1 / 7

by Kurt Kaleikini

by Kurt Kaleikini. Hacker’s & Cracker’s. Who are Hackers & Crackers. Hackers. Crackers.

ryann
Download Presentation

by Kurt Kaleikini

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. by Kurt Kaleikini Hacker’s & Cracker’s

  2. Who are Hackers & Crackers Hackers Crackers Crackers break things. Crackers are those who get their thrills by cracking software, creating viruses, and destroying things. Unfortunately media often confuse the terms, thus the term hacker, when mentioned in mainstream media, usually refers to crackers! • Hackers is a term used for those who have been closely associated with the development of the computer, outside of the traditional corporate structure, and the free software movement (also known as the Open Source movement). Those that help develop code to improve (or create new) software, and share that code with fellow hackers. Hackers therefore make things. http://grok.lsu.edu/Article.aspx?articleid=7203

  3. Security Essentials (Secure sites start with https, not http.) What is a virus? What is Spyware/Malware? Software that can install itself, or run, on a computer without the owner's consent. Spyware may display no symptoms after infecting a computer, but can affect how the computer runs. Spyware can monitor personal information, change personal settings or cause the computer to run slowly. • Software programs deliberately designed to interfere with normal computer operation. They can record, corrupt, or delete data and infect other computers through the Internet. The main symptom to look for, if a virus is present, is if the computer has slowed significantly. http://grok.lsu.edu/Article.aspx?articleId=13994

  4. “Don’t be the next Victim” “Finally, Check your accounts for any irregular activities!” http://torchalum.wordpress.com/2010/12/06/tip-of-the-week-don%E2%80%99t-become-a-victim-to-internet-hackers/ • Find out if your computer is safe. • Get a Free Scan: • AMIHackerProof.com. • Set up a 2way firewall and or antispyware • From: • Norton Antivirus • McAfee • Choose your usernames wisely • Do Not: • use same username & passwords for all of your accounts • use less than 7 characters and symbols if acceptable • Beware of the sites you visit, emails you receive and people you befriend • Avoid: • downloading files from questionable websites • opening emails and messages from senders you don’t recognize. • giving personal information without verifying you are not being “Scammed” • unknown chat rooms

  5. Don’t Get Hacked on Facebook http://www.youtube.com/watch?v=x3So5xKKG4I

  6. Avoid Getting Hacked(When Gamin g on the Internet) http://www.youtube.com/watch?v=WE1L1GQyAn8

  7. Works Cited • http://grok.lsu.edu/Article.aspx?articleid=7203 • http://grok.lsu.edu/Article.aspx?articleId=13994 • http://torchalum.wordpress.com/2010/12/06/tip-of-the-week-don%E2%80%99t-become-a-victim-to-internet-hackers/ • http://www.youtube.com/watch?v=x3So5xKKG4I • http://www.youtube.com/watch?v=WE1L1GQyAn8

More Related