Title Lorem Ipsum
Adrian Lamo
Please add your name here
29th April, 2021
Why I chose this topic - Adrian Lamo
Hello Everyone, I am <>
Hope you are doing well and staying safe!
I want start the presentation by – answering Why I selected this topic.
Adrian Lamo, well, I find him quite intriguing as well as thought-provoking. Hence, by the virtue of this presentation I would like to throw some light on his life story, especially his prowess in hacking and technical acumen to hack almost anything that is available on internet. In this presentation I am going to explain what Adrian committed because of which he was regarded as black hat and arrested. Furthermore, in this presentation we are going to discuss about how such illegal hacking can be prevented and offer you some practical recommendations that you can leverage in your daily life.
2
One of the most notorious black-hat hacker of all time. Adrian was a threat analyst and hacker by profession.
I chose this topic because I want explain about Black Hats and the magnitude of havoc their actions can create for a person, state and even a country.
Black Hats are the hackers who exploit the internet and extract confidential data from the systems of computer. They are stereotypical illegal groups of hackers that extract data and use them for their own benefits
How was Adrian Lamo discovered
Hacking is the process of modifying the features of a system such that one is able to attain the objective beyond the original intention of creator.
Adrian was a person who continuously engaged in various hacking activities and had accepted it as philosophy of life. He started as a grey hat hacker but later converted into complete black hat hacker.
Individuals, not PCs, make PC dangers. Hackers deceive others for their own benefit! Give a hacker like Adrian admittance to the Internet — and to your PC — and the danger they posture to your security increments dramatically. PC programmers are unapproved clients who break into PC frameworks to take, change or annihilate data, frequently by introducing hazardous malware without your insight or assent. Their sharp strategies and point by point specialized information help them access the data you truly don't need them to have.
3
Adrian had conducted several rounds of penetration testing through his hacking codes and procedures. He was successfully able to breach in to US security by finding lope...