P. 1
Ha King

Ha King

|Views: 317|Likes:
Published by infofst
little search about hacking
little search about hacking

More info:

Categories:Types, School Work
Published by: infofst on Oct 18, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

11/27/2011

pdf

text

original

English Presentation

Theme : Hacking Presented By MEJRI MOEZ HBAIEB HENI LOUKIL RAMI LOUATI KAIS

PLAN
 INTRODUCTION  HACKER VS CRACKER  COMPUTER HACKING  EMAIL HACKING  CONCLUSION

INTRODUCTION

What is Hacking: Hacking refers to any operation by an outsider of breaking into a computer system and gaining control of that system.

INTRODUCTION
Hacking is not synonym to computer hacking the first hackers appeared in the 1960's at the Massachusetts Institute of Technology During the 1970's, a different kind of hackers appeared: the phreaks or phone hackers By the 1980's, phreaks started to migrate to computers

INTRODUCTION
In 1986,hacking became officially considered as a crime Since 1990, when the use of the internet widespread around the world,the number of hackers and their threats have multiplied Around 2000, systems security became mainstream among the public.

HACKER VS CRACKER

A hacker is a person who is proficient with computers and/or programming and uses hacking, for a non malicious objective, but rather for an intellectual curiosity. There is NO illegality for doing so, since it harms no one.

HACKER VS CRACKER
A cracker is a hacker who uses their proficiency for personal gains outside of the law or for disturbing or causing harm to others; for example: stealing data, accessing bank accounts, distributing viruses etc. Such doing is illegal and punishable by law.

COMPUTER HACKING

Computer hacking is known as breaking into computer by an outsider. It is often performed by infecting the target with a 'server'.

COMPUTER HACKING

 What is a server in computer-hacking domain?

COMPUTER HACKING

 What is a server in computer-hacking domain?  How can a hacker infect a computer by a server?

COMPUTER HACKING

 What is a server in the computer-hacking domain?  How can a hacker infect a computer by a server?  How can I protect myself against computer hacking?

WHAT'S A 'SERVER'

A server is a little program generated by the hacker to allow him taking control of the target computer.

HOW INFECTING A COMPUTER
By presenting it to the target as an ordinary program or bindering it with another program.

By infecting a website by this server and give the link to the target.

By hacking the computer through an exploit in the operating system or in a program, and put a server into target computer.

PROTECTION
Setup in your computer a powerful antivirus program and update it continuously.
 

Try to setup a good firewall .

Don't click on a web link, but copy and paste it in the browser bar.

Don't exchange any file with strange people, because they can identify your IP address .

EMAIL HACKING

Email hacking involves stealing the password for a specific email address not belonging to the hacker. The magnitude of the harm caused by such hacking depends on the importance to the victim of the stolen information.

EMAIL HACKING
Hacking e-mails is performed mainly through three major methods: Sending malwares.

EMAIL HACKING
Hacking e-mails is performed mainly through three major methods: Sending malwares. Fraud pages.

EMAIL HACKING
Hacking e-mails is performed mainly through three major methods: Sending malwares. Fraud pages. Hacking computer or network

SENDING MALWARES

This method mainly depends on the hacker's experience in programming and his knowledge about the different malwares that can be sent.

FRAUD PAGES

This method is very widespread in the hacker world. Fraud pages are web pages that appear exactly like the real login page of e-mail but if you put your user name and password, it immediately sends data to the hacker.

Fraud page for Hotmail accounts

Hacking e-mails by hacking computer
This method doesn't only allow to hacker to hack e-mails, but also any data that the victim enters while using the computer, such as ftp accounts (so his website will be hacked), his forums' usernames and passwords, and everything he writes.

CONCLUSION

We can resume our presentation, we have seen the differrence between hackers and crackers, and two haking's categories, computer hacking and e-mail hacking, but Hacking is not limited to these laters.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->