Top 10 Hackers

CIA computer hackers in the media's portrayal of Ethan Hunt repels from the ceiling to hack the system, and anti-social teen to Lonely "noć a list of" stealing here, as in Mission Impossible, High - Tech, Super - The spy who has risen from just about entertainment.
Reality, however, hackers have a very different Bunch, simultaneously, as well as the World Wide Web, and is credited with the development of major technology companies as founder of a group that has been blamed with causing billions of dollars in losses. In this article, we have to decide for yourself, the truth of both nefarious and heroic, the most famous hackers, ten better than fiction by introducing you to test that theory.


Black Hat krakarlu
Internet, computer systems development work, which is called krakarlu or hackers, "black hats, with" abounds. They can be seen on the news that you want to be the ones to run away for cybercrimes. Others for personal benefit, but some of them, to the fun and curiosity. In this section we are one of the most famous and interesting "Black Hat" hackers Five Profile.
 

 1.Jonathan James: He was sent to prison for hacking has gained notoriety for the first child of James. He was sentenced to 16 years of age. PBS interview with an unnamed, professes, "I am, surrounded by the instruments on about. I am of the reduction is not fun to see what a challenge."

      
James' major intrusions of high - profile companies targeted. He is a backdoor into a Defense Threat Reduction Agency server install. DTRA nuclear, biological, chemical and special weapons from the United States and its traditional allies of the Department of Defense agency charged with reducing the threat. He was created by an employee of the usernames and passwords backdoor sensitive emails, view, and enabled him to capture.

      
James is also stealing software worth approximately $ 1.7 million, NASA computer fractures. According to the Department of Justice, "the software inside the living space, including temperature and humidity control, support for the International Space Station's physical environment." NASA last of a $ 41,000 cost up racking, was forced to shut down its computer systems. James, he downloaded the code in C programming to supplement his studies, but stressed, explaining that "on the code itself is crappy ... definitely not worth $ 1.7 million like they claimed."

      
Also known as the scope of his intrusions, if James, the "c0mrade," he had the opportunity to work at least 10 years and was an adult. Instead, he was banned and Probation entertainment system with a six-month sentence under house arrest, was planning to serve. However, he was an infringement of the terms, and served six months in prison. Today, James learned his lesson, and the opening may be a computer security company, was announced.


  2. Adrian Lamo: Lamo's claim to fame in the New York Times and Microsoft, such as the main company to take a break - ins available. As "nirasrayulaku Hacker," he told his intrusions to Kinko's, coffee shops and used Internet connections at libraries. In a profile article in the "I have a laptop in Pittsburgh, which is a kind word, a multi - jurisdictional redefines DC is not in the clothes of a change.", "He Hacks by Day, by Night Squats," Lamo reflects

      
Lamo's intrusions, mainly, he found flaws in security for companies in which they are exploited, then the introduction of its drawbacks, the test consisted of. His hits, Yahoo, Bank of America, Citigroup and Cingular are. White hat hackers are hired by companies to the introduction of a test, it's legal. Lamo is not what is not.

      
He New York Times' intranet, when entered into, in severe cases. He himself added to the list of experts and viewed Social Security numbers, personal information, including the CONTRIBUTORS. Lamo also has a high - profile element of the research, the Times' LexisNexis account hacked.

      
New York Times for his intrusion, Lamo was ordered to pay damages of approximately $ 65,000. He is also the home confinement for six months and on January 16, 2007 expiration of the Probation, was sentenced to two years. Lamo is currently an award - winning journalist and working as a public speaker.


   
3.Kevin Mitnick: A self-proclaimed "Hacker poster boy," Mitnick officials to go through one of the most popular career. Riots at the level of his campaign through the media but his actual offenses may be important than his notoriety suggests. Department of Justice describes him as "most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.

      
His popular Mitnick on hacking experience before committing crimes in a bit. Los Angeles bus punch card system to get free rides, he began to exploit. Then, Apple co - founder Steve Wozniak, such as phone phreaking in dabbled. Although the number of offenses, Mitnick was finally breaking into the Digital Equipment Corporation's computer network and software, was convicted for stealing.

      
Mitnick, he went on a two and a half year's riots were a serious of "coast-to-coast kolahalanni hacking." CNN article, "Legendary Computer Hacker Released from Jail," ", he hacked into computers and steal corporate secrets, scrambled phone networks and the national defense warning system." He then tells the computer expert Tsutomu Shimomura Hacker and his colleagues led to the Undoing of a home computer, into hacked.

      
Today, Mitnick Black Hat Hacker and his role as a productive member of society in the last move and stay there. He is 8 months in solitary confinement for five years served, and the author, and speaker, is now a computer security consultant.


   
4.Kevin Poulsen: Also known as Dark Dante, Poulsen among other things, a brand new Porsche into LA radio's KIIS-FM phone lines, has gained recognition for his hack. Law enforcement has him as "Hannibal Lecter of computer crime."

      
He hacked into the database after a federal investigation authorities began to pursue Poulsen. During this career, he later wiretap by the FBI for hacking into federal computers drew fire igniting the citi.

      
His hacking specialty, however, revolves around telephones. Poulsen's most famous hack, KIIS-FM, the station's phone lines can be obtained by taking all over. In the relevant achievement, Poulsen also "and then ran a virtual escort agency for an introduction to reactivate the old Yellow Page escort telephone numbers." Later, when his photo up on the show Unsolved Mysteries program dhikottindi 1-800 phone lines. Ultimately, Poulsen was captured in a supermarket and served on a sentence of five years.

      
Since serving time, Poulsen worked as a journalist. He is a senior editor for Wired News is now. MySpace profiles to identify 744 of his popular article details his work with sex offenders.


   
5. Robert tapan Morris: Morris, son of former National Security Agency scientist Robert Morris, Morris Worm, creator of the Internet was the first computer worm known as anlised. As a result of the crimes, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

      
Morris wrote the code for the worm while he was a student at Cornell. Announced that it intended to use the Internet to see how big he was. Warm, however, because they are no longer usable, much more depression itself down twice. I know exactly how many computers it can not be manipulated, but experts estimate the impact of a 6,000 machines. He has three years of Probation, 400 hours of community service and was sentenced to a fine of $ 10,500.

      
Morris is now at the MIT Computer Science and Artificial Intelligence Laboratory has been working as a tenured professor. Such as Chord and wireless mesh networks Roofnet he was mainly as a computer network architectures including distributed hash tables of the research.



White Hat hackers 
 
The hackers used their skills and are classified as "white hat." The white hats are often hired by companies to test the integrity of their systems as "ethical hackers," to work. Others, the laws of bending but not breaking to operate the company without permission and in the process of creating some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed.

   
1. Stephen Wozniak: "Woz" Apple's "Other Steve" is famous for. Wozniak, along with current Apple CEO Steve Jobs, Apple Computer co - founded. He, as well as Kettering University and the National Medal of Technology, also received honorary doctorates from Nova Southeastern University. In addition, Woz Fame in September 2000, earned a place in the National Inventors Hall of Fame.

      
Woz hacking making his debut in the blue boxes, free long distance calls telephone - exchange mechanisms that bypass the device. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. Then a couple of college classmates to the blue boxes, built and sold their frequencies, not on research. Henry Kissinger as the Pope while Wozniak has also been used to call a blue box.


      
His popular computer Wozniak eventually came out of college. Jobs, such as a fully assembled PC board to the computer to sell the brightest idea. Steves Wozniak's cherished scientific calculator and Jobs sold 'VW van for capital and Garage Sale Got to work on assembling the sample. Wozniak is the design of hardware and software. Woz.org the Letters section, he said, "Ed Roberts and Bill Gates and Paul Allen, and the number of tons of help more, do not." Wozniak and Jobs to commemorate a local dealer for $ 666.66 each for the Apple I sold the first 100.

      
Woz is no longer focusing primarily on philanthropy instead, Apple has been working full time for. One of the most popular in Los Gatos, California School District as a fairy godfather to his function. "Wozniak, and teachers to provide students with the Los Gatos School District 'adopted' hands - on classes and the state - of - art technology, equipment donations."


   
2. Tim Berners-Lee: Berners-Lee, creator of the World Wide Web, we are unable to Internet sites, documents and files you use to access the system as it is famous. He has a number of identities in particular, has received the Millennium Technology Prize.

      
While a student at Oxford University, Berners-Lee, a friend of hacking university computers to access the coverage and then banned. w3.org reports, "pondanappatiki, he had a soldering iron, TTL gates, an M6800 processor and an old television with built his first computer. [Oxford at]" Berners-Lee's parents, technological innovation Manchester Mark1, one of the earliest electronic computers, mathematicians have worked as, his genes might be running.

      
CERN, a European nuclear research organization, Berners-Lee was working with researchers to easily share and update information in a hypertext prototype system that helped. He later realized that hypertext could be joined with the Internet. Berners-Lee explains how he combines them: ". - Ta-da - I have to take the hypertext idea and connect it to the TCP and DNS ideas and came to the World Wide Web"

      
From his creation of the World Wide Web, Berners-Lee founded the World Wide Web Consortium at MIT. W3C describes itself as "an international consortium where Member organizations, a full-time staff and the public work together to develop Web standards." Berners-Lee's World Wide Web idea, as well as from the W3C standards, as well as any patent or rayaltilato due to be distributed free of charge.


   
3. Linus Torvalds: Torvalds Linux, the most popular Unix-based operating system fathered. He was "an engineer," he calls himself and his desires are normal and he said "I am not making fun I can have the best damn operating system to hang."

      
Torvalds, a Commodore Vic -20, 8-bit home computer that came with the computers in his debut. He then moved on to a Sinclair QL. Sinclair was last modified on Wikipedia that the report he was "particularly widespread, its operating system." Specifically, Torvalds Hacks "is an assembler and a text editor ... as well as a few games." Added

      
Inspiration for using the Minix operating system, Torvalds, the Linux kernel was created in 1991. He is a task switcher in Intel 80386 assembly, and started with the terminal driver. Later on, he wanted the code, put out a call for others to contribute. Currently, only about 2 percent of the current Linux kernel, Torvalds himself to write. The success of this public invitation to contribute code for Linux Free / Open Source Software is one of the most famous example is the campaign.

      
Currently, Torvalds volunteer programmers contribute to the code is integrated to the kernel, Linux ringleader had. He was later named the Stockholm University and an Asteroid, and received honorary doctorates from the University of Helsinki. He was also filmed by Time Magazine's "Heroes 60 Years."


   
4.
Richard Stallman: Stallman's fame, he was the founder of the GNU project to develop a free operating system, is derived from. This, for he is known as the 'father of free software. His "Serious Bio", "non - free software for users and helplessly represent fragmented, unable to change it, and it is forbidden to share places. The liberties of a free operating system is required for the use of a computer." Emphasized,

      
Stallman, who is in love with RMS, MIT in the early hacking. Emacs project and others like him as a "staff Hacker" and did it. He has limited computer access in the laboratory on a critic. Installed a password system, Stallman password has been reset to zero strings, it failed, then the password information for users of the system, the removal of the messages sent to them.

      
Stallman's crusade for free software started with a printer. Laboratory at MIT, he and other hackers so that they sent convenient alert messages are allowed to modify the code printers. However, a new printer came along - one who is not allowed to edit. It is far away from the lab and submitted to the warnings, the lack of an inconvenience. It was during this period that he was "convinced ... a moral need to free software."

      
With this inspiration, he began work on GNU. Stallman wrote an essay, he made it a foundation, because an operating system to commemorate the "GNU Project," "the crucial software to use a computer." During this time, the operating system GNU / Linux version uses Torvalds began the Linux kernel. GNU "copyleft", used to allow users to modify, copy and distribute copyrighted software distributed under the law, hired a method.

      
Stallman's life continues to center around the promotion of free software. The Free Software Foundation and League for Programming Freedom in organizations such as the Digital Rights Management (or as he prefers, Digital Restrictions Management) works against such movements. He has won awards, including fellowship, and four honorary doctorates for his work, the widespread recognition.


   
5.  Tsutomu Shimomura: Shimomura reached fame in an unfortunate manner: he was hacked on by Kevin Mitnick. This is a personal attack, he can help the FBI capture him in his cause.

      
Shimomura's work to catch Mitnick commendable, but he is not without his own dark side. By Bruce Sterling recalled: "He, T cellphone AT & this out at Laguna finger - Hacks that, shrinkwrap it out of the Laguna, and an FBI agent he was listening, standing at his shoulder, up and down the Capitol Hill, what starts monitoring phone calls."

      
Shimomura him to bring down the out-hacked Mitnick. Soon after the discovery about the intrusion, he established a team to work finding Mitnick. Using Mitnick's cell phone, they Raleigh - Durham International Airport near him on the track. Article, Shimomura Mitnick explains how pinpointed the location of the "SDSC Computer Experts Terrorist FBI Capture Computer Help". Armed with a technician from the phone company, Shimomura "hooked to a laptop in a narrow apartment complex in search of a cellular frequency direction - to be used to find the antenna." Mitnick was arrested shortly thereafter. After a career, Shimomura and then it became a film journalist John markoph, who wrote a book about the incident.

Most Searches

2leep.com