The Department of Computer Applications organized a Seminar on “Ethical Hacking” on 24th July 2024 in the Audio Visual Hall. The Seminar focused to students on which career path is most suited based on their skill sets. The program started at 10:00 am with the Tamil Thai vazthu. Welcome address by Ms. S. Sahaya Sharmily, S3 MCA and Presidential address by Dr. Tessy Thomas, Vice-Chancellor of NICHE and Inaugural address by Dr. P. Tirumalvalavan, Registrar of NICHE. Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. Hobby/profession of working with computers. In other words hacking is nothing but breaking into computers, gaining access to one’s computer or network, some people do it for fun so for them it is just fun with computers. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. Hobby/profession of working with computers. In other words hacking is nothing but breaking into computers, gaining access to one’s computer or network, some people do it for fun so for them it is just fun with computers. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. Hobby/profession of working with computers. In other words hacking is nothing but breaking into computers, gaining access to one’s computer or network, some people do it for fun so for them it is just fun with computers. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. This Seminar focused on the process of detecting vulnerabilities in an application, system, or organization's infrastructure that an attacker can use to exploit an individual or organization. Hackers use this process to prevent cyber-attacks and security breaches by lawfully hacking into the systems and looking for weak points. MCA and BCA students were attended this programme. The programme was very useful to the students.