SlideShare ist ein Scribd-Unternehmen logo
1 von 96
Downloaden Sie, um offline zu lesen
MATTAgile.com
History of Old School Hacking Matt Harasymczuk
2011-05-10
MATTAgile.com
Matt Harasymczuk
• http://www.matt.harasymczuk.pl

• matt@harasymczuk.pl

• MBP sp. z o.o, Software Engineer

• Poznan University of Technology, Network Engineer (intern)

• Consdata.pl, Network Administrator

• Hera sp. z o.o, Software Engineer
MATTAgile.com
abstract
MATTAgile.com
definitions
MATTAgile.com
Phreaking
• phone hacking
MATTAgile.com
Carding
• credit card hacking
MATTAgile.com
flame war
MATTAgile.com
hacker vs cracker
• good guys

• programers

• activists

• developers
• bad guys

• programmers

• vandals

• thieves
MATTAgile.com
"hackers build things, crackers break them."
MATTAgile.com
hence...
MATTAgile.com
white hat vs black hat
MATTAgile.com
in real world it is a bit fuzzy
MATTAgile.com
therefore
MATTAgile.com
grey hat
MATTAgile.com
devices
MATTAgile.com
Blue Box
• 2600 Hz
MATTAgile.com
Black Box
• Attached to phone

• at the both sides

• if off-the-hook

• toll free call

• used in BBS
MATTAgile.com
Red Box
• any recorder or player
MATTAgile.com
Dial-up modem
• 300 bodów

• 28kbps

• 56kbps
MATTAgile.com
old school hackers
MATTAgile.com
Alan Turing
• mathematician,
logician,cryptanalyst and computer
scientist

• Turing machine

• cracked Enigma machine

• 1952, illegal homosexual acts

• chemical castration

• suicide cyanide poisoning
MATTAgile.com
Konrad Zuse
• German engineer and computer
pioneer

• 1941, world's first functional
program-controlled Turing-complete
computer, the Z3

• first high-level programming
language
MATTAgile.com
Grace Hopper
• one of the first programmers of the
Harvard Mark I

• developed the first compiler

• COBOL

• Found first BUG
MATTAgile.com
Donald Knuth
• Professor Emeritus

• Computer Scientist

• The Art of Computer Programming

• Stanford University

• "father" of the analysis of
algorithms

• creator of the TeX
MATTAgile.com
Edsger W. Dijkstra
• Dutch computer scientist

• 1972 Turing Award

• shortest path-algorithm a.k.a
“Dijkstra's algorithm”

• ALGOL

• Reverse Polish Notation, Shunting
yard algorithm, Banker's algorithm,

• Dining philosophers problem

• 1968 article "A Case against the GO
TO Statement”
MATTAgile.com
Dennis Richie and Ken Tomphson Unix creators
MATTAgile.com
Ed Gould
• one of the creators of BSD Unix
MATTAgile.com
John Draper
• a.k.a. “Capitan Crunch”

• Phreaker

• 1971 in Cap’n Crunch cereal whistle

• emits a 2600 hertz tone

• when 2nd hole was glued up

• created Blue Box
MATTAgile.com
Steve Wozniak
• a.k.a. “Woz”

• co-founded Apple Computer

• blue boxes

• created Apple I

• first Personal Computer
MATTAgile.com
Steve Jobs
• co-founder of Apple inc.

• saw potential in mouse-driven GUI

• founded NeXT in 1984

• CEO of Apple since 1997

• Jobs experimented with
psychedelics

• calling his LSD experiences "one of
the two or three most important
things [he had] done in [his] life".
MATTAgile.com
William Henry Gates III
• a.k.a. “Bill”

• Microsoft

• wrote his first computer program on
ASR-33 Teletype terminal

• 1975 at MITS Altair 8800 based on
the Intel 8080 CPU

• distribute the interpreter as Altair
BASIC

• Sold MS-DOS to IMB for $50k
MATTAgile.com
Paul Allen
• Allen co-founded Microsoft with Bill
Gates

• in 1975, and began marketing a
BASIC

• In 1980, after promising to deliver
IBM a DOS
MATTAgile.com
Kevin Mitnick
• a.k.a. “Condor”

• Social Engineer

• arrested in 1995

• hacked into Digital Equipment
Corporation systems, Nokia,
Motorola, Fujitsu Siemens and
many others.
MATTAgile.com
Larry Wall
• Perl in 1987

• author of path program
MATTAgile.com
Tsutomu Shimomura
• was hacked by Kevin Mitnick

• help the FBI to capture him

• Shimomura out-hacked Mitnick to
bring him down
MATTAgile.com
Robert Morris
• professor at MIT

• created Morris Worm

• first computer worm

• co-founded the online store known
by the name Viaweb, one of the first
web-based applications, with Paul
Graham
MATTAgile.com
Ian Murphy
• a.k.a. "Captain Zap"

• in 1981

• first person ever arrested for a
computer crime

• hacked into AT&T's computers and
changed their internal clocks

• People suddenly received late-night
discounts in the afternoon
MATTAgile.com
Kevin Poulsen
• a.k.a. “Dark Dante”

• former black hat hacker

• takeover of the KIIS-FM phone lines

• 102nd caller and win the prize of a
Porsche 944 S2

• taught himself lock picking

• America's best-known cyber-
criminals
MATTAgile.com
Linus Torvalds
• Father of linux kernel

• git

• His M.Sc. thesis was titled Linux: A
Portable Operating System.

• 35 patents worldwide

• Linus’ Law: "given enough eyeballs,
all bugs are shallow"
MATTAgile.com
Sir Tim Berners-Lee
• a.k.a. “TimBL”

• British physicist,computer scientist
and MIT professor

• invented the World Wide Web

• director of the World Wide Web
Consortium (W3C)

• Berners-Lee was knighted by
Queen Elizabeth II for his pioneering
work
MATTAgile.com
Gary McKinnon
• a.k.a. “Solo”

• Scottish systems administrator

• has been accused of the biggest
military computer hack of all time

• hacking into 97

• NASA, the US Army, US Navy,
Department of Defense and the US
Air Force computers

• Feb 2001 to Mar 2002
MATTAgile.com
Raphael Gray
• 19 when he hacked computer
systems

• Jan and Feb 1999

• published details of over 6,500
credit cards

• using an £800 computer

• sent Viagra tablets to Bill Gates

• arrested in Mar 1999
MATTAgile.com
Mark Abene
• a.k.a. “Phiber Optik”

• from New York City

• member of Legion of Doom and
Masters of Deception

• high-profile hacker in the early
1990s

• In 1994, one-year enprisonment

• for conspiracy and unauthorized
access to computer and telephone
systems
MATTAgile.com
Jonathan James
• a.k.a. “c0mrade”

• first juvenile incarcerated for
cybercrime

• 15 when he hacked

• Defense Threat Reduction Agency,
a division of the United States
Department of Defense

• suicide May 18, 2008
MATTAgile.com
Deceptive Duo
• 20-year-old Benjamin Stark

• 18-year-old Robert Lyttle

• 2002 series of high-profile break-ins
to government networks

• U.S. Navy, NASA, FAA and
Department of Defense
MATTAgile.com
Adrian Lamo
• grey hat hacker

• exploited: Microsoft, the New York
Times, Lexis-Nexis, and Yahoo!

• hunt down by FBI

• surrendered to the U.S. Marshals on
September 9, 2003

• pay $65,000

• sentenced to home detention and
probation
MATTAgile.com
MICHAEL CALCE
• a.k.a. “MafiaBoy”

• 15 years old

• Valentine’s Day in 2000

• DoS - 75 computers in 52 networks

• eBay, Amazon and Yahoo

• eight months of “open custody,”

• one year of probation, restricted
use of the internet, and a small fine.
MATTAgile.com
Vladimir Levin
• a.k.a. “ArkanoiD”

• 1994 St. Petersburg hacker group

• tricked Citibank's computers into
spitting out $10 million

• played around with systems’ tools
(e.g. were installing and running
games) and were unnoticed by the
bank’s staff.

• three years in prison and ordered to
pay Citibank $240,015 (his share
from the heist)
MATTAgile.com
Gordon Lyon
• a.k.a. “Fyodor”

• network security expert

• open source programmer

• Nmap Security Scanner

• Insecure.Org

• SecLists.Org

• SecTools.Org
MATTAgile.com
Others
• Onel A. De Guzman

• Cheng Ing-Hau

• Mudge

• Jon Lech Johansen

• Dimitry Sklyarov

• David L. Smith
• Johan Helsingius

• Eric Steven Raymond

• John Perry Barlow

• Sven Jaschan

• Dennis Moran
MATTAgile.com
hacking subculture
MATTAgile.com
groups
MATTAgile.com
Chaos Computer Club
• a.k.a. “CCC”

• based in Germany, founded in
1981

• 9,000 members

• "a galactic community of life forms,
independent of age, sex, race or
societal orientation, which strives
across borders for freedom of
information...."

• Supporting the principles of the
hacker ethic
MATTAgile.com
Legion of Doom
• founded in 1984

• weblog: "Cult of the Dead Cow"

• Cult's stated goal of "Global
Domination Through Media
Saturation,"

• Great hacker war with Masters of
Deception
MATTAgile.com
Masters of Deception
• a.k.a. “MOD”

• New York-based hackergroup

• reportedly controlled all the major
telephone RBOC's and X.
25networks

• controlling large parts of the
backbone of Internet

• levels of initiation and protection of
more sensitive knowledge

• Great hacker war with Legion of
Doom
MATTAgile.com
L0pht
• hacker collective

• active 1992 and 2000

• located in the
Boston,Massachusetts area

• l0pht crack
MATTAgile.com
Team Elite
• international group of computer
hackers

• who develop all kind of software
and their primary focus is security

• found security holes at

• MI5, WHO, Kaspersky Lab, Avira,
Symantec, McAfee, AVG, Eset, F-
Secure, ESA, Trend Micro, Intel,
eBay UK, PayPal, the U.S. Bank,
Bank of America, RBS WorldPay,
Visa, The New York Times, The
Telegraph, Daily Express, MPAA,
RIAA, Ministry of Defence of the
United Kingdom, Estoniaand
Armenia, IFPI, Bhuvan, Deutsche
Bundesbank.
MATTAgile.com
Anonymous
• It is not old, but it is notable!

• from 4chan.org

• LOIC

• HB Gary

• Sony

• DDoS on MPAA and RIAA
MATTAgile.com
Other notable
MATTAgile.com
hacktivists
MATTAgile.com
Richard Stallman
• a.k.a. “rms”

• GNU Project

• father of free software

• Emacs

• gcc, gdb

• against Digital Rights Management

• awards, fellowships and four
honorary doctorates.
MATTAgile.com
Eric Corley
• Emmanuel Goldstein

• Off the Hook

• Free Kevin
MATTAgile.com
Eric Steven Raymond
• Cathedral and the Bazzar

• The Hacker's Dictionary

• How to Be a Hacker

• developer of fetchmail
• revels in living the life in all its geeky
glory
MATTAgile.com
Loyd Blankenship
• The Mentor

• The Hacker Manifesto

• Member of Legion Of Doom
MATTAgile.com
movements
MATTAgile.com
l33t speak
• catb.org/jargon/

• glider
MATTAgile.com
ASCII art
MATTAgile.com
Free Kevin
MATTAgile.com
Hackerspace
• hackerspaces.org
MATTAgile.com
EHAP
• Ethical Hackers Against Pedophilia

• The Genocide2600 Group
MATTAgile.com
media
MATTAgile.com
Phrack magazine
• phrack.com

• first published November 17, 1985

• Fyodor: "the best, and by far the
longest running hacker zine,"

• covers phreaking, anarchy,
cracking, hacking, cryptography
and international news.

• "has had its finger on the pulse of
hacker culture"

• handbook and a manifesto for
hackers
MATTAgile.com
2600
• Off the Hook

• 2600: The Hacker Quarterly

• HOPE conference

• 2600.com
MATTAgile.com
The Hacker Manifesto
• The Mentor -> Blankenship

• wrote after he was arrested in 1986

• hacker’s only crime is curiosity

• a moral guide to hackers

• a cornerstone of hacker philosophy

• reprinted in Phrack
MATTAgile.com
The Cathedral and the
Bazzar
• a.k.a. “CatB”

• essay by Eric S. Raymond

• based on his observations of the
Linux kernel development process

• and his experiences managing an
open source project, fetchmail

• at Linux Congress, May 27, 1997
MATTAgile.com
movies
MATTAgile.com
War games
• imdb.com/title/tt0086567

• 1983

• Matthew Broderick

• Dabney Coleman

• John Wood

• Ally Sheedy
MATTAgile.com
Hackers
• imdb.com/title/tt0113243

• 1995

• Jonny Lee Miller

• Angelina Jolie

• Hackers 2

• Hackers 3
MATTAgile.com
Sneakers
• imdb.com/title/tt0105435

• 1992

• Gary Hershberger

• Robert Redford

• Sidney Poitier

• David Strathairn

• Dan Aykroyd
MATTAgile.com
communication
MATTAgile.com
Bulletin board system
• a.k.a. “BBS”

• Once logged in

• user can uploading and
downloading software and data

• reading news and bulletins

• exchanging messages with other
users, either through electronic mail
or in public message boards

• access via a Telnet
MATTAgile.com
Usenet
• Tom Truscott and Jim Ellis in 1979

• worldwide distributed Internet
discussion system

• Usenet resembles a bulletin board
system

• precursor to the various Internet
forums

• absence of a central server and
dedicated administrator
MATTAgile.com
Internet Relay Chat
• a.k.a. “IRC”

• IRC was created in 1988

• real-time Internet text messaging
(chat) or synchronous conferencing

• mainly designed for group
communication
MATTAgile.com
fun
MATTAgile.com
The great hacker war
MATTAgile.com
wardriving
MATTAgile.com
wargames
MATTAgile.com
crack me
MATTAgile.com
uplink
• Hacker Elite

• introversion.co.uk/uplink/
MATTAgile.com
conferences
MATTAgile.com
defcon www.defcon.org
MATTAgile.com
black hat blackhat.com
MATTAgile.com
hope hope.net
MATTAgile.com
Any questions?
Matt Harasymczuk
matt@harasymczuk.pl
www.matt.harasymczuk.pl
MATTAgile.com
I rest my case That's all Folks
MATTAgile.com
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
ملخص النهائي لضوابط الامن السيبراني
ملخص النهائي لضوابط الامن السيبرانيملخص النهائي لضوابط الامن السيبراني
ملخص النهائي لضوابط الامن السيبرانيNaifAlghamdi31
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
34088.Chapter-2.pptx
34088.Chapter-2.pptx34088.Chapter-2.pptx
34088.Chapter-2.pptxNAVEEN128672
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 

Was ist angesagt? (20)

Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
ملخص النهائي لضوابط الامن السيبراني
ملخص النهائي لضوابط الامن السيبرانيملخص النهائي لضوابط الامن السيبراني
ملخص النهائي لضوابط الامن السيبراني
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
34088.Chapter-2.pptx
34088.Chapter-2.pptx34088.Chapter-2.pptx
34088.Chapter-2.pptx
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses
 

Andere mochten auch

Always Be Responsible for Any Code You Write Even for Fun. NoException();
Always Be Responsible for Any Code You Write Even for Fun. NoException();Always Be Responsible for Any Code You Write Even for Fun. NoException();
Always Be Responsible for Any Code You Write Even for Fun. NoException();Matt Harasymczuk
 
How Many Wheels You Have to Reinvent
How Many Wheels You Have to ReinventHow Many Wheels You Have to Reinvent
How Many Wheels You Have to ReinventMatt Harasymczuk
 
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...Matt Harasymczuk
 
Craftsmanship - Technical Disciplines vs. Agile - Business Practises
Craftsmanship - Technical Disciplines vs. Agile - Business PractisesCraftsmanship - Technical Disciplines vs. Agile - Business Practises
Craftsmanship - Technical Disciplines vs. Agile - Business PractisesMatt Harasymczuk
 
[Case Study] Agile @gov.pl
[Case Study] Agile @gov.pl[Case Study] Agile @gov.pl
[Case Study] Agile @gov.plMatt Harasymczuk
 
Evolution Not Revolution. A Case Study of an Enterprise Agile Transformation
Evolution Not Revolution. A Case Study of an Enterprise Agile TransformationEvolution Not Revolution. A Case Study of an Enterprise Agile Transformation
Evolution Not Revolution. A Case Study of an Enterprise Agile TransformationMatt Harasymczuk
 
Why Constraints are Good? A Case Study of an Enterprise Agile Transformation
Why Constraints are Good? A Case Study of an Enterprise Agile TransformationWhy Constraints are Good? A Case Study of an Enterprise Agile Transformation
Why Constraints are Good? A Case Study of an Enterprise Agile TransformationMatt Harasymczuk
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)Stu Sjouwerman
 

Andere mochten auch (13)

Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Always Be Responsible for Any Code You Write Even for Fun. NoException();
Always Be Responsible for Any Code You Write Even for Fun. NoException();Always Be Responsible for Any Code You Write Even for Fun. NoException();
Always Be Responsible for Any Code You Write Even for Fun. NoException();
 
How Many Wheels You Have to Reinvent
How Many Wheels You Have to ReinventHow Many Wheels You Have to Reinvent
How Many Wheels You Have to Reinvent
 
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...
Agile: XP and Software Engineering Practises that Supports Delivering Buisnes...
 
Kevin MItnick
Kevin MItnickKevin MItnick
Kevin MItnick
 
Craftsmanship - Technical Disciplines vs. Agile - Business Practises
Craftsmanship - Technical Disciplines vs. Agile - Business PractisesCraftsmanship - Technical Disciplines vs. Agile - Business Practises
Craftsmanship - Technical Disciplines vs. Agile - Business Practises
 
[Case Study] Agile @gov.pl
[Case Study] Agile @gov.pl[Case Study] Agile @gov.pl
[Case Study] Agile @gov.pl
 
Scrum, but...
Scrum, but...Scrum, but...
Scrum, but...
 
Evolution Not Revolution. A Case Study of an Enterprise Agile Transformation
Evolution Not Revolution. A Case Study of an Enterprise Agile TransformationEvolution Not Revolution. A Case Study of an Enterprise Agile Transformation
Evolution Not Revolution. A Case Study of an Enterprise Agile Transformation
 
Why Constraints are Good? A Case Study of an Enterprise Agile Transformation
Why Constraints are Good? A Case Study of an Enterprise Agile TransformationWhy Constraints are Good? A Case Study of an Enterprise Agile Transformation
Why Constraints are Good? A Case Study of an Enterprise Agile Transformation
 
Astronaut Flight Surgeon
Astronaut Flight SurgeonAstronaut Flight Surgeon
Astronaut Flight Surgeon
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Ähnlich wie History of Old School Hacking and Hacker Subculture

History of Hacking
History of HackingHistory of Hacking
History of HackingAstro Tech
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาMuay31
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาOnwadee18
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all timePRESENTATIONSFORESL
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
The history of the internet
The history of the internetThe history of the internet
The history of the internetNikki Usher
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 

Ähnlich wie History of Old School Hacking and Hacker Subculture (20)

History of Hacking
History of HackingHistory of Hacking
History of Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Wired or weird
Wired or weirdWired or weird
Wired or weird
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
The history of the internet
The history of the internetThe history of the internet
The history of the internet
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
History of computers
History of computersHistory of computers
History of computers
 
Kraken '16 It quiz final
Kraken '16 It quiz finalKraken '16 It quiz final
Kraken '16 It quiz final
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 

Kürzlich hochgeladen

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

History of Old School Hacking and Hacker Subculture