Hacker (hacking) behind the break-government sites, Ryan Cleary, were arrested. After preaching five Inilah.com world's most evil hackers, the following five best hackers.
Hackers can use their skills to good and evil. Hackers usually either category hired various firms to test the integrity of the system. Subject well, there were five people who entered in the history of hacking. Here are the characters.
Stephen Wozniak,'Woz' known as' Steve Jobs' other 'in the Apple. He was awarded a doctorate and the National Medal of Technology from Kettering University and Nova Southeastern University. Woz also successfully entered the National inventors Hall of Fame in 2000.
Woz start hacking making blue boxes, devices to bypass the phone changer mechanism to make free long distance calls.
Tim Barners-Lee.These hackers known as the creator of the World Wide Web (www), the system we use to access sites, documents and data on the internet. This man received many awards and most notably, the Millennium Technology Prize.
The man who also became a student of Oxford University was first caught hacking with a friend. According to the w3, Woz made his first computer with a soldering iron, TTL gates, M6800 processor and an ancient television.
Linus Torvalds.
This man was known as the father of Linux, an operating system (OS) based on Unix. Torvalds, who calls himself 'technician' is to say, simple aspiration, which wants to have fun making the best OS that he could.
This man has the first computer Commodore VIC-20, 8-bit home computers. Sinclair QL and then change the Wikipedia report, it modifies the Sinclair "extensively, teruma on its OS '.
Richard Stallman.This man is famous for the GNU Project, which he has made to develop the OS for free. In this case, Stallman is known as the Father of Free Software. Men who choose to be called 'rms' is the first time hacking at MIT.
Tsutomu Shimomura.Hackers are known for the way sudden ominous, ie Kevin Mitnick hacked. For this attack, Shimomura helped the FBI arrested Mitnick.
5 Best Hacker In History
Written By ization shop on Friday, February 24, 2012 | Friday, February 24, 2012
Subscribe to:
Post Comments (Atom)
Popular Posts Today
-
Root Shell is the dream of all hackers. Usually a hackers who entered thgrough a web vulnerability , will upload web shell . with web shell ...
-
In this article I will use tactics to hijack the session fixation Mandiri Internet banking session which is the largest b...
-
Learn about Paypal Phishing attack to hack Paypal account password . Recently paypal phishing attack has shown a shocking boost,Paypal p...
-
So there’s a lot of tutorial and tips out there on how to hack a bank account and the bank hacking software. Some hackers claim they ...
0 komentar:
Post a Comment