SlideShare uma empresa Scribd logo
1 de 16
HACKER CULTURE
JACK HSU

Assignment 1
WHAT IS IT?

Hacker culture: deals with hacking ethics and hackers themselves
Hacker:
1. One that hacks
2. An expert at programming and solving problems with a hacker
3. A person who illegally gains access to and sometimes tampers with
information in a computer system
4. Unauthorized use of a system/network
PBS HACKERS

• Hacking happens to everyone
• Not all hacking is with bad intention
• Hackers improve the internet by telling companies bout loop holes
• Example: Dmitry
• Some companies Microsoft aren’t devoting enough time
• Many hackers just for do it just personal pleasure
Right
or
Wrong?

THE ARGUMENT

IS IT RIGHT?
IS IT WRONG?
BUT…TYPES OF HACKERS

1.White Hat hackers:
-Aka Good guys
-They are the professionals
-Test systems and security systems
Usually wont cover tracks
BUT…TYPES OF HACKERS

2.Black hat hackers
-Opposite of white(obviously)
-Iconic image image
-Break into computers and networks
-Computer viruses
-Identify theft, passwords, credit card
BUT…TYPES OF HACKERS

3.Script kiddies:
-Black hat hackers
But….
Uses others programs
Download from internet etc
to make themselves popular
BUT…TYPES OF HACKERS

4.Hacktivists
May be motivated by
Religion
Politics
Revenge
Wrong doing
Harass
=Own entertainment
BUT…TYPES OF HACKERS

5.State sponsored hackers:
To protect military
Hired
To hack into other system(with gov permission)
BUT…TYPES OF HACKERS

6.Spy hacker
Hired hackers
Expose other corporation:
Secrets
Plans
For the companies own good
BUT…TYPES OF HACKERS

7. Cyber terrorists
Motivated by religion & political beliefs
Goal is to create:
Fear
Chaos
Panic
Maybe even death
Most dangerous
Wide range of skills and goals
WAYS TO HACK

Password hack
Virus hacking
Email hacking
Site Hacking
Credit Card hacking
Linux Hacking
Most Common social engineering’s
A FEW CASES

1.

1994, Phonemasters 1.85mil from Spring, AT&T and others, changed FBI
line to sex chat line
2.

1994, Vladimir Levin hacked into Citibank $10mil first internet bank
robbery. All but 400k. 3 years jail. 240K to citibank
3. 2000, DdoS(distributed denial of service).
Yahoo, eBay, buy.com, CNN, Dell, Amazon, Zdnet, E*trade, Excite.
Estimate 1.7 billion lost. Aka Mafiaboy Montreal, 15YO
SAFE YOURSELF!

http://www.youtube.com/watch?v=VPtTJYtfAUs
PICK A SIDE

1.HACKING IS BAD PERIOD.
2.Hacking is good when its for good intentions and not harming anyone
3.Hacking is good either good or bad intentions
BIBLIOGRAPHY

Ahmad, Nadeem. "Hacking CrackingN." Hacking. SlideShare. 01 Nov. 2013
<http://www.slideshare.net/NadeemAhmad16/hacking-14659261>.
"Hacker." Merriam-Webster. Merriam-Webster. 01 Nov. 2013 <http://www.merriamwebster.com/dictionary/hacker>.

Macintyre, Linden. "HACKERS." HACKERS - ProQuest. 06 Dec. 2000. CBC. 01 Nov. 2013
<http://search.proquest.com/docview/190744497>.
"Notable Hacks." Who Are Hackers - Notable Hacks | Hackers | FRONTLINE | PBS. 01 Nov.
2013. PBS. 29 Nov. 2013
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html>.

Mais conteúdo relacionado

Mais procurados

Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 

Mais procurados (20)

Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
About hacker
About hackerAbout hacker
About hacker
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking
Hacking Hacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
HackingHacking
Hacking
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacking
HackingHacking
Hacking
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Destaque

Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Andy Kriebel
 
10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon PitchKen Tabor
 
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Fabien Grenet
 
How to start a Startup - Sam Altman
How to start a Startup - Sam AltmanHow to start a Startup - Sam Altman
How to start a Startup - Sam AltmanMads Holmen
 

Destaque (8)

Hacker Culture
Hacker CultureHacker Culture
Hacker Culture
 
What the HACK is HHVM?
What the HACK is HHVM?What the HACK is HHVM?
What the HACK is HHVM?
 
Hackathon
HackathonHackathon
Hackathon
 
Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13Creating a Culture of Data @ Facebook - TCCEU13
Creating a Culture of Data @ Facebook - TCCEU13
 
What is a Hackathon?
What is a Hackathon?What is a Hackathon?
What is a Hackathon?
 
10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch10 Tips for a Winning Hackathon Pitch
10 Tips for a Winning Hackathon Pitch
 
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
Y Combinator Startup Class #1 : Ideas, Products, Teams and Execution (Part 1)
 
How to start a Startup - Sam Altman
How to start a Startup - Sam AltmanHow to start a Startup - Sam Altman
How to start a Startup - Sam Altman
 

Semelhante a Hacker culture

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Hacking
HackingHacking
HackingVirus
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 

Semelhante a Hacker culture (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
hacking
hackinghacking
hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Hacker culture

  • 2. WHAT IS IT? Hacker culture: deals with hacking ethics and hackers themselves Hacker: 1. One that hacks 2. An expert at programming and solving problems with a hacker 3. A person who illegally gains access to and sometimes tampers with information in a computer system 4. Unauthorized use of a system/network
  • 3. PBS HACKERS • Hacking happens to everyone • Not all hacking is with bad intention • Hackers improve the internet by telling companies bout loop holes • Example: Dmitry • Some companies Microsoft aren’t devoting enough time • Many hackers just for do it just personal pleasure
  • 5. BUT…TYPES OF HACKERS 1.White Hat hackers: -Aka Good guys -They are the professionals -Test systems and security systems Usually wont cover tracks
  • 6. BUT…TYPES OF HACKERS 2.Black hat hackers -Opposite of white(obviously) -Iconic image image -Break into computers and networks -Computer viruses -Identify theft, passwords, credit card
  • 7. BUT…TYPES OF HACKERS 3.Script kiddies: -Black hat hackers But…. Uses others programs Download from internet etc to make themselves popular
  • 8. BUT…TYPES OF HACKERS 4.Hacktivists May be motivated by Religion Politics Revenge Wrong doing Harass =Own entertainment
  • 9. BUT…TYPES OF HACKERS 5.State sponsored hackers: To protect military Hired To hack into other system(with gov permission)
  • 10. BUT…TYPES OF HACKERS 6.Spy hacker Hired hackers Expose other corporation: Secrets Plans For the companies own good
  • 11. BUT…TYPES OF HACKERS 7. Cyber terrorists Motivated by religion & political beliefs Goal is to create: Fear Chaos Panic Maybe even death Most dangerous Wide range of skills and goals
  • 12. WAYS TO HACK Password hack Virus hacking Email hacking Site Hacking Credit Card hacking Linux Hacking Most Common social engineering’s
  • 13. A FEW CASES 1. 1994, Phonemasters 1.85mil from Spring, AT&T and others, changed FBI line to sex chat line 2. 1994, Vladimir Levin hacked into Citibank $10mil first internet bank robbery. All but 400k. 3 years jail. 240K to citibank 3. 2000, DdoS(distributed denial of service). Yahoo, eBay, buy.com, CNN, Dell, Amazon, Zdnet, E*trade, Excite. Estimate 1.7 billion lost. Aka Mafiaboy Montreal, 15YO
  • 15. PICK A SIDE 1.HACKING IS BAD PERIOD. 2.Hacking is good when its for good intentions and not harming anyone 3.Hacking is good either good or bad intentions
  • 16. BIBLIOGRAPHY Ahmad, Nadeem. "Hacking CrackingN." Hacking. SlideShare. 01 Nov. 2013 <http://www.slideshare.net/NadeemAhmad16/hacking-14659261>. "Hacker." Merriam-Webster. Merriam-Webster. 01 Nov. 2013 <http://www.merriamwebster.com/dictionary/hacker>. Macintyre, Linden. "HACKERS." HACKERS - ProQuest. 06 Dec. 2000. CBC. 01 Nov. 2013 <http://search.proquest.com/docview/190744497>. "Notable Hacks." Who Are Hackers - Notable Hacks | Hackers | FRONTLINE | PBS. 01 Nov. 2013. PBS. 29 Nov. 2013 <http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html>.

Notas do Editor

  1. http://search.proquest.com.ezproxy.lib.ryerson.ca/docview/190744497
  2. http://www.merriam-webster.com/dictionary/hacker
  3. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  4. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  5. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  6. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  7. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  8. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  9. http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations
  10. http://www.slideshare.net/NadeemAhmad16/hacking-14659261
  11. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html