SlideShare a Scribd company logo
1 of 15
Hacking
Presented by:- Arpit Verma
Reg. No.:- CRO0422316
Contents
1. What is hacking?
2. Who are hacker?
3. Hacker Categories?
4. Types of Hacker?
5. Skill of hackers?
6. Advantages & Disadvantages?
7. How to save computer from hackers
What is Hacking?
• Hacking is the act of breaking in to a computer
system and is a criminal offence under the
computer misuse
Or
• The really simple definition of hacking: is gaining
an unauthorized access to a computer system
Who is Hacker ?
The person who is consistently engaging in
hacking activities, and has accepted
hacking as a lifestyle and philosophy of
their choice, is called a Hacker
HACKER CATEGORIES
1. Semi-Professional Hacking. Performed part-time and
does not provide an income. They fit the classical
hacker characteristics.. they work and play on the edge
of society, have a gang mentality, strong negative
responses to threats against his/her self-esteem, can
have narcissistic personality disorders.
2. Inter-City Hacking. Inner-city residence (any race,
color, religion, creed, etc,), exhibits anger at social
condition, exhibits no social conscience, jail is not a
deterrent. Hacking gives them a sense of power and
allows them to make their own rules.
HACKER CATEGORIES
3. Euro hacking. More worldly , enlightened then US
hackers and are generally motivated by philosophical or
political concerns. Generally thought of as a way of life
and not a crime, thinks hacking is treating technology
without respect; thinks its great sport to spin up
intelligence communities.
4. Professional Hacking. This encompasses any for profit
activity such as spies, industrial espionage, Narco
terrorist, White Collar criminals, etc.
• White hat
• Black hat
• Grey hat
Type of hacker
White-hat Hackers
• The good guys
who identify the
security
weakness of
the system or
network and
inform the
owner about
them
Black Hat Hackers
A black hat is the villain or
bad guy, who crash into
victim’s security to steal
information and destroy
the victims security
network.
Also known as ‘cracker’.
Grey hat Hackers
• A grey hat, in the
hacking community,
refers to a skilled
hacker who is
somewhere in
between white and
black hat hackers
• Routers: knowledge of routers, routing protocols, and access control
lists
• Microsoft: skills in operation, configuration and management.
• Linux: knowledge of Linux/Unix; security setting, configuration, and
services.
• Firewalls: configurations, and operation of intrusion detection
systems.
• Mainframes
• Network Protocols: TCP/IP; how they function and can be
manipulated.
• Project Management: knowledge of leading, planning, organizing,
and controlling a penetration testing team.
Skill of a hacker
ADVANTAGES OF HACKING
• CAN BE USED TO RECOVER LOST INFORMATION WHERE
THE COMPUTER PASSWORD HAS BEEN LOST.
• TEACHES U THAT NO TECHNOLOGY IS 100% SECURE
•
• TO TEST HOW GOOD SECURITY IS ON YOUR OWN
NETWORK. ;)
• THEY CALL IT WHITE HAT COMPUTER HACKING.
• HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU
ARE ONLINE BUT THE ONLY PROBLEM IS
IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN
HACKING THEN YOU COULD GET CHUCKED OFF THE
GAMING SERVER SO WATCH OUT
How to save computer from hackers
• Protect Your Computer: Avoid Computer
Holes/Vulnerabilities
• Install only trusted software and delete unknown emails .
• If you have any doubt about a piece of software's
function, do not install it.
• Avoid adult web sites, a hacker's paradise.
• Whether in your e-mail or online, do not click on ads. If
the ad is of interest, find the site. Be careful with what
you physically put into your computer. This is especially
true for shared R/W CDs, USB hard disks, or flash
drives. This is an easy path for a virus to follow from
computer to computer.
e.mail i.d.- arpit.akiko@gmail.com
Mob. No.- +91 9540688557
Hacking

More Related Content

What's hot

What's hot (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
introduction of Cyber securit
introduction of Cyber securitintroduction of Cyber securit
introduction of Cyber securit
 
Password Attack
Password Attack Password Attack
Password Attack
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 

Viewers also liked

Viewers also liked (6)

10a98 virus111
10a98 virus11110a98 virus111
10a98 virus111
 
PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Hacking
HackingHacking
Hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
dos attacks
dos attacksdos attacks
dos attacks
 

Similar to Hacking

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSamip Shah
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 

Similar to Hacking (20)

hacking
hackinghacking
hacking
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Hacking
HackingHacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Hacking

  • 1. Hacking Presented by:- Arpit Verma Reg. No.:- CRO0422316
  • 2. Contents 1. What is hacking? 2. Who are hacker? 3. Hacker Categories? 4. Types of Hacker? 5. Skill of hackers? 6. Advantages & Disadvantages? 7. How to save computer from hackers
  • 3. What is Hacking? • Hacking is the act of breaking in to a computer system and is a criminal offence under the computer misuse Or • The really simple definition of hacking: is gaining an unauthorized access to a computer system
  • 4. Who is Hacker ? The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker
  • 5. HACKER CATEGORIES 1. Semi-Professional Hacking. Performed part-time and does not provide an income. They fit the classical hacker characteristics.. they work and play on the edge of society, have a gang mentality, strong negative responses to threats against his/her self-esteem, can have narcissistic personality disorders. 2. Inter-City Hacking. Inner-city residence (any race, color, religion, creed, etc,), exhibits anger at social condition, exhibits no social conscience, jail is not a deterrent. Hacking gives them a sense of power and allows them to make their own rules.
  • 6. HACKER CATEGORIES 3. Euro hacking. More worldly , enlightened then US hackers and are generally motivated by philosophical or political concerns. Generally thought of as a way of life and not a crime, thinks hacking is treating technology without respect; thinks its great sport to spin up intelligence communities. 4. Professional Hacking. This encompasses any for profit activity such as spies, industrial espionage, Narco terrorist, White Collar criminals, etc.
  • 7. • White hat • Black hat • Grey hat Type of hacker
  • 8. White-hat Hackers • The good guys who identify the security weakness of the system or network and inform the owner about them
  • 9. Black Hat Hackers A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.
  • 10. Grey hat Hackers • A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 11. • Routers: knowledge of routers, routing protocols, and access control lists • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems. • Mainframes • Network Protocols: TCP/IP; how they function and can be manipulated. • Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team. Skill of a hacker
  • 12. ADVANTAGES OF HACKING • CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST. • TEACHES U THAT NO TECHNOLOGY IS 100% SECURE • • TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK. ;) • THEY CALL IT WHITE HAT COMPUTER HACKING. • HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU ARE ONLINE BUT THE ONLY PROBLEM IS IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN HACKING THEN YOU COULD GET CHUCKED OFF THE GAMING SERVER SO WATCH OUT
  • 13. How to save computer from hackers • Protect Your Computer: Avoid Computer Holes/Vulnerabilities • Install only trusted software and delete unknown emails . • If you have any doubt about a piece of software's function, do not install it. • Avoid adult web sites, a hacker's paradise. • Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.