1 00:00:00,360 --> 00:00:07,080 The dome system can be anything either next door, laptop or a tablet, when the dome system hacking 2 00:00:07,080 --> 00:00:13,080 comes into play, it usually means the art of hacking a computer using some tools and techniques. 3 00:00:13,800 --> 00:00:21,030 So the question arises, how to hack a system or computer is probably one of the most frequently asked 4 00:00:21,030 --> 00:00:24,090 question by most Internet users and hacking. 5 00:00:24,270 --> 00:00:27,720 And to just say no, let's see what is system hacking? 6 00:00:28,170 --> 00:00:35,070 System hacking is itself a vast subject which consists of hacking the different software based technologies 7 00:00:35,070 --> 00:00:42,150 systems such as laptop, desktop, etc system hacking is defined as a compromise of computer system 8 00:00:42,150 --> 00:00:49,710 and software to gain access to the computer targeted computer and steal or misuse sensitive information. 9 00:00:50,130 --> 00:00:56,100 Here, the malicious hackers exploit the weakness in a computer system or network to gain unauthorized 10 00:00:56,130 --> 00:00:59,770 access to its data or take illegal advantage of it. 11 00:00:59,830 --> 00:01:02,880 Now let's see that how hackers perform system hacking. 12 00:01:03,620 --> 00:01:08,880 A hacker can had the computer system because the hacker knows the actual work of computer system and 13 00:01:08,880 --> 00:01:10,680 software, which is inside the system. 14 00:01:11,490 --> 00:01:16,980 What is a hacker has information about the systems, networking and knowledge of other areas related 15 00:01:16,980 --> 00:01:17,890 to computer science. 16 00:01:18,240 --> 00:01:24,690 Anyone which is using a computer and is connected to the Internet is susceptible to the threat of malicious 17 00:01:24,690 --> 00:01:25,160 hackers. 18 00:01:25,290 --> 00:01:33,810 These online villains generally use as viruses, malware, frozen worms, -- techniques, email 19 00:01:33,810 --> 00:01:40,560 spamming, social engineering, exploit operating system inabilities or Audobon abilities to get access 20 00:01:40,560 --> 00:01:42,040 to any victim system. 21 00:01:42,060 --> 00:01:47,550 So now the question arises that what can these hackers do using after compromising the system? 22 00:01:48,390 --> 00:01:54,630 When you think it's connected to the Internet, the hacker can execute the malware on your PC and quietly 23 00:01:54,630 --> 00:01:59,770 transmits the personal, financial and essential information without your consent. 24 00:02:00,150 --> 00:02:05,010 These hackers can blackmail the victim for the money by stealing the essential information from the 25 00:02:05,010 --> 00:02:09,990 computer, which you don't want to reveal of the compromising the victim system. 26 00:02:10,440 --> 00:02:15,470 The hacker can do these many things like the victims data bank. 27 00:02:15,480 --> 00:02:18,540 Leading the way is still files and folders. 28 00:02:18,930 --> 00:02:25,530 Hijack victim's username and password is steal money and credit card details while the victim is doing 29 00:02:25,530 --> 00:02:27,990 e-marketing or online transactions. 30 00:02:28,560 --> 00:02:34,800 Sell victims information to third parties who may use the information for illegal purposes. 31 00:02:35,640 --> 00:02:41,400 Create traffic to shut down your website to access to the server and manipulating the file room, etc.. 32 00:02:41,610 --> 00:02:45,530 So these many things hackers can do all of the compromising your system. 33 00:02:46,200 --> 00:02:50,250 So this is all about what is system hacking in upcoming Mujib's. 34 00:02:50,250 --> 00:02:54,600 We are going to see how to perform system hacking in your own virtual environment.