SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Security-Assessment
                                                     .com




A Step into the Computer Underground


                    “By Understanding The Enemy
  We Are Better Prepared To Defend Ourselves”


                                           by Brett Moore



  Copyright Security-Assessment.com 2003
Security-Assessment
                                         .com




   Hackers, Crackers, Phreakers, Black Hats
   Males and Females, All Ages
   Computer Underground
   Warez Pirates
   Warez == Slang For Pirated Software



Copyright Security-Assessment.com 2003
Security-Assessment
                                         .com




   Internet Gives Worldwide Access To People
        With Similar Interests
   Credit Cards
   Free Software
   DVD Copies
   Pornography
   MP3 Music Files
Copyright Security-Assessment.com 2003
Security-Assessment
                                         .com




   Dialup access with modems
   BBS (Bulletin Board Systems)
   Online Handles (Alias)
   Leave Messages And Trade Files
   Free Long Distance Phone Calls



Copyright Security-Assessment.com 2003

Mais conteúdo relacionado

Mais procurados

Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityArturo Filastò
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Lumension
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and crackingDeepak kumar
 
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacyTehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacyMohammad Reza Kamalifard
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 

Mais procurados (7)

Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
 
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacyTehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Digital security
Digital securityDigital security
Digital security
 

Destaque

Attendant in contact center
Attendant in contact centerAttendant in contact center
Attendant in contact centerabhijit23391
 
Music video history
Music video historyMusic video history
Music video historyJG_
 
Vivanuestropueblo 130123173728-phpapp01
Vivanuestropueblo 130123173728-phpapp01Vivanuestropueblo 130123173728-phpapp01
Vivanuestropueblo 130123173728-phpapp01Marisol Diaz Serrano
 
Centros adscritos y listado de ies bilingües
Centros  adscritos y listado de ies bilingüesCentros  adscritos y listado de ies bilingües
Centros adscritos y listado de ies bilingüesMarisol Diaz Serrano
 
Técnicas e finalizações de pratos
Técnicas e finalizações de pratosTécnicas e finalizações de pratos
Técnicas e finalizações de pratosÁlvaro José
 
RallyON Presentation
RallyON PresentationRallyON Presentation
RallyON Presentationagibson22
 
Menú de septiembre y otras informaciones sobre el mismo
Menú de septiembre y otras informaciones sobre el mismoMenú de septiembre y otras informaciones sobre el mismo
Menú de septiembre y otras informaciones sobre el mismoMarisol Diaz Serrano
 
Libro de Historia del Café en Marcala
Libro de Historia del Café en MarcalaLibro de Historia del Café en Marcala
Libro de Historia del Café en MarcalaEdwin Pérez
 
Defination of gis and components of arc gis
Defination of gis and components of arc gisDefination of gis and components of arc gis
Defination of gis and components of arc gisSreedhar Siddhu
 

Destaque (13)

Vitaminas
VitaminasVitaminas
Vitaminas
 
Videojocs
VideojocsVideojocs
Videojocs
 
Attendant in contact center
Attendant in contact centerAttendant in contact center
Attendant in contact center
 
Feliz2013
Feliz2013Feliz2013
Feliz2013
 
Music video history
Music video historyMusic video history
Music video history
 
Vivanuestropueblo 130123173728-phpapp01
Vivanuestropueblo 130123173728-phpapp01Vivanuestropueblo 130123173728-phpapp01
Vivanuestropueblo 130123173728-phpapp01
 
Centros adscritos y listado de ies bilingües
Centros  adscritos y listado de ies bilingüesCentros  adscritos y listado de ies bilingües
Centros adscritos y listado de ies bilingües
 
Técnicas e finalizações de pratos
Técnicas e finalizações de pratosTécnicas e finalizações de pratos
Técnicas e finalizações de pratos
 
josue 3
josue 3josue 3
josue 3
 
RallyON Presentation
RallyON PresentationRallyON Presentation
RallyON Presentation
 
Menú de septiembre y otras informaciones sobre el mismo
Menú de septiembre y otras informaciones sobre el mismoMenú de septiembre y otras informaciones sobre el mismo
Menú de septiembre y otras informaciones sobre el mismo
 
Libro de Historia del Café en Marcala
Libro de Historia del Café en MarcalaLibro de Historia del Café en Marcala
Libro de Historia del Café en Marcala
 
Defination of gis and components of arc gis
Defination of gis and components of arc gisDefination of gis and components of arc gis
Defination of gis and components of arc gis
 

Semelhante a E security

Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxpatricke8
 
Security Assessment
Security AssessmentSecurity Assessment
Security AssessmentAnil Nayak
 
Computer Ethics And Information Systems
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information SystemsMandy Froemming
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 

Semelhante a E security (12)

Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docxComputer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
Computer Forensics and Cyber CrimeCHAPTERComputer Forens.docx
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Computer Ethics And Information Systems
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information Systems
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking
HackingHacking
Hacking
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 

Último

Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 

Último (20)

Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 

E security

  • 1. Security-Assessment .com A Step into the Computer Underground “By Understanding The Enemy We Are Better Prepared To Defend Ourselves” by Brett Moore Copyright Security-Assessment.com 2003
  • 2. Security-Assessment .com  Hackers, Crackers, Phreakers, Black Hats  Males and Females, All Ages  Computer Underground  Warez Pirates  Warez == Slang For Pirated Software Copyright Security-Assessment.com 2003
  • 3. Security-Assessment .com  Internet Gives Worldwide Access To People With Similar Interests  Credit Cards  Free Software  DVD Copies  Pornography  MP3 Music Files Copyright Security-Assessment.com 2003
  • 4. Security-Assessment .com  Dialup access with modems  BBS (Bulletin Board Systems)  Online Handles (Alias)  Leave Messages And Trade Files  Free Long Distance Phone Calls Copyright Security-Assessment.com 2003