Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Professional Hackers
Search
Jim Geovedi
June 12, 2009
Technology
0
110
Professional Hackers
Are hackers getting paid now, like a pro?
Jim Geovedi
June 12, 2009
Tweet
Share
More Decks by Jim Geovedi
See All by Jim Geovedi
Who's Smarter Than Machine?
geovedi
0
120
Unstructured Data is the New Gold: ML + NLP is the New Shiz!
geovedi
5
910
Machine Learning for Cybersecurity
geovedi
5
2.5k
Waluku: Answering Astronomy Questions through Social Media
geovedi
0
180
@begobet
geovedi
0
310
The 21st Century Bank Job
geovedi
0
140
Satellite Telephony Security
geovedi
0
83
Hacking a Bird in the Sky: The Revenge of Angry Birds
geovedi
0
120
Cloud Security - Security Aspects of Cloud Computing
geovedi
0
78
Other Decks in Technology
See All in Technology
20250913_JAWS_sysad_kobe
takuyay0ne
2
260
LLM時代のパフォーマンスチューニング:MongoDB運用で試したコンテキスト活用の工夫
ishikawa_pro
0
180
AIエージェント開発用SDKとローカルLLMをLINE Botと組み合わせてみた / LINEを使ったLT大会 #14
you
PRO
0
140
初めてAWSを使うときのセキュリティ覚書〜初心者支部編〜
cmusudakeisuke
1
290
20250910_障害注入から効率的復旧へ_カオスエンジニアリング_生成AIで考えるAWS障害対応.pdf
sh_fk2
3
280
データ分析エージェント Socrates の育て方
na0
8
3.2k
Evolución del razonamiento matemático de GPT-4.1 a GPT-5 - Data Aventura Summit 2025 & VSCode DevDays
lauchacarro
0
220
使いやすいプラットフォームの作り方 ー LINEヤフーのKubernetes基盤に学ぶ理論と実践
lycorptech_jp
PRO
1
200
サラリーマンの小遣いで作るtoCサービス - Cloudflare Workersでスケールする開発戦略
shinaps
2
470
IoT x エッジAI - リアルタイ ムAI活用のPoCを今すぐ始め る方法 -
niizawat
0
130
Autonomous Database - Dedicated 技術詳細 / adb-d_technical_detail_jp
oracle4engineer
PRO
4
10k
AIエージェントで90秒の広告動画を制作!台本・音声・映像・編集をつなぐAWS最新アーキテクチャの実践
nasuvitz
3
400
Featured
See All Featured
What’s in a name? Adding method to the madness
productmarketing
PRO
23
3.7k
Exploring the Power of Turbo Streams & Action Cable | RailsConf2023
kevinliebholz
34
6k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
8
530
Building Flexible Design Systems
yeseniaperezcruz
329
39k
Into the Great Unknown - MozCon
thekraken
40
2k
Imperfection Machines: The Place of Print at Facebook
scottboms
268
13k
Chrome DevTools: State of the Union 2024 - Debugging React & Beyond
addyosmani
7
850
Music & Morning Musume
bryan
46
6.8k
Fantastic passwords and where to find them - at NoRuKo
philnash
52
3.4k
RailsConf & Balkan Ruby 2019: The Past, Present, and Future of Rails at GitHub
eileencodes
139
34k
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
53k
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
48
9.7k
Transcript
jim geovedi information security troublemaker, professional script kiddy professional hackers
hackers
are hackers getting paid now, like a pro?
professional hackers
corporate hackers
corporate hackers programmer deals with programming operating systems or applications
corporate hackers administrator responsible for running special equipment or whole
infrastructures
corporate hackers operator sitting in front of a monitor (or
several) all days and evaluating output of logs and system messages
corporate hackers security officer writing the security policies and procedures
for the company decides what to do when security incident is happening defining security and access roles
corporate hackers it auditor independent organ within the organisation which
ensures the adequateness of it controls
corporate hackers consultant works for a consultant company (general consultant
companies, it consultant companies, or it security companies)
corporate hackers hacker check security of networks, review source code,
etc. hired to show to customers or press the company employ cool person
independent hackers
independent hackers operating system/software hacker develop and improve system based
on personal interest
independent hackers intrusion specialist concentrate primarily on how to break-
in the system or network
independent hackers vulnerability researcher discovering the vulnerability and how to
take advantage of it
independent hackers botnet owner take control of thousands of hosts
rent the botnet for ddos, anonymous proxy, spam, phising etc.
independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists
and botnet owner
independent hackers spammer/fraudster intend to result in financial or personal
gain
local hacking scene
how many professional hackers in indonesia? a question of ethics:
hackers behaviour real hackers vs. media whores local hacking scene
skill development certification for professional hackers valuing our own skills
local hacking scene
fin.