Upload
s-m-masoud-sadrnezhaad
View
366
Download
3
Embed Size (px)
DESCRIPTION
Citation preview
Hackers & Crackers+ software freedom
By: S. M. Masoud Sadrnezhaad
[email protected]://sadrnezhaad.ir/smm
Contents
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
Introducing Useful References and Q & AIntroducing Useful References and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
Hacker Terms
History Hack definition
Jargon FileRequest for Comments
Crack definition Hacker Ethic
Grey HatBlack HatWhite Hat
Programmers Subculture
What’s a Hacker?
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
References and Q & AReferences and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
What’s a Hacker?
How To Become A Hacker How can I get started, then? Historical Note: Hacking and Free
Software Free Software Movement Hacker’s Culture Hackers: Heroes of the Computer
Revolution Hackers Attitude
Computer Crime and Common Cracking Tricks
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
References and Q & AReferences and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
Common Cracking Tricks
Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam
Remote Keylogging
Software-based keyloggers Hardware-based keyloggers On-screen keyboards
Online Payment Websites
Phishing
Website ForgeryLink manipulation
Phone PhishingNumber manipulation
Fake MailAddress manipulationRobots Recognition
Backtrack GNU/Linux
based on the Debian Tools Categories:
Information gathering Vulnerability
assessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneous
http://backtrack-linux.org
Anonymous Hacktivist Group Introduction
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
References and Q & AReferences and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
Anonymous Hacktivist Group
Guy Fawkes mask Activities
WikileaksOccupy Wall Street movementStop Online Piracy Act The Pirate BayMegaupload File SharingVisa, Mastercard, PaypalArab Spring activities
Julian Assange
Anonymous Hacktivist Group
Anonymous Hacktivist Group
Anonymous Hacktivist Group
Software Freedom
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
References and Q & AReferences and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
Software Freedom
The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it
does your computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others
Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day
Other Similar Words
Copyleft Creative Commons Open Source
Working together for free software
The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free Software
Projects LibrePlanet Campaign for Hardware that
Supports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG
Examples of Free Software
Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software : mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl. Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex Wikipedia
And …. Let‘s go to next slide for some famous distros
Why GNU/Linux!
Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks
Ubuntu Operation System
Famous Hackers Introduction
What’s a Hacker?What’s a Hacker?
Anonymous Hacktivist Group IntroductionAnonymous Hacktivist Group Introduction
Software FreedomSoftware Freedom
Famous Hackers IntroductionFamous Hackers Introduction
References and Q & AReferences and Q & A
Hacker Terms and Types of HackersHacker Terms and Types of Hackers
Computer Crimes and Common Cracking TricksComputer Crimes and Common Cracking Tricks
Richard M. Stallman
Steven Levy
Eric S. Raymond
John Draper
Eben Moglen
Steve Wozniak
Dan Bricklin
Linus Torvalds
Bruce Perens
Alan Cox
Mark Shuttleworth
Ian Murdock
William John Sullivan
Happy Hacking);
Question & Answer