5 Most Evil Hacker In History
Written By ization shop on Friday, February 24, 2012 | Friday, February 24, 2012
phenomenon hacker (hacker) to heat up again when Ryan Cleary, an attacker government sites, were captured. Even so, there are the five most malicious hackers in history.
Jonathan James, this man became the first teenager to prison for acts of piracy. James sentenced to 16 years in prison at the time.
"I was just playing around. It is a pleasure for me to see what I can do, "he said when interviewed by PBS.
James always target high profile organizations. He never put a 'back door' (DRTA) at the Ministry of Defense of the United States (U.S.). Through the 'back door' is, hackers are able to peek at sensitive emails and capture usernames and passwords of employees.
Kemhan Besides, the man dubbed c0mrade also been breaking into NASA computers.
Adria Lamo, hackers managed to break into the New York Times and Microsoft. 'Hacker vagrant' says, "I have a laptop in Pittsburgh, and a change of clothes in DC".
Lamo crime primarily on penetration testing to find security holes and exploit them. Yahoo!, Bank of America, Citigroup and Cingular are the victims.
Kevin Mitnick, "hacker poster 'it never entered the authorities wanted list. Ministry of Justice portray it as 'the most wanted computer criminal in U.S. history'.
This guy filmed the crime, Freedom Downtime and Takedown. This is the greatest crime of man, infiltrated Digital Equipment Corporation computer networks and stealing software on it.
Kevin Poulsen, a man who is also known as Dark Dante is known to hijack the LA radio telephone network, KIIS-FM, which makes it managed to get a new Porsche car. Authorities called him "Hannibal Lecter of computer crime '.
Robert Tappan Morris, son of former National Security Agency scientist Robert Morris is known as the Morris Worm. The worm became the first computer worm is released on the internet. The result, he became the first person charged with Fraud and Abuse Act Computer 1986.
Subscribe to:
Post Comments (Atom)
Popular Posts Today
-
Root Shell is the dream of all hackers. Usually a hackers who entered thgrough a web vulnerability , will upload web shell . with web shell ...
-
In this article I will use tactics to hijack the session fixation Mandiri Internet banking session which is the largest b...
-
Learn about Paypal Phishing attack to hack Paypal account password . Recently paypal phishing attack has shown a shocking boost,Paypal p...
-
So there’s a lot of tutorial and tips out there on how to hack a bank account and the bank hacking software. Some hackers claim they ...
0 komentar:
Post a Comment