Title: Computer Hacking And IT Security
1 COMPUTER HACKING ANDIT
SECURITYPresented By http//www.computer-kno
wledge.com
2WHAT IS HACKER?The term hacker is used by MIT
train enthusiasts who hacked their train sets to
change how they work. Later, these same
enthusiasts emerge as the first computer
hackers.There is an on-going debate about the
definition of the word hacker. A hacker can be
anyone with a deep interest in computer-based
technology it does not necessarily define
someone who wants to do harm.
3WHAT IS ATTACKER?The term attacker can be used
to describe a malicious hacker. Another term for
an attacker is a black hat.Security analysts
are often called white hats, and white-hat
analysis is the use of hacking for defensive
purposes.
4FORMS OF ATTACKS Attacks on a company or
organization's computer systems take many
different forms, such as spoofing, smurfing, and
other types of Denial of Service (DoS) attacks.
Attacks are mainly designed to harm or
interrupt the use of your operational systems. In
this way , you can learn how to hack the computer
systems.
5HACKING TRICKS For hacking tricks make use of
hacking tools that are used to test the security
of a network, pc etc. It can also be used to
recover lost information where the computer
password has been lost.
6COMPUTER HACKING METHODS OF ATTACKOf course
attacks can involve far greater levels of
sophistication. Here are some of the more common
techniques used in password cracking 1.
Dictionary Attack 2. Hybrid Attack 3. Brute
Force Attack 4. Internal Attack
7CONTACT INFORMATIONWebsite Info
http//www.computer-knowledge.comContact
E-mail contact_at_computer-knowledge.com