Hackers & Crackers (+ Software Freedom)

Preview:

DESCRIPTION

 

Citation preview

Hackers & Crackers+ software freedom

By: S. M. Masoud Sadrnezhaad

smmsadrnezh@gmail.comhttp://sadrnezhaad.ir/smm

Contents

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

Introducing Useful References and Q & AIntroducing Useful References and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

Hacker Terms

History Hack definition

Jargon FileRequest for Comments

Crack definition Hacker Ethic

Grey HatBlack HatWhite Hat

Programmers Subculture

What’s a Hacker?

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

References and Q & AReferences and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

What’s a Hacker?

How To Become A Hacker How can I get started, then? Historical Note: Hacking and Free

Software Free Software Movement Hacker’s Culture Hackers: Heroes of the Computer

Revolution Hackers Attitude

Computer Crime and Common Cracking Tricks

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

References and Q & AReferences and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

Common Cracking Tricks

Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam

Remote Keylogging

Software-based keyloggers Hardware-based keyloggers On-screen keyboards

Online Payment Websites

Phishing

Website ForgeryLink manipulation

Phone PhishingNumber manipulation

Fake MailAddress manipulationRobots Recognition

Backtrack GNU/Linux

based on the Debian Tools Categories:

Information gathering Vulnerability

assessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneous

http://backtrack-linux.org

Anonymous Hacktivist Group Introduction

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

References and Q & AReferences and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

Anonymous Hacktivist Group

Guy Fawkes mask Activities

WikileaksOccupy Wall Street movementStop Online Piracy Act The Pirate BayMegaupload File SharingVisa, Mastercard, PaypalArab Spring activities

Julian Assange

Anonymous Hacktivist Group

Anonymous Hacktivist Group

Anonymous Hacktivist Group

Software Freedom

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

References and Q & AReferences and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

Software Freedom

The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it

does your computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others

Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day

Other Similar Words

Copyleft Creative Commons Open Source

Working together for free software

The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free Software

Projects LibrePlanet Campaign for Hardware that

Supports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG

Examples of Free Software

Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software : mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl. Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex Wikipedia

And …. Let‘s go to next slide for some famous distros

Why GNU/Linux!

Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks

Ubuntu Operation System

Famous Hackers Introduction

What’s a Hacker?What’s a Hacker?

Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction

Software FreedomSoftware Freedom

Famous Hackers IntroductionFamous Hackers Introduction

References and Q & AReferences and Q & A

Hacker Terms and Types of HackersHacker Terms and Types of Hackers

Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks

Richard M. Stallman

Steven Levy

Eric S. Raymond

John Draper

Eben Moglen

Steve Wozniak

Dan Bricklin

Linus Torvalds

Bruce Perens

Alan Cox

Mark Shuttleworth

Ian Murdock

William John Sullivan

Happy Hacking);

Question & Answer

Recommended