hacking yahoo, msn email accounts.
1. 2.

One of these methods is social engineering. Hacking yahoo messenger or any other messenger is quite easy if you know the persons Email ID.

Credit card hacking

5/24/12

Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. Ways to hack the credit card. There are many ways to hack the credit card number. But the following two ways are oftenly used to hack the number.
1. 2.

Phishing Through a website.

5/24/12

1. Phishing In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

5/24/12

2.Through website The hacker only needs to hack the systems of an online retailer, and search for the database where the retailer stores the information of all of the users who have made recent transactions.

How to hack windows password? 5/24/12

1. 2.

Restart the computer and toggle the F5 button You will get screen that will ask you if you want to boot with command prompt (that is one way) or boot in safe mode without command prompt you will see a menu that asks which account you want to access. We know that the other accounts you can't get into but there will be a new account called computer administrator. Click computer administrator and go to settings/control panel/user accounts Remove password

3.

4.

5.

5/24/12

Thank you

You might also like