Kevin Mitnick
Hakcer
Mitnick may be most famous of his generation, because Mitnick was
'crowned' by the U.S. Justice Department became the most wanted
computer criminal in United States along seharag. Mitnick
with his posture that matches the character of a hacker, enter the
number of company-owned computer systems technology and
telekomunikasitop world, including Nokia, Fujitsu, and Motorola. After
large-scale published by the FBI, Mitnick was finally arrested in 1995
and after receiving numerous allegations, she eventually spent time in
jail for 5 years. He was released in 2000 and is now opening a computer security consultant. He did not call the action as 'hacking' and even gave the name of 'social engineering'.
Kevin Poulson
Poulson
first enters the world of hacking through the phone line at radio
station KIIS-FM in Los Angeles, and that made famous when Poulson
digital fraud by claiming to be a caller who break through the 102
phone line just to get money to buy a Porsche. Kevin
Poulson or alias name Dark Dante, managed to turn back the Yellow
Pages, then use the phone number in it to run a virtual escort agency. The
police later arrested Poulson and imprison him for three years after he
hacked a federal investigation database, as well as all 1.800 phone
line crashes. After he got out of jail he is now a journalist.
Adrian Lamo
Adrian
Lamo or so-called 'homeless hacker', usually using coffee shops,
libraries and Internet cafes as a base to carry out the action. Most activities are breaking into computer networks and then report the weaknesses to the company that owns the network. Lamo's
biggest claim is well-known after his break through the office intranet
New York Times, adding the company name in the database of the daily
newspaper. He also uses LexisNexis account to obtain secret access to profilpejabat company. Lamo is now working as a journalist.
Stephen Wozniak
Renowned as a co-founder of Apple, start action 'white-hat' him with hacking into phone systems. When
the school at the University of California, he made a device to his
friends called 'blue box' and allow his friends to call in time as long
as possible, free of charge. However, later Wozniak out of the university and worked with his friend Steve Jobs, Apple Computer.
Loyd Blankenship
Known as the 'Mentor', a member of the elite hacker group in 1980. The
action of the biggest is that he became the author of the Hacker
Manifesto (The Conscience of a Hacker), which he wrote in prison in
1986. In
the book Hacker Manifesto (The Conscience of a Hacker), it is mentioned
that the hacker is only the actions made by the hacker is just a
curiosity and not just be a moral hackers today, but also the absolute
paradigm of the philosophy of hackers. The
book was also reviewed in the magazine Phrack, and even made a movie in
1995 with the title of hackers, starring Angelina Jolie.
Linus Torvalds
Hackers are also developing a Linux operating system, a combination of "MINIX Linus". Now the Linux operating system has become the operating systems 'default' hacker. Then,
along with Richard Stallman build early versions of Linux, working with
programmers, developers and hackers around the world to develop the
Linux kernel.
John Draper
Hackers
are using the help of a plastic whistle which was a gift from a cereal
box "Cap n Crunch", he succeeded in hacking into phone systems. He found a frequency of 2600 Hz and is used as a tool to make free phone calls. In its development, the frequency of 2600 Hz is no longer made with plastic whistles, but using a tool called "Blue Box"
.Mark Abene
Entered
into one of the members "Master of Deception" and the Hacker Groups
Legion of Doom, also known as Phiber Optics elite group based in New
York, targeting U.S. phone systems, including AT & T compuetr
system in the late mid 80-an.Group eventually disbanded in 1992 when many members went to jail. In 1994, he was sentenced to one year in prison for conspiracy and unauthorized access to computer and telephone systems.
Robert Morris
Morris is the son of scientist National Computer Security Center, which is part of the National Security Agencies (NSA). He became famous after he managed to hackers infect thousands of computers connected in a network. He later wrote a popular Internet worm in 1988.
Richard Stallman
Is the inventor of the GNU project, and became one of the 'hacker senior schools' work at the MIT Artificial Intelligence lab. He worked as a "staff hacker" on the project Emac and protested the restrictions on access to computers in the lab. Once the password diisntal, he then broke into the system password and send a message to all staff to remove the password.
Ian Murphy
Ian
Muphy successfully hacking into the computer and compose AT & T
setting the internal clock-setting nya.Hal cause a lot of phone users
get a discount 'midnight' in the afternoon, and had to wait until
midnight to pay the high bills.
Vladimir Levin
Hackers managed to do this one CitiBank to computer fraud and benefit 10 million dollars. He is a graduate of St. Petersburg. Petersburg Technology University, and later Interpol arrested at Heathrow Airport in 1995.
Tsutomu Shimomura
Is
a top computer security experts, and managed to capture traces of Kevin
Mitnick on the date of February 15, 1995 when Mitnick broke into his
computer.
Eric Steven Raymond
Dubbed as the father of hackers. A pioneer hacktivist and opensource movement. He wrote a lot of hacking guide, one of which is: "How To Become A Hacker" and "The new hacker's Dictionary".
Onel A. de Guzman
A student from the Philippines to be the Greatest Hacker. He created the virus 'Love Bug' to break into the email service system all over the world.
Mudge
Mudge along with his followers managed to shut down Internet traffic in the company for half an hour.
Chen Ing-Hau
He is a deadly computer virus makers 'Chernobyl' that killed off many of the world system.
Dennis Moran
Known
by the name 'Coolio', convicted on charges of hacking sites nationwide,
such as military units, Air Force and anti-drug Dare.com.
David L. Smith
Smith
is the author of the Melissa worm that went on to become the first
e-mail virus that is distributed in the Usenet discussion group
alt.sex. Form of the original virus is also transmitted via email. Smith was eventually arrested and sentenced to prison for alleged losses of $ 80 million.Sven JaschanJaschan accused guilty of the Netsky and Sasser worms creation in 2004 when he was a teenager. The virus responsible for 70 percent of the spread of malware via the Internet at that time. Jaschan received sentences for 3 years for his crimes, and after he was recruited by a security company.
Michael Calce
Calce 15 years old when he managed to break the world's largest commercial website. Hacker
also has the name MafiaBoy in 2000 launched a DDoS attack to 75
computers in 52 networks, as well as eBay, Amazon and Yahoo. He was finally arrested after he revealed his action in chatroon online. He was sentenced to prison for 8 months and a small fine.
Robert Tappan Morris
November
1988, a successful computer virus discovered by Cornell University,
infecting about 6,000 Unix machines, and the resulting loss of millions
of dollars. Maker unknown virus called Robert Tappan Morris. Morris said that the virus 'worm' was not intended for any damage, but somehow he had to undergo three years imprisonment. While the disc containing the Morris worm source code is now stored at the Boston Museum of Scienc
This is the list of Top 22 World Hacker
Written By ization shop on Sunday, June 3, 2012 | Sunday, June 03, 2012
Subscribe to:
Post Comments (Atom)
Popular Posts Today
-
Root Shell is the dream of all hackers. Usually a hackers who entered thgrough a web vulnerability , will upload web shell . with web shell ...
-
In this article I will use tactics to hijack the session fixation Mandiri Internet banking session which is the largest b...
-
Learn about Paypal Phishing attack to hack Paypal account password . Recently paypal phishing attack has shown a shocking boost,Paypal p...
-
So there’s a lot of tutorial and tips out there on how to hack a bank account and the bank hacking software. Some hackers claim they ...
0 komentar:
Post a Comment