What's New in Teams Calling, Meetings and Devices March 2024
Hackers final
1.
2. Outlines:
- Disagreement on the definition of a hacker.
- Classification of hacker morally.
- Hacker attack methods.
- Methods for collecting information.
- The black hat hackers.
- The White hat hackers.
- The top ten famous hackers.
3. Disagreement on the definition of a hacker
- Many define the hacker as a person who is:
destructive, negative and bad. These terms are
combined with the word hacker ( computer hacker).
- And that the impact of some of what was in the
media, where due to the lack of understanding
of reality hacker, and relate it to word piracy.
- (piracy) : expression that describes the illegal sale of
copies of the private creative work.
- and is used in violation of copyright in particular for films,
television episodes , songs and computer programs.
Web network has become one of the best marketing means.
4. - Cracker : term to define a spoiler hacker.
- despite the both marked the intelligence
and spirit of challenge and not afraid to
face the unknown. However, the cracker
always acts of sabotage and intrusion for
reasons other than positive and this is
the person who deserves the label Computer
pirate.
- While the hacker devise solutions to the
problems and trying to innovate in his work.
5. Classification of hacker morally
- a white hat hacker: is called hacker reformer.
- a black hat hacker: called
the hacker spoiler, which in English is
called Cracker.
- a Grey hat hacker :tottering between
reform and tampering.
6. Hacker attack methods
- Denial of service attacks (DoS).
- Overflow the buffer.
- Security holes.
- Trojans (Trojan horse).
7. Methods for collecting information
- Sniffing (listen).
- Social Engineering.
- finding wireless networks.
8. "The hacker is often a programmer or a network-engineers
or individuals familiar with the very technology and carry
out piracy through the use of specific devices in a few
cases.
Either the possibility of hacking the real will be one of skill
hacker and intelligence riper, so that it reveals gaps in the
Web sites and programs .
And is not permanent that the aim is a hacker vandalism
in most cases.
The goal is to prove the strength and the ability to defeat
the defenses of the site, which means that the hacker was
able to defeat website designers and developers "
9. The black hat hacker
- A black hat is the villain or bad guy.
- The phrase is often used in computing slang,
where it refers to a computer security hacker
who breaks into networks or computers, or
creates computer viruses.
- Unlike a white hat hacker, the black hat
hacker takes advantage of the break-in,
perhaps destroying files or stealing data for
some future purpose.
10. - The black hat hacker may also make the
exploit known to other hackers and/or the
public without notifying the victim. This gives
others the opportunity to exploit the
vulnerability before the organization is able to
secure it.
- The term comes from old Western movies,
where heroes often wore white hats and the
"bad guys" wore black hats.
11. The white hat hackers
- A white hat hacker breaks security for non-
malicious reasons, perhaps to test their own
security system. The term "white hat" in
Internet slang refers to an ethical hacker.
- This classification also includes individuals
who perform penetration tests and
assessments within a contractual agreement.
12. The top ten famous hackers
1. Kevin Mitnick
2. Gary McKinnon
3. Adrian Lamo
4. Robert Tappan Morris
5. Vladimir Levin
6. Markus Hess
7. Michael Calce
8. Albert Gonzalez
9. Kevin Poulsen
10. Jonathan James