Language Selection

English French German Italian Portuguese Spanish

Training a new breed of hacker

Filed under
Software

Barcelona is home to an innovative new project designed to combat hacking.

The Hacker High School is at the University of La Salle, in the same department that churns out some of the best of Barcelona's designers.

The scheme is not the "devil's workshop" it might sound but, say its organisers, aims to tackle a modern-day taboo.

Likening current attitudes to hacking to old repressed notions of sex, they say many are doing it, but few are talking about it.

Pete Herzog, managing director of the organisation that set it up, says: "If you go back 50 years ago what was sex education? Sex education was 'sex is out there, don't do it, you'll get diseases'.

"We have the same situation now. We can't really tell you what hacking is.

"You'll get worms in your e-mail box all the time. Somebody will probably put Trojans on your computer. Something will happen.

"You'll see it, but everyone who is doing this is doing it illegally, they're bad. We can't define it, but if you do it you'll go to jail. "

Digital self-defence

The programme was set up by the Institute for Security and Open Methodologies (ISECOM), a non-profit computer security outfit that wants to make students streetwise to the hostile neighbourhood the internet can often be.

Children from local high schools get a sort of digital self-defence class, giving teens the moves to tackle fraud, identity theft and attacks on their systems.

Mr Herzog says: "We are taking kids who will see this kind of illegal activity, and showing them how it is done, what's happening.

"This is so they can understand the technical concept, and also, what is their computer doing, how can it be cleaned up, why is this taking over their system, why is their privacy being invaded?"

The A to Z of hacking includes modules in ports and protocols, malware, digital forensics and e-mail security and privacy, showing how to send an e-mail that looks like it comes from someone else.

Teacher Xavier Cadenas says: "The students should be able to distinguish if the user who sent them an e-mail is a known person and they are who they claim to be, if the e-mail is legal or not legal.

"They should always be suspicious and not believe everything they see."

Full Story.

More in Tux Machines

Google Fixed GHOST Exploit in Chrome OS in 2014 and Didn't Tell Anyone

Details about a GLIBC vulnerability were published a couple of days ago by a company called Qualys, and the distributions using it have already received patches. Now, it seems that Google knew about this problem, patched it in ChromeOS a year ago, and forgot to say anything to anyone. Read more

ESA implements open source based private cloud infrastructure

The European Space Agency (ESA) has implemented a private cloud infrastructure to offer IT services to its user communities. The datacentre in Frascati, Italy, is already operational, while a second datacentre in Darmstadt, Germany, has just been completed. Read more

Today in Techrights

A small note on window decorations

If you have updated to the recently released GNOME development version, you may have noticed that some window decorations look slightly different. Of course it is quite normal for the theme to evolve with the rest of GNOME, but in this case the visual changes are actually the result of some bigger changes under the hood which deserve some more explanation. It is well-known that GTK+ gained support for client-side decorations a while ago – after all, most GNOME applications were quick in adopting custom titlebars, which have become one of the most distinguished patterns of GNOME 3 applications. However it is less well-known that client-side decorations may also be used for windows with no custom decorations, namely when using GDK’s wayland backend. Read more