Enviar búsqueda
Cargar
Hacker Culture and Free Software
•
Descargar como PPTX, PDF
•
0 recomendaciones
•
612 vistas
Ken-Lauren Daganio
Seguir
Seminar for the University of Sto. Tomas. 12 November, 2012.
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 65
Descargar ahora
Recomendados
Ruby on Rails Introduction | FEU-EAC, February 2014
Ruby on Rails Introduction | FEU-EAC, February 2014
Ken-Lauren Daganio
Beerspots Final Pitch
Beerspots Final Pitch
Ken-Lauren Daganio
Hack
Hack
Haggen So
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
Making your hackathon matter api con-uk
Making your hackathon matter api con-uk
Cristiano Betta
Hacking and Civic Hacking
Hacking and Civic Hacking
Diego Donaggio
What The Heck Is Hacking?
What The Heck Is Hacking?
Lars Zimmermann
What the Heck are Hackathons?
What the Heck are Hackathons?
Infinite Playground / The Hackitarians
Recomendados
Ruby on Rails Introduction | FEU-EAC, February 2014
Ruby on Rails Introduction | FEU-EAC, February 2014
Ken-Lauren Daganio
Beerspots Final Pitch
Beerspots Final Pitch
Ken-Lauren Daganio
Hack
Hack
Haggen So
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
Making your hackathon matter api con-uk
Making your hackathon matter api con-uk
Cristiano Betta
Hacking and Civic Hacking
Hacking and Civic Hacking
Diego Donaggio
What The Heck Is Hacking?
What The Heck Is Hacking?
Lars Zimmermann
What the Heck are Hackathons?
What the Heck are Hackathons?
Infinite Playground / The Hackitarians
Med122 hackers lecture
Med122 hackers lecture
Rob Jewitt
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
What is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
The Hacker Perspective
The Hacker Perspective
jjtay
Ethical hacking
Ethical hacking
A Raheem Ansari
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Marc Dusseiller Dusjagr
Hacking
Hacking
Himanshu Rathoria
Makers, Hackers and Gamers
Makers, Hackers and Gamers
center4edupunx
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
hackers
hackers
Aya Eltayed
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
Hacking ppt
Hacking ppt
giridhar_sadasivuni
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
GTKlondike
Computer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Hacking
Hacking
mubeenm50
Ethical hacking
Ethical hacking
Sourabh Goyal
the best hacking ppt
the best hacking ppt
fuckubitches
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Más contenido relacionado
Similar a Hacker Culture and Free Software
Med122 hackers lecture
Med122 hackers lecture
Rob Jewitt
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
What is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
The Hacker Perspective
The Hacker Perspective
jjtay
Ethical hacking
Ethical hacking
A Raheem Ansari
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Marc Dusseiller Dusjagr
Hacking
Hacking
Himanshu Rathoria
Makers, Hackers and Gamers
Makers, Hackers and Gamers
center4edupunx
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
hackers
hackers
Aya Eltayed
Is hacking good or bad
Is hacking good or bad
Ashish Chandurkar
Hacking ppt
Hacking ppt
giridhar_sadasivuni
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
GTKlondike
Computer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Hacking
Hacking
mubeenm50
Ethical hacking
Ethical hacking
Sourabh Goyal
the best hacking ppt
the best hacking ppt
fuckubitches
Similar a Hacker Culture and Free Software
(20)
Med122 hackers lecture
Med122 hackers lecture
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
Mac129 med102 hackers lecture
What is Ethical hacking
What is Ethical hacking
The Hacker Perspective
The Hacker Perspective
Ethical hacking
Ethical hacking
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Hacking
Hacking
Makers, Hackers and Gamers
Makers, Hackers and Gamers
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
hackers
hackers
Is hacking good or bad
Is hacking good or bad
Hacking ppt
Hacking ppt
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
Computer and Internet hacking
Computer and Internet hacking
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Hacking
Hacking
Ethical hacking
Ethical hacking
the best hacking ppt
the best hacking ppt
Último
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Último
(20)
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Hacker Culture and Free Software
1.
Hacker Culture
+ Free Software
2.
3.
4.
HACKER
5.
CRACKER
6.
HACKER?
7.
8.
9.
10.
11.
12.
http://hacks.mit.edu
13.
playfulness, cleverness, and
exploration
14.
Hacking means exploring
the limits of what is possible, in a spirit of playful cleverness. - Richard Stallman, 2002
15.
HACKER
!= CRACKER
16.
<begin>
17.
History.
18.
19.
Why?
20.
21.
The True Hackers
22.
Tech Model Railroad
Club
23.
TMRC
24.
25.
Computer?
26.
27.
28.
29.
30.
31.
The Hacker
Ethic
32.
Access to computers—and
anything that might teach you something about the way the world works— should be unlimited and total. Always yield to the Hands-On Imperative!
33.
All information should
be free.
34.
Mistrust Authority—Promote
Decentralization.
35.
Hackers should be
judged by their hacking, not bogus criteria such as degrees, age, race, or position.
36.
You can create
art and beauty on a computer.
37.
Computers can change
your life for the better.
38.
39.
AI, Lisp, and
PROLOG.
40.
Hardware Hackers
41.
42.
Part Deux.
43.
MIT AI Lab
44.
A printer
story
45.
46.
47.
GNU
48.
GNU’s Not Unix
49.
50.
51.
52.
53.
54.
55.
56.
57.
Now?
58.
59.
60.
61.
62.
63.
Questions?
64.
KTHXBYE.
65.
superken kdaganio kendaganio kd@badsectorlabs.com ken@webgeek.ph ken@freelancer.com
Notas del editor
I'm KenI'm the Evangelist at WebGeekI spread the good news about “WebGeek and of course Tech Scene in the Philippines!
Descargar ahora