Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Rajan Kohli & Parul Khanna

Third Eye Ethical Hackers (R)
by

Rajan Kohli

on 16 June 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Rajan Kohli & Parul Khanna

Wifi Hacking
Security Tips :
Any Question?
Email Hacking
Various Fake Emails Are Sent to Users Using Fake Mail Technologies to Hack into Users Account by Trapping Them in Scams
About Me:
Cyber Terror: Introduction to Ethical Hacking
Most Wifi Connections at Various Organisations/Homes Can be Easily Cracked via Various Methods .
For eg : Using Linux Operating System called as BAckTrack
For Security of Cookies Always Use a MASTER PASSWORD for your browser & add Special Chracters to your Password.

Do not Click on Unknown & Suspicious Links & Avoid Email Security.

Change your Wifi password after every 1-2 weeks
Email us:
info@thirdeyeethicalhackers.com
What is Ethical Hacking?
An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.

Ethical hacking is also known as penetration testing, intrusion testing and red teaming.

A study by NASSCOM says that by 2013 the demand for professional ethical hackers will reach 1,88,000.To meet the growing need,a certified ethical hacking programme has been made available.
Youngest Student Entrepreneurs as Per Guardians Student Entreprenuership Summit 2012
Internationally Acclaimed Security Researchers Presented Projects in 5 Countries
Found Loopholes like Cross Site Scripting & Session Hijacking in Yahoo & Facebook
Found Loopholes like SMS & Call Forging in Mobile Networks
Conducted More Than 160 Workshops including IITs,NITs & Many Prestigious Universties
Trained 16+ MNCs Like Yahoo,Google ISACA,TCS,HCL,Infosys,k7 Antivirus
Solved Many Cyber Crime Cases (Netbanking Fraud,Online Accounts Forgery) & etc.
Cookie Stealing is A Process in Which Cyber Attackers Steals Your Sensitive Passwords By Injecting Codes into Sevral .EXE(Executable Files)
For Ex: Microsoft Windows ,Microsoft Office,Adobe Photoshop,Firefox,Google Chrome , Firefox.
Cookie Stealing
Full transcript