Anda di halaman 1dari 23

English Presentation

Theme : Hacking

Presented By

MEJRI MOEZ
HBAIEB HENI
LOUKIL RAMI
LOUATI KAIS
PLAN

 INTRODUCTION

 HACKER VS CRACKER

 COMPUTER HACKING

 EMAIL HACKING

 CONCLUSION
INTRODUCTION

What is Hacking:

Hacking refers to any operation by an


outsider of breaking into a computer system
and gaining control of that system.
INTRODUCTION
Hacking is not synonym to computer
hacking

the first hackers appeared in the 1960's at the


Massachusetts Institute of Technology

During the 1970's, a different kind of hackers


appeared: the phreaks or phone hackers

By the 1980's, phreaks started to migrate to


computers
INTRODUCTION
In 1986,hacking became officially considered
as a crime

Since 1990, when the use of the internet


widespread around the world,the number of
hackers and their threats have multiplied

Around 2000, systems security became


mainstream among the public.
HACKER VS CRACKER

A hacker is a person who is proficient with


computers and/or programming and uses
hacking, for a non malicious objective, but
rather for an intellectual curiosity. There is
NO illegality for doing so, since it harms no
one.
HACKER VS CRACKER

A cracker is a hacker who uses their


proficiency for personal gains outside of the
law or for disturbing or causing harm to
others; for example: stealing data,
accessing bank accounts, distributing
viruses etc. Such doing is illegal and
punishable by law.
COMPUTER HACKING

Computer hacking is known as breaking into


computer by an outsider.
It is often performed by infecting the target
with a 'server'.
COMPUTER HACKING

 What is a server in computer-hacking


domain?
COMPUTER HACKING

 What is a server in computer-hacking


domain?
 How can a hacker infect a computer by a
server?
COMPUTER HACKING

 What is a server in the computer-hacking


domain?
 How can a hacker infect a computer by a
server?
 How can I protect myself against
computer hacking?
WHAT'S A 'SERVER'

A server is a little program generated by the


hacker to allow him taking control of the
target computer.
HOW INFECTING A COMPUTER

By presenting it to the target as an ordinary
program or bindering it with another program.


By infecting a website by this server and
give the link to the target.


By hacking the computer through an exploit
in the operating system or in a program, and
put a server into target computer.
PROTECTION

Setup in your computer a powerful anti-
virus program and update it continuously.


Try to setup a good firewall .


Don't click on a web link, but copy and
paste it in the browser bar.


Don't exchange any file with strange
people, because they can identify your IP
address .
EMAIL HACKING

Email hacking involves stealing the


password for a specific email address not
belonging to the hacker. The magnitude of
the harm caused by such hacking depends
on the importance to the victim of the stolen
information.
EMAIL HACKING

Hacking e-mails is performed mainly


through three major methods:

- Sending malwares.
EMAIL HACKING

Hacking e-mails is performed mainly


through three major methods:

- Sending malwares.

- Fraud pages.
EMAIL HACKING

Hacking e-mails is performed mainly


through three major methods:

- Sending malwares.

- Fraud pages.

- Hacking computer or network


SENDING MALWARES

This method mainly depends on the


hacker's experience in programming and
his knowledge about the different malwares
that can be sent.
FRAUD PAGES

This method is very widespread in the


hacker world. Fraud pages are web pages
that appear exactly like the real login page
of e-mail but if you put your user name and
password, it immediately sends data to the
hacker.
Fraud page for Hotmail accounts
Hacking e-mails by hacking
computer

This method doesn't only allow to hacker to


hack e-mails, but also any data that the
victim enters while using the computer,
such as ftp accounts (so his website will be
hacked), his forums' usernames and
passwords, and everything he writes.
CONCLUSION

We can resume our presentation, we have


seen the differrence between hackers and
crackers, and two haking's categories,
computer hacking and e-mail hacking, but
Hacking is not limited to these laters.

Anda mungkin juga menyukai