Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester 2008-2009 By :wejad.n.mansour.

Slides:



Advertisements
Similar presentations
What Is An Operating System?. Before Operating Systems u What do you do with just computer hardware? –If someone gives you a computer with no software.
Advertisements

ETHICAL HACKING.
Your Potential as an Entrepreneur
Open Source Projects Manage Themselves? Dream On! (Another take on CatB) Chuck Connell, Tufts Univ.
Target Skill: Professional Self-Promotion is Among the Top Management Skills Presented by:
A “ Patch ” file has been detected! DeleteSkip H A C K E R S Shireen Isbeta Maha Al qassas Prepared by Advisor Dr. Basil Hamed 1 Islamic University of.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hacking And Cracking ICT Project.
Playful cleverness History and Visions of New Media IMKE 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).
Computer Literacy… …not!. Why not CL?  It’s not my job…  If it were my job, I could do it better than you…  If you could do it better, it doesn’t matter…
Facebook Opens Up Its Hardware Secrets By Martin Nenov Date: 04/18/11 Source: Technology Review MIT.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Internet writing is different and important Skills: none IT concepts: Importance of Internet writing, types of Internet writing, extent of Internet writing.
Turning university professors into competent learners (or how to interweave a new educational methodology with a tool for Lifelong Learning) Eliza Stefanova,
Internet writing Skills: none Concepts: importance, frequency, quality and types of Internet writing, text as a data type This work is licensed under.
Internet writing is different and important Skills: none IT concepts: Importance of Internet writing, types of Internet writing, extent of Internet writing.
Holt High School _48889_ ,00.html.
Career Field Technology Heckler & Spurr.  Web Developer- Blake  Game Designer- Blake  Computer Tech/Repair- Heckler  Program Designer- Heckler  Computer.
Computer Hacking Cybercrime (1).
Chapter 3 Computer Science and the Foundation of Knowledge Model
An anti-hacking guide.  Hackers are kindred of expert programmers who believe in freedom and spirit of mutual help. They are not malicious. They may.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Recession is Fantastic for Your Business Make this Your Year with FM Group FM Group Business Opportunity.
By zeeShan Yaqoob. What’s the Internet? The Internet is built on a chaotic mishmash of hardware, governed by minimal standards and even fewer rules. Thousands.
1 After completing this lesson, you will know: The history of computers from the 1940s up to the present. The future of computing. The many ways in which.
Institute for Social Research - Zagreb Centre for Educational Research and Development THE STATUS OF INFORMATION AND COMMUNICATION TECHNOLOGY IN NATIONAL.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Computer history By Breanne Larsen. What would you do without a computer? Some of the most popular uses for computers are: – Homework research – Video.
How Web 2.0 will effect you and medical education James B. McGee, M.D. Associate Professor of Medicine Assistant Dean for Medical Education Technology.
Communication Technology
CS 110: Introduction to Computer Science Frequently asked questions about a CS major and CS career.
What IS a Journeyman Programmer? Why this program?
A Presentation On Computer Security Submitted To: Submitted By: Mr.Neeraj Kr. Pandey Yogesh Singh Rana B.Tech 2 nd year CS-B(T2) 1.
1 Introduction Why do managers need to understand and participate in IS decisions? –Today, every company is a technology company –IS must be managed as.
COMPUTER SOFTWARE Management Information Systems.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Created by: Jason Hansen 28 March 2012 The Computer Begins Many steps in starting the computer Important people and devices (1975-Now) Do you know… The.
CPT 499 Internet Skills for Educators Overview of the Internet Session One.
Institutional Repositories… publish and be damned? IWMW University of Aberdeen Stephanie Taylor UKOLN.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Hacking and Its Mysteries By: Nancy Reyes. Table of Contents  Hacking, Good or Bad?  Hackers and Their Origins  Society/Media and Hackers  Government.
Software Design 17.1 Aside: ethics of software l What is intellectual property, why is it important?  what about FSF, GPL, copy-left, open source, … 
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
Technology Plan SMITA PIMPLAPURE Final Project Technology and Educational Restructuring December 11, 2003.
Department of Mathematics and Computer Science
SCI-BUS is supported by the FP7 Capacities Programme under contract no. RI Introduction to Science Gateway Sustainability Dr. Wibke Sudholt CloudBroker.
The New National Curriculum Assessment Meeting March 2016 EXCALIBUR PRIMARY SCHOOL.
Ray Chambers My Digital Story Independent Learning Helping students flip the learning and control the outcome they want. Start Collaboration Helping students.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
By: Brittany Cochran, Lindsey King, and Justin Blanton.
° Role 1st Role 2nd Role What are we looking for?
Construction and Collaboration
Introduction to Entrepreneurship
Computer Basics Technology’s Impact.
Hackers and Crackers iJacsn.
What is Computer Science?
The Impact Of ICT “Hacking”
Ethical hacking
Introduction to Entrepreneurship
5 HACKS THAT WILL HELP YOU ACHIEVE YOUR MAJOR BEAUTY GOALS.
Your Potential as an Entrepreneur
Network Intentionally
CS 1302 Programming Principles II
Linux: A Product of the Internet
Different points of view in teaching Information Technology
Introduction to Entrepreneurship
Introduction to Entrepreneurship
Introduction to Entrepreneurship
Presentation transcript:

Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour

Contents: 1.What Is a Hacker 2.What hacker do 3.Early hackers 4.Hackers every where 5.Crackers 6.Crackers and hackers 7.Basic Hacking Skills 8.4all of u 9.The Hacker Attitude 10.Status in the Hacker Culture 11.Summary 12.quiz

What Is a Hacker..... There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time- sharing minicomputers and the earliest Arpanet experiments. The members of this culture originated the term ‘hacker’.

What hacker do..... Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.

Early hackers..... In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential

Hackers every where..... The hacker mind-set is not confined to this software- hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this presentation we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

Crackers..... There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy,

Crackers..... irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.

Crackers and hackers The basic difference is this……. hackers build things, crackers break them

Basic Hacking Skills  Learn how to programming.  Get one of the open-source Unix's and learn to use and run it.  Learn how to use the World Wide Web and write HTML.  if you don't have functional English, learn it.

4all of u …… To follow the path: look to the master, follow the master, walk with the master, see through the mast er become the master

The Hacker Attitude if you want to be a hacker repeat the following things until you believe them: The world is full of fascinating problems waiting to be solved. No problem should ever have to be solved twice. Boredom and drudgery are evil. Freedom is good. Attitude is no substitute for competence.

Status in the Hacker Culture Write open-source software Help test and debug open-source software Publish useful information Help keep the infrastructure working Serve the hacker culture itself

Summary hacker was a programmer. someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers. creating programs that no one else could conceive. They were the pioneers of the computer industry. building everything from small applications to operating systems

quiz What is the basic difference between the hackers and crackers. What Is a Hackers? what are the basic Hacking Skills?

Thank you