Friday, December 11, 2009

top 10 famous hacker


The expertise of a hacker is often considered 'troublesome' number of victims. Yet not all be branded as negative hackers, many of them are using their expertise for the purposes of viewing or improve weaknesses in the computer software.

But the effect, caused by a number of hackers who used his skills for evil purposes is often a hacker got a negative view of society.

The journey to become a hacker himself traveled through a long journey. To become a famous hacker, often have to deal with the prison. Just look at the way 10 the following world-renowned hackers as reported by the Telegraph, Sunday (29/11).

1. Kevin Mitnick
Born August 6, 1963 this is one of the computer hacker most controversial in the late 20th century. United States Court even referred to him as a criminal fugitive most wanted computer in America. Kevin's been known to break into computer networks of major telecommunications companies such as Alcatel, Fujitsu and Motorola.

The FBI arrested Kevin Mitnick in January 1995 in her apartment in the city of Raleigh, North Carolina on charges of assault against the government. Currently, he job as a security consultant computer network system.

2. Kevin Poulson
Long before he became a senior editor at Wired News, Men's full name is Kevin Lee Poulsen was known as an excellent hacker. Born in Pasadena, United States, 1965 was never broken into the fixed line network owned by Los Angeles radio station KIIS-FM, so he often won the radio quizzes. Even over the phone via a radio quiz show he can win a major prize, a Porsche.

3. Adrian Lamo
Adrian Lamo's name is often dubbed as 'the homeless hacker' the article he often did its actions in coffee shops, libraries or internet cafe. Action the most attention was when he broke into the company's network of media, the New York Times and Microsoft, MCI WorldCom, Ameritech, Cingular. Not only that, he also managed to infiltrate the system's AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems. Now he is living as a journalist.

4. Stephen Wozniak
'Woz' as he was usually called. We have perhaps better known as a founder of Apple. But as a student, Wozniak has become a fairly competent hacker. 59-year-old man was known to have broken into the phone network that enables long distance calls without paying anything and without a time limit. The instrument was made during a student is known by the name 'blue boxes'

5. Loyd Blankenship
The man nicknamed the mentor was once a prominent member of a hacker group in 1980 Legion Of Doom. Blakenship is the author of The Conscience of a Hacker (Hacker Manifesto). The book, written after he was captured and published in the underground hacker ezine Phrack.

6. Michael Calce
From an early age Calce was known as a Hacker. Action to break the commercial sites of the world did when he was 15 years old. Men who use the name in any action MafiaBoy, is arrested when the break in 2000 ruffled eBay, Amazon and Yahoo.

7. Robert Tappan Morris
The name Morris is known as an internet virus maker in 1988, otherwise known as the 'Morris Worm' is known to damage approximately 6000 computers. Due his act he be sanctioned for social work for 4000 hours. Now he works as an educator at the Massachusetts Institute of Technology.

8. The Masters Of Deception
The Masters Of Deception (MoD) is a group of hackers based in New York. These groups often disrupt the phone network owned Telecommunications Company like AT & T. Some members of this group were arrested in 1992 and thrown into prison.

9. David L. Smith
Smith is known as the inventor of Mellisa worm, which was first discovered on March 26, 1999. Mellisa is often also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo". The virus is distributed via email. Smith himself eventually dragged to jail because the virus had caused approximately $ 80 million

10. Sven Jaschan
Jaschan to carve his name as a villain in the virtual world in 2004 when a malicious program Netsky and Sasser worms. Currently he works in a network security company.

No comments:

Post a Comment