Download presentation
Presentation is loading. Please wait.
1
7 Mavericks and Hacking 1
2
Open Source & Free Software
2 Early software was often free, i.e. Basic ~1975 Companies began charging for software licenses 1983 Richard Stallman launched GNU EMACS Free software, free society: Richard Stallman at TEDxGeneva 2014 (13 mins /\)
3
Linux Linus Torvalds: 2014 Computer Pioneer Award (9 mins /\)
3 Linus Torvalds: 2014 Computer Pioneer Award (9 mins /\) Linux is a free software version of UNIX Stallman wrote many of the operating system services Torvalds wrote the kernel Linux is released using the GNU General Public License (See next slide) Stallman calls it GNU/Linux
4
GNU GENERAL PUBLIC LICENSE
4 Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA , USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; …..
5
Kevin Mitnick INTERVIEW: Former Hacker Kevin Mitnick (5 mins /\)
Discovery Channel - The Secret History Of Hacking (50 mins) Kevin Mitnick movie: Freedom Downtime (True Story Of Hacker Kevin Mitnik) (2 hours) Kevin Mitnick | Talks at Google (1 hour)
6
Anonymous et. al. 5 Most Dangerous Hackers Of All Time (5 mins /\)
6 5 Most Dangerous Hackers Of All Time (5 mins /\) Keren Elazari: Hackers: the Internet's immune system (16 mins /\) Top 5 Facts about Anonymous (5 mins /\)
7
Guerilla Archiving Scientists Scramble to Protect Decades of Climate Research Before Trump Takes Office (6 mins /\)
8
Ransomware Ransomware: How to Protect Yourself From Cybercrime Scam (2 min)
9
Can Cars be Hacked? 9 Hackers Remotely Kill a Jeep on the Highway—With Me in It (5 mins) Charlie Miller Keynote, Automotive Security: A Hacker's Eye View (50 mins)
10
Cyber Warfare 10 Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. Rand Corporation The Newsmakers: Cyber Warfare (3 mins /\) A cyber warfare expert outlines what a US-Russia cyber war looks like (3 mins) Edward Snowden on Cyber Attacks (4 mins /\)
11
Session Questions – Mavericks and Hacking
11 Compare contributions of individuals vs. collective efforts in the development of computing? Are hackers good guys or bad guys? Compare cyber warfare to traditional battlefield gore. Does cyber warfare level the field between nations?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.