+ All Categories

Hackers

Date post: 01-Nov-2014
Category:
Upload: kifah-marwan
View: 3 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
12
HACKERS
Transcript
Page 1: Hackers

HACKERS

Page 2: Hackers

Outlines: -Disagreement on the definition of a hacker .

-Classification of hacker morally. -Hacker attack methods.

-Methods for collecting information. -The black hat hackers . -The White hat hackers .

-The top ten famous hackers .

Page 3: Hackers

Disagreement on the definition of a hacker - Many define the hacker as a person who is:

  destructive, negative and bad. These terms are combined with the word hacker ( computer hacker).

  - And that the impact of some of what was in the media, where due to

the lack of understanding of reality hacker, and relate it to word piracy .

( - piracy : )     expression that describes the illegal sale of  copies of the private creative work.

- and is used in violation of copyright in particular for films, television

episodes , songs and computer programs. Web network has become one of the best marketing means.

Page 4: Hackers

- Cracker : term to define a spoiler hacker. - despite the both marked the intelligence

and spirit of challenge and not afraid to face the unknown. However, the cracker always acts of sabotage and intrusion for reasons other than positive and this is the person who deserves the label Computer pirate.

- While the hacker devise solutions to the problems and trying to innovate in his work.

Page 5: Hackers

Classification of hacker morally

- a white hat hacker: is called hacker reformer. - a black hat hacker: called the hacker spoiler, which in English is called Cracker. - a Grey hat hacker :tottering between reform and tampering.

Page 6: Hackers

Hacker attack methods

- Denial of service attacks (DoS).- Overflow the buffer.

- Security holes . -Trojans (Trojan horse) .

Page 7: Hackers

Methods for collecting information

- Sniffing (listen).- Social Engineering .

- finding wireless networks.

Page 8: Hackers

The hacker is often a programmer or a network-engineers or individuals familiar with the very technology and carry out piracy through the use of specific devices in a few cases.

Either the possibility of hacking the real will be one of skill

hacker and intelligence riper, so that it reveals gaps in the Web sites and programs.

And is not permanent that the aim is a hacker vandalism in

most cases.

The goal is to prove the strength and the ability to defeat the defenses of the site, which means that the hacker was

able to defeat website designers and developers.

Page 9: Hackers

The black hat hacker

- A black hat is the villain or bad guy. - The phrase is often used in computing slang,

where it refers to a computer security hacker who breaks into networks or computers, or

creates computer viruses . - Unlike a white hat hacker, the black hat hacker

takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose.

Page 10: Hackers

- The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

- The term comes from old Western movies, where heroes often wore white hats and the "bad guys" wore black hats.

Page 11: Hackers

The white hat hackers - A white hat hacker breaks security for non-

malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an ethical hacker.

- This classification also includes individuals

who perform penetration tests and assessments within a contractual agreement.

Page 12: Hackers

The top ten famous hackers 1 .Kevin Mitnick2 .Gary McKinnon

3 .Adrian Lamo4 .Robert Tappan Morris

5 .Vladimir Levin6 .Markus Hess7 .Michael Calce

8 .Albert Gonzalez9 .Kevin Poulsen

10 .Jonathan James


Recommended