Вы находитесь на странице: 1из 14

Wakman Rafi

Hacking has several meanings in the technology and computer science fields which is illegally breaking into the computer, generally with the help of a network connection.

The term "hacker" originally meant a very enthusiastic and skilful computer programmer. In recent years this term is being used for people computers to gain unauthorized access to data.

Spam Downloads Pop-ups

There are two types of hackers:

White Hat These are considered the good


guys. White hat hackers dont use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

Black Hat These are considered the bad


guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, websites.

Password Hacking Network Hacking Windows Hacking Web Hacking

In the year 1983, a gang of teenage hackers in Milwaukee, Wisconsin, known as The 414s, broke into computer systems throughout the United States and Canada, including those of Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. The Newsweek article appears to be the first use of the word hacker by the mainstream media.

Steve Jobs and Steve Wozniak , founders of Apple Computers, are both hackers. Linus Torvalds , creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. Richard Stallman , also known as "rms," founded the GNU Project, a free operating system. At the age of 16 , Jonathan James became the first hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA.

Steve Jobs, co-founder of Apple and pioneer hacker

Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. leading to the rumor that Mitnick had made the FBI's Most Wanted list.

Kevin Poulsen, specialized in hacking phone systems. He's famous for hacking the phones of a radio station called KIIS-FM.

Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.

Passive attacks: which attempt to learn or make use of information from the system but does not affect system resources. Active attacks: which attempt to alter system resources or affect their operation.

To retrieve protected data To stop crime To monitor the terror activities in internet... The main advantage to detect the cyber crimes...

Its Illegal Hackers get into computers and can get access to personal information, bank details and send harmful viruses to computers. Its widely thread/challenge to our security

User awareness is key to a secure computer/network


Do not open suspicious files/emails

Avoid using P2P programs


Avoid downloading freeware If attacked, disconnect the network. Do not turn

off the computer

Wakman Rafi

Вам также может понравиться