Hackers & Crackers (+ Software Freedom)
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Hackers & Crackers (+ Software Freedom)

on

  • 341 views

 

Statistics

Views

Total Views
341
Views on SlideShare
326
Embed Views
15

Actions

Likes
0
Downloads
14
Comments
0

2 Embeds 15

http://sadrnezhaad.ir 14
http://www.sadrnezhaad.ir 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hackers & Crackers (+ Software Freedom) Presentation Transcript

  • 1. smmsadrnezh@gmail.comhttp://sadrnezhaad.ir/smm
  • 2. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionIntroducing Useful References and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 3.  History Hack definition Jargon File Request for Comments Crack definition Hacker Ethic Grey Hat Black Hat White Hat Programmers Subculture
  • 4. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 5.  How To Become A Hacker How can I get started, then? Historical Note: Hacking and FreeSoftware Free Software Movement Hacker’s Culture Hackers: Heroes of the ComputerRevolution Hackers Attitude
  • 6. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 7.  Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam
  • 8.  Software-based keyloggers Hardware-based keyloggers On-screen keyboards Online Payment Websites
  • 9.  Website Forgery Link manipulation Phone Phishing Number manipulation Fake Mail Address manipulation Robots Recognition
  • 10.  based on the Debian Tools Categories: Information gathering Vulnerabilityassessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneoushttp://backtrack-linux.org
  • 11. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 12.  Guy Fawkes mask Activities Wikileaks Occupy Wall Street movement Stop Online Piracy Act The Pirate Bay Megaupload File Sharing Visa, Mastercard, Paypal Arab Spring activities Julian Assange
  • 13. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 14.  The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it doesyour computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day
  • 15.  Copyleft Creative Commons Open Source Working together for freesoftware The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free SoftwareProjects LibrePlanet Campaign for Hardware thatSupports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG
  • 16.  Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex WikipediaAnd …. Let‘s go to next slide for some famous distros
  • 17.  Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks
  • 18. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks