LA1.S02.
1 LOCATED AND PRESENT
INFORMATION ON IMPACT OF ICT
HACKING
NAME ●
MUHD AFIF MIRZA BIN KHALIDI
4AMANAH
CLASS
●
OR 4DEDI KASI
●
TEACHER NAME ●
PN. SYAZRAH
DEFENITION OF HACKING!!!!!!!
-HACKING IS AN UNAUTHORISED ACCESS TO THE COMPUTER SYSTEM
DONE BY A HACKER.
-HACKING IS A SOURCE OF TREAT TO SECURITY IN COMPUTER .
-IT IS DEFINED AS UNAUTHORISED ACCESS TO THE COMPUTER
SYSTEM BY A HACKER.
HOW HACKER WORK
“Hacker" has gotten a bad reputation
They steal information and they can destroy
the economy or start a war by hacking the
military computer systems.
While there's no denying that there are
hackers out there with bad intentions, they
make up only a small percentage of the
hacker community.
WHAT IS HACKER
A hacker who breaks into systems primarily to steal
is not regarded as a computer expert, although they
can be. A hacker within the professional world of
computing is regarded as a professional computer
expert within his field. In the professional computing
world, a hacker can be a computer and network
security expert. hey can also be a highly skilled
software programmer or a hardware modifier. The
type of hacker who breaks into bank accounts or a
company’s network does exist, but the meaning is
entirely different from that of a professional hacke
FAMOUS HACKER
Steve Jobs and Steve Wozniak, founders of Apple
Computers, are both hackers. Some of their early
exploits even resemble the questionable activities of
some malicious hackers. However, both Jobs and
Wozniak outgrew their malicious behavior and began
concentrating on creating computer hardware and
software. Their efforts helped usher in the age of the
personal computer -- before Apple, computer
systems remained the property of large corporations,
too expensive and cumbersome for average
consumers.
HACKER
The meaning of a hacker is one who accesses a
computer that can supposably not be accessed to
non authorized people of the community. Hackers
may use any type of system to access this
information depending on what they intend on
doing in the system. Methods hackers may use a
variety of ways to hack into a system. First, if the
hacker is experienced and smart the hacker will use
telnet to access a shell on another machine so that
the risk of getting caught is lower than doing it
using their own system
What the best way to stop
hacker
Get a firewall.
One standard answer:
Try a online antivirus scanner and a online anti-
hadware/malware/spyware scanner in safe mode with
network to clean up your computer BEFORE you download
anything.
To format you computer and reinstall is the last option.
Turn off system restore before you boot up in safe mode with
network to clean your system restore points for viruses,
spyware, adware etc.
Ethical hacker
Hackers Center Ethical Hacker is aimed at helping new
Hackers learn Ethical Hacking from school view with steps
and guidance. Learning Ethical Hacking hasn't been so easy
until now. We make sure that people thriving to learn
security know how to learn in matter of weeks and not years.
We are security portal and believe that to become a good
security professional one must know as much as a black hat
hacker. After completing this program, you should be able to
understand security and advance into professional security.
This program may be updated or modified as we see fit. This
is an educational program and it is not meant to teach you
hacking for profit or illegal purposes.
SOURCES OF REFERENCE
http://answers.yahoo.com/question/index?qid=20091115105112AAe3j0M
THANK Q TO MY GROUP MEMBERS:
FAZRUL
HAZIQ THANK Q
SO MUCH