Hackers & Crackers (+ Software Freedom)

  • 250 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
250
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
18
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. smmsadrnezh@gmail.comhttp://sadrnezhaad.ir/smm
  • 2. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionIntroducing Useful References and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 3.  History Hack definition Jargon File Request for Comments Crack definition Hacker Ethic Grey Hat Black Hat White Hat Programmers Subculture
  • 4. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 5.  How To Become A Hacker How can I get started, then? Historical Note: Hacking and FreeSoftware Free Software Movement Hacker’s Culture Hackers: Heroes of the ComputerRevolution Hackers Attitude
  • 6. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 7.  Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam
  • 8.  Software-based keyloggers Hardware-based keyloggers On-screen keyboards Online Payment Websites
  • 9.  Website Forgery Link manipulation Phone Phishing Number manipulation Fake Mail Address manipulation Robots Recognition
  • 10.  based on the Debian Tools Categories: Information gathering Vulnerabilityassessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneoushttp://backtrack-linux.org
  • 11. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 12.  Guy Fawkes mask Activities Wikileaks Occupy Wall Street movement Stop Online Piracy Act The Pirate Bay Megaupload File Sharing Visa, Mastercard, Paypal Arab Spring activities Julian Assange
  • 13. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
  • 14.  The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it doesyour computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day
  • 15.  Copyleft Creative Commons Open Source Working together for freesoftware The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free SoftwareProjects LibrePlanet Campaign for Hardware thatSupports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG
  • 16.  Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex WikipediaAnd …. Let‘s go to next slide for some famous distros
  • 17.  Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks
  • 18. What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks