The Hacker Perspective
Upcoming SlideShare
Loading in...5
×
 

The Hacker Perspective

on

  • 1,090 views

 

Statistics

Views

Total Views
1,090
Views on SlideShare
1,050
Embed Views
40

Actions

Likes
0
Downloads
29
Comments
0

4 Embeds 40

http://23.22.210.145 22
http://hackjacketdevs.wpengine.com 13
http://hackjacket.staging.wpengine.com 4
http://hackjacketdevs.staging.wpengine.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Hacker Perspective The Hacker Perspective Presentation Transcript

  • tHe hAcKeR pErSpEcTiVe… http://home.flash.net/~rayearle/Hfiles/Hacker.png http://www.hackronomicon.com/images/HackerInside.png …hacked by Juliet Taylor http://en.wikipedia.org/wiki/Hacker_ethic
  • Famous Hackers… Jonathan James Adrian Lamo Kevin Mitnick Kevin Poulsen Linus Torvalds Tim-Berners Lee Steve Wozniak -10 Most Famous Hackers of All Time
  • No limits to Creativity… -Bre Prettis
  • “It's the thought processes, more than anything else, that sets a hacker apart from most people. It's the ability to look critically at a problem, when everyone says quot;it CAN'T work like thatquot;, when the hacker knows the logic of the situation says it can.” –Richard Cheshire
  • “Based on hackers’ self-reports, we assume a sort of intrinsic motivation is characteristic for hackers—at least for many of them.” –Tom Chance
  • Hacker work is, in the words of the hacker Linus Torvalds, quot;interesting, exciting, and joyousquot;, quot;intrinsically interesting and challenging.”–Tom Chance
  • Hackers see the world from a different angle…
  • “In contemporary society we maintain a distinction between work and leisure, and are acutely aware of when work erodes the time we usually dedicate to leisure. To hackers, the distinction is nonexistent.” –Tom Chance
  • Hacking is about taking something ordinary and making it into art!
  • “To hack is to dedicate yourself to realizing your full human potential; to take an essentially active, rather than passive stance towards your environment.” –Tom Chance
  • The word ``hacker'' has taken on many different meanings ranging from 1) ``a person who enjoys learning the details of computer systems and how to stretch their capabilities'' to 2) ``a malicious or inquisitive meddler who tries to discover information by poking around .. possibly by deceptive or illegal means ...'' –Dorothy Denning
  • “I’m always excited when hacktivists say, ‘No, break the warranty, open the box, mod your Xbox, don’t obey what company tells you to do with your technology.” -Anna Newitz
  • “Reverse engineering is the process of discovering the technological principles of a device, object or system through analysis of its structure, function and operation. It often involves taking something apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without copying anything from the original.” -Wikipedia
  • “We often say that breaking into a system implies a lack of caring for the system's owner and authorized users. But, one hacker says that the ease of breaking into a system reveals a lack of caring on the part of the system manager to protect user and company assets, or failure on the part of vendors to warn managers about the vulnerabilities of their systems.” -Dorothy Denning
  • Hacking is about turning things upside down…
  • “Hacking could involve the heartfelt conviction that beauty can be found in computers, that the fine aesthetic in a perfect program can liberate the mind and spirit”. –Tom Chance
  • Works Cited Chance, Tom. quot;Dissertation on the Hacker Ethic and Meaningful Work.quot; Tom Chance's Website. 3 Aug. 2005. 4 May 2009 <http://tom.acrewoods.net/research/hackerethic/ dissertation#SECTION00030000000000000000>. Cheshire, Richard. quot;Hacker Perspective.quot; 2600 Magazine Spring 2006. 18 Apr. 2009 <http://cheshirecatalyst.com/perspective.html>. Denning, Dorothy. quot;Concerning Hackers Who Break into Computer Systems.quot; WindowSecurity. 19 Apr. 2000. 3 May 2009 <http://www.windowsecurity.com/uplarticle/16/Hackers-NCSC.txt> . Newitz , Annalee (2007) quot;Capitalist monsters, RFID and Internet tubes,quot; Hack This Zine, v. 5. Prettis, Bre. quot;The Hacker Perspective.quot; 2600 Magazine Dec. 2008-2009: 26-28. 23 Apr. 2009 <http://la2600.com/pix/HackerPerspective_BrePettis_2600_Winter2008-2009small.pdf>. quot;Top 10 Most Famous Hackers of All Time.quot; IT Security. 2009. Tippit Incorporated. 1 May 2009 <http://www.itsecurity.com/features/top-10-famous- hackers-042407/>. Voiskounsky, Alexander E. quot;Flow-Based Model of Computer Hackers' Motivation.quot; CyberPsychology and Behavior 6.2 (2003): 171-174. 21 Apr. 2009 <http://web.ebscohost.com.libproxy.trinity.edu/ehost/ 71a00b35-3774-4571- a988-05da67079c15%40sessionmgr108>.