Title: By: Mahmoud Ashraf
1 2Introduction
- Hackers use many types of hacking tools like
- Viruses, Worms, Trojan Horses and only
professional hackers use Software Flaws and other
ways.
Hacker is someone who tries to break into
computer systems.
3Programs used in hacking?
4What is a Trojan Horse and how to prevent your
self from it?
- A destructive programs that masquerades as a
benign application. Unlike viruses , Trojan
horses do not replicate themselves but they can
be just as destructive. One of the most insidious
types of Trojan horse is a program that claims to
rid your computer of viruses but instead
introduces viruses onto your computer.
5How to prevent your self from Viruses, Worms,
Trojan Horses ?
- The best way is to just use common sense. When
going through your email, pay attention to what
you are opening. If you aren't friends with a guy
named John Doe, then you probably don't care
about his vacation, so why open a picture from
him? Just delete it and move on. - You can use technology to help you! Using
anti-virus and anti-spyware software is a great
way to not only keep your computer running
smooth, but to keep you identity safe. This
software is made to search of viruses not only on
your computer, but in the emails your receive as
well. There are a number of titles to choose from
like Symantec Anti Virus and my personal favorite
Kaspersky Anti Virus
6What is a software flow and how to prevent your
self from it?
- Every piece of software is composed of thousands
if not millions of lines of code. - Essentially what this code is, is a set of
instructions for the computer to follow in order
to perform what ever function the software is
designed to. - There are bound to be oversights and errors made
by the people who write and design it. - .
7- The problem is that sometimes these oversights
exposes weaknesses in software, and when the
piece of software is made to manage things like
client information or financial data, these
weaknesses become targets for hackers who try to
exploit them. - Depending on the exploit a hacker finds and the
piece of software it is in, the problems
experienced can range from data just being
inaccurate or being deleted, to the hacker being
able to take full control of your computer
8How to prevent yourself from Software Flow?
- How to protect yourself from Software flow?
- make sure you keep your software up to date. Once
a manufacture releases software, they will
typically release updates for it as well to fix
the exploits once they are discovered. For pieces
of software made by Microsoft, the updates can be
downloaded from their website updates.microsoft.co
m. - Most other manufactures also post the updates on
their websites, and many even build a feature
into their software to download the updates
automatically, Microsoft builds this feature into
Windows and it is called "Microsoft Automatic
Updates" Be sure to check often for updates,
because many times not only do they fix bugs in
the software, but they add functionality as well.
9How to know what ports you have are open?
- The are port scanner software designed to search
a network host for open ports. This is often used
by administrators to check the security of their
networks and by crackers to compromise it. - The most popular programs are-
- Superscan
- Nmap
10ProRat explaining
This is a photo of the program pro rat and now we
will explain how hackers make patches (Trojans)
with this software
11(No Transcript)
12- Keep it as it is
- You e-mail
- As in the pic
- As in the pic
- Click on general settings
131.Dont change the port. 2.Add server
pass 3.Victims name 4. Click on server extensions
141.Choose anything I prefer SCR 2.Click on server
icon
151.Choose the icon you prefer. 2.To import a new
icon. 3.Click to creat server.
16I wish my explanation was easy and Thank you.
17- Thank you for your interests and wish that you
have got information to protect your self and
Know How Hackers Think??