Your SlideShare is downloading. ×
0
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hackers & Crackers (+ Software Freedom)

279

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
279
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. smmsadrnezh@gmail.comhttp://sadrnezhaad.ir/smm
  • 2. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionIntroducing Useful References and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 3.  History Hack definition Jargon File Request for Comments Crack definition Hacker Ethic Grey Hat Black Hat White Hat Programmers Subculture
  • 4. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 5.  How To Become A Hacker How can I get started, then? Historical Note: Hacking and FreeSoftware Free Software Movement Hacker’s Culture Hackers: Heroes of the ComputerRevolution Hackers Attitude
  • 6. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 7.  Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam
  • 8.  Software-based keyloggers Hardware-based keyloggers On-screen keyboards Online Payment Websites
  • 9.  Website Forgery Link manipulation Phone Phishing Number manipulation Fake Mail Address manipulation Robots Recognition
  • 10.  based on the Debian Tools Categories: Information gathering Vulnerabilityassessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneoushttp://backtrack-linux.org
  • 11. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 12.  Guy Fawkes mask Activities Wikileaks Occupy Wall Street movement Stop Online Piracy Act The Pirate Bay Megaupload File Sharing Visa, Mastercard, Paypal Arab Spring activities Julian Assange
  • 13. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 14.  The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it doesyour computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day
  • 15.  Copyleft Creative Commons Open Source Working together for freesoftware The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free SoftwareProjects LibrePlanet Campaign for Hardware thatSupports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG
  • 16.  Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex WikipediaAnd …. Let‘s go to next slide for some famous distros
  • 17.  Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks
  • 18. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks

×