Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
soumya ranjan nath
Active In SP

Posts: 5
Joined: Jan 2010
16-01-2010, 07:03 PM

i want to gather information of dis topic along with some visualisations to use as slide shows..
Active In SP

Posts: 247
Joined: Jan 2010
19-01-2010, 06:34 PM

A formal definition of hacking is :Unauthorized attempts to bypass the security mechanisms of an information system or network.Hacking is an attitude and practice surrounding the use, consumption, and
production of computer-related work.The ethos behind hacking has a long legacy, dating back at
least to the beginning of the century. In computing, a hacker is a person in one of several distinct classes like:
-People committed to circumvention of computer security.
-The hobbyist home computing community, focusing on hardware. The community included Steve Jobs(Apple CEO), Steve Wozniak(co-founder of apple) and Bill Gates(Microsoft) and created the personal computing industry.
-A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

Computer security hackers
In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems.The media portrays the 'hacker' as a villain.But they have a role in correcting the security problems. With the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.

Home computer hackers
In this context, hacker refers to computer hobbyists who push the limits of their software or hardware.The areas that did not fit together with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming. Some also try modding(modifying computer hardware and electronics for their benefit).
some general facts about hackers include:

1)Hacking occurs in a social context
2) Hacking is irreverent and informal, and this is in tension with the various
institutions that support hacking
3) Respect is gained through hands-on problem-solving
4) Hacking is concerned with opening black boxes and understanding their
5) Hackers are mainly male

Hacker groups:These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), and H.O.P.E.

Hacker attitudes:
Hackers with different attitudes and aims use different terms to differentiate themselves from each other:
1)White hat:A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.

2)Grey hat:is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted

3)Black hat: sometimes called "cracker", is someone who breaks computer security without authorization or uses technology for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.

4)Script kiddie:
is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others and may have only little understanding of what it actually does.

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.

Common methods used by hackers
1)Security exploit:
It is a prepared application that takes advantage of a known weakness.Eg.SQL injection attacks injects malicious SQL code in maybe textboxes.

2)Password cracking

3)Vulnerability scanner:
It is a tool used to quickly check computers on a network for known weaknesses.They also use port scanners for open ports to gain access.

4)Packet sniffer:
It is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

5)Spoofing attack:It involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.

It is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators.

7)Trojan horse:
It is a program which seems to be doing one thing, but is actually doing another. It can open a backdoor for attacker to gain access.

8)Social engineering:
It is the art of getting persons to reveal sensitive information about a system.

It is a self-replicating program that propagates through computer networks without user intervention.

It is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

11)Key loggers:
It is a tool designed to record ('log') every keystroke on an affected machine for later retrieval.confidential information typed on the affected machine, such as a user's password or other private data are sent to the attacker.

Full report download:

.pdf   Hacking.pdf (Size: 59.36 KB / Downloads: 137)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
21-03-2010, 10:59 AM

please read topicideashow-to-ethical-hacking-full-report for more about ethical hacking
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  mpt myanmar mobile phone bill hacking Guest 1 176 12-10-2016, 09:13 AM
Last Post: amrutha735
  ethical hacking paper presentation in ieee format Guest 1 75 11-10-2016, 01:02 PM
Last Post: amrutha735
  mpt myanmar mobile phone bill hacking Guest 2 174 20-05-2016, 02:04 PM
Last Post: Dhanabhagya
  mpt myanmar mobile phone bill hacking Guest 1 70 20-05-2016, 01:55 PM
Last Post: Dhanabhagya
  mpt myanmar mobile phone bill hacking Guest 0 59 23-01-2016, 10:47 PM
Last Post: Guest
  online banking hacking ppt Guest 0 51 17-01-2016, 09:49 AM
Last Post: Guest
  ethical hacking seminar ieee format Guest 0 56 17-01-2016, 02:09 AM
Last Post: Guest
  mpt myanmar mobile phone bill hacking Guest 1 164 06-01-2016, 07:59 PM
Last Post: Guest
  mpt myanmar mobile phone bill hacking Guest 1 83 19-12-2015, 01:24 PM
Last Post: Guest
  mpt myanmar mobile phone bill hacking Guest 0 59 19-12-2015, 01:21 PM
Last Post: Guest