Skip to main content

Great Hackers


The 414s
The 414s were a gang of six teenagers named after their Milwaukee, Wisconsin area code, who broke into dozens of computer systems throughout the United States and Canada in 1983.Their exploits included Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank.The incident appeared as the cover storyof Newsweek with the title Beware: Hackers at play,possibly the first mass-media use of the term hacker in the context of computersecurity. As a result, the U.S. House of Representatives held hearings on computer security and passed several laws.

Mark Abene
Mark Abene (also known as Phiber Optik) inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.

Dark Avenger
Dark Avenger is the pseudonym of a Bulgarian virus writer who invented polymorphic code in 1992 as a means to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.

John Draper
John Draper(also known as Captain Crunch) is widely credited with evangelizing the use of the 2600 hertz tone generated by whistles distributed in Captain Crunch cereal boxes in the 1970s, and sometimes inaccurately credited with discovering their use.Draper served time in prison for his work, and is believed to have introduced Steve Wozniak to phone phreaking through the 2600Hz tone. Draper now develops anti-spam and security software.

Farid Essebar
Farid Essebar (also known as Diabl0) is the creator of Zotob

Nahshon Even-Chaim
Nahshon Even-Chaim (also known as Phoenix) was a leading member of Australianhacking group The Realm. He targeted US defense and nuclear research computer systemsin late 1980s until his capture by Australian Federal Police in 1990. He and fellow Realm members Electron and Nom were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.

Markus Hess
Markus Hess is a West German who hacked into United States Military sites and collected information for the KGB,he was eventually tracked down by Clifford Stoll.

Jonathan James(convicted cybercriminal)
Jonathan James(also known as c0mrade) downloaded $1.7 million dollars worth of softwarewhich controlled the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. Sentenced at age 16, he was the youngest person ever incarcerated for cybercrime in the United States.

ne0h
ne0h was reported to have been employed by a Pakistani terrorist with Al-Qaeda connections, in order to steal student information from a Chinese university(reportedly, one comparable to MIT[citation needed]), India's BhabhaAtomic Research Centre, and SIPRNet, the U.S. Department of Defense's Defense Data Network.

Adrian Lamo
Lamo surrendered to federal authorities in 2003 after a brief manhunt, and was charged with nontechnical but surprisingly successful intrusions into computer systems at Microsoft, The New York Times, Lexis-Nexis, MCI WorldCom, SBC, Yahoo!, and others. His methods were controversial, and his full-disclosure-by-media practices led some to assert that he was publicity-motivated.

Vladimir Levin
Vladimir Levin allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used, or even if Vladimirwas a mathematician, is unknown.

Kevin Mitnick
Kevin Mitnick was held in jail for four and a half years and released on January 21,2000. He was convicted of computer related crimes and possession of several forged identification documents. Once "the most wanted man in cyberspace", Mitnick went on to be a prolific public speaker, author, and media personality.

Robert Tappan Morris
Robert T. Morris, while a graduate student at Cornell University in 1988, created the first worm, Morris Worm, which used buffer overflows to propagate. He is the son of Robert Morris, the former chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA). Morris was not exactly a hacker of the computer security hacker culture, but a user of the MIT-AI, the home machine of the early academic hacker culture. According to Steven Levy, he was a true hacker who blundered.

v00d00
Jason Burks born October 2 1976, also referred to as "v00d00" is a former computer hacker, and malicious software writer. He is best known for writing the Juggernaut Hydra, and releasing it into the Progressive Insurance mainframe.

Craig Neidorf
In 1990, Neidorf (a co-founder of Phrack) was prosecuted for stealing the E911 documentfrom BellSouth and publicly distributing it online. BellSouth claimed that the document was worth $80,000; they dropped the charges after it was revealed that copies of the document could simply be ordered for a minuscule $13.

Brian Salcedo
Brian Salcedo was convicted in 2004 of conspiracy to commit wire and computer fraud for hacking the Lowe's home improvement chain's unsecured wireless LAN in an attempt to capture credit card numbers used during transactions. The FBI claimed that the crime could have caused more than $2.5 million in damages. He was sentenced to 9 years in federal prison. The government claims that at the time of its imposition, Brian Salcedo'ssentence was the longest federal prison sentence ever given for a computer related offense.

David L. Smith
In 1999, Smith launched the Melissa Worm, causing $80 million dollars worth of damageto businesses. Originally sentenced to 40 years, he eventually served only 20 monthswhen he agreed to work undercover for the FBI.

Comments

Popular posts from this blog

Future of AI

  The Future of Artificial Intelligence Artificial intelligence (AI) is one of the most important technologies of our time. It is already having a major impact on our lives, and its influence is only going to grow in the years to come. AI is already being used in a wide variety of applications, including: Natural language processing: AI is used to understand human language, which is essential for applications like speech recognition and machine translation. Image recognition: AI is used to identify objects and patterns in images, which is used in applications like facial recognition and self-driving cars. Machine learning: AI is used to train machines to learn from data, which is used in applications like fraud detection and spam filtering. These are just a few examples of the many ways that AI is being used today. As AI continues to develop, it will be used in even more applications, and its impact on our lives will only grow. So what does the future hold for AI? Here are a few predic

Are CRED Rewards a Sham?

  CRED is a fintech startup that offers a credit card bill payment app. The app is designed to make it easier for users to pay their credit card bills on time and earn rewards. However, there are some concerns that CRED may not be good for consumers. One concern is that CRED encourages users to spend more money than they can afford. The app uses gamification and social media to create a sense of competition among users. This can lead to users spending more money in order to climb the leaderboard and earn rewards. Another concern is that CRED's rewards program is not as generous as it may seem. In order to earn the most rewards, users need to pay their credit card bills on time and in full. However, many users may not be able to do this, especially if they are struggling to make ends meet. Finally, CRED's privacy policy has been criticized for being too vague. The policy states that CRED may share user data with third-party partners, but it does not specify which partners or wha

Karnataka Elections 2023: The Handslide

  The Congress party won the 2023 Karnataka Legislative Assembly election by a landslide, winning 126 seats and forming the government. The BJP, which was in power for the last five years, was reduced to 39 seats. The Janata Dal (Secular) won 37 seats. There were several reasons for the Congress's victory. One reason was the anti-incumbency factor. The BJP had been in power for five years, and there was a lot of dissatisfaction with the government's performance. The Congress was able to capitalize on this dissatisfaction and win over many voters. Another reason for the Congress's victory was its strong local leadership. The party had a strong organization in Karnataka, and it was able to mobilize its supporters effectively. The BJP, on the other hand, was seen as being out of touch with the people of Karnataka. The Congress also benefited from the fact that it was able to project a more secular image than the BJP. The BJP has been accused of being too close to the Hindutva