Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Professional Hackers
Search
Sponsored
·
Ship Features Fearlessly
Turn features on and off without deploys. Used by thousands of Ruby developers.
→
Jim Geovedi
June 12, 2009
Technology
0
120
Professional Hackers
Are hackers getting paid now, like a pro?
Jim Geovedi
June 12, 2009
Tweet
Share
More Decks by Jim Geovedi
See All by Jim Geovedi
Who's Smarter Than Machine?
geovedi
0
130
Unstructured Data is the New Gold: ML + NLP is the New Shiz!
geovedi
5
920
Machine Learning for Cybersecurity
geovedi
5
2.5k
Waluku: Answering Astronomy Questions through Social Media
geovedi
0
190
@begobet
geovedi
0
320
The 21st Century Bank Job
geovedi
0
140
Satellite Telephony Security
geovedi
0
88
Hacking a Bird in the Sky: The Revenge of Angry Birds
geovedi
0
130
Cloud Security - Security Aspects of Cloud Computing
geovedi
0
84
Other Decks in Technology
See All in Technology
今日から始めるAmazon Bedrock AgentCore
har1101
4
380
IaaS/SaaS管理における SREの実践 - SRE Kaigi 2026
bbqallstars
4
1.6k
Azure Durable Functions で作った NL2SQL Agent の精度向上に取り組んだ話/jat08
thara0402
0
140
データの整合性を保ちたいだけなんだ
shoheimitani
7
2.8k
GSIが複数キー対応したことで、俺達はいったい何が嬉しいのか?
smt7174
3
140
予期せぬコストの急増を障害のように扱う――「コスト版ポストモーテム」の導入とその後の改善
muziyoshiz
1
1.5k
We Built for Predictability; The Workloads Didn’t Care
stahnma
0
130
GitHub Issue Templates + Coding Agentで簡単みんなでIaC/Easy IaC for Everyone with GitHub Issue Templates + Coding Agent
aeonpeople
1
170
サイボウズ 開発本部採用ピッチ / Cybozu Engineer Recruit
cybozuinsideout
PRO
10
73k
AIと新時代を切り拓く。これからのSREとメルカリIBISの挑戦
0gm
0
680
ClickHouseはどのように大規模データを活用したAIエージェントを全社展開しているのか
mikimatsumoto
0
190
What happened to RubyGems and what can we learn?
mikemcquaid
0
240
Featured
See All Featured
Un-Boring Meetings
codingconduct
0
200
The Language of Interfaces
destraynor
162
26k
Highjacked: Video Game Concept Design
rkendrick25
PRO
1
280
Primal Persuasion: How to Engage the Brain for Learning That Lasts
tmiket
0
240
Utilizing Notion as your number one productivity tool
mfonobong
2
210
Design and Strategy: How to Deal with People Who Don’t "Get" Design
morganepeng
133
19k
The innovator’s Mindset - Leading Through an Era of Exponential Change - McGill University 2025
jdejongh
PRO
1
88
Visualization
eitanlees
150
17k
jQuery: Nuts, Bolts and Bling
dougneiner
65
8.4k
Being A Developer After 40
akosma
91
590k
What’s in a name? Adding method to the madness
productmarketing
PRO
24
3.9k
Bridging the Design Gap: How Collaborative Modelling removes blockers to flow between stakeholders and teams @FastFlow conf
baasie
0
440
Transcript
jim geovedi information security troublemaker, professional script kiddy professional hackers
hackers
are hackers getting paid now, like a pro?
professional hackers
corporate hackers
corporate hackers programmer deals with programming operating systems or applications
corporate hackers administrator responsible for running special equipment or whole
infrastructures
corporate hackers operator sitting in front of a monitor (or
several) all days and evaluating output of logs and system messages
corporate hackers security officer writing the security policies and procedures
for the company decides what to do when security incident is happening defining security and access roles
corporate hackers it auditor independent organ within the organisation which
ensures the adequateness of it controls
corporate hackers consultant works for a consultant company (general consultant
companies, it consultant companies, or it security companies)
corporate hackers hacker check security of networks, review source code,
etc. hired to show to customers or press the company employ cool person
independent hackers
independent hackers operating system/software hacker develop and improve system based
on personal interest
independent hackers intrusion specialist concentrate primarily on how to break-
in the system or network
independent hackers vulnerability researcher discovering the vulnerability and how to
take advantage of it
independent hackers botnet owner take control of thousands of hosts
rent the botnet for ddos, anonymous proxy, spam, phising etc.
independent hackers rootkit/trojan/virus writer sometime work together with intrusion specialists
and botnet owner
independent hackers spammer/fraudster intend to result in financial or personal
gain
local hacking scene
how many professional hackers in indonesia? a question of ethics:
hackers behaviour real hackers vs. media whores local hacking scene
skill development certification for professional hackers valuing our own skills
local hacking scene
fin.