Hackers & Crackers (+ Software Freedom)
Upcoming SlideShare
Loading in...5
×
 

Hackers & Crackers (+ Software Freedom)

on

  • 298 views

 

Statistics

Views

Total Views
298
Views on SlideShare
286
Embed Views
12

Actions

Likes
0
Downloads
13
Comments
0

1 Embed 12

http://sadrnezhaad.ir 12

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hackers & Crackers (+ Software Freedom) Hackers & Crackers (+ Software Freedom) Presentation Transcript

    • smmsadrnezh@gmail.comhttp://sadrnezhaad.ir/smm
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionIntroducing Useful References and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
    •  History Hack definition Jargon File Request for Comments Crack definition Hacker Ethic Grey Hat Black Hat White Hat Programmers Subculture
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
    •  How To Become A Hacker How can I get started, then? Historical Note: Hacking and FreeSoftware Free Software Movement Hacker’s Culture Hackers: Heroes of the ComputerRevolution Hackers Attitude
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
    •  Remote keylogging Phishing SQL Injection DDoS attack / Overflow Desktop Exploitation Remote Sniffing Honeyball IP fragmentation attacks Lottery scam
    •  Software-based keyloggers Hardware-based keyloggers On-screen keyboards Online Payment Websites
    •  Website Forgery Link manipulation Phone Phishing Number manipulation Fake Mail Address manipulation Robots Recognition
    •  based on the Debian Tools Categories: Information gathering Vulnerabilityassessment Exploitation tools Privilege escalation Maintaining access Reverse engineering RFID tools Stress testing Forensics Reporting tools Services Miscellaneoushttp://backtrack-linux.org
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
    •  Guy Fawkes mask Activities Wikileaks Occupy Wall Street movement Stop Online Piracy Act The Pirate Bay Megaupload File Sharing Visa, Mastercard, Paypal Arab Spring activities Julian Assange
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks
    •  The freedom to run the program, for any purpose The freedom to study how the program works, and change it so it doesyour computing as you wish The freedom to redistribute copies so you can help your neighbor The freedom to distribute copies of your modified versions to others Free as in Freedom Who Control Your Computer? Free Software Community Why Free Software? Free Software Foundation Software Freedom Day
    •  Copyleft Creative Commons Open Source Working together for freesoftware The GNU Operating System Defective By Design Windows 7 Sins PlayOgg End Software Patents Campaign for OpenDocument RIAA Expert Witness Fund High Priority Free SoftwareProjects LibrePlanet Campaign for Hardware thatSupports Free Software Free BIOS Campaign Campaign against the ACTAHTTP://FSF.ORG HTTP://GNU.ORG
    •  Linux Kernel Smart-Phone OS: Android,Symbian, Meego Thunderbird Mail Client GCC (GNU C Compiler) and C Librarys Server-type Software mysql, PostgreSQL, Apache Programming Languages such as: TCL Ruby Python PHP Perl Firefox Web Browser VLC Media Player Open Office TOR Anonymity Online Pidgin KDE & Gnome Desktop Environments Latex WikipediaAnd …. Let‘s go to next slide for some famous distros
    •  Free / Open Source Software Lower cost for users and higher salary for specialists Choose how your desktop look like Scheduler updates with one click Support every kind of CPU Architecture More secure Forget about viruses Original Software More efficient in size and faster Forgot about defragmentation No backdoor Multiple workstations Live disks
    • What’s a Hacker?Anonymous Hacktivist Group IntroductionSoftware FreedomFamous Hackers IntroductionReferences and Q & AHacker Terms and Types of HackersComputer Crimes and Common Cracking Tricks