Being hacker

Solo disponible en BuenasTareas
  • Páginas : 15 (3646 palabras )
  • Descarga(s) : 9
  • Publicado : 26 de agosto de 2010
Leer documento completo
Vista previa del texto
LESSON 1 BEING A HACKER

LESSON 1 – BEING A HACKER

“License for Use” Information
The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a publicinstitution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visitthe LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, wedo ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004.

2

LESSON 1 – BEING A HACKER

Table of Contents
“License for Use” Information.................................................................................................................. 2Contributors................................................................................................................................................ 4 1.0 Introduction.......................................................................................................................................... 5 1.1 Resources.............................................................................................................................................. 6 1.1.1Books.............................................................................................................................................. 6 1.1.2 Magazines and Newspapers...................................................................................................... 7 1.1.3 Zines andBlogs............................................................................................................................. 7 1.1.4 Forums and Mailing Lists.............................................................................................................. 8 1.1.5 Newsgroups................................................................................................................................... 8 1.1.6Websites......................................................................................................................................... 9 1.1.7 Chat............................................................................................................................................. 10 1.1.8 P2P................................................................................................................................................ 11 1.2Further Lessons.................................................................................................................................... 11

3

LESSON 1 – BEING A HACKER

Contributors
Pete Herzog, ISECOM Chuck Truett, ISECOM Marta Barceló, ISECOM Kim Truett, ISECOM

4

LESSON 1 – BEING A HACKER

1.0 Introduction
Welcome to the Hacker Highschool program! This program isdesigned to encourage you to be well-rounded and resourceful. The core instruction theme is to harness the hacker curiosity in you and to guide you progressively through your hacker education to help you grow into a responsible role, capable of determining security and privacy problems and making proper security decisions for yourself. While there is a thrill to hacking partly because of the...
tracking img