1 / 13

INTRODUCTION TO THE TOPIC PHREK AND HACKERS

INTRODUCTION TO THE TOPIC PHREK AND HACKERS. PRESENTED BY:Jude zakariya Ndak. Introduction to the topic Phreak and Hackers in computer Ethics

lexiss
Télécharger la présentation

INTRODUCTION TO THE TOPIC PHREK AND HACKERS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTRODUCTION TO THE TOPIC PHREK AND HACKERS • PRESENTED BY:JudezakariyaNdak

  2. Introduction to the topic Phreak and Hackers in computer Ethics What is phreaking or hacking: phreaking or hacking are all ways to gain access to protect or classified channels of information by an unconventional use of information. Phreaking manipulate the phone signaling in order to make free calls, while hacking typically involves using a computer and a modem to brake into protected systems and networks.

  3. History of phreaking and HackingPhreaking started around late 1950s, when long distance calls was a premium item and it was costly making this calls, phreaking got its golden age around 1960 and early 1970s. The first and original computer hackers emerged in the 1960s at MIT(Massachusetts Institute of Technology)

  4. What do Phreak and Hackers Do • Both phreak and hackers are peoplewho exploit the weakness of a network system.They spend enormous amounts of time trying to breach the security of networks,Web servers and email servers. Usually they use a selection of specialist software to identify weaknesses, which are then exploited. In the case of the phreak they use somthing called a blue box.Some do it for fun while others do it to spy on people or to defraud people.

  5. Names of Femousephreaks and Hackers: • Joe engresia Bill from new Yorkcaptain john draperSteve WozniakSteve jobskevinemitnicwikileaksBill gatesMark zuckerberg

  6. The Method Hackers or phreak Use To Bake Through a System • For the hackers, they write malicious programs and send it via a network to enable them steal important documents eg spam mail. • The program could also be use to spy on people by listening to there phone interaction( N .S .A). • Hackers can cause system overloading by causing to much traffic on a network to make it crash. • Phreaks uses an equipment call blue box or captain crunch(Whistle) to commit toll fraud.

  7. picture of a phone phreak holding a blue box

  8. Ways to Prevent Your Phone or System From Hackers & Phreak • Perform required software updates for your operating system and web browser. • Install a firewall on your computer and personalize the settings. • Change your passwords every month for the data base administrator he need to change his password everyday. • Install anti-spyware/adware programs onto your system.

  9. Delete emails from unknown sources. Never click on an emailed link that looks questionable. Install the ETM System's, Voice IPS is another security application, providing real-time alerts to telecom managers when phreaking is going on.

More Related