This document provides an overview of hacking, including its history, definitions, types, famous hackers, reasons for hacking, and how to secure systems and data. It discusses how hacking began at MIT in the 1960s and describes hackers as seeking weaknesses in computer systems. The document outlines different types of hacking such as website, network, password, and computer hacking. It provides advice on securing data with strong passwords and monitoring online transactions for security.
3. Contents
History of Hacking
What is Hacking?
Who is Hacker?
Famous hackers in history
Why do Hackers hack?
Types of Hacking
How to give a password to account
What should do after hacked
How to secure our data
Advantages of Hacking
Disadvantages of Hacking
Conclusion
4. History of Hacking
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the term “hacker”.
The truth hacker amongst our societies have thirst for the
knowledge .
Boredom is never an object of challenge for the hacker
5. What is Hacking ?
The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called Hacking.
7. Who is a hacker?
In the computer security context, a hacker is someone who seeks
and exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue
that someone breaking into computers is better called a cracker.
8. Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
9. Why do hackers hack ?
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network during the war.
12. Website Hacking
Hacking a website means taking control from the website
owner to a person who hacks the website.
14. Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
18. Email Hacking
Email hacking is illicit access to an email account or
email correspondence.
20. Password Hacking
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been stored in or
transmitted by a computer system.
22. Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
24. Computer Hacking
Computer Hacking is when files on your computer are viewed,
created, or edited without your authorization.
25. What should do after hacked?
Shutdown the system
− Or turn off the system
Separate the system from network
Restore the system with the backup
− Or reinstall all programs
Connect the system to the network
It can be good to call the police
26. How to give a password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
27. How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
28. How to secure our data
Ex.
◦ 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||.
◦ I transferred Rs.100000 to your account, So go ahead as our
plan.
29. Advantages of hacking
oCan be used to recover lost information where the
computer password has been lost.
oTeaches you that no technology is 100% secure.
oTo test how good security is on your own network.
oThey call it white hat computer hacking.
31. Conclusion
Keep your password protected. Write your password should
be with combination of characters, digits, special symbols. Do
not respond to feck on fishing email. When you are doing any
online transection always keep watch on site whether the
protocol of site is https & whether there is a lock symbol .