Upload
karan-poshattiwar
View
2.423
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
WHO IS HACKER?Hack
Cut with repeated irregular blowsExamine something very minutely
HackerThe person who hacks
CrackerSystem intruder/destroyerHacker means cracker nowadays
HISTORY OF HACKING
Telephone hackingUse telephone freelyIt’s called phreaking
Computer virusDestroy many computers
Network hackingHack the important server
remotely and destroy/modify/disclose the information
TYPES OF HACKINGNormal
data transfer
Interruption Interception
Modification Fabrication
HACKING ACCIDENTSInternet Worm
Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.
Cuckoo’s EggClifford Stoll caught the
hackers who are the German hackers applied by KGB
WHY DO HACKERS HACK?Just for funShow offHack other systems secretlyNotify many people their thoughtSteal important informationDestroy enemy’s computer network during
the war
WHAT DO HACKERS KNOW?
Don’t know what Unix isDon’t know what they doKnow how to intrude the systemKnow how to crash the systemKnow where the hacking programs are
HOW CAN BE A REAL HACKERStudy C/C++/assembly
languageStudy computer
architectureStudy operating systemStudy computer networkExamine the hacking
tools for a monthThink the problem of the
computer
WHY CAN’T DEFEND AGAINST HACKERS?
There are many unknown security holeHackers need to know only one security hole
to hack the systemAdmin need to know all security holes to
defend the system
WHAT SHOULD DO AFTER HACK?
Shutdown the systemOr turn off the system
Separate the system from networkRestore the system with the backup
Or reinstall all programsConnect the system to the networkIt can be good to call the police
HOW TO TRANSLATE HACKERS LANGUAGE?
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Ex)1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n
I did not hack this page, it was like this when I hacked in
THANK YOU!!!
PRESENTED BY:KARAN POSHATTIWAR