Information Systems Security & HardwareSecurity & Computer Hardware Course for TeensLesson 1Being a Hacker
RulesHomework AssignmentsNo Late HomeworkDiscussion with your classmates is encouraged; however, you must not copy each other’s work.The school has a strict policy against plagiarism.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)2
RulesIf you copy a sentence, it shall be in italics with proper reference. If	you copy a paragraph, it is considered plagiarism.If two students use the exactly same sentence on the homework, both receive zero credits for the homework.If two students submit identical homework, both get F.A report goes to the academic office and associate dean.Cheating on an exam or quiz will result in a 0 on the exam quiz and an F for the course.A report goes to the academic office and associate dean.You are encouraged to discuss the homework, but DO NOT look at each other’s homework.Zero tolerance on violation of academic integrity.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)3
What is a hacker?Someone who plays golf poorly Someone who is inexperienced or unskilled in a particular activityan expert at programming and solving problems with a computer (White/Grey Hat) a person who illegally gains access to and sometimes tampers with information in a computer system (Black Hat)   Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)4
LearningHacking, in reality, is a creative process that is based more on lifestyle than lesson.What we teach today may not be relevant tomorrow.You must embrace the habits of being constantly vigilant in learning.Only then will you become a great hacker.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)5
Are you a kiddie…?	It is much better for you to embrace hacker learning habits, which are probably the most vital part of hacking and will separate you from the script kiddie (a person who runs hacking tools without knowing how or why they work).Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)6
ConceptsIf you do not understand a concept then:Ask me…Research itPlease SPEAK UP!Ignoring concepts will only make it difficult for you to understand concepts in other workbooks and parts of this and future lessons.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)7
InvestigationYou will need to investigate concepts and topicsUse:ComputersHacking InternetBooksMagazinesEtc.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)8
Who makes a good hacker?Great hackers are well rounded and creative. Many of them are painters, writers, and designers.Hacking skills can also be applied to other fields, such as Political Science (see The Prince by Machiavelli for an example).Remember, hacking is about figuring out how things work regardless of how they were designed to work.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)9
BooksThose paper things collecting dust on your shelves at home.Yes, those old musty “books” actually hold a wealth of knowledge.…and you do not need to plug them in…WOW!Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)10
More BooksNothing will help you more than reading a current book on the subject.Books get old right? How can a old book help you?The secret is to learn to see the fundamental structure underneath the thin skin of details.Computers are still based on Boolean Logic.What is Boolean Logic? (Research it…)Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)11
Even More BooksThe Art of War by Sun Tzu covers fundamental principles that still apply today, and it was written in the 8th Century B.C.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)12
Yep!  We are still on Books…A writer spending a year writing a book is more likely to check facts than someone who is updating a blog six times a dayRemember – accurate does not mean unbiasedCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)13
Do you need to read cover to cover?No!Jump through the book, backwards and forwards, just as you would bounce from link to link in a web page.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)14
MagazinesTimely informationShort not in depth“Pop Journalism” isn't always “Accurate journalism”Good for social engineeringWhat is Social Engineering? (Research it…)Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)15
Magazines continued…Consider the theme or topicA Microsoft magazine will play down Apple and vise-versaRead an interesting fact in a magazine, look into it furtherPretend that you believe it, and look for confirmations, then pretend that you don't believe it, and look for rebuttals.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)16
In Class Exercise 1Search the Web for 3 online magazines regarding SecurityHow did you find these magazines?Are all three magazines about computer security?Do you believe the material on the site? Yes, why? No, why not?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)17
Do you have a zine I can borrow?Zines are small, often free magazines that have a very small distribution.Is the New York Times a zine?How about “Bob’s house of rocks and stones”?Ever hear of 2600?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)18
2600www.2600.com  Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)19Autumn 2009 February  1987
Blogs or Bogs I always forget…Blogs are a modernization of the zine.Like zines, however, anyone may criticize a story and show an opposing opinion.  Remember…Question and do not take information at face value.Always ask yourself “Does the author have a ulterior motive?”Are they trying to SELL you something.Best test: “If you found a gold mine would you share it?”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)20
In Class Exercise 2Search the Web for 3 zines regarding computer security.How did you find these zines?Why do you classify these as zines?         Remember, just because they market it as a zine or put “zine” in the title does not mean it is one.Search the Web for 3 blogs regarding computer security.What communities are these associated with?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)21
The Invisible Web…ohhhh!Did anyone see the invisible web slide….it was here a minute ago?Welcome to: Forums and Mailing ListsMany forums and mailing lists are not searchable through major search engines.Opps…sorry Google  Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)22
Forums & Mailing ListsYou can find forums on almost any topic and many online magazines and newspapers offer forums for readers to write opinions regarding published articles.This information is called “the invisible web” as it contains information and data that is invisible to many since a very specific search is needed, often through meta-search engines or only directly on the website of the forum.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)23
In Class Exercise 3Find 3 computer security forumsHow did you find these forums?Can you determine the whole theme of the website?Do the topics in the forums reflect the theme of the website hosting them?Find 3 computer security mailing lists.Who is the “owner” of these lists?On which list would you expect the information to be more factual? Why?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)24
You snooze you news…Which is older the web or news groups?If you said my gym socks under you bed you are so right. The correct answer is: NEWS GROUPS.Guess who bought the ENTIRE archive of newsgroups and put them online at http://groups.google.com?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)25
R.I.PNewsgroups are not as popular and are steadily being replaced by new web services like blogs and forums.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)26
In Class Exercise 4Using Google's groups, find the oldest newsgroup posting you can about security.Find other ways to use newsgroups - are there applications you can use to read newsgroups?How many newsgroups can you find that talk about computer hacking?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)27
What is de facto standard for sharing information?The World Wide Web (WWW)You call it “the web” it’s real name is Pneumonoultramicroscopicsilicovolcanoconiosis    or Web ServicesE-mail is a web service.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)28
Do you have some cache I can borrow?A cache is an area of memory on the search engine's server where the search engine stores pages that matched your search criteria.http://www.archive.orgWhat do you see?Cached versions of whole websites from over the years.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)29
You can trust me…honest!Should you trust a web site that comes up in a search engine?No WAY!Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)30
Trust must be earned!WOT did he say?Web of trust (W.O.T)http://www.mywot.comWOT is a free Internet security add-on for your browser. It will keep you safe from some online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)31
Wait the internet is not safe...!?Many hacker attacks and viruses are spread just by visiting a website or downloading programs to run.Yes, Cute Fuzzy Bunnies 2.0 (may be a virus)So do not download stuff from web sites you do not know.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)32
Hi, you don’t know me but….Can I have your credit card number….?Do you use face book or My Space?Put down you date of birth?Home Address?Best friends real name?Other personal information?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)33
In Class Exercise 5Google if Facebook & My Space are secure.What did you learn?What do you think now?Going to make any changes on your Facebook & My Space page?Rule of thumb:                                                          Do not post anything you do not want your mother to see.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)34
Group Exercise 1Open www.google.comType: “allintitle: "index of" .pdf”Click on a link in the results and you should find one that looks like a directory listing.Example: Index of /pub/irs-pdf/This is called “Google hacking”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)35
In Class Exercise 6Find 3 more directory listings which contain .xls files and .avi files.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)36
Can you search for searchs?Yep!http://www.searchengine.comFind 10 search engines which are NOT meta search enginesSearch for “security testing and ethical hacking” and list the top 3 answersSearch for the same without the quotes and give the top 3 answers. Are they different? Why or Why not?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)37
How to search smarterI am looking for a online resource of magazines for ethical hackingType in all this into the search barOne gets a lot of resultsIf I was to make such a resource, what information would be in there and what key words could I pick from that information?Now try “Ethical Hacking”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)38
In Class Exercise 7Search for the following using smart search techniques.my favorite list of magazines on ethical hackinglist of ethical hacking magazinesresources for ethical hackersethical hacking magazinemagazines ethical hacking security list resourceCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)39
In Class Exercise 7.1Find the oldest website from Mozilla in the Internet Archive.How?Go to http://www.archive.orgSearch in:  www.mozilla.orgCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)40
Are you chatty or just clam chowder?Which is older: AOL Instant Messeging, Internet Messenger or Internet Relay Chat (IRC)?Research it…Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)41
In Class Exercise 8Find 3 chat programs to use for instant messaging. What makes them different? Can they all be used to talk to each other?Find out what IRC is and how you can connect to it. Once you are able to connect, enter the ISECOM chat room as announced on the front page of http://www.isecom.orgHow do you know which channels exist to join in IRC?Find 3 computer security channels and 3 hacker channels. Can you enter these channels? Are there people talking or are they “bots”?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)42
Robot or Bot?What is a bot?(roBOT) A program used on the Internet that performs a repetitive function such as posting a message to multiple newsgroups or searching for information or news. Bots are used to provide comparison shopping. Bots also keep a channel open on the Internet Relay Chat (IRC). The term is used for all variety of macros and intelligent agents that are Internet or Web related. See botnet, spambot and agent.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)43
P2P or PsP?What do you think P2P stands for?Peer to PeerP2P, is a network inside the InternetP2P computers communicate directly with each other through a network or the internet.Do you know what Sneaker Net is?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)44
P2P Most people associate P2P with the downloading of mp3s and pirated movie (bad!)P2P networks can be a vital resource for finding informationThere are also a lot of files on these networks that shouldn't be there. Don't be afraid to use P2P networks, but be aware of the dangers.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)45
Next time…more!Windows Command LineLinux!Hardware….101!IRON Geek! (kind of like Iron Chef) Much much more…..Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)46

Lesson 1

  • 1.
    Information Systems Security& HardwareSecurity & Computer Hardware Course for TeensLesson 1Being a Hacker
  • 2.
    RulesHomework AssignmentsNo LateHomeworkDiscussion with your classmates is encouraged; however, you must not copy each other’s work.The school has a strict policy against plagiarism.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)2
  • 3.
    RulesIf you copya sentence, it shall be in italics with proper reference. If you copy a paragraph, it is considered plagiarism.If two students use the exactly same sentence on the homework, both receive zero credits for the homework.If two students submit identical homework, both get F.A report goes to the academic office and associate dean.Cheating on an exam or quiz will result in a 0 on the exam quiz and an F for the course.A report goes to the academic office and associate dean.You are encouraged to discuss the homework, but DO NOT look at each other’s homework.Zero tolerance on violation of academic integrity.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)3
  • 4.
    What is ahacker?Someone who plays golf poorly Someone who is inexperienced or unskilled in a particular activityan expert at programming and solving problems with a computer (White/Grey Hat) a person who illegally gains access to and sometimes tampers with information in a computer system (Black Hat) Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)4
  • 5.
    LearningHacking, in reality,is a creative process that is based more on lifestyle than lesson.What we teach today may not be relevant tomorrow.You must embrace the habits of being constantly vigilant in learning.Only then will you become a great hacker.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)5
  • 6.
    Are you akiddie…? It is much better for you to embrace hacker learning habits, which are probably the most vital part of hacking and will separate you from the script kiddie (a person who runs hacking tools without knowing how or why they work).Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)6
  • 7.
    ConceptsIf you donot understand a concept then:Ask me…Research itPlease SPEAK UP!Ignoring concepts will only make it difficult for you to understand concepts in other workbooks and parts of this and future lessons.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)7
  • 8.
    InvestigationYou will needto investigate concepts and topicsUse:ComputersHacking InternetBooksMagazinesEtc.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)8
  • 9.
    Who makes agood hacker?Great hackers are well rounded and creative. Many of them are painters, writers, and designers.Hacking skills can also be applied to other fields, such as Political Science (see The Prince by Machiavelli for an example).Remember, hacking is about figuring out how things work regardless of how they were designed to work.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)9
  • 10.
    BooksThose paper thingscollecting dust on your shelves at home.Yes, those old musty “books” actually hold a wealth of knowledge.…and you do not need to plug them in…WOW!Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)10
  • 11.
    More BooksNothing willhelp you more than reading a current book on the subject.Books get old right? How can a old book help you?The secret is to learn to see the fundamental structure underneath the thin skin of details.Computers are still based on Boolean Logic.What is Boolean Logic? (Research it…)Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)11
  • 12.
    Even More BooksTheArt of War by Sun Tzu covers fundamental principles that still apply today, and it was written in the 8th Century B.C.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)12
  • 13.
    Yep! Weare still on Books…A writer spending a year writing a book is more likely to check facts than someone who is updating a blog six times a dayRemember – accurate does not mean unbiasedCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)13
  • 14.
    Do you needto read cover to cover?No!Jump through the book, backwards and forwards, just as you would bounce from link to link in a web page.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)14
  • 15.
    MagazinesTimely informationShort notin depth“Pop Journalism” isn't always “Accurate journalism”Good for social engineeringWhat is Social Engineering? (Research it…)Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)15
  • 16.
    Magazines continued…Consider thetheme or topicA Microsoft magazine will play down Apple and vise-versaRead an interesting fact in a magazine, look into it furtherPretend that you believe it, and look for confirmations, then pretend that you don't believe it, and look for rebuttals.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)16
  • 17.
    In Class Exercise1Search the Web for 3 online magazines regarding SecurityHow did you find these magazines?Are all three magazines about computer security?Do you believe the material on the site? Yes, why? No, why not?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)17
  • 18.
    Do you havea zine I can borrow?Zines are small, often free magazines that have a very small distribution.Is the New York Times a zine?How about “Bob’s house of rocks and stones”?Ever hear of 2600?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)18
  • 19.
    2600www.2600.com CourseDesign by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)19Autumn 2009 February 1987
  • 20.
    Blogs or BogsI always forget…Blogs are a modernization of the zine.Like zines, however, anyone may criticize a story and show an opposing opinion. Remember…Question and do not take information at face value.Always ask yourself “Does the author have a ulterior motive?”Are they trying to SELL you something.Best test: “If you found a gold mine would you share it?”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)20
  • 21.
    In Class Exercise2Search the Web for 3 zines regarding computer security.How did you find these zines?Why do you classify these as zines? Remember, just because they market it as a zine or put “zine” in the title does not mean it is one.Search the Web for 3 blogs regarding computer security.What communities are these associated with?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)21
  • 22.
    The Invisible Web…ohhhh!Didanyone see the invisible web slide….it was here a minute ago?Welcome to: Forums and Mailing ListsMany forums and mailing lists are not searchable through major search engines.Opps…sorry Google Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)22
  • 23.
    Forums & MailingListsYou can find forums on almost any topic and many online magazines and newspapers offer forums for readers to write opinions regarding published articles.This information is called “the invisible web” as it contains information and data that is invisible to many since a very specific search is needed, often through meta-search engines or only directly on the website of the forum.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)23
  • 24.
    In Class Exercise3Find 3 computer security forumsHow did you find these forums?Can you determine the whole theme of the website?Do the topics in the forums reflect the theme of the website hosting them?Find 3 computer security mailing lists.Who is the “owner” of these lists?On which list would you expect the information to be more factual? Why?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)24
  • 25.
    You snooze younews…Which is older the web or news groups?If you said my gym socks under you bed you are so right. The correct answer is: NEWS GROUPS.Guess who bought the ENTIRE archive of newsgroups and put them online at http://groups.google.com?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)25
  • 26.
    R.I.PNewsgroups are notas popular and are steadily being replaced by new web services like blogs and forums.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)26
  • 27.
    In Class Exercise4Using Google's groups, find the oldest newsgroup posting you can about security.Find other ways to use newsgroups - are there applications you can use to read newsgroups?How many newsgroups can you find that talk about computer hacking?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)27
  • 28.
    What is defacto standard for sharing information?The World Wide Web (WWW)You call it “the web” it’s real name is Pneumonoultramicroscopicsilicovolcanoconiosis or Web ServicesE-mail is a web service.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)28
  • 29.
    Do you havesome cache I can borrow?A cache is an area of memory on the search engine's server where the search engine stores pages that matched your search criteria.http://www.archive.orgWhat do you see?Cached versions of whole websites from over the years.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)29
  • 30.
    You can trustme…honest!Should you trust a web site that comes up in a search engine?No WAY!Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)30
  • 31.
    Trust must beearned!WOT did he say?Web of trust (W.O.T)http://www.mywot.comWOT is a free Internet security add-on for your browser. It will keep you safe from some online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)31
  • 32.
    Wait the internetis not safe...!?Many hacker attacks and viruses are spread just by visiting a website or downloading programs to run.Yes, Cute Fuzzy Bunnies 2.0 (may be a virus)So do not download stuff from web sites you do not know.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)32
  • 33.
    Hi, you don’tknow me but….Can I have your credit card number….?Do you use face book or My Space?Put down you date of birth?Home Address?Best friends real name?Other personal information?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)33
  • 34.
    In Class Exercise5Google if Facebook & My Space are secure.What did you learn?What do you think now?Going to make any changes on your Facebook & My Space page?Rule of thumb: Do not post anything you do not want your mother to see.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)34
  • 35.
    Group Exercise 1Openwww.google.comType: “allintitle: "index of" .pdf”Click on a link in the results and you should find one that looks like a directory listing.Example: Index of /pub/irs-pdf/This is called “Google hacking”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)35
  • 36.
    In Class Exercise6Find 3 more directory listings which contain .xls files and .avi files.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)36
  • 37.
    Can you searchfor searchs?Yep!http://www.searchengine.comFind 10 search engines which are NOT meta search enginesSearch for “security testing and ethical hacking” and list the top 3 answersSearch for the same without the quotes and give the top 3 answers. Are they different? Why or Why not?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)37
  • 38.
    How to searchsmarterI am looking for a online resource of magazines for ethical hackingType in all this into the search barOne gets a lot of resultsIf I was to make such a resource, what information would be in there and what key words could I pick from that information?Now try “Ethical Hacking”Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)38
  • 39.
    In Class Exercise7Search for the following using smart search techniques.my favorite list of magazines on ethical hackinglist of ethical hacking magazinesresources for ethical hackersethical hacking magazinemagazines ethical hacking security list resourceCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)39
  • 40.
    In Class Exercise7.1Find the oldest website from Mozilla in the Internet Archive.How?Go to http://www.archive.orgSearch in: www.mozilla.orgCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)40
  • 41.
    Are you chattyor just clam chowder?Which is older: AOL Instant Messeging, Internet Messenger or Internet Relay Chat (IRC)?Research it…Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)41
  • 42.
    In Class Exercise8Find 3 chat programs to use for instant messaging. What makes them different? Can they all be used to talk to each other?Find out what IRC is and how you can connect to it. Once you are able to connect, enter the ISECOM chat room as announced on the front page of http://www.isecom.orgHow do you know which channels exist to join in IRC?Find 3 computer security channels and 3 hacker channels. Can you enter these channels? Are there people talking or are they “bots”?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)42
  • 43.
    Robot or Bot?Whatis a bot?(roBOT) A program used on the Internet that performs a repetitive function such as posting a message to multiple newsgroups or searching for information or news. Bots are used to provide comparison shopping. Bots also keep a channel open on the Internet Relay Chat (IRC). The term is used for all variety of macros and intelligent agents that are Internet or Web related. See botnet, spambot and agent.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)43
  • 44.
    P2P or PsP?Whatdo you think P2P stands for?Peer to PeerP2P, is a network inside the InternetP2P computers communicate directly with each other through a network or the internet.Do you know what Sneaker Net is?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)44
  • 45.
    P2P Most peopleassociate P2P with the downloading of mp3s and pirated movie (bad!)P2P networks can be a vital resource for finding informationThere are also a lot of files on these networks that shouldn't be there. Don't be afraid to use P2P networks, but be aware of the dangers.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)45
  • 46.
    Next time…more!Windows CommandLineLinux!Hardware….101!IRON Geek! (kind of like Iron Chef) Much much more…..Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)46