Kevin Mitnick
Perhaps the most famous hakcer Mitnick became of his generation, because Mitnick has been 'crowned' by the U.S. Justice Department became the most wanted computer criminal in the United States along seharag. Mitnick with his posture that matches the character of a hacker, enter t
he number of company-owned computer systems technology and telekomunikasitop world, including Nokia, Fujitsu, and Motorola. After large-scale published by the FBI, Mitnick eventually arrested in 1995 and after receiving numerous allegations, she eventually spent time in prison for five years. He was released in 2000 and now has a computer security consultant. He did not call his actions as 'hacking' and instead gave the name of 'social engineering'.
he number of company-owned computer systems technology and telekomunikasitop world, including Nokia, Fujitsu, and Motorola. After large-scale published by the FBI, Mitnick eventually arrested in 1995 and after receiving numerous allegations, she eventually spent time in prison for five years. He was released in 2000 and now has a computer security consultant. He did not call his actions as 'hacking' and instead gave the name of 'social engineering'.
Kevin Poulsen
Poulson was first enters the world of hacking through the phone line at KIIS-FM radio station in the city of Los Angeles, and that made famous when Poulson digital fraud by claiming to be a caller who break through the 102 phone line just to get money to buy a Porsche. Kevin Poulson or aliasnya name Dark Dante, managed to turn back the Yellow Page, then using the phone number in it to run in a virtual escort agency. The police later arrested Poulson and imprison him for three years after he hacked the database of a federal investigation, and also all made the phone line 1.800 crashes. After he got out of prison he is now a journalist.
Adrian Lamo
Adrian Lamo, or so-called 'homeless hacker', usually using coffee shops, libraries and Internet cafés as a base to carry out the action. Most activities are breaking into computer networks and then reported to the company that has a weakness that network. Lamo's biggest claim is that he is best known after his break through the office intranet and the New York Times added its name in the database of the daily newspaper companies. It also uses LexisNexis account to obtain secret access to profilpejabat company. Lamo is now working as a journalist.Stephen Wozniak
Loyd Blankenship
Linus Torvalds
John Draper
Mark Abene
Mudge
One of the hackers who are hacking perbuatanya testified that make Internet networks around the world working not only with a count of 30 minutes
No comments:
Post a Comment