SlideShare a Scribd company logo
1 of 44
Nut & Noodzaak van
Hacken

24 mei 2012 IMG_SRC HackWire
Dave Borghuis aka zeno4ever
Voorzitter hackerspace TkkrLab, Enschede
Wie is Dave?
• Voorzitter hackerspace TkkrLab
• sinds 12’de met computers (C64 ,Amiga)
• technologie enthousiasteling
• vrijwilliger o.a. ACCO, OHM2013
• dagelijks werk prog. adm. software
hacker |ˈhakər|

1 a person who uses computers to gain unauthorized access to
data.
• informal an enthusiastic and skillful computer programmer
or user.
2 a person or thing that hacks or cuts roughly.

cracker |ˈkrakər|

• a person who breaks into a computer system, typically for an
illegal purpose. computer crackers will push the outer limits of
network security.
hacker |ˈhakər|

1 a person who uses computers to gain unauthorized access to
data.
• informal an enthusiastic and skillful computer programmer
or user.
2 a person or thing that hacks or cuts roughly.

cracker |ˈkrakər|

• a person who breaks into a computer system, typically for an
illegal purpose. computer crackers will push the outer limits of
network security.
craker
A cracker is an individual who attempts to access computer
systems without authorization. These individuals are often
malicious, as opposed to hackers, and have many means at their
disposal for breaking into a system. See also: hacker, Computer
Emergency Response Team, Trojan Horse, virus, worm.

hacker
A person who delights in having an intimate understanding of the
internal workings of a system, computers and computer networks
in particular. The term is often misused in a pejorative context,
where "cracker" would be the correct term. See also: cracker
Source: RCF 1983
Some History
MIT

Tech Model Railroad Club
(TMRC)
TX-0
Some Hackers
Stephen Wozniak
GNU
Richard Stallman

Oprichter GNU / Free Software Foundation
Hello everybody out there using minix
I'm doing a (free) operating system (just a hobby, won't be big and
professional like gnu) for 386(486) AT clones. This has been
brewing since april, and is starting to get ready.I'd like any
feedback on things people like/dislike in minix, as my OS
resembles it somewhat(same physical layout of the filesystem(due to practical reasons)among other things). I've
currently ported bash(1.08) and gcc(1.40),and things seem to
work.This implies that I'll get something practical within a few
months, andI'd like to know what features most people would
want. Any suggestions are welcome, but I won't promise I'll
implement them :-)
1994 - Kernel
1.0
Linus Torvalds

Linux kernel architect
Rop Gongrijp

O.a. oprichter
Xs4all
Hackers hebben ons mede
internet, open source en
veel meer gebracht.
Zonder deze hackers zou
de wereld er heel andres uit
hebben gezien!!
Zonder deze hackers zou
de wereld er heel andres uit
hebben gezien!!
Hackers Mindset
Wat hebben deze
hackers gemeen?
hackers gemeen?

• Erg nieuwsgierig
• Wil een systemen door en door kennen.
• Creatief / spelen met techniek
• Kritisch kijk op de wereld
• Think outsite de box
enkele
voorbeelden ...
OV-Chipkaart
netwerk voor anonieme communicatie
Annoniem kunnen melden van misstanden
We hebben hackers
nodig omdat:
nodig omdat:
• Staan kritisch in de maatschappij
• Kunnen nieuwe technieken op waarde
inschatten

• Bescherming privacy & veiligheid
• Delen van kennis
Freedom to
tinker
Open Source
CCC / OHM2013
Hackerspaces in NL
Hackerspace
Enschede
Arcade 1943
• MAKE DIY
• 3D printer / cnc
• Workshops/lezingen
Floppy Jukebox
Lockpick workshop
OWASP
Zentools CNC
RepRap 3D printer
BBQ
Activiteiten
• Lezing Brenno de Winter
• Python Cursus / iOs introduction
• Researching smartcards
• Meten is zweten; oscilloscope basics
• Open Data Enschede Drink
• Linux gebruikers groep
The Future
Toekomst
• Meer erkenning voor rol hackers
• Nog veel te doen, bewustzijn
• Privacy
• Veiligheid sites / systemen (OWASP)
• Rol hackerspaces
• DIY (3D printer/Arduino etc.)
• We gaan spannende toekomst tegemoet!!
Questions ?
Happy Hacking!!

More Related Content

Viewers also liked

improved register value pattern generation for branch prediction
improved register value pattern generation for branch predictionimproved register value pattern generation for branch prediction
improved register value pattern generation for branch predictionthewayim
 
Arindam chaudhary
Arindam chaudharyArindam chaudhary
Arindam chaudharyRavi Kapoor
 
Ecic karlsson and kuoppala
Ecic karlsson and kuoppalaEcic karlsson and kuoppala
Ecic karlsson and kuoppalaJukka Karlsson
 
웹트렌드
웹트렌드웹트렌드
웹트렌드thewayim
 
Sosiaalinen media ja kirkko
Sosiaalinen media ja kirkkoSosiaalinen media ja kirkko
Sosiaalinen media ja kirkkoJukka Karlsson
 

Viewers also liked (6)

improved register value pattern generation for branch prediction
improved register value pattern generation for branch predictionimproved register value pattern generation for branch prediction
improved register value pattern generation for branch prediction
 
Arindam chaudhary
Arindam chaudharyArindam chaudhary
Arindam chaudhary
 
Isosena verkossa
Isosena verkossaIsosena verkossa
Isosena verkossa
 
Ecic karlsson and kuoppala
Ecic karlsson and kuoppalaEcic karlsson and kuoppala
Ecic karlsson and kuoppala
 
웹트렌드
웹트렌드웹트렌드
웹트렌드
 
Sosiaalinen media ja kirkko
Sosiaalinen media ja kirkkoSosiaalinen media ja kirkko
Sosiaalinen media ja kirkko
 

Similar to Nut en noodzaak hacken

Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
LinuxPresentation500kb
LinuxPresentation500kbLinuxPresentation500kb
LinuxPresentation500kbMatt R
 
Open source is good for both business and humanity
Open source is good for both business and humanityOpen source is good for both business and humanity
Open source is good for both business and humanityDocker, Inc.
 
Open Source is Good for Both Business and Humanity - DockerCon 2016
Open Source is Good for Both Business and Humanity - DockerCon 2016 Open Source is Good for Both Business and Humanity - DockerCon 2016
Open Source is Good for Both Business and Humanity - DockerCon 2016 {code}
 
PHP Hacking: The battle between great ideas and not-so-great code
PHP Hacking: The battle between great ideas and not-so-great codePHP Hacking: The battle between great ideas and not-so-great code
PHP Hacking: The battle between great ideas and not-so-great codePete Prodoehl
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
History of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHistory of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHiro Yoshioka
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTSudhanshu Chauhan
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
 
Introduction to Hacking for University Hack Day
Introduction to Hacking for University Hack DayIntroduction to Hacking for University Hack Day
Introduction to Hacking for University Hack DayChristian Heilmann
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 

Similar to Nut en noodzaak hacken (20)

Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
LinuxPresentation500kb
LinuxPresentation500kbLinuxPresentation500kb
LinuxPresentation500kb
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Open source is good for both business and humanity
Open source is good for both business and humanityOpen source is good for both business and humanity
Open source is good for both business and humanity
 
Open Source is Good for Both Business and Humanity - DockerCon 2016
Open Source is Good for Both Business and Humanity - DockerCon 2016 Open Source is Good for Both Business and Humanity - DockerCon 2016
Open Source is Good for Both Business and Humanity - DockerCon 2016
 
PHP Hacking: The battle between great ideas and not-so-great code
PHP Hacking: The battle between great ideas and not-so-great codePHP Hacking: The battle between great ideas and not-so-great code
PHP Hacking: The battle between great ideas and not-so-great code
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
History of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker CultureHistory of IT industry, Internet and Hacker Culture
History of IT industry, Internet and Hacker Culture
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Introduction to Hacking for University Hack Day
Introduction to Hacking for University Hack DayIntroduction to Hacking for University Hack Day
Introduction to Hacking for University Hack Day
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Nut en noodzaak hacken

  • 1. Nut & Noodzaak van Hacken 24 mei 2012 IMG_SRC HackWire Dave Borghuis aka zeno4ever Voorzitter hackerspace TkkrLab, Enschede
  • 2. Wie is Dave? • Voorzitter hackerspace TkkrLab • sinds 12’de met computers (C64 ,Amiga) • technologie enthousiasteling • vrijwilliger o.a. ACCO, OHM2013 • dagelijks werk prog. adm. software
  • 3. hacker |ˈhakər| 1 a person who uses computers to gain unauthorized access to data. • informal an enthusiastic and skillful computer programmer or user. 2 a person or thing that hacks or cuts roughly. cracker |ˈkrakər| • a person who breaks into a computer system, typically for an illegal purpose. computer crackers will push the outer limits of network security.
  • 4. hacker |ˈhakər| 1 a person who uses computers to gain unauthorized access to data. • informal an enthusiastic and skillful computer programmer or user. 2 a person or thing that hacks or cuts roughly. cracker |ˈkrakər| • a person who breaks into a computer system, typically for an illegal purpose. computer crackers will push the outer limits of network security.
  • 5. craker A cracker is an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system. See also: hacker, Computer Emergency Response Team, Trojan Horse, virus, worm. hacker A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker Source: RCF 1983
  • 7.
  • 11.
  • 13. GNU
  • 14. Richard Stallman Oprichter GNU / Free Software Foundation
  • 15. Hello everybody out there using minix I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since april, and is starting to get ready.I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat(same physical layout of the filesystem(due to practical reasons)among other things). I've currently ported bash(1.08) and gcc(1.40),and things seem to work.This implies that I'll get something practical within a few months, andI'd like to know what features most people would want. Any suggestions are welcome, but I won't promise I'll implement them :-)
  • 18.
  • 20. Hackers hebben ons mede internet, open source en veel meer gebracht. Zonder deze hackers zou de wereld er heel andres uit hebben gezien!! Zonder deze hackers zou de wereld er heel andres uit hebben gezien!!
  • 22. Wat hebben deze hackers gemeen? hackers gemeen? • Erg nieuwsgierig • Wil een systemen door en door kennen. • Creatief / spelen met techniek • Kritisch kijk op de wereld • Think outsite de box enkele voorbeelden ...
  • 24. netwerk voor anonieme communicatie
  • 25. Annoniem kunnen melden van misstanden
  • 26. We hebben hackers nodig omdat: nodig omdat: • Staan kritisch in de maatschappij • Kunnen nieuwe technieken op waarde inschatten • Bescherming privacy & veiligheid • Delen van kennis
  • 32.
  • 33. Arcade 1943 • MAKE DIY • 3D printer / cnc • Workshops/lezingen
  • 36. OWASP
  • 39. BBQ
  • 40. Activiteiten • Lezing Brenno de Winter • Python Cursus / iOs introduction • Researching smartcards • Meten is zweten; oscilloscope basics • Open Data Enschede Drink • Linux gebruikers groep
  • 42. Toekomst • Meer erkenning voor rol hackers • Nog veel te doen, bewustzijn • Privacy • Veiligheid sites / systemen (OWASP) • Rol hackerspaces • DIY (3D printer/Arduino etc.) • We gaan spannende toekomst tegemoet!!

Editor's Notes

  1. Voor meer informatie of vragen kun je mailen naar [email_address].
  2. Dit zijn de verklaringen voor de term ‘hackers’ zoals men door de media ed. gebruikt word.
  3. Echter dit is een verkeerd gebruik van het woord hacker, historisch gezien heeft het een bredere en positieve lading.
  4. De RCF omschrijving geeft beter aan wat een hacker is: een persoon die passie voor techniek en/of systemen heeft in de breedste zin van het woord. The basic difference is this: hackers build things, crackers break them.
  5. Hoe vreemd het ook klinkt de oorspronkelijke term hacker heeft een relatie met modeltreinen.
  6. In de Jaren ‘60 was er een studenten vereniging op MIT (Massachusetts Institute of Technology ) die met computer de modeltreinen wilden gaan aansturen.
  7. Computers waren toen nog een schaars goed die alleen voor exclusieve groep mensen beschikbaar waren. Om (fysiek) toegang tot deze systemen te verkrijgen moest men allerlei hacks uitvoeren (incl. lockpicken, etc)
  8. Voorbeeld van enkele bekende hackers
  9. In 1976 werd de Apple I computer op de markt gebracht als een volledig geassembleerde computer met een toetsenbord mogelijkheid (moest je zelf toevoegen).
  10. De bedenker van de Apple I, Stephen “Woz” Wozniak word ook vandaag de dag nog gezien als een hacker
  11. De volgende hacker is eind 1983 met Open Source begonnen omdat van een printerdriver de source code niet werd meegeleverd. Hij vind dat voor alle software mogelijk moet zijn om deze zelf aan te passen (Free as in Freedom)
  12. Richard Stallman is een van de grote voorvechters van Open Source en heeft hiervoor verschillende organisaties in het leven geroepen om dit mogelijk te maken. (o.a. GNU, Free Software Foundation, copyleft). Tevens is hij een tegenstander tegen software patenten en DRM, wat hij ziet als een uitbreiding van de copy right.
  13. Deze hacker heeft op 25 Aug 1991 deze email gestuurd met verzoek om feedback van zijn ‘hobby’ project.
  14. Hieruit is Linux voortgekomen, een van de populairste gratis besturings systemen. Linux word vandaag de dag gebruikt van supercomputers tot mobieltjes.
  15. Linus Torvalds is de oorspronkelijke ontwikkelaar van Linux en nu coördineerd de huidige ontwikkeling.
  16. Een hacker van eigen bodem bekend als oprichter van Hacktic (magazine voor technoanarchisten) en heeft het als een van de eersten internet naar Nederland gebracht. Later een van de oprichters van Xs4all.
  17. Rop Gonggrijp heeft ook onderzoek naar stemcomputers gedaan en als niet veilig beschouwd. Voor wikileaks heeft hij in 2010 meegeholpen in het publiceren van de video “Collateral Murder”.
  18. Wat is nu de mindset van hackers?
  19. OV-chipkaart was al gehackt voor de introductie, Brenno de Winter heeft hier veel aandacht aan gegeven. Ook de implementatie zelf ontbreekt aan aantal mogelijkheden die met oude systeem wel mogelijk is (reizen met meerdere personen op 1 kaart, niet meer annoniem).
  20. TOR netwerk is in 2002 ontwikkeld om annoniem te kunnen communiceren. Nu word het gebruikt om bv ook vanuit China en andere regimes annoniem te kunnen browsen.
  21. Op de wikileaks kan misstanden worden gepubliceerd zonder dat je meteen bekend bent.
  22. Ik heb recentelijk een TV gekocht, hierin zit een Linux computer. Echter deze is helemaal dicht getimmert waardoor ik niet zelf kan kiezen wat ik met mijn gekochte apperatuur doe. Het is alsof je een windows computer koopt waarvan Microsoft zegt dat je bepaalde software niet mag gebruiken. Gelukkig duurt het meestal niet lang voordat hiervoor een oplossing is (bv Jailbreak voor iPhone)
  23. Hackers zorgen er voor dat we veel open source producten hebben en we kunnen kiezen tussen commerciele en open source software. Van vrijwel elk product is tegenwoordig een open source versie die zich kan meten met de commerciele versie.
  24. Hackers komen ook bij elkaar om ervaringen en kennis te delen. Eens in de 4 jaar is er een Nederlandse (OHM2013) en Duitse (CCC in 2011, hier op foto) hackers zomer camping waar rond de 2500 - 3000 hackers bij elkaar komen.
  25. Sinds een aantal jaar komen er steeds meer hackerspaces overal ter wereld en ook in Nederland. We hebben nu rond de 10 hackerspaces in nederland, kijk op hackerspaces.nl of er een bij jouw in de buurt zit.
  26. Ik ben de voorzitter van Hackerspace Enschede in Twente
  27. We hebben momenteel een locatie in het historisch pand de fabrieksschool in het centrum van Enschede
  28. Een van onze projecten, een arcade kast uit 1987 verbinden met twitter om de high scores te tweeten.
  29. We hebben ook een Floppy Jukebox gemaakt die ook via OSC aangestuurd kan worden.
  30. We houden ook diverse workshops en lezingen, hier zie je de lockpicking lezing.
  31. Met OWASP leer je een veilige website te bouwen doordat je leert wat de top 10 van internet hacks zijn en wat je kunt doen om je hiervoor te beschermen.
  32. We hebben ook onze eigen tools die je niet zo snel zelf zou aanschaffen, zoals deze CNC frees machine.
  33. en RepRap huxley 3D printer.
  34. We houden ook de nodige sociale evenementen zoals BBQ (aangestoken met passende lectuur) met ons eigen hackersdrankje Club-Mate (Thee frisdrank met caffeine)
  35. Dit is een beperkt overzicht van onze activiteiten, voor volledige lijst kijk op tkkrlab.nl
  36. De toekomst van hacking