CS Presentation Michael Retrum.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

I am Poem By: Danny T.
Computer security Viruses Hacking Backups
Privacy Lost: How Technology is Endangering Your Privacy David H. Holtzman POWERPOINT BY: PETER OLSON.
Computers in Society Week 8: Computer Security and Hacking.
Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.
SHARING THE STORY! Quality Street Nike The Scouts.
Possible Ideas For Production
Integrating Technology Into the Mathematics Classroom Erik Krivitsky.
Summer Student Questionnaire We gave the 2001 CERN Summer Students a questionnaire. Here are the questions and an analysis of their answers.
Notes on Graduate School Cliff Shaffer Department of Computer Science Virginia Tech Blacksburg, VA.
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? In my PowerPoint I used a computer.
Computer Viruses... a big problem with small solutions.
Lecture 21 Computer Security Ethics
Tech. Team Future Technology program Likes and Dislikes on Technology By Alex Stephenson.
CSCE 4561 Ethical Hacking and Whistle Blowing A Hypothetical Case Study By Barret Miller.
1 Software Engineering Discussion for SCEC UseIT Intern Program Phil Maechling 26 May 2005
Proposal Report Proposals will either be accepted or rejected. Obviously, you want your proposal to be accepted. To help make this possible, follow the.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
Medical Advocacy and Advance Directives Session 3 Staying in the Circle of Life.
 Hackers Heroes of the Computer Revolution By Phil Dinovo.
Power Point by: Marc Prenger. Disclaimer / Intro to Hackers The book Hackers is broken up into four parts. Throughout these parts the “Hacker Ethic” is.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Written By Dan Gutman and Illustrated by Jim Paloit.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Computer Systems App Making Lesson 4– Designing my App.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Lesson 3. Aim: What does God teach us in the Bible?
Working Together! Taking Control of Textbook Costs at Coastline: Partnership is the key!
By: Madison Dunagan. Pros:  How much you pay for an E- readers up front is supposed to recoup expense by paying less over time for the textbooks in paper.
The hacker approach: the deve- lopment of free licenses IPNM 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).
Persuasive Writing Independent Reading -15 minutes
The hacker approach: the deve-lopment of free licenses
SECTION 2.8 ESV.
COMPUTER ENGINEERING.
Do You Know?.
Lesson Objectives Aims You should be able to:
Copyright and fair use Hayley Pugh ETEC 424.
Love Gets Involved August 28.
SECTION 2.8 NIV.
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
Information Systems in Organizations 3.3 Digital Business Innovation
Avast Antivirus Support- How to remove Avast plug- in from outlook.
Unit 2 Ancient Civilizations
SAMR Model in the Classroom
The Art of Deception.
קורס פיננסי – מושגים פיננסיים / כלכליים
Penetration Testing Computer Science and Software Engineering
Cultures Madeline Martinson UF 200- Margaret Sass
Participating in an Internet Project
Unit 6 Digital Literacy Study S3 Obj 2-2
The Light Of The World John 3:16-21/8: The Light Of The World John 3:16-21/8:12-20.
Computer Science Prototyping.
Хайр ба хорсол love and hate
Lesson – When is my model appropriate? - Residual Plots
Unit 6 Digital Literacy Study S3 Obj 2-2
Art Portfolio Final Mandie petersen.
LO1 - Know about aspects of cyber security
Scratch –Think Like a Computer
The Parable of the Good Samaritan
Lead me Lord lead me by the hand And help me face the rising sun.
In order to make progress over the next two lessons I will:
Song of Peace.
Jesus, You are And will always be Beautiful and lovely to me.
Copyright, Design and Patents Act (1988)
Place the logo of your community partner here.
Presentation transcript:

CS Presentation Michael Retrum

Hackers, Heroes of the computer revolution The book was written by Steven Levy It was originally published in 1985 and then rereleased as a 25th anniversary edition in 2010

Tech Model Railroad Club Tech Model RailRoad club MIT 1959 MIT had one computer, the TX-0, which was very expensive and because of this it was highly secured The members would go at weird times in hope that they could have access to the computer They hated how strictly protected it was and wanted everyone to have easier access to a computer

“Hackers ethic” “Hackers believe that essential lessons can be learned about the systems-about the world-from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. They resent any person, physical barrier, or law that tries to keep them from doing this.” They wanted to improve and tinker with computers in any way they could They wanted everyone to be able to access computers and love them like they did

Relation to our class The Hackers advanced technology significantly and without the progress they made, what we talk about in class wouldn't’t be possible While we often talk about Hackers in class, the use of the term hacker is completely different. Hackers in this time period were people who came up with clever or new programs or software

Recommendation Steven Levy gave a very informational new prospective on the hackers at the beginning stage of computers My perspective changed completely about hackers and I found the book to be rather interesting I would recommend the book to others as I believe that it can bring a new perspective on hacking and may draw an interest in getting involved with the good side of hacking