tailieunhanh - Training Security EMEA - I

Anger underneath Weve been dominated by sadists Yes, I am a criminal Looking for an “elsewhere” This is it. this is where I belong. Wide range rebellion You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe its for our own good, yet were the criminals We make use of a service already existing without paying for what could be dirt-cheap if it wasnt run by profiteering gluttons your three-piece psychology and 1950s technobrain | Security Training I – The environment Renaud BIDOU Security Consultant EMEA Who are the hackers ? Mythical Texts Sociological Approach Reality Security Corporate security Security professionals Agenda Who are the hackers ? Mythical Texts let’s have an over all view of Radware solutions. “Mentor’s Last Words” aka « hacker’s manifesto », « conscience of a hacker » THE mythical text Written by a hacker in a period of large busting Justified a posteriori the behavior of hackers We explore. We seek after knowledge. My crime is that of curiosity Shows a very high self-esteem Im smarter than most of the other kids My crime is that of outsmarting you TEXTS Anger underneath Weve been dominated by sadists Yes, I am a criminal Looking for an “elsewhere” This is it. this is where I belong. Wide range rebellion You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe its for our own good, yet were the criminals We make use of a service already existing without paying for what could be dirt-cheap if it wasnt run by profiteering gluttons your three-piece psychology and 1950s technobrain “Mentor’s Last Words” TEXTS Subjective text Written to justify hacker’s acts and provide them with respectability Must not be analyzed “as is” No real theory or philosophy behind the text Still a reference Each and every hacker knows this text Mostly found on lamers web sites Flame wars have proved that real hackers know and respect this text “Mentor’s Last Words” TEXTS One of the very few state of the art written document Written to explain who hackers are Dissident says he is not a hacker Distinguishes 2 categories of hackers And the idiotic schmucks of the world True hackers Defines the rules A true hacker DOESNT get into the system to kill everything True hackers are curious and patient “The ethics of hacking” (Dissident) TEXTS Text for newbies And to those wanna-bes out there who like the label of | Security Training I – The environment Renaud BIDOU Security Consultant EMEA Who are the hackers ? Mythical Texts Sociological Approach Reality Security Corporate security Security professionals Agenda Who are the hackers ? Mythical Texts let’s have an over all view of Radware solutions. “Mentor’s Last Words” aka « hacker’s manifesto », « conscience of a hacker » THE mythical text Written by a hacker in a period of large busting Justified a posteriori the behavior of hackers We explore. We seek after knowledge. My crime is that of curiosity Shows a very high self-esteem Im smarter than most of the other kids My crime is that of outsmarting you TEXTS Anger underneath Weve been dominated by sadists Yes, I am a criminal Looking for an “elsewhere” This is it. this is where I belong. Wide range rebellion You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe its for our own good, yet were the criminals We make use

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.